2023
DOI: 10.1109/jestpe.2022.3221867
|View full text |Cite
|
Sign up to set email alerts
|

Distinguishing Between Cyber Attacks and Faults in Power Electronic Systems—A Noninvasive Approach

Abstract: With increased cyber infrastructure in large power systems with inverter-based resources (IBRs), it remains highly susceptible to cyber attacks. Reliable and secure operations of such system under a large signal disturbance necessitate an anomaly diagnosis scheme, which is substantial for either selective operation of relays (during grid faults), or cybersecurity (during cyber attacks). This becomes a challenge for power electronic systems, as their characteristic response to such large signal disturbance is v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Attack #15-PE Hardware Attack: Intentional PE hardware layer attack can include tempering, swapping, and vandalism to defect the PE hardware layer by physical attackers (AV18). This attack can cause degrading inverter performance, PE hardware components' faults, and shutting-down the device by the protection circuits [84].…”
Section: Pe Hardware Layer Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Attack #15-PE Hardware Attack: Intentional PE hardware layer attack can include tempering, swapping, and vandalism to defect the PE hardware layer by physical attackers (AV18). This attack can cause degrading inverter performance, PE hardware components' faults, and shutting-down the device by the protection circuits [84].…”
Section: Pe Hardware Layer Attacksmentioning
confidence: 99%
“…PE-ID3 provides a comprehensive diagnosis against attacks. A remarkable example method distinguishing between cyberattacks and PE hardware faults can be found in [84], which can further provide designing PEF. However, Fallah et al [108] assume that firmware is secure and malware cases are not considered.…”
Section: F Pe Hardware Attacks Defense (Attacks #13-15)mentioning
confidence: 99%
“…Examples of such faults include over voltages or overheating [30].  Environmental disturbances: External factors that exert an influence on the performance or operation of power electronic systems.…”
Section: Anomaly Taxonomymentioning
confidence: 99%
“…The [30] study, uses a non-invasive anomaly diagnosis mechanism to distinguish between cyber-attacks and faults in power electronic systems such as Inverter-Based Resources (IBRs) or microgrids. This method only requires locally measured voltage and frequency as input and can distinguish these anomalies within 5 ms.…”
Section: Anomaly Diagnosismentioning
confidence: 99%
“…These factors can potentially result in delayed transmission of control signals among distributed energy resources (DERs), consequently impairing the overall system performance. Furthermore, these integrated cyber-physical systems are also prone to cyber attacks [5], [6]. Given PES's characteristics of low system inertia and swift responsiveness, such attacks can have more profound implications compared to bulk power systems.…”
Section: Introductionmentioning
confidence: 99%