2021
DOI: 10.1109/jestpe.2019.2953480
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security in Control of Grid-Tied Power Electronic Converters—Challenges and Vulnerabilities

Abstract: Grid tied power electronic converters are key enabling technologies for interfacing renewable energy sources, energy storage, electrical vehicles, microgrids and high voltage dc transmission lines with the electrical power grid. As number of power converters in modern grids continually increase, their monitoring and coordinated control in a way to support the grid have become topics of increased practical and research interest. In connection with this, latest standards have also defined mandatory set of contro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 115 publications
(61 citation statements)
references
References 65 publications
(75 reference statements)
0
48
0
Order By: Relevance
“…By definition, uncoordinated attacks can be defined as a set of attack elements, which do not follow synchronization theory in Wx attack = 0. As a consequence, it follows from (6) to conclude that L T u a = 0 for uncoordinated attacks. Remark III: Using (13), it can be formalized that the set of detection criterion…”
Section: A Detectionmentioning
confidence: 96%
See 1 more Smart Citation
“…By definition, uncoordinated attacks can be defined as a set of attack elements, which do not follow synchronization theory in Wx attack = 0. As a consequence, it follows from (6) to conclude that L T u a = 0 for uncoordinated attacks. Remark III: Using (13), it can be formalized that the set of detection criterion…”
Section: A Detectionmentioning
confidence: 96%
“…To detect the presence of cyber attacks, bad-data detection tests are usually performed to identify residual element(s) between estimated and measured states [6]. These attacks can be classified differently into a primary superset with false data injection attacks (FDIAs) [7], denial of service (DoS) [8] and replay attacks as its elements [9].…”
Section: Introductionmentioning
confidence: 99%
“…Co-simulation Platform; Simulation packages for assessing system integration of components typically cover only one sub-domain, while simplifying the others. Co-simulation overcomes this by coupling sub-domain models that are described and solved within their native environments, using specialized solvers and validated libraries [27]. Besides, it is possible to solve a problem that consists of subproblems with different time steps through co-simulations.…”
Section: B Future Workmentioning
confidence: 99%
“…Further, data intrusion from stealth attacks is also possible, as demonstrated in [8]- [12]. Such attacks are capable of increasing the generation cost without causing any obvious indications of power imbalance.…”
Section: A Linear Regression Based Resilient Optimalmentioning
confidence: 99%