{"title":"电网交互智能逆变器的自安全性研究","authors":"Mehmetcan Gursoy, B. Mirafzal","doi":"10.1109/KPEC51835.2021.9446213","DOIUrl":null,"url":null,"abstract":"The capability to exchange information with utility operators, aggregators, and nearby smart devices can make a grid-interactive inverter an intelligent cyber-physical device. However, the capability of exchanging information can also put the inverters at the risk of insecure operation. In this paper, possible software manipulations into the inverters are studied to understand their vulnerability to cyber-attacks. Moreover, the state-of-the-art system-level and device-level cyber-defense measures are discussed, and advantages and drawbacks of each technique are provided. Studies show that a reference model can be implemented in device-level security to effectively examine incoming setpoints for detecting and preventing malicious or harmful actions. This paper particularly underlines the significance of device-level self-security and its advantages for grid-interactive inverters. Finally, recommendations for future studies are provided.","PeriodicalId":392538,"journal":{"name":"2021 IEEE Kansas Power and Energy Conference (KPEC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"On Self-Security of Grid-Interactive Smart Inverters\",\"authors\":\"Mehmetcan Gursoy, B. Mirafzal\",\"doi\":\"10.1109/KPEC51835.2021.9446213\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The capability to exchange information with utility operators, aggregators, and nearby smart devices can make a grid-interactive inverter an intelligent cyber-physical device. However, the capability of exchanging information can also put the inverters at the risk of insecure operation. In this paper, possible software manipulations into the inverters are studied to understand their vulnerability to cyber-attacks. Moreover, the state-of-the-art system-level and device-level cyber-defense measures are discussed, and advantages and drawbacks of each technique are provided. Studies show that a reference model can be implemented in device-level security to effectively examine incoming setpoints for detecting and preventing malicious or harmful actions. This paper particularly underlines the significance of device-level self-security and its advantages for grid-interactive inverters. Finally, recommendations for future studies are provided.\",\"PeriodicalId\":392538,\"journal\":{\"name\":\"2021 IEEE Kansas Power and Energy Conference (KPEC)\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Kansas Power and Energy Conference (KPEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/KPEC51835.2021.9446213\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Kansas Power and Energy Conference (KPEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KPEC51835.2021.9446213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Self-Security of Grid-Interactive Smart Inverters
The capability to exchange information with utility operators, aggregators, and nearby smart devices can make a grid-interactive inverter an intelligent cyber-physical device. However, the capability of exchanging information can also put the inverters at the risk of insecure operation. In this paper, possible software manipulations into the inverters are studied to understand their vulnerability to cyber-attacks. Moreover, the state-of-the-art system-level and device-level cyber-defense measures are discussed, and advantages and drawbacks of each technique are provided. Studies show that a reference model can be implemented in device-level security to effectively examine incoming setpoints for detecting and preventing malicious or harmful actions. This paper particularly underlines the significance of device-level self-security and its advantages for grid-interactive inverters. Finally, recommendations for future studies are provided.