Skip to main content
Top

2023 | OriginalPaper | Chapter

Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles

Authors : Tambiara Tabassum, Mohammad Reza Khalghani

Published in: Power Systems Cybersecurity

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Power systems are shifting into a new paradigm of connectivity. This new paradigm facilitates massive integrations of different energy resources and loads, e.g., renewable energy and electric vehicle (EV) charging stations, throughout a microgrid with cyber interfaces. The integration of these energy resources and EVs can significantly enhance the microgrid efficiency, reliability, resiliency, and address environmental concerns. Several emerging technologies are required to prepare the cyber-physical infrastructure for this highly integrated grid. This new grid model is highly dependent on the cyber interfaces and communication infrastructure that makes the system vulnerable to cyber disruptions and threats. Considering the interconnected nature of these microgrids, cyber disorders may lead to disastrous consequences; therefore, it is essential to know the vulnerabilities of the grid and design tools to identify and mitigate these threats. This chapter specifically focuses on cybersecurity issues of the microgrid with inverter-based resources (IBRs) and EV charging stations. Due to complexity and unknown behavior of grids with IBRs and EV charging stations, a variety of cyber risks can impact the grid. Therefore, this chapter demonstrates the vulnerabilities of this new grid architecture, including IBRs and EV charging stations. Besides, it discusses the effective model-based, Artificial Intelligence (AI)-based techniques, and some technologies to detect and mitigate these cyber threats.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference 2020 long-term reliability assessment. https://www.nerc.com/pa/RAPA/ra/Reliability%20Assessments. Accessed 2022-07-10 2020 long-term reliability assessment. https://​www.​nerc.​com/​pa/​RAPA/​ra/​Reliability%20Assessments. Accessed 2022-07-10
2.
go back to reference Summary report on evs at scale and the U.S. electric power system. https://www.energy.gov/sites/prod/files/2019/12/f69/GITT%20ISATT. Accessed 2022-07-10 Summary report on evs at scale and the U.S. electric power system. https://​www.​energy.​gov/​sites/​prod/​files/​2019/​12/​f69/​GITT%20ISATT. Accessed 2022-07-10
3.
go back to reference N. Pogaku, M. Prodanovic, T.C. Green, Modeling, analysis and testing of autonomous operation of an inverter-based microgrid. IEEE Trans. Power Electron. 22(2), 613–625 (2007)CrossRef N. Pogaku, M. Prodanovic, T.C. Green, Modeling, analysis and testing of autonomous operation of an inverter-based microgrid. IEEE Trans. Power Electron. 22(2), 613–625 (2007)CrossRef
4.
go back to reference I.S. Bayram, I. Papapanagiotou, A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014(1), 1–18 (2014)CrossRef I.S. Bayram, I. Papapanagiotou, A survey on communication technologies and requirements for internet of electric vehicles. EURASIP J. Wirel. Commun. Netw. 2014(1), 1–18 (2014)CrossRef
5.
go back to reference N. Priyadharshini, S. Gomathy, M. Sabarimuthu, A review on microgrid architecture, cyber security threats and standards, in Materials Today: Proceedings (2020) N. Priyadharshini, S. Gomathy, M. Sabarimuthu, A review on microgrid architecture, cyber security threats and standards, in Materials Today: Proceedings (2020)
6.
go back to reference M. Ashrafuzzaman, S. Das, Y. Chakhchoukh, S. Shiva, F.T. Sheldon, Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Sec. 97, 101994 (2020)CrossRef M. Ashrafuzzaman, S. Das, Y. Chakhchoukh, S. Shiva, F.T. Sheldon, Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Sec. 97, 101994 (2020)CrossRef
7.
go back to reference S. Sahoo, T. Dragičević, F. Blaabjerg, Cyber security in control of grid-tied power electronic converters-challenges and vulnerabilities. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5326–5340 (2019) S. Sahoo, T. Dragičević, F. Blaabjerg, Cyber security in control of grid-tied power electronic converters-challenges and vulnerabilities. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5326–5340 (2019)
9.
go back to reference A. Bindra, Securing the power grid: Protecting smart grids and connected power systems from cyberattacks. IEEE Power Electron. Mag. 4(3), 20–27 (2017)CrossRef A. Bindra, Securing the power grid: Protecting smart grids and connected power systems from cyberattacks. IEEE Power Electron. Mag. 4(3), 20–27 (2017)CrossRef
10.
go back to reference E.L. McCoy, Cyberterrorism (Cavendish Square Publishing, LLC, 2018) E.L. McCoy, Cyberterrorism (Cavendish Square Publishing, LLC, 2018)
11.
go back to reference F. Nejabatkhah, Y.W. Li, H. Liang, R.R. Ahrabi, Cyber-security of smart microgrids: a survey. Energies 14(1), 27 (2020)CrossRef F. Nejabatkhah, Y.W. Li, H. Liang, R.R. Ahrabi, Cyber-security of smart microgrids: a survey. Energies 14(1), 27 (2020)CrossRef
12.
