论文标题

分布式能源资源网络安全前景:漏洞,攻击,影响和缓解

Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations

论文作者

Zografopoulos, Ioannis, Hatziargyriou, Nikos D., Konstantinou, Charalambos

论文摘要

电力电网的数字化和分权是经济和环境可持续的未来的关键作用。为了实现这一目标,分布式能源(DER),包括屋顶太阳能电池板,电池存储,电动汽车等,在电力系统中变得无处不在。电力公用事业从DERS中受益,因为它们可以最大程度地减少运营成本;同时,DERS授予用户和聚合器控制其产生和消耗的功率。 DER是互连,可互操作和支持遥控功能的,因此,它们的网络安全性具有基本的重要性。沟通依赖性和Der体系结构的多样性扩大了威胁表面,并加剧了电力系统的网络安全姿势。在这项工作中,我们专注于安全的监督,这些安全监督位于DER的网络和物理层中,并可能危及网格操作。现有作品强调了针对资产的网络攻击的影响,但是,它们要么关注特定的系统组件(例如,通信协议),不考虑DERS的关键任务目标,或者忽略了对抗性观点(例如,对抗/攻击模型)。为了解决这些遗漏,我们在操纵资产时全面分析了对抗性能力和目标,然后介绍协议和设备级别的漏洞如何构成影响电力系统操作的网络攻击。最后,我们为阻止对手和未来网络安全研究的方向提供缓解策略。

The digitization and decentralization of the electric power grid are key thrusts for an economically and environmentally sustainable future. Towards this goal, distributed energy resources (DER), including rooftop solar panels, battery storage, electric vehicles, etc., are becoming ubiquitous in power systems. Power utilities benefit from DERs as they minimize operational costs; at the same time, DERs grant users and aggregators control over the power they produce and consume. DERs are interconnected, interoperable, and support remotely controllable features, thus, their cybersecurity is of cardinal importance. DER communication dependencies and the diversity of DER architectures widen the threat surface and aggravate the cybersecurity posture of power systems. In this work, we focus on security oversights that reside in the cyber and physical layers of DERs and can jeopardize grid operations. Existing works have underlined the impact of cyberattacks targeting DER assets, however, they either focus on specific system components (e.g., communication protocols), do not consider the mission-critical objectives of DERs, or neglect the adversarial perspective (e.g., adversary/attack models) altogether. To address these omissions, we comprehensively analyze adversarial capabilities and objectives when manipulating DER assets, and then present how protocol and device-level vulnerabilities can materialize into cyberattacks impacting power system operations. Finally, we provide mitigation strategies to thwart adversaries and directions for future DER cybersecurity research.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源