Skip to main content
Top
Published in: International Journal of Information Security 1/2024

01-08-2023 | Survey

Cybersecurity challenges in IoT-based smart renewable energy

Authors: Alexandre Rekeraho, Daniel Tudor Cotfas, Petru Adrian Cotfas, Titus Constantin Bălan, Emmanuel Tuyishime, Rebecca Acheampong

Published in: International Journal of Information Security | Issue 1/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) makes it possible to collect data from, and issue commands to, devices via the Internet, eliminating the need for humans in the process while increasing productivity, accuracy, and economic value. Therefore, the integration of IoT plays a crucial role in achieving high efficiency and sustainability in the production of renewable energy that could be used to meet future electricity needs. While this approach has many significant benefits, it also opens smart renewable energy to cyberattacks, giving hackers a new window of opportunity to take advantage of renewable energy’s vulnerabilities. This obviously affects the financial and physical functioning of smart renewable energy. This article reviews the literature on cybersecurity threats and vulnerabilities in IoT-based smart renewable energy and cyberattacks on power systems. False data injection, replay, denial of service, and brute force credential attacks have been identified as the main threats to IoT-based smart renewable energy. These threats exploit IoT-based smart renewable energy’s vulnerabilities such as the usage of insecure communication protocols, poor encryption techniques, poor hash algorithms, lack of access control, lack of parameter sanitization, and the inappropriate use of authentication alongside encryption. The findings of this review will assist researchers in better understanding the issues surrounding the cybersecurity of IoT-based smart renewable energy and the needs for grid security in light of the exponential growth in the number of renewable energy sources connected to the grid.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Batcha, R.R., Geetha, M.K. A survey on IOT based on renewable energy for efficient energy conservation using machine learning approaches. In: 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE), IEEE, pp 123–128 (2020). https://doi.org/10.1109/ICETCE48199.2020.9091737. Batcha, R.R., Geetha, M.K. A survey on IOT based on renewable energy for efficient energy conservation using machine learning approaches. In: 2020 3rd International Conference on Emerging Technologies in Computer Engineering: Machine Learning and Internet of Things (ICETCE), IEEE, pp 123–128 (2020). https://​doi.​org/​10.​1109/​ICETCE48199.​2020.​9091737.
7.
go back to reference Hueros-Barrios, P.J., Rodríguez Sánchez, F.J., Martín, P., Jiménez, C., Fernández, I.: Addressing the cybersecurity vulnerabilities of advanced nanogrids: a practical framework. Internet Things 20, 100620 (2022)CrossRef Hueros-Barrios, P.J., Rodríguez Sánchez, F.J., Martín, P., Jiménez, C., Fernández, I.: Addressing the cybersecurity vulnerabilities of advanced nanogrids: a practical framework. Internet Things 20, 100620 (2022)CrossRef
29.
go back to reference Ponnalagarsamy, S., et al.: Impact of IoT on renewable energy. In: Singh, I., et al. (eds.) IoT Applications Computing. IntechOpen (2022) Ponnalagarsamy, S., et al.: Impact of IoT on renewable energy. In: Singh, I., et al. (eds.) IoT Applications Computing. IntechOpen (2022)
55.
go back to reference Olowu, T.O., Dharmasena, S., Hernandez, A., Sarwat, A.: Impact analysis of cyber attacks on smart grid: a review and case study. In: Tyagi, H., Chakraborty, P.R., Powar, S., Agarwal, A.K. (eds.) New Research Directions in Solar Energy Technologies in Energy, Environment, and Sustainability, pp. 31–51. Springer, Singapore (2021) Olowu, T.O., Dharmasena, S., Hernandez, A., Sarwat, A.: Impact analysis of cyber attacks on smart grid: a review and case study. In: Tyagi, H., Chakraborty, P.R., Powar, S., Agarwal, A.K. (eds.) New Research Directions in Solar Energy Technologies in Energy, Environment, and Sustainability, pp. 31–51. Springer, Singapore (2021)
61.
go back to reference Zhong, H., et al. A lightweight and secure data authentication scheme with privacy preservation for wireless sensor networks. In: 2016 International Conference on Networking and Network Applications (NaNA), pp. 210–217 (2016). https://doi.org/10.1109/NaNA.2016.85. Zhong, H., et al. A lightweight and secure data authentication scheme with privacy preservation for wireless sensor networks. In: 2016 International Conference on Networking and Network Applications (NaNA), pp. 210–217 (2016). https://​doi.​org/​10.​1109/​NaNA.​2016.​85.
70.
go back to reference Pavithra, L., Rekha, D.: Prevention of replay attack for isolated smart grid. In: Deshpande, P., Abraham, A., Iyer, B., Ma, K. (eds.) Next Generation Information Processing System, Advances in Intelligent Systems and Computing, pp. 251–258. Springer, Singapore (2021) Pavithra, L., Rekha, D.: Prevention of replay attack for isolated smart grid. In: Deshpande, P., Abraham, A., Iyer, B., Ma, K. (eds.) Next Generation Information Processing System, Advances in Intelligent Systems and Computing, pp. 251–258. Springer, Singapore (2021)
