1. Power system effects and mitigation recommendations for DER cyberattacks
- Author
-
Jay Johnson, Jimmy Quiroz, Ricky Concepcion, Felipe Wilches-Bernal, and Matthew J. Reno
- Subjects
lcsh:Computer engineering. Computer hardware ,Computer Networks and Communications ,Computer science ,power supply quality ,lcsh:TK7885-7895 ,telecommunication security ,physical impact ,cyber actions ,cyber-physical systems ,lcsh:QA75.5-76.95 ,cyber-physical power system ,Electric power system ,distributed power generation ,Artificial Intelligence ,power system cyber security attack ,Electrical and Electronic Engineering ,DER cyberattacks ,power engineering computing ,business.industry ,power system effects ,interoperable distributed energy resources ,bulk system frequency ,Cyber-physical system ,transmission system support ,Transmission system ,Attack surface ,Adversary ,extensive deployment ,power quality ,power grids ,autonomous commanded grid-support functions ,Computer Science Applications ,grid-support function ,mitigation recommendations ,power system security ,Risk analysis (engineering) ,Software deployment ,Distributed generation ,open systems ,Voltage regulation ,lcsh:Electronic computers. Computer science ,business ,Information Systems - Abstract
Extensive deployment of interoperable distributed energy resources (DER) is increasing the power system cyber security attack surface. National and jurisdictional interconnection standards require DER to include a range of autonomous and commanded grid-support functions, which can drastically influence power quality, voltage, and bulk system frequency. Here, the authors investigate the impact to the cyber-physical power system in scenarios where communications and operations of DER are controlled by an adversary. The findings show that each grid-support function exposes the power system to distinct types and magnitudes of risk. The physical impact from cyber actions was analysed in cases of DER providing distribution system voltage regulation and transmission system support. Finally, recommendations are presented for minimising the risk using engineered parameter limits and segmenting the control network to minimise common-mode vulnerabilities.
- Published
- 2019
- Full Text
- View/download PDF