Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks

The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autono...

Full description

Saved in:
Bibliographic Details
Published inRadìoelektronnì ì komp'ûternì sistemi (Online) no. 4; pp. 50 - 63
Main Authors Fursov, Ihor, Yamkovyi, Klym, Shmatko, Oleksandr
Format Journal Article
LanguageEnglish
Published National Aerospace University «Kharkiv Aviation Institute 29.11.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow.
AbstractList The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid. Wind generators produce electricity for further distribution in the network between «smart» electricity consumers, which often include autonomous power systems in medical institutions, autonomous power supply of homes, charging stations for cars, etc. Wind generators operate in two aspects: in the physical and information space. Thus, a violation of the security of the information flow of a wind generator can affect the physical performance of electricity generation, and disable equipment. The study aims to identify types of cyber threats in the wind generator network based on the analysis of known attack incidents, analysis of the Smart Grid network structure, network devices, protocols, and control mechanisms of a wind generator. The tasks of the work are: review and analyze known cyberattack incidents; review the classification of cyber threats to wind farms; consider the most common methods of attacks on the cyberphysical system of wind farms; consider ways of intrusions into the information flow of the cyberphysical system wind generator; consider resilience mechanisms of wind generators in case of a cyberattack, consider the directions of further research. The methods are a systematic approach that provides a comprehensive study of the problem, quantitative and qualitative analysis of incidents of cyber attacks on wind generators, and methods of attacks. The following results were obtained: 11 large-scale known incidents of cyber attacks on the cyberphysical systems of the energy sector and smart power supply networks were analyzed, and information flow features and structure of the wind generators were considered. Main communication interfaces of the Smart Grid network were reviewed, control mechanisms for the physical parts of the wind generator system such as automatic voltage regulator, and automatic generation control were observed, vulnerable data transmission protocols, DNP3 in particular, were analyzed, possible consequences in the case of a cyber-intrusion into the network were considered. Conclusions: wind farms, as part of the Smart Grid system, are a convenient target for cyberattacks, as the number of potential ways to interfere with the information flow of the cyberphysical system is growing due to an increase in the number of sensors, communication channels in the network. This is especially important for the further development of wind farm security systems, which at the time, are not able to provide high accuracy of intrusion detection into the information flow.
Author Yamkovyi, Klym
Fursov, Ihor
Shmatko, Oleksandr
Author_xml – sequence: 1
  givenname: Ihor
  orcidid: 0000-0002-3597-4935
  surname: Fursov
  fullname: Fursov, Ihor
– sequence: 2
  givenname: Klym
  orcidid: 0000-0001-9512-4150
  surname: Yamkovyi
  fullname: Yamkovyi, Klym
– sequence: 3
  givenname: Oleksandr
  orcidid: 0000-0002-2426-900X
  surname: Shmatko
  fullname: Shmatko, Oleksandr