71.
go back to reference Yeom, J.-C., Zhou, Q., Song, I.-A., Lee, Y.-S., Ra, I.: Authentication mechanism for IoT device in micro grid environments. In: Peng, H., Deng, C., Wu, Z., Liu, Y. (eds.) Computational Intelligence and Intelligent Systems, in Communications in Computer and Information Science, pp. 281–291. Springer, Singapore (2019) Yeom, J.-C., Zhou, Q., Song, I.-A., Lee, Y.-S., Ra, I.: Authentication mechanism for IoT device in micro grid environments. In: Peng, H., Deng, C., Wu, Z., Liu, Y. (eds.) Computational Intelligence and Intelligent Systems, in Communications in Computer and Information Science, pp. 281–291. Springer, Singapore (2019)
73.
go back to reference Liang, L., Zheng, K., Sheng, Q., Wang, W., Fu, R., Huang, X.: A denial of service attack method for IoT system in photovoltaic energy system. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) Network and System Security. Lecture Notes in Computer Science, pp. 613–622. Springer International Publishing, Cham (2017)CrossRef Liang, L., Zheng, K., Sheng, Q., Wang, W., Fu, R., Huang, X.: A denial of service attack method for IoT system in photovoltaic energy system. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) Network and System Security. Lecture Notes in Computer Science, pp. 613–622. Springer International Publishing, Cham (2017)CrossRef
75.
76.
go back to reference Bhosale, K.S., et al. The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. In: 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (℡SIKS), pp. 136–139 (2017). https://doi.org/10.1109/℡SKS.2017.8246247. Bhosale, K.S., et al. The distributed denial of service attacks (DDoS) prevention mechanisms on application layer. In: 2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (℡SIKS), pp. 136–139 (2017). https://​doi.​org/​10.​1109/​℡SKS.​2017.​8246247.
89.
go back to reference I.-C. Alert. Cyber-attack against ukrainian critical infrastructure. In: Cybersecurity Infrastruct. Secur. Agency, Washington, DC, USA, Tech. Rep. ICS Alert (IR-ALERT-H-16–056–01), (2016) I.-C. Alert. Cyber-attack against ukrainian critical infrastructure. In: Cybersecurity Infrastruct. Secur. Agency, Washington, DC, USA, Tech. Rep. ICS Alert (IR-ALERT-H-16–056–01), (2016)
90.
go back to reference Zetter, K., et al.: Inside the cunning, unprecedented hack of Ukraine’s power grid. Wired 9, 1–5 (2016) Zetter, K., et al.: Inside the cunning, unprecedented hack of Ukraine’s power grid. Wired 9, 1–5 (2016)
93.
go back to reference Learned, L.: Risks posed by firewall firmware vulnerabilities. North American Electric Reliability Corporation (2019) Learned, L.: Risks posed by firewall firmware vulnerabilities. North American Electric Reliability Corporation (2019)
95.
go back to reference Cyber attack of the Sandworm group (UAC-0082) on energy facilities of Ukraine using malware INDUSTROYER2 and CADDYWIPER (CERT-UA#4435). cert.gov.ua. Accessed 04 Feb 2023 from https://cert.gov.ua/ Cyber attack of the Sandworm group (UAC-0082) on energy facilities of Ukraine using malware INDUSTROYER2 and CADDYWIPER (CERT-UA#4435). cert.gov.ua. Accessed 04 Feb 2023 from https://​cert.​gov.​ua/​
100.
go back to reference Shanmugapriya, D., et al.: MQTT protocol use cases in the internet of things. In: Srirama, S.N., Lin, J.C.-W., Bhatnagar, R., Agarwal, S., Reddy, P.K. (eds.) Big Data Analytics. Lecture Notes in Computer Science, pp. 146–162. Springer International Publishing, Cham (2021)CrossRef Shanmugapriya, D., et al.: MQTT protocol use cases in the internet of things. In: Srirama, S.N., Lin, J.C.-W., Bhatnagar, R., Agarwal, S., Reddy, P.K. (eds.) Big Data Analytics. Lecture Notes in Computer Science, pp. 146–162. Springer International Publishing, Cham (2021)CrossRef
101.
go back to reference Chlela, M., et al. Impact of cyber-attacks on islanded microgrid operation. In: Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems, in RSES ’16. New York, NY, USA: Association for Computing Machinery (2016), pp. 1–5. https://doi.org/10.1145/2939940.2939943 Chlela, M., et al. Impact of cyber-attacks on islanded microgrid operation. In: Proceedings of the Workshop on Communications, Computation and Control for Resilient Smart Energy Systems, in RSES ’16. New York, NY, USA: Association for Computing Machinery (2016), pp. 1–5. https://​doi.​org/​10.​1145/​2939940.​2939943
Metadata
Title
Cybersecurity challenges in IoT-based smart renewable energy
Authors
Alexandre Rekeraho
Daniel Tudor Cotfas
Petru Adrian Cotfas
Titus Constantin Bălan
Emmanuel Tuyishime
Rebecca Acheampong
Publication date
01-08-2023
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 1/2024
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-023-00732-9

Other articles of this Issue 1/2024

International Journal of Information Security 1/2024 Go to the issue

Premium Partner