Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon openaccess Cybersecurity for distributed energy resources and smart inverters

The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third-parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber-attacks. This study proposes a holistic attack-resilient framework to protect the integrated DER and the critical power grid infrastructure from malicious cyber-attacks, helping ensure the secure integration of DER without harming the grid reliability and stability. Specifically, the authors discuss the architecture of the cyber-physical power system with a high penetration of DER and analyse the unique cybersecurity challenges introduced by DER integration. Next, they summarise important attack scenarios against DER, propose a systematic DER resilience analysis methodology, and develop effective and quantifiable resilience metrics and design principles. Finally, they introduce attack prevention, detection, and response measures specifically designed for DER integration across cyber, physical device, and utility layers of the future smart grid.

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
      • 37. Sandia National Laboratories: ‘Accelerating development of advanced inverters: evaluation of anti-islanding schemes with grid support functions and preliminary laboratory demonstration’, 2013. Available at http://www.prod.sandia.gov/techlib/access-control.cgi/2013/1310231.pdf.
    5. 5)
      • 7. North American Electric Reliability Corporation (NERC): ‘Critical Infrastructure Protection (CIP) Standards’, 2015. Available at http://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx.
    6. 6)
      • 31. Seguin, R., Woyak, J., Costyk, D., et al: ‘High-penetration PV integration handbook for distribution engineers’. NREL/TP-5D00-63114, National Renewable Energy Laboratory (NREL), 2016. Available at http://www.nrel.gov/docs/fy16osti/63114.pdf.
    7. 7)
      • 18. Grochocki, D., Huh, J.H., Berthier, R., et al: ‘AMI threats, intrusion detection requirements and deployment recommendations’. Third Int. Conf. Smart Grid Communications, Tainan city, Taiwan, November 2012, pp. 395400.
    8. 8)
    9. 9)
    10. 10)
    11. 11)
      • 42. Qi, J., Sun, K., Wang, J., et al: ‘Dynamic state estimation for multi-machine power system by unscented Kalman filter with enhanced numerical stability’, IEEE Trans. Smart Grid, doi: 10.1109/TSG.2016.2580584.
    12. 12)
      • 8. National Institute of Standards and Technology (NIST): ‘NISTIR 7628 Revision 1: Guidelines for Smart Grid Cyber Security’, 2014. Available at https://www.nist.gov/sites/default/files/documents/smartgrid/nistir-7628_total.pdf.
    13. 13)
    14. 14)
      • 12. California Energy Commission: ‘Renewable energy – overview’, 2016. Available at http://www.energy.ca.gov/renewables/tracking_progress/documents/renewable.pdf.
    15. 15)
    16. 16)
    17. 17)
    18. 18)
      • 34. ARM Limited: ‘Building a secure system using TrustZone technology’. Report, PRD29-GENC-009492C, ARM Limited, 2016. Accessed: http://www.infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf.
    19. 19)
      • 9. National Electric Sector Cybersecurity Organization Resource (NESCOR): ‘Wide area monitoring, protection, and control systems (WAMPAC) – standards for cyber security requirements’, 2012. Available at http://www.smartgrid.epri.com/doc/ESRFSD.pdf.
    20. 20)
    21. 21)
      • 2. Baker, S., Waterman, S., Ivanov, G.: ‘In the crossfire: critical infrastructure in the age of cyber war’. Technical Report, 2009, McAfee. Available at: https://www.resources2.secureforms.mcafee.com/LP=2733.
    22. 22)
      • 32. Hajahmed, M.A., Illindala, M.S.: ‘The influence of inverter-based DGs and their controllers on distribution network protection’. IEEE Industry Applications Society Annual Meeting, October 2013.
    23. 23)
    24. 24)
      • 39. Ju, W., Qi, J., Sun, K.: ‘Simulation and analysis of cascading failures on an NPCC power system test bed’. IEEE PES General Meeting, Denver, CO, 2015.
    25. 25)
    26. 26)
      • 16. Cleveland, F., Lee, A., National Electric Sector Cybersecurity Organization Resource (NESCOR): ‘Cyber security for DER systems’, Version 1.0, Electric Power Research Institute (EPRI), 2013. Available at http://www.smartgrid.epri.com/doc/der%20rpt%2007-30-13.pdf.
    27. 27)
    28. 28)
    29. 29)