go back to reference H.F. Habib, C.R. Lashway, O.A. Mohammed, A review of communication failure impacts on adaptive microgrid protection schemes and the use of energy storage as a contingency. IEEE Trans. Ind. Appl. 54(2), 1194–1207 (2017)CrossRef H.F. Habib, C.R. Lashway, O.A. Mohammed, A review of communication failure impacts on adaptive microgrid protection schemes and the use of energy storage as a contingency. IEEE Trans. Ind. Appl. 54(2), 1194–1207 (2017)CrossRef
13.
go back to reference M.H. Cintuglu, O.A. Mohammed, K. Akkaya, A. Selcuk Uluagac, A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutor. 19(1), 446–464 (2016) M.H. Cintuglu, O.A. Mohammed, K. Akkaya, A. Selcuk Uluagac, A survey on smart grid cyber-physical system testbeds. IEEE Commun. Surv. Tutor. 19(1), 446–464 (2016)
14.
go back to reference Z. Li, M. Shahidehpour, F. Aminifar, Cybersecurity in distributed power systems. Proc. IEEE 105(7), 1367–1388 (2017)CrossRef Z. Li, M. Shahidehpour, F. Aminifar, Cybersecurity in distributed power systems. Proc. IEEE 105(7), 1367–1388 (2017)CrossRef
15.
go back to reference X. Shi, Y. Li, Y. Cao, Y. Tan, Cyber-physical electrical energy systems: challenges and issues. CSEE J. Power Energy Syst. 1(2), 36–42 (2015)CrossRef X. Shi, Y. Li, Y. Cao, Y. Tan, Cyber-physical electrical energy systems: challenges and issues. CSEE J. Power Energy Syst. 1(2), 36–42 (2015)CrossRef
16.
go back to reference G. Liang, J. Zhao, F. Luo, S.R. Weller, Z.Y. Dong, A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2016)CrossRef G. Liang, J. Zhao, F. Luo, S.R. Weller, Z.Y. Dong, A review of false data injection attacks against modern power systems. IEEE Trans. Smart Grid 8(4), 1630–1638 (2016)CrossRef
17.
go back to reference J. Zhang, J. Ye, L. Guo, F. Li, W. Song, Vulnerability assessments for power-electronics-based smart grids, in 2020 IEEE Energy Conversion Congress and Exposition (ECCE) (IEEE, 2020), pp. 1702–1707 J. Zhang, J. Ye, L. Guo, F. Li, W. Song, Vulnerability assessments for power-electronics-based smart grids, in 2020 IEEE Energy Conversion Congress and Exposition (ECCE) (IEEE, 2020), pp. 1702–1707
18.
go back to reference J. Zhang, Q. Li, J. Ye, L. Guo, Cyber-physical security framework for photovoltaic farms, in 2020 IEEE CyberPELS (CyberPELS) (IEEE, 2020), pp. 1–7 J. Zhang, Q. Li, J. Ye, L. Guo, Cyber-physical security framework for photovoltaic farms, in 2020 IEEE CyberPELS (CyberPELS) (IEEE, 2020), pp. 1–7
19.
go back to reference F. Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, J. Ye, W.Z. Song, Detection and identification of cyber and physical attacks on distribution power grids with pvs: An online high-dimensional data-driven approach (IEEE J. Emerg. Select. Top, Power Electron, 2019) F. Li, R. Xie, B. Yang, L. Guo, P. Ma, J. Shi, J. Ye, W.Z. Song, Detection and identification of cyber and physical attacks on distribution power grids with pvs: An online high-dimensional data-driven approach (IEEE J. Emerg. Select. Top, Power Electron, 2019)
20.
go back to reference F. Li, Q. Li, J. Zhang, J. Kou, J. Ye, W.Z. Song, H.A. Mantooth, Detection and diagnosis of data integrity attacks in solar farms based on multilayer long short-term memory network. IEEE Trans. Power Electron. 36(3), 2495–2498 (2020)CrossRef F. Li, Q. Li, J. Zhang, J. Kou, J. Ye, W.Z. Song, H.A. Mantooth, Detection and diagnosis of data integrity attacks in solar farms based on multilayer long short-term memory network. IEEE Trans. Power Electron. 36(3), 2495–2498 (2020)CrossRef
21.
go back to reference Y. Li, P. Zhang, L. Zhang, B. Wang, Active synchronous detection of deception attacks in microgrid control systems. IEEE Trans. Smart Grid 8(1), 373–375 (2016)CrossRef Y. Li, P. Zhang, L. Zhang, B. Wang, Active synchronous detection of deception attacks in microgrid control systems. IEEE Trans. Smart Grid 8(1), 373–375 (2016)CrossRef
22.
go back to reference O.A. Beg, T.T. Johnson, A. Davoudi, Detection of false-data injection attacks in cyber-physical dc microgrids. IEEE Trans. Ind. Inf. 13(5), 2693–2703 (2017)CrossRef O.A. Beg, T.T. Johnson, A. Davoudi, Detection of false-data injection attacks in cyber-physical dc microgrids. IEEE Trans. Ind. Inf. 13(5), 2693–2703 (2017)CrossRef
23.
go back to reference A. Sargolzaei, K.K. Yen, M.N. Abdelghani, S. Sargolzaei, B. Carbunar, Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access 5, 15901–15912 (2017)CrossRef A. Sargolzaei, K.K. Yen, M.N. Abdelghani, S. Sargolzaei, B. Carbunar, Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access 5, 15901–15912 (2017)CrossRef
24.