BookMark eNp1kEFrGzEQhUVxoU6ac6_7B9YZjbRabW7BtInB0EPbs9BqR6mS7cpIso3_fdZOyaHQywwM73vDe1dsMcWJGPvCYSVQIdwmeskrBMSVXIH8wJaolKgROC7Ykmsua4nYfGI3OT8DAOq24a1esvDjj02lekhhqOw0VMcwjyeaKNkSU76bj1U8UDoEOlbRV-7UU6rK70S25Atx2I9ndR_GUALls2gXj7Mo73e78VRNVI4xveTP7KO3Y6abv_ua_fr29ef6sd5-f9is77e1QyVk3XKpsQGhnRg67rHjugeQ2Lbaeyed403jkFpted9L5RsurFKKd7ZrOXIQ12zz5jtE-2x2KcwBTybaYC6HmJ7MnDi4kYwQvSWrQCvXSJj_Cehb33VedpyIhtnr9s3LpZhzIv_ux8Fcijfn4s25eCMNyJlo_iFcKLaEOJVkw_hf7hUP-4rM
CitedBy_id crossref_primary_10_1007_s13369_024_09577_3
crossref_primary_10_3390_e25081123
crossref_primary_10_3390_jcp3040031
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.32620/reks.2022.4.04
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2663-2012
EndPage 63
ExternalDocumentID oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed
10_32620_reks_2022_4_04
GroupedDBID 9MQ
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c2634-714825038c3d91f2918b0042778ffc4cc155c2e78a1bb46f513a66619a9712103
IEDL.DBID DOA
ISSN 1814-4225
IngestDate Wed Aug 27 00:57:50 EDT 2025
Tue Jul 01 04:08:42 EDT 2025
Thu Apr 24 22:52:31 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2634-714825038c3d91f2918b0042778ffc4cc155c2e78a1bb46f513a66619a9712103
ORCID 0000-0002-3597-4935
0000-0001-9512-4150
0000-0002-2426-900X
OpenAccessLink https://doaj.org/article/33baea6086c5403d930b7f99f491eeed
PageCount 14
ParticipantIDs doaj_primary_oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed
crossref_primary_10_32620_reks_2022_4_04
crossref_citationtrail_10_32620_reks_2022_4_04
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-11-29
PublicationDateYYYYMMDD 2022-11-29
PublicationDate_xml – month: 11
  year: 2022
  text: 2022-11-29
  day: 29
PublicationDecade 2020
PublicationTitle Radìoelektronnì ì komp'ûternì sistemi (Online)
PublicationYear 2022
Publisher National Aerospace University «Kharkiv Aviation Institute
Publisher_xml – name: National Aerospace University «Kharkiv Aviation Institute
SSID ssj0002875178
ssib044757823
ssib052605930
ssib038076033
Score 2.2175922
Snippet The subject of this study is the cyber vulnerability of wind generators, as part of the cyberphysical system of intelligent power supply networks, Smart Grid....
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
StartPage 50
SubjectTerms cps
cyber threat
cybersecurity
smart grid
wind generators
Title Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks
URI https://doaj.org/article/33baea6086c5403d930b7f99f491eeed
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT8QgECbGkx6Mz_gOBw9eupZCoXhT4yMmetFN9tYABd9ds7tq_PfO0O6mF-PFW0uGpkynzAwM30fIAc-DL8BNJMbkRYKYUnBV-USmynmmDBMKDyff3Mqrvrge5IMO1RfWhDXwwI3ijji3xhsJkbeD4IJXmqdWBa2D0MzDBI-zL_i8TjIFloQo6rKzP4eoduAKZ_c5RvFTDsDnuMSkchanbfB4IhFg5Q0OEEfA9qORf0Fo7yzriV5L6TZ1YR2k_-iSLpbJUhtL0pNmDCtkzterZLGDMLhGnu7eYIj0cvRUUVNX9AtScPoQoaaRZucYGikWceIGAR0G6r6tH9HJI4aS49jj8-MVpWMNLWTVKPSOzGp0jHyg37Ru6sjH66R_cX5_dpW07AqJyyTHIkwB2SGoyoFSWcg0K-IvrFQRghPOQaThMq8Kw6wVMuSMG8h1mDZaIeoY3yDz9bD2m4SaICGLS2VVaS2syKxQaZBV4a0uQm79FulNFVa6FnocGTBeS0hBooZL1HCJGi5FmYotcjjr8N6gbvwueopfYCaGcNmxAYyobI2o_MuItv_jITtkAd8KDypmepfMT0Yffg8ilondj8b5A7mS4uA
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Smart+Grid+and+wind+generators%3A+an+overview+of+cyber+threats+and+vulnerabilities+of+power+supply+networks&rft.jtitle=Rad%C3%ACoelektronn%C3%AC+%C3%AC+komp%27%C3%BBtern%C3%AC+sistemi+%28Online%29&rft.au=Ihor+Fursov&rft.au=Klym+Yamkovyi&rft.au=Oleksandr+Shmatko&rft.date=2022-11-29&rft.pub=National+Aerospace+University+%C2%ABKharkiv+Aviation+Institute&rft.issn=1814-4225&rft.eissn=2663-2012&rft.issue=4&rft.spage=50&rft.epage=63&rft_id=info:doi/10.32620%2Freks.2022.4.04&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_33baea6086c5403d930b7f99f491eeed
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-4225&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-4225&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-4225&client=summon