The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has res
...
The endeavour towards making power distribution systems (PDSs) smarter has made the interdependence on communication network indispensable. Further, prospective high penetration of intermittent renewable energy sources in the form of distributed energy resources (DERs) has resulted in the necessity for smart controllers on such DERs. Inverters are employed for the purpose of DC to AC power conversion in the distribution network where the present standards require these inverters to be smart. In general, distributed energy resource management systems (DERMS) calculate and send set points/operating points to these smart inverters using protocols such as smart energy profile (SEP) 2.0. Given the nature of sites at which such DERs are installed i.e., home area networks with a pool of IoT(Internet-of-Things) devices, the opportunity for a malicious actor to sabotage the operation is typically higher than that for a transmission system. National Electric Sector Cyber-security Organization Resource (NESCOR) has described several failure scenarios and impact analyses in case of cyber attacks on DERs. One such failure scenario concerns attacks on real/reactive power control commands. In this paper, it is demonstrated that physical invariant based security on the edge devices, i.e. smart controllers deployed in DER inverters, is an effective approach to minimize the impact of cyber attacks targeting reactive power control in DER inverters. The proposed defense is generic and can also be extended to attacks on real-power control. The proposed defense is validated on a co-simulation platform (OpenDSS and MATLAB/SIMULINK).
@en