go back to reference S. Zuo, O.A. Beg, F.L. Lewis, A. Davoudi, Resilient networked ac microgrids under unbounded cyber attacks. IEEE Trans. Smart Grid 11(5), 3785–3794 (2020)CrossRef S. Zuo, O.A. Beg, F.L. Lewis, A. Davoudi, Resilient networked ac microgrids under unbounded cyber attacks. IEEE Trans. Smart Grid 11(5), 3785–3794 (2020)CrossRef
25.
go back to reference S. Sahoo, T. Dragičević, F. Blaabjerg, Resilient operation of heterogeneous sources in cooperative dc microgrids. IEEE Trans. Power Electron. 35(12), 12601–12605 (2020)CrossRef S. Sahoo, T. Dragičević, F. Blaabjerg, Resilient operation of heterogeneous sources in cooperative dc microgrids. IEEE Trans. Power Electron. 35(12), 12601–12605 (2020)CrossRef
26.
go back to reference D. Shi, Yu. Pengfeng Lin, C.-C.C. Wang, X. Yan, P. Wang, Deception attack detection of isolated dc microgrids under consensus-based distributed voltage control architecture. IEEE J. Emerg. Select. Top. Circuits Syst. 11(1), 155–167 (2021) D. Shi, Yu. Pengfeng Lin, C.-C.C. Wang, X. Yan, P. Wang, Deception attack detection of isolated dc microgrids under consensus-based distributed voltage control architecture. IEEE J. Emerg. Select. Top. Circuits Syst. 11(1), 155–167 (2021)
27.
go back to reference A. Chavez, C. Lai, N. Jacobs, S. Hossain-McKenzie, C.B. Jones, J Johnson, A. Summers, Hybrid intrusion detection system design for distributed energy resource systems, in 2019 IEEE CyberPELS (CyberPELS) (IEEE, 2019), pp. 1–6 A. Chavez, C. Lai, N. Jacobs, S. Hossain-McKenzie, C.B. Jones, J Johnson, A. Summers, Hybrid intrusion detection system design for distributed energy resource systems, in 2019 IEEE CyberPELS (CyberPELS) (IEEE, 2019), pp. 1–6
28.
go back to reference A.M. Kosek, Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model, in 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) (IEEE, 2016), pp. 1–6 A.M. Kosek, Contextual anomaly detection for cyber-physical security in smart grids based on an artificial neural network model, in 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG) (IEEE, 2016), pp. 1–6
29.
go back to reference D.M. Shilay, K.G. Lorey, T. Weiz, T. Lovetty, Y. Cheng, Catching anomalous distributed photovoltaics: An edge-based multi-modal anomaly detection (2017). arXiv preprint arXiv:1709.08830 D.M. Shilay, K.G. Lorey, T. Weiz, T. Lovetty, Y. Cheng, Catching anomalous distributed photovoltaics: An edge-based multi-modal anomaly detection (2017). arXiv preprint arXiv:​1709.​08830
30.
go back to reference G.B. Gaggero, M. Rossi, P. Girdinio, M. Marchese, Detecting system fault/cyberattack within a photovoltaic system connected to the grid: a neural network-based solution. J. Sens. Actuator Netw. 9(2), 20 (2020)CrossRef G.B. Gaggero, M. Rossi, P. Girdinio, M. Marchese, Detecting system fault/cyberattack within a photovoltaic system connected to the grid: a neural network-based solution. J. Sens. Actuator Netw. 9(2), 20 (2020)CrossRef
31.
go back to reference K. Fotiadou, T.H. Velivassaki, A. Voulkidis, D. Skias, C. De Santis, T. Zahariadis, Proactive critical energy infrastructure protection via deep feature learning. Energies 13(10), 2622 (2020)CrossRef K. Fotiadou, T.H. Velivassaki, A. Voulkidis, D. Skias, C. De Santis, T. Zahariadis, Proactive critical energy infrastructure protection via deep feature learning. Energies 13(10), 2622 (2020)CrossRef
32.
go back to reference M.R. Khalghani, V. Verma, S.K. Solanki, J.M. Solanki, Resilient networked control of inverter-based microgrids against false data injections. Electronics 11(5) (2022) M.R. Khalghani, V. Verma, S.K. Solanki, J.M. Solanki, Resilient networked control of inverter-based microgrids against false data injections. Electronics 11(5) (2022)
33.
go back to reference A. Bidram, A. Davoudi, Hierarchical structure of microgrids control system. IEEE Trans. Smart Grid 3(4), 1963–1976 (2012)CrossRef A. Bidram, A. Davoudi, Hierarchical structure of microgrids control system. IEEE Trans. Smart Grid 3(4), 1963–1976 (2012)CrossRef
34.
go back to reference L. Meng, E.R. Sanseverino, A. Luna, T. Dragicevic, J.C. Vasquez, J.M. Guerrero, Microgrid supervisory controllers and energy management systems: a literature review. Renew. Sustain. Energy Rev. 60, 1263–1273 (2016)CrossRef L. Meng, E.R. Sanseverino, A. Luna, T. Dragicevic, J.C. Vasquez, J.M. Guerrero, Microgrid supervisory controllers and energy management systems: a literature review. Renew. Sustain. Energy Rev. 60, 1263–1273 (2016)CrossRef
35.
