Smart DC Microgrid Architectures and its Cyber Security Challenges: An Overview

被引:0
作者
Phanthanachai, Jetwadee [1 ]
Tripathy, Manoj [1 ]
Pamulaparthy, Balakrishana [2 ]
机构
[1] Indian Inst Technol Roorkee, Dept Elect Engn, Roorlee, India
[2] GE Grid Solut, Emerging Technol, Hyderabad, India
来源
2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024 | 2024年
关键词
Cyber-physical; Cyber-Attacks; DC microgrids; Threats; Cybersecurity-strategies; Cybersecurity-principles;
D O I
10.1109/SVCC61185.2024.10637310
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper examines the cybersecurity challenges faced by DC Microgrids, which rely on information and communication technology (ICT) for energy delivery to customers through bidirectional communication. Given the increasing role of SCADA systems in microgrid operations, cybersecurity has become paramount due to the interconnectedness of commercial and smart devices across multiple networks. The susceptibility of DC microgrids to various cyber threats poses significant risks, including potential disruptions to operations and safety incidents such as power outages and load shedding. This paper provides an overview of potential vulnerabilities and common security issues encountered in DC microgrids. Cyber security has become increasingly critical in today's digital landscape, with organizations facing ever-evolving threats and challenges. This research paper provides a detailed exploration of specific cybersecurity strategies and technologies that can be employed to effectively address these challenges. By examining key cybersecurity principles, emerging threats, and innovative solutions, organizations can enhance their security posture and mitigate risks effectively.
引用
收藏
页数:8
相关论文
共 28 条
[1]   Communication Network Architectures for Smart-House with Renewable Energy Resources [J].
Ahmed, Mohamed A. ;
Kang, Yong Cheol ;
Kim, Young-Chon .
ENERGIES, 2015, 8 (08) :8716-8735
[2]  
Amin R, 2012, INT CONF SMART GRID, P229, DOI 10.1109/SmartGridComm.2012.6485988
[3]  
[Anonymous], 2006, NSF WORKSH CYB PHYS
[4]  
Bani-Ahmed A, 2014, INT CONF RENEW ENERG, P780, DOI 10.1109/ICRERA.2014.7016491
[5]  
Bohani Farah Aqilah, 2021, Journal of Integrated and Advanced Engineering (JIAE), V1, P37
[6]  
Cherepanov A., 2017, WeLiveSecurity, ESET, V12
[7]  
Cherepanov Anton, 2016, VIR B C OCT, P1
[8]   Modeling and Control of PV Charger System With SEPIC Converter [J].
Chiang, S. J. ;
Shieh, Hsin-Jang ;
Chen, Ming-Chieh .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (11) :4344-4353
[9]  
Collins Sean, 2012, Journal of Policing, Intelligence and Counter Terrorism, V7, P80, DOI [DOI 10.1080/18335330.2012.653198, 10.1080/18335330.2012.653198, DOI 10.1080/18335330.2012]
[10]  
Dehlawi Z, 2013, 2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, P73, DOI 10.1109/ISI.2013.6578789