      • 56. Li, P., Qi, J., Wang, J., et al: ‘An SQP method combined with gradient sampling for small-signal stability constrained OPF’, IEEE Trans. Power Syst., doi: 10.1109/TPWRS.2016.2598266.
    30. 30)
    31. 31)
      • 1. North American Electric Reliability Corporation (NERC): ‘Cyber attack task force – final report’. Technical Report, 2012. Available at http://www.nerc.com/%20docs/cip/catf/12-CATF_Final_Report_BOT_clean_Mar_26_2012-Board%20Accepted%200521.pdf.
    32. 32)
      • 20. Seal, B., Cleveland, F., Hefer, A.: ‘Distributed energy management (DER): advanced power system management functions and information exchanges for inverter-based DER devices, modelled in IEC 61850-90-7’, 2014. Available at http://www.xanthus-consulting.com/Publications/documents/Advanced_Functions_for_DER_Inverters_Modeled_in_IEC_61850-90-7.pdf.
    33. 33)
    34. 34)
    35. 35)
    36. 36)
    37. 37)
    38. 38)
      • 10. Taft, J.D., Becker-Dippmann, A.: ‘Grid architecture, release 3.0’. Pacific Northwest National Laboratory (PNNL) Report 24044, 2015. Available at http://www.gridarchitecture.pnnl.gov/media/white-papers/Grid%20Architecture%20%20-%20DOE%20QER.pdf.
    39. 39)
    40. 40)
      • 45. Huang, R., Huang, T., Gadh, R., et al: ‘Solar generation prediction using the ARMA model in a laboratory-level micro-grid’. Third Int. Conf. Smart Grid Communications, Tainan city, Taiwan, November 2012, pp. 528533.
    41. 41)
      • 35. GlobalPlatform: ‘TEE internal API specification v1.0’, 2008. Available at http://www.globalplatform.org/specificationsdevice.asp.
    42. 42)
      • 14. California Public Utilities Commission (CPUC): ‘Recommendations for updating the technical requirements for inverters in distributed energy resources: smart inverter working group recommendations’, 2013. Available at http://www.energy.ca.gov/electricity_analysis/rule21/documents/recommendations_and_test_plan_documents/Recommendations_for_updating_Technical_Requirements_for_Inverters_in_DER_2014-02-07-CPUC.pdf.
    43. 43)
    44. 44)
    45. 45)
    46. 46)
      • 46. Box, G.E.P., Jenkins, G.M., Reinsel, G.C.: ‘Time series analysis: forecasting and control’ (John Wiley & Sons, 2015).
    47. 47)
      • 15. National Electric Sector Cybersecurity Organization Resource (NESCOR): ‘Electric sector failure scenarios and impact analyses’, Version 1.0, Electric Power Research Institute (EPRI), 2013. Available at http://www.smartgrid.epri.com/doc/NESCOR%20failure%20scenarios09-13%20finalc.pdf.
    48. 48)
      • 11. Hawaii State Energy Office: ‘Hawaii energy facts & figures’, 2015. Available at http://www.energy.hawaii.gov/wp-content/uploads/2011/10/FF_May2016_FINAL_5.13.16.pdf.
    49. 49)
      • 19. Berthier, R., Sanders, W.H., Khurana, H.: ‘Intrusion detection for advanced metering infrastructures: requirements and architectural directions’. First Int. Conf. Smart Grid Communications, October 2010, pp. 350355.
    50. 50)
      • 26. Qi, J., Ju, W., Sun, K.: ‘Estimating the propagation of interdependent cascading outages with multi-type branching processes’, IEEE Trans. Power Syst., doi: 10.1109/TPWRS.2016.2577633.
    51. 51)
      • 13. New York State (NYS) Department of Public Service: ‘Reforming the energy vision’. Report, 14-M-0101, 2014. Available at http://www3.dps.ny.gov/W/PSCWeb.nsf/96f0fec0b45a3c6485257688/FILE/ATTK0J3L.pdf/Reforming%20The%20Energy%20Vision%20(REV)%20REPORT%204.25.%2014.pdf.
    52. 52)
    53. 53)
      • 17. International Electrotechnical Commission (IEC), IEC TR 62351-12:2016: resilience and security recommendations for power systems with distributed energy resources (DER) cyber-physical systems, Edition 1, 2016.
    54. 54)
      • 43. Taha, A.F., Qi, J., Wang, J., et al: ‘Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs’, IEEE Trans. Smart Grid, doi: 10.1109/TSG.2016.2570546.
    55. 55)
      • 30. Barker, P.P., Mello, R.W.D: ‘Determining the impact of distributed generation on power systems. I. Radial distribution systems’. IEEE Power Engineering Society Summer Meeting, 2000, pp. 16451656.
    56. 56)
      • 6. U.S. Department of Energy (DOE) – Energy Sector Control Systems Working Group: ‘Roadmap to Achieve Energy Delivery Systems Cybersecurity’. Technical Report, 2011. Available at http://www.energy.gov/sites/prod/files/Energy%20Delivery%20Systems%20Cybersecurity%20Roadmap_finalweb.pdf.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-cps.2016.0018
Loading

Related content

content/journals/10.1049/iet-cps.2016.0018
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address