go back to reference M.R. Khalghani, J. Solanki, S.K. Solanki, A. Sargolzaei, Resilient and stochastic load frequency control of microgrids, in 2019 IEEE Power and Energy Society General Meeting (PESGM) (2019), pp. 1–5 M.R. Khalghani, J. Solanki, S.K. Solanki, A. Sargolzaei, Resilient and stochastic load frequency control of microgrids, in 2019 IEEE Power and Energy Society General Meeting (PESGM) (2019), pp. 1–5
36.
go back to reference M.R. Khalghani, J. Solanki, S.K. Solanki, M.H. Khooban, A. Sargolzaei, Resilient frequency control design for microgrids under false data injection. IEEE Trans. Ind. Electron. 68(3), 2151–2162 (2020)CrossRef M.R. Khalghani, J. Solanki, S.K. Solanki, M.H. Khooban, A. Sargolzaei, Resilient frequency control design for microgrids under false data injection. IEEE Trans. Ind. Electron. 68(3), 2151–2162 (2020)CrossRef
37.
go back to reference X. Jin, W. Jianzhong, M. Yunfei, M. Wang, X. Xiandong, H. Jia, Hierarchical microgrid energy management in an office building. Appl. Energy 208, 480–494 (2017)CrossRef X. Jin, W. Jianzhong, M. Yunfei, M. Wang, X. Xiandong, H. Jia, Hierarchical microgrid energy management in an office building. Appl. Energy 208, 480–494 (2017)CrossRef
38.
go back to reference F.G. Torres. Advanced control of renewable energy microgrids with hybrid energy storage system. PhD thesis, PHD thesis (Seville, Spain, 2015) F.G. Torres. Advanced control of renewable energy microgrids with hybrid energy storage system. PhD thesis, PHD thesis (Seville, Spain, 2015)
39.
go back to reference S. Tufail, I. Parvez, S. Batool, A. Sarwat, A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 14(18), 5894 (2021)CrossRef S. Tufail, I. Parvez, S. Batool, A. Sarwat, A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 14(18), 5894 (2021)CrossRef
40.
go back to reference M. Avrutsky, R. Hadar, S. Arditi, Enhanced system and method for theft prevention in a solar power array during nonoperative periods, April 14 2015. US Patent 9,007,210 M. Avrutsky, R. Hadar, S. Arditi, Enhanced system and method for theft prevention in a solar power array during nonoperative periods, April 14 2015. US Patent 9,007,210
41.
go back to reference Z. Gao, C. Cecati, S.X. Ding, A survey of fault diagnosis and fault-tolerant techniques-part i: fault diagnosis with model-based and signal-based approaches. IEEE Trans. Ind. Electron. 62(6), 3757–3767 (2015)CrossRef Z. Gao, C. Cecati, S.X. Ding, A survey of fault diagnosis and fault-tolerant techniques-part i: fault diagnosis with model-based and signal-based approaches. IEEE Trans. Ind. Electron. 62(6), 3757–3767 (2015)CrossRef
42.
go back to reference S. Yin, G. Wang, H. Gao, Data-driven process monitoring based on modified orthogonal projections to latent structures. IEEE Trans. Control Syst. Technol. 24(4), 1480–1487 (2015)CrossRef S. Yin, G. Wang, H. Gao, Data-driven process monitoring based on modified orthogonal projections to latent structures. IEEE Trans. Control Syst. Technol. 24(4), 1480–1487 (2015)CrossRef
43.
go back to reference G. Wang, S. Yin, Quality-related fault detection approach based on orthogonal signal correction and modified pls. IEEE Trans. Industr. Inf. 11(2), 398–405 (2015) G. Wang, S. Yin, Quality-related fault detection approach based on orthogonal signal correction and modified pls. IEEE Trans. Industr. Inf. 11(2), 398–405 (2015)
44.
go back to reference K. Manandhar, X. Cao, H. Fei, Y. Liu, Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNetMATHCrossRef K. Manandhar, X. Cao, H. Fei, Y. Liu, Detection of faults and attacks including false data injection attack in smart grid using kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNetMATHCrossRef
45.
go back to reference J. Qin, M. Li, L. Shi, Yu. Xinghuo, Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans. Autom. Control 63(6), 1648–1663 (2017)MathSciNetMATHCrossRef J. Qin, M. Li, L. Shi, Yu. Xinghuo, Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans. Autom. Control 63(6), 1648–1663 (2017)MathSciNetMATHCrossRef
46.
go back to reference M. Victorio, A. Sargolzaei, M.R. Khalghani, A secure control design for networked control systems with linear dynamics under a time-delay switch attack. Electronics 10(3), 322 (2021)CrossRef M. Victorio, A. Sargolzaei, M.R. Khalghani, A secure control design for networked control systems with linear dynamics under a time-delay switch attack. Electronics 10(3), 322 (2021)CrossRef
47.
