Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks
The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autono...
Saved in:
Published in | Radìoelektronnì ì komp'ûternì sistemi (Online) no. 4; pp. 50 - 63 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
National Aerospace University «Kharkiv Aviation Institute
29.11.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow. |
---|---|
AbstractList | The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow. |
Author | Yamkovyi, Klym Fursov, Ihor Shmatko, Oleksandr |
Author_xml | – sequence: 1 givenname: Ihor orcidid: 0000-0002-3597-4935 surname: Fursov fullname: Fursov, Ihor – sequence: 2 givenname: Klym orcidid: 0000-0001-9512-4150 surname: Yamkovyi fullname: Yamkovyi, Klym – sequence: 3 givenname: Oleksandr orcidid: 0000-0002-2426-900X surname: Shmatko fullname: Shmatko, Oleksandr |
BookMark | eNp1kEFrGzEQhUVxoU6ac6_7B9YZjbRabW7BtInB0EPbs9BqR6mS7cpIso3_fdZOyaHQywwM73vDe1dsMcWJGPvCYSVQIdwmeskrBMSVXIH8wJaolKgROC7Ykmsua4nYfGI3OT8DAOq24a1esvDjj02lekhhqOw0VMcwjyeaKNkSU76bj1U8UDoEOlbRV-7UU6rK70S25Atx2I9ndR_GUALls2gXj7Mo73e78VRNVI4xveTP7KO3Y6abv_ua_fr29ef6sd5-f9is77e1QyVk3XKpsQGhnRg67rHjugeQ2Lbaeyed403jkFpted9L5RsurFKKd7ZrOXIQ12zz5jtE-2x2KcwBTybaYC6HmJ7MnDi4kYwQvSWrQCvXSJj_Cehb33VedpyIhtnr9s3LpZhzIv_ux8Fcijfn4s25eCMNyJlo_iFcKLaEOJVkw_hf7hUP-4rM |
CitedBy_id | crossref_primary_10_1007_s13369_024_09577_3 crossref_primary_10_3390_e25081123 crossref_primary_10_3390_jcp3040031 |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.32620/reks.2022.4.04 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2663-2012 |
EndPage | 63 |
ExternalDocumentID | oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed 10_32620_reks_2022_4_04 |
GroupedDBID | 9MQ AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ |
ID | FETCH-LOGICAL-c2634-714825038c3d91f2918b0042778ffc4cc155c2e78a1bb46f513a66619a9712103 |
IEDL.DBID | DOA |
ISSN | 1814-4225 |
IngestDate | Wed Aug 27 00:57:50 EDT 2025 Tue Jul 01 04:08:42 EDT 2025 Thu Apr 24 22:52:31 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c2634-714825038c3d91f2918b0042778ffc4cc155c2e78a1bb46f513a66619a9712103 |
ORCID | 0000-0002-3597-4935 0000-0001-9512-4150 0000-0002-2426-900X |
OpenAccessLink | https://doaj.org/article/33baea6086c5403d930b7f99f491eeed |
PageCount | 14 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed crossref_primary_10_32620_reks_2022_4_04 crossref_citationtrail_10_32620_reks_2022_4_04 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-11-29 |
PublicationDateYYYYMMDD | 2022-11-29 |
PublicationDate_xml | – month: 11 year: 2022 text: 2022-11-29 day: 29 |
PublicationDecade | 2020 |
PublicationTitle | Radìoelektronnì ì komp'ûternì sistemi (Online) |
PublicationYear | 2022 |
Publisher | National Aerospace University «Kharkiv Aviation Institute |
Publisher_xml | – name: National Aerospace University «Kharkiv Aviation Institute |
SSID | ssj0002875178 ssib044757823 ssib052605930 ssib038076033 |
Score | 2.2175922 |
Snippet | The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid.... |
SourceID | doaj crossref |
SourceType | Open Website Enrichment Source Index Database |
StartPage | 50 |
SubjectTerms | cps cyber threat cybersecurity smart grid wind generators |
Title | Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks |
URI | https://doaj.org/article/33baea6086c5403d930b7f99f491eeed |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8QgECbGkx6Mz_gOBw9eupZCoXhT4yMmetFN9tYABd9ds7tq_PfO0O6mF-PFW0uGpkynzAwM30fIAc-DL8BNJMbkRYKYUnBV-USmynmmDBMKDyff3Mqrvrge5IMO1RfWhDXwwI3ijji3xhsJkbeD4IJXmqdWBa2D0MzDBI-zL_i8TjIFloQo6rKzP4eoduAKZ_c5RvFTDsDnuMSkchanbfB4IhFg5Q0OEEfA9qORf0Fo7yzriV5L6TZ1YR2k_-iSLpbJUhtL0pNmDCtkzterZLGDMLhGnu7eYIj0cvRUUVNX9AtScPoQoaaRZucYGikWceIGAR0G6r6tH9HJI4aS49jj8-MVpWMNLWTVKPSOzGp0jHyg37Ru6sjH66R_cX5_dpW07AqJyyTHIkwB2SGoyoFSWcg0K-IvrFQRghPOQaThMq8Kw6wVMuSMG8h1mDZaIeoY3yDz9bD2m4SaICGLS2VVaS2syKxQaZBV4a0uQm79FulNFVa6FnocGTBeS0hBooZL1HCJGi5FmYotcjjr8N6gbvwueopfYCaGcNmxAYyobI2o_MuItv_jITtkAd8KDypmepfMT0Yffg8ilondj8b5A7mS4uA |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Smart+Grid+and+wind+generators%3A+an+overview+of+cyber+threats+and+vulnerabilities+of+power+supply+networks&rft.jtitle=Rad%C3%ACoelektronn%C3%AC+%C3%AC+komp%27%C3%BBtern%C3%AC+sistemi+%28Online%29&rft.au=Ihor+Fursov&rft.au=Klym+Yamkovyi&rft.au=Oleksandr+Shmatko&rft.date=2022-11-29&rft.pub=National+Aerospace+University+%C2%ABKharkiv+Aviation+Institute&rft.issn=1814-4225&rft.eissn=2663-2012&rft.issue=4&rft.spage=50&rft.epage=63&rft_id=info:doi/10.32620%2Freks.2022.4.04&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-4225&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-4225&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-4225&client=summon |