False data injection threats in active distribution systems: A comprehensive survey
With the proliferation of smart devices and revolutions in communications, electrical
distribution systems are gradually shifting from passive, manually-operated and inflexible …
distribution systems are gradually shifting from passive, manually-operated and inflexible …
Cybersecurity of photovoltaic systems: challenges, threats, and mitigation strategies: a short survey
Photovoltaic (PV) systems, as critical components of the power grid, have become
increasingly reliant on standard Information Technology (IT) computing and network …
increasingly reliant on standard Information Technology (IT) computing and network …
Detection of cyber attacks in grid-tied PV systems using dynamic watermarking
In this article an active defense mechanism for detecting cyber-attacks on a grid-tied PV
system is discussed. The proposed defense mechanism introduces a unique random signal …
system is discussed. The proposed defense mechanism introduces a unique random signal …
[HTML][HTML] A Review of Smart Photovoltaic Systems Which Are Using Remote-Control, AI, and Cybersecurity Approaches
In recent years, interest in renewable energy and photovoltaic systems has increased
significantly. The design and implementation of photovoltaic systems are various, and they …
significantly. The design and implementation of photovoltaic systems are various, and they …
Blockchain-based man-in-the-middle (MITM) attack detection for photovoltaic systems
Cybersecurity of photovoltaic (PV) systems entails a much larger scope than just encryption
and firewall of communications. For instance, integrity of data in transit between inverters …
and firewall of communications. For instance, integrity of data in transit between inverters …
Cybersecurity challenges in IoT-based smart renewable energy
Abstract The Internet of Things (IoT) makes it possible to collect data from, and issue
commands to, devices via the Internet, eliminating the need for humans in the process while …
commands to, devices via the Internet, eliminating the need for humans in the process while …
Multi-Layered Coordinated Countermeasures for DC Microgrid Clusters Under Man in the Middle Attack
This paper aims to investigate the adversarial effects of man/machine-in-the-middle (MITM)
attacks on interconnected direct current microgrid (MG) clusters, their detection and …
attacks on interconnected direct current microgrid (MG) clusters, their detection and …
An active detection scheme for sensor spoofing in grid-tied pv systems
In this paper an active detection scheme for sensor spoofing (manipulated externally via a
cyber attack) in grid-tied PV systems is discussed. The core of the proposed active detection …
cyber attack) in grid-tied PV systems is discussed. The core of the proposed active detection …
Resilient, Auditable and Secure IoT-Enabled Smart Inverter Firmware Amendments With Blockchain
The solar industry in residential areas has been witnessing an astonishing growth
worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside …
worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside …
Enabling Efficient and Malicious Secure Data Aggregation in Smart Grid With False Data Detection
H Pang, K He, Y Fu, JN Liu, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
As the next-generation power grid, the smart grid has significantly improved dependability,
flexibility, and efficiency compared with the traditional power grid. However, due to …
flexibility, and efficiency compared with the traditional power grid. However, due to …