go back to reference A. Abbasspour, A. Sargolzaei, M. Victorio, N. Khoshavi, A neural network-based approach for detection of time delay switch attack on networked control systems. Proc. Comput. Sci. 168, 279–288 (2020)CrossRef A. Abbasspour, A. Sargolzaei, M. Victorio, N. Khoshavi, A neural network-based approach for detection of time delay switch attack on networked control systems. Proc. Comput. Sci. 168, 279–288 (2020)CrossRef
48.
go back to reference K. Harnett, B. Harris, D. Chin, G. Watson et al., Doe/dhs/dot volpe technical meeting on electric vehicle and charging station cybersecurity report. Technical report, John A. Volpe National Transportation Systems Center (US) (2018) K. Harnett, B. Harris, D. Chin, G. Watson et al., Doe/dhs/dot volpe technical meeting on electric vehicle and charging station cybersecurity report. Technical report, John A. Volpe National Transportation Systems Center (US) (2018)
49.
go back to reference C. Zhao, J. He, P. Cheng, J. Chen, Analysis of consensus-based distributed economic dispatch under stealthy attacks. IEEE Trans. Industr. Electron. 64(6), 5107–5117 (2016)CrossRef C. Zhao, J. He, P. Cheng, J. Chen, Analysis of consensus-based distributed economic dispatch under stealthy attacks. IEEE Trans. Industr. Electron. 64(6), 5107–5117 (2016)CrossRef
50.
go back to reference M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, Z. Han, Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2014)CrossRef M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, Z. Han, Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2014)CrossRef
51.
go back to reference S. Harshbarger, M. Hosseinzadehtaher, B. Natarajan, E. Vasserman, M. Shadmand, G. Amariucai, (a little) ignorance is bliss: The effect of imperfect model information on stealthy attacks in power grids, in 2020 IEEE Kansas Power and Energy Conference (KPEC) (IEEE, 2020), pp. 1–6 S. Harshbarger, M. Hosseinzadehtaher, B. Natarajan, E. Vasserman, M. Shadmand, G. Amariucai, (a little) ignorance is bliss: The effect of imperfect model information on stealthy attacks in power grids, in 2020 IEEE Kansas Power and Energy Conference (KPEC) (IEEE, 2020), pp. 1–6
52.
go back to reference Z. Mahmood, The Internet of Things in the Industrial Sector (Springer, 2019) Z. Mahmood, The Internet of Things in the Industrial Sector (Springer, 2019)
53.
go back to reference S. Mumtaz, A. Alsohaily, Z. Pang, A. Rayes, K.F. Tsang, J. Rodriguez, Massive internet of things for industrial applications: Addressing wireless iiot connectivity challenges and ecosystem fragmentation. IEEE Ind. Electron. Mag. 11(1), 28–33 (2017)CrossRef S. Mumtaz, A. Alsohaily, Z. Pang, A. Rayes, K.F. Tsang, J. Rodriguez, Massive internet of things for industrial applications: Addressing wireless iiot connectivity challenges and ecosystem fragmentation. IEEE Ind. Electron. Mag. 11(1), 28–33 (2017)CrossRef
54.
go back to reference S. Al-Rubaye, E. Kadhum, Q. Ni, A. Anpalagan, Industrial internet of things driven by sdn platform for smart grid resiliency. IEEE Internet Things J. 6(1), 267–277 (2019)CrossRef S. Al-Rubaye, E. Kadhum, Q. Ni, A. Anpalagan, Industrial internet of things driven by sdn platform for smart grid resiliency. IEEE Internet Things J. 6(1), 267–277 (2019)CrossRef
55.
go back to reference M. Garau, M. Anedda, C. Desogus, E. Ghiani, M. Murroni, G Celli, A 5g cellular technology for distributed monitoring and control in smart grid, in 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) (2017), pp. 1–6 M. Garau, M. Anedda, C. Desogus, E. Ghiani, M. Murroni, G Celli, A 5g cellular technology for distributed monitoring and control in smart grid, in 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB) (2017), pp. 1–6
56.
go back to reference M.S. Mahmoud, Y. Xia, Cloud Control Systems: Analysis, Design and Estimation (Academic Press, 2020) M.S. Mahmoud, Y. Xia, Cloud Control Systems: Analysis, Design and Estimation (Academic Press, 2020)
57.
go back to reference K. Shuaib, Z. Trabelsi, M. Abed-Hafez, A. Gaouda, M. Alahmad, Resiliency of smart power meters to common security attacks. Proc. Comput. Sci. 52, 145–152 (2015)CrossRef K. Shuaib, Z. Trabelsi, M. Abed-Hafez, A. Gaouda, M. Alahmad, Resiliency of smart power meters to common security attacks. Proc. Comput. Sci. 52, 145–152 (2015)CrossRef
58.
go back to reference N. Adam, Workshop on future directions in cyber-physical systems security, in Report on workshop organized by Department of Homeland Security (DHS) (2010) N. Adam, Workshop on future directions in cyber-physical systems security, in Report on workshop organized by Department of Homeland Security (DHS) (2010)
59.
go back to reference R. Saltzman, A. Sharabani, Active man in the middle attacks, in OWASP AU (2009) R. Saltzman, A. Sharabani, Active man in the middle attacks, in OWASP AU (2009)
60.
