2019 IEEE Power and Energy Conference at Illinois (PECI) 2019
DOI: 10.1109/peci.2019.8698907
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography Considerations for Distributed Energy Resource Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 8 publications
0
1
0
Order By: Relevance
“…The defense methods for DERs can be categorized into hardware-based and software-based methods. The hardwarebased methods utilize the hardware components, such as trusted execution environments (TEEs) [12], cryptography module [13], and device statistical features [14]. Nevertheless, the hardware-based methods have limitations due to poor scalability and less administrative control over DERs.…”
Section: B Der Cybersecuritymentioning
confidence: 99%
“…The defense methods for DERs can be categorized into hardware-based and software-based methods. The hardwarebased methods utilize the hardware components, such as trusted execution environments (TEEs) [12], cryptography module [13], and device statistical features [14]. Nevertheless, the hardware-based methods have limitations due to poor scalability and less administrative control over DERs.…”
Section: B Der Cybersecuritymentioning
confidence: 99%
“…Recently, several research works addressed the different security aspects of CPS: the different CPS security goals were listed and discussed in Chen [12] , Miller and Valasek [13] , Bou-Harb [14] , Sklavos and Zaharakis [15] ; maintaining CPS security was presented in Humayed et al [16] ; CPS security challenges and issues were presented in Yoo and Shon [17] , Alguliyev et al [18] ; some of the security issues were reviewed, including big data security [19,20] , IoT storage issues [21] , and Operating System vulnerabilities [22] ; several security and privacy solutions using cryptographic algorithms and protocols were discussed in Kocabas et al [23] , Lai et al [24] . However, none of the existing works presented a comprehensive view of CPS security in terms of threats, vulnerabilities, and attacks based on the targeted domain (cyber, physical, or hybrid).…”
Section: Related Workmentioning
confidence: 99%
“…In [23] Kocabas et al conducted their own survey which was dedicated to conventional and emerging encryption schemes which could be employed to offer secure data storage and sharing. In [24] , Lai et al reviewed and discussed prominent cryptographic authentication and encryption methods [275] to secure Distributed Energy Resources (DER) systems, while providing recommendations on applying cryptography to DER systems. In [276] , Ding et al presented an overview of recent advances on security control and attack detection of industrial CPS, especially against denial-ofservice, replay, and deception attacks.…”
Section: Cryptographic-based Solutionsmentioning
confidence: 99%
“…The report presents and discusses different types of cryptography algorithms, including symmetric encryption algorithms with different cypher block operation modes. Additionally, the report assesses the requirements from the SunSpec Common Smart Inverter Profile, California Rule 21, and IEEE 2030.5 for prioritizing functionalities within the Module-OT device (Jacobs et al 2019;Lai et al 2019).…”
Section: Practical Considerations Of Cryptography In Distributed Ener...mentioning
confidence: 99%