skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: A Survey of Protocol-Level Challenges and Solutions for Distributed Energy Resource Cyber-Physical Security

Journal Article · · Energies (Basel)
DOI:https://doi.org/10.3390/en11092360· OSTI ID:1478184
ORCiD logo [1];  [2];  [3];  [1]
  1. Florida Intl Univ., Miami, FL (United States)
  2. Southern Methodist Univ., Dallas, TX (United States)
  3. National Renewable Energy Lab. (NREL), Golden, CO (United States)

Here, the increasing proliferation of distributed energy resources (DERs) on the smart grid has made distributed solar and wind two key contributors to the expanding attack surface of the network; however, there is a lack of proper understanding and enforcement of DER communications security requirements. With vendors employing proprietary methods to mitigate hosts of attacks, the literature currently lacks a clear organization of the protocol-level vulnerabilities, attacks, and solutions mapped to each layer of the logical model such as the OSI stack. To bridge this gap and pave the way for future research by the authors in determining key DER security requirements, this paper conducts a comprehensive review of the key vulnerabilities, attacks, and potential solutions for solar and wind DERs at the protocol level. In doing so, this paper serves as a starting point for utilities, vendors, aggregators, and other industry stakeholders to develop a clear understanding of the DER security challenges and solutions, which are key precursors to comprehending security requirements.

Research Organization:
National Renewable Energy Lab. (NREL), Golden, CO (United States)
Sponsoring Organization:
USDOE National Renewable Energy Laboratory (NREL), Laboratory Directed Research and Development (LDRD) Program
Grant/Contract Number:
AC36-08GO28308
OSTI ID:
1478184
Report Number(s):
NREL/JA-5C00-72612; ENERGA
Journal Information:
Energies (Basel), Vol. 11, Issue 9; ISSN 1996-1073
Publisher:
MDPI AGCopyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 18 works
Citation information provided by
Web of Science

References (78)

The importance of testing Smart Grid IEDs against security vulnerabilities conference April 2016
Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol conference January 2006
A Survey of Ethernet LAN Security journal October 2013
Internet of Things (IoT) communication protocols: Review conference May 2017
A review on security and privacy issues in wireless sensor networks conference May 2017
OSI upper layer protocol requirements for TMN operations conference January 1988
Malicious JavaScript Insertion through ARP Poisoning Attacks journal May 2009
Research based on OSI model conference May 2011
Development of unidirectional security gateway appliance using intel 82580EB NIC interface conference October 2016
Rapid migration of VMs on a datacenter under cyber attack over optical infrastructure conference October 2016
Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing conference January 2015
Integrated TCP/IP protocol software testing for vulnerability detection
  • 2003 International Conference on Computer Networks and Mobile Computing. ICCNMC 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003. https://doi.org/10.1109/ICCNMC.2003.1243061
conference January 2003
Integrity based relationships and trustworthy communication between network participants
  • Oberle, Alexander; Larbig, Pedro; Kuntze, Nicolai
  • ICC 2014 - 2014 IEEE International Conference on Communications, 2014 IEEE International Conference on Communications (ICC) https://doi.org/10.1109/ICC.2014.6883386
conference June 2014
Cyber intrusion of wind farm SCADA system and its impact analysis conference March 2011
Light weight approach for IP-ARP spoofing detection and prevention conference November 2011
FTTH network survivability security based on massive fiber optic mechanical switch in consolidated central office conference July 2010
Security features in ethernet switches for access networks conference January 2003
Comparative Evaluation of Spoofing Defenses journal March 2011
An improved secret key update for multiple intersymbol obfuscation in physical layer security conference September 2017
The Security and Promotion Method of Transport Layer of TCP/IP Agreement
  • Hao-yu, Wang; Hui-zhi, Cao; Xu, Zhu
  • 2010 2nd International Conference on Information Technology and Computer Science (ITCS 2010), 2010 Second International Conference on Information Technology and Computer Science https://doi.org/10.1109/ITCS.2010.132
conference July 2010
Transport Level Address for application level communication conference August 2009
Quantum Cryptography For Secure Optical Networks conference June 2007
Building blocks of a simulation environment of the OSI network layer of packet-switching networks
  • Gerisch, A.; Lawniczak, A. T.; Di Stefano, B.
  • CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436) https://doi.org/10.1109/CCECE.2003.1226080
conference January 2003
Telecommunication traffic through submarine cables: Security and vulnerabilities conference December 2016
A Survey of Man In The Middle Attacks journal October 2016
Data security on Ethernet LANs
  • Hadjina, N.; Thompson, P.
  • 10th Mediterranean Electrotechnical Conference - MELECON 2000, 2000 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries. Proceedings. MeleCon 2000 (Cat. No.00CH37099) https://doi.org/10.1109/MELCON.2000.880359
conference January 1998
A comprehensive study on security attacks on SSL/TLS protocol conference October 2016
A survey on security assessment of metering infrastructure in Smart Grid systems conference April 2015
End-to-end encryption at the network layer conference January 1990
Primary frequency control and dynamic grid support for vehicle-to-grid in transmission systems journal September 2018
Wireless transmission of RS232 interface signal based on ZigBee conference July 2010
A Thin Security Layer Protocol over IP Protocol on TCP/IP Suite for Security Enhancement conference November 2006
Analysis and application of Wireshark in TCP/IP protocol teaching
  • 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT) https://doi.org/10.1109/EDT.2010.5496372
conference April 2010
Transport layer proxy for stateful UDP packet filtering conference January 2002
Controlling IP Spoofing through Interdomain Packet Filters journal January 2008
Research on the network security based on radiated virus
  • 2010 International Conference on Information, Networking and Automation (ICINA 2010), 2010 International Conference on Information, Networking and Automation (ICINA) https://doi.org/10.1109/ICINA.2010.5636462
conference October 2010
Enhanced utility-scale photovoltaic units with frequency support functions and dynamic grid support for transmission systems journal February 2017
Smart grids security challenges: Classification by sources of threats journal December 2018
A link-layer-based self-replicating vulnerability discovery agent conference June 2010
Fairness issues for mixed TCP/OSI internets conference January 1991
Communications Link Layer Security conference November 2006
Performance Comparison of TCP, UDP, and TFRC in Wired Networks
  • Pakanati, Chennareddy; Padmavathamma, M.; Reddy, N. Ramanjaneya
  • 2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT) https://doi.org/10.1109/CICT.2015.37
conference February 2015
Cyber security vulnerability assessment for Smart substations conference October 2016
Traffic flow confidentiality security service in OSI computer network architecture conference January 1990
Security in the OSI model journal January 1988
An interactive visualization tool for teaching ARP spoofing attack conference October 2017
Adaptive cross-layer-based TCP congestion control for 4G wireless mobile cloud access conference May 2016
A security standard for LANs conference January 1990
OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection journal April 1980
Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent conference October 2017
Packet scheduling attacks on shipboard networked control