go back to reference K.K. Fletcher, X. Liu, Security requirements analysis, specification, prioritization and policy development in cyber-physical systems, in 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement-Companion (IEEE, 2011), pp. 106–113 K.K. Fletcher, X. Liu, Security requirements analysis, specification, prioritization and policy development in cyber-physical systems, in 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement-Companion (IEEE, 2011), pp. 106–113
61.
go back to reference S. Tan, J.M. Guerrero, P. Xie, R. Han, J.C. Vasquez, Brief survey on attack detection methods for cyber-physical systems. IEEE Syst. J. 14(4), 5329–5339 (2020)CrossRef S. Tan, J.M. Guerrero, P. Xie, R. Han, J.C. Vasquez, Brief survey on attack detection methods for cyber-physical systems. IEEE Syst. J. 14(4), 5329–5339 (2020)CrossRef
62.
go back to reference G. Hug, J.A. Giampapa, Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)CrossRef G. Hug, J.A. Giampapa, Vulnerability assessment of ac state estimation with respect to false data injection cyber-attacks. IEEE Trans. Smart Grid 3(3), 1362–1370 (2012)CrossRef
63.
go back to reference L. Liu, M. Esmalifalak, Q. Ding, V.A. Emesih, Z. Han, Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)CrossRef L. Liu, M. Esmalifalak, Q. Ding, V.A. Emesih, Z. Han, Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans. Smart Grid 5(2), 612–621 (2014)CrossRef
64.
go back to reference J. Liu, R. Singh, B.C. Pal, Distribution system state estimation with high penetration of demand response enabled loads. IEEE Trans. Power Syst. 36(4), 3093–3104 (2021)CrossRef J. Liu, R. Singh, B.C. Pal, Distribution system state estimation with high penetration of demand response enabled loads. IEEE Trans. Power Syst. 36(4), 3093–3104 (2021)CrossRef
65.
go back to reference X. Ren, J. Yan, Y. Mo, Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency. IEEE Trans. Signal Process. 66(6), 1454–1468 (2018)MathSciNetMATHCrossRef X. Ren, J. Yan, Y. Mo, Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency. IEEE Trans. Signal Process. 66(6), 1454–1468 (2018)MathSciNetMATHCrossRef
66.
go back to reference B. Kailkhura, Y.S. Han, S. Brahma, P.K. Varshney, Asymptotic analysis of distributed bayesian detection with byzantine data. IEEE Signal Process. Lett. 22(5), 608–612 (2014)MATHCrossRef B. Kailkhura, Y.S. Han, S. Brahma, P.K. Varshney, Asymptotic analysis of distributed bayesian detection with byzantine data. IEEE Signal Process. Lett. 22(5), 608–612 (2014)MATHCrossRef
67.
go back to reference B. Kailkhura, Y.S. Han, S. Brahma, P.K. Varshney, Distributed bayesian detection in the presence of byzantine data. IEEE Trans. Signal Process. 63(19), 5250–5263 (2015)MathSciNetMATHCrossRef B. Kailkhura, Y.S. Han, S. Brahma, P.K. Varshney, Distributed bayesian detection in the presence of byzantine data. IEEE Trans. Signal Process. 63(19), 5250–5263 (2015)MathSciNetMATHCrossRef
68.
go back to reference A.S. Rawat, P. Anand, H. Chen, P.K. Varshney, Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2010)MathSciNetMATHCrossRef A.S. Rawat, P. Anand, H. Chen, P.K. Varshney, Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks. IEEE Trans. Signal Process. 59(2), 774–786 (2010)MathSciNetMATHCrossRef
69.
go back to reference B. Tang, J. Yan, S. Kay, H. He, Detection of false data injection attacks in smart grid under colored gaussian noise, in 2016 IEEE Conference on Communications and Network Security (CNS) (IEEE, 2016), pp. 172–179 B. Tang, J. Yan, S. Kay, H. He, Detection of false data injection attacks in smart grid under colored gaussian noise, in 2016 IEEE Conference on Communications and Network Security (CNS) (IEEE, 2016), pp. 172–179
70.
go back to reference S.K. Park, L. Xu, Data Assimilation for Atmospheric, Oceanic and Hydrologic Applications (Vol. II) (Springer, 2013) S.K. Park, L. Xu, Data Assimilation for Atmospheric, Oceanic and Hydrologic Applications (Vol. II) (Springer, 2013)
71.
go back to reference A. Radke, Z. Gao, A survey of state and disturbance observers for practitioners, in 2006 American Control Conference (IEEE, 2006), p. 6 A. Radke, Z. Gao, A survey of state and disturbance observers for practitioners, in 2006 American Control Conference (IEEE, 2006), p. 6
72.
go back to reference J. Qi, A.F. Taha, J. Wang, Comparing kalman filters and observers for power system dynamic state estimation with model uncertainty and malicious cyber attacks. IEEE Access 6, 77155–77168 (2018)CrossRef J. Qi, A.F. Taha, J. Wang, Comparing kalman filters and observers for power system dynamic state estimation with model uncertainty and malicious cyber attacks. IEEE Access 6, 77155–77168 (2018)CrossRef
73.
go back to reference Z. Guo, D. Shi, K.H. Johansson, L. Shi, Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 4(1), 4–13 (2016)MathSciNetMATHCrossRef Z. Guo, D. Shi, K.H. Johansson, L. Shi, Optimal linear cyber-attack on remote state estimation. IEEE Trans. Control Netw. Syst. 4(1), 4–13 (2016)MathSciNetMATHCrossRef
74.
go back to reference J. Miloševič, T. Tanaka, H. Sandberg, K.H. Johansson, Analysis and mitigation of bias injection attacks against a kalman filter. IFAC-PapersOnLine 50(1), 8393–8398 (2017)CrossRef J. Miloševič, T. Tanaka, H. Sandberg, K.H. Johansson, Analysis and mitigation of bias injection attacks against a kalman filter. IFAC-PapersOnLine 50(1), 8393–8398 (2017)CrossRef
75.
go back to reference I.S. Thaseen, C.A. Kumar, Intrusion detection model using fusion of chi-square feature selection and multi class svm. J. King Saud Univ.-Comput. Inf. Sci. 29(4), 462–472 (2017) I.S. Thaseen, C.A. Kumar, Intrusion detection model using fusion of chi-square feature selection and multi class svm. J. King Saud Univ.-Comput. Inf. Sci. 29(4), 462–472 (2017)
76.
go back to reference F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetMATHCrossRef F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetMATHCrossRef
77.
go back to reference A.A. Yaseen, M. Bayart, Cyber-attack detection with fault accommodation based on intelligent generalized predictive control. IFAC-PapersOnLine 50(1), 2601–2608 (2017)CrossRef A.A. Yaseen, M. Bayart, Cyber-attack detection with fault accommodation based on intelligent generalized predictive control. IFAC-PapersOnLine 50(1), 2601–2608 (2017)CrossRef
78.
go back to reference H. Nishino, H. Ishii, Distributed detection of cyber attacks and faults for power systems. IFAC Proc. 47(3), 11932–11937 (2014)CrossRef H. Nishino, H. Ishii, Distributed detection of cyber attacks and faults for power systems. IFAC Proc. 47(3), 11932–11937 (2014)CrossRef
79.
go back to reference X. Li, X. Liang, L. Rongxing, X. Shen, X. Lin, H. Zhu, Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38–45 (2012)CrossRef X. Li, X. Liang, L. Rongxing, X. Shen, X. Lin, H. Zhu, Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun. Mag. 50(8), 38–45 (2012)CrossRef
80.
go back to reference S. Ali, Y. Li, Learning multilevel auto-encoders for ddos attack detection in smart grid network. IEEE Access 7, 108647–108659 (2019)CrossRef S. Ali, Y. Li, Learning multilevel auto-encoders for ddos attack detection in smart grid network. IEEE Access 7, 108647–108659 (2019)CrossRef
81.
go back to reference R.C. Borges Hink, J.M. Beaver, M.A. Buckner, T. Morris, U. Adhikari, S. Pan, Machine learning for power system disturbance and cyber-attack discrimination, in 2014 7th International symposium on resilient control systems (ISRCS) (IEEE, 2014), pp. 1–8 R.C. Borges Hink, J.M. Beaver, M.A. Buckner, T. Morris, U. Adhikari, S. Pan, Machine learning for power system disturbance and cyber-attack discrimination, in 2014 7th International symposium on resilient control systems (ISRCS) (IEEE, 2014), pp. 1–8
82.
go back to reference D. Mukherjee, A novel strategy for locational detection of false data injection attack. Sustain. Energy, Grids Netw. 31, 100702 (2022) D. Mukherjee, A novel strategy for locational detection of false data injection attack. Sustain. Energy, Grids Netw. 31, 100702 (2022)
83.
go back to reference Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)CrossRef Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)CrossRef
84.
go back to reference C. Feng, Y. Wang, Q. Chen, Y. Ding, G. Strbac, C. Kang, Smart grid encounters edge computing: Opportunities and applications. Adv. Appl. Energy 1, 100006 (2021)CrossRef C. Feng, Y. Wang, Q. Chen, Y. Ding, G. Strbac, C. Kang, Smart grid encounters edge computing: Opportunities and applications. Adv. Appl. Energy 1, 100006 (2021)CrossRef
85.
go back to reference A. Califano, E. Dincelli, S. Goel, Using features of cloud computing to defend smart grid against ddos attacks, in 10th Annual Symposium on Information Assurance (Asia 15), ALBANY (2015) A. Califano, E. Dincelli, S. Goel, Using features of cloud computing to defend smart grid against ddos attacks, in 10th Annual Symposium on Information Assurance (Asia 15), ALBANY (2015)
86.
go back to reference R.C. Diovu, J.T. Agee, A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks, in 2017 IEEE PES PowerAfrica (IEEE, 2017), pp. 28–33 R.C. Diovu, J.T. Agee, A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks, in 2017 IEEE PES PowerAfrica (IEEE, 2017), pp. 28–33
87.
go back to reference N. Eltayieb, R. Elhabob, A. Hassan, F. Li, An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect. 98, 165–172 (2019)CrossRef N. Eltayieb, R. Elhabob, A. Hassan, F. Li, An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid. J. Syst. Architect. 98, 165–172 (2019)CrossRef
88.
go back to reference B. Alohali, M. Merabti, K. Kifayat, A cloud of things (cot) based security for home area network (han) in the smart grid, in 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies (IEEE, 2014, pp. 326–330 B. Alohali, M. Merabti, K. Kifayat, A cloud of things (cot) based security for home area network (han) in the smart grid, in 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies (IEEE, 2014, pp. 326–330
89.
go back to reference L. Chen, J. Liu, W. Ha, Cloud service security evaluation of smart grid using deep belief network. Int. J. Sens. Netw. 33(2), 109–121 (2020)CrossRef L. Chen, J. Liu, W. Ha, Cloud service security evaluation of smart grid using deep belief network. Int. J. Sens. Netw. 33(2), 109–121 (2020)CrossRef
90.
go back to reference F. Aloul, A.R. Al-Ali, R. Al-Dalky, M. Al-Mardini, W. El-Hajj, Smart grid security: threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012)CrossRef F. Aloul, A.R. Al-Ali, R. Al-Dalky, M. Al-Mardini, W. El-Hajj, Smart grid security: threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 1(1), 1–6 (2012)CrossRef
91.
go back to reference L.A. Maglaras, J. Jiang, Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems, in 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (IEEE, 2014), pp. 133–134 L.A. Maglaras, J. Jiang, Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems, in 10th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (IEEE, 2014), pp. 133–134
92.
go back to reference A. Saad, S. Faddel, O. Mohammed, Iot-based digital twin for energy cyber-physical systems: design and implementation. Energies 13(18), 4762 (2020)CrossRef A. Saad, S. Faddel, O. Mohammed, Iot-based digital twin for energy cyber-physical systems: design and implementation. Energies 13(18), 4762 (2020)CrossRef
93.
go back to reference V.H. Nguyen, Q.T. Tran, Y. Besanger, M. Jung, T.L. Nguyen, Digital twin integrated power-hardware-in-the-loop for the assessment of distributed renewable energy resources. Electr. Eng. 104(2), 377–388 (2022)CrossRef V.H. Nguyen, Q.T. Tran, Y. Besanger, M. Jung, T.L. Nguyen, Digital twin integrated power-hardware-in-the-loop for the assessment of distributed renewable energy resources. Electr. Eng. 104(2), 377–388 (2022)CrossRef
94.
go back to reference M. Dehghani, M. Ghiasi, T. Niknam, A. Kavousi-Fard, M. Shasadeghi, N. Ghadimi, F. Taghizadeh-Hesary, Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 90 (2020)CrossRef M. Dehghani, M. Ghiasi, T. Niknam, A. Kavousi-Fard, M. Shasadeghi, N. Ghadimi, F. Taghizadeh-Hesary, Blockchain-based securing of data exchange in a power transmission system considering congestion management and social welfare. Sustainability 13(1), 90 (2020)CrossRef
95.
go back to reference H. Zhang, J. Wang, Y. Ding, Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180, 955–967 (2019)CrossRef H. Zhang, J. Wang, Y. Ding, Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180, 955–967 (2019)CrossRef
96.
go back to reference X. Huang, X. Cheng, P. Wang, H. Liu, Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6, 13565–13574 (2018)CrossRef X. Huang, X. Cheng, P. Wang, H. Liu, Lnsc: a security model for electric vehicle and charging pile management based on blockchain ecosystem. IEEE Access 6, 13565–13574 (2018)CrossRef
97.
go back to reference M.H. Rehmani, A. Davy, B. Jennings, C. Assi, Software defined networks-based smart grid communication: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(3), 2637–2670 (2019)CrossRef M.H. Rehmani, A. Davy, B. Jennings, C. Assi, Software defined networks-based smart grid communication: a comprehensive survey. IEEE Commun. Surv. Tutor. 21(3), 2637–2670 (2019)CrossRef
98.
go back to reference A. Fausto, M. Marchese, Implementation details to reduce the latency of an sdn statistical fingerprint-based ids, in 2019 International Symposium on Advanced Electrical and Communication Technologies (ISAECT) (IEEE, 2019), pp. 1–6 A. Fausto, M. Marchese, Implementation details to reduce the latency of an sdn statistical fingerprint-based ids, in 2019 International Symposium on Advanced Electrical and Communication Technologies (ISAECT) (IEEE, 2019), pp. 1–6
99.
go back to reference D. Jin, Z. Li, C. Hannon, C. Chen, J. Wang, M. Shahidehpour, C.W. Lee, Toward a cyber resilient and secure microgrid using software-defined networking. IEEE Trans. Smart Grid 8(5), 2494–2504 (2017)CrossRef D. Jin, Z. Li, C. Hannon, C. Chen, J. Wang, M. Shahidehpour, C.W. Lee, Toward a cyber resilient and secure microgrid using software-defined networking. IEEE Trans. Smart Grid 8(5), 2494–2504 (2017)CrossRef
Metadata
Title
Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles
Authors
Tambiara Tabassum
Mohammad Reza Khalghani
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20360-2_4