Assessing DER network cybersecurity defences in a power-communication co-simulation environment

32Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

Abstract

Increasing penetrations of interoperable distributed energy resources (DER) in the electric power system are expanding the power system attack surface. Maloperation or malicious control of DER equipment can now cause substantial disturbances to grid operations. Fortunately, many options exist to defend and limit adversary impact on these newly-created DER communication networks, which typically traverse the public internet. However, implementing these security features will increase communication latency, thereby adversely impacting real-time DER grid support service effectiveness. In this work, a collection of software tools called SCEPTRE was used to create a co-simulation environment where SunSpec-compliant photovoltaic inverters were deployed as virtual machines and interconnected to simulated communication network equipment. Network segmentation, encryption, and moving target defence security features were deployed on the control network to evaluate their influence on cybersecurity metrics and power system performance. The results indicated that adding these security features did not impact DER-based grid control systems but improved the cybersecurity posture of the network when implemented appropriately.

Cite

CITATION STYLE

APA

Johnson, J., Onunkwo, I., Cordeiro, P., Wright, B. J., Jacobs, N., & Lai, C. (2020). Assessing DER network cybersecurity defences in a power-communication co-simulation environment. IET Cyber-Physical Systems: Theory and Applications, 5(3), 274–282. https://doi.org/10.1049/iet-cps.2019.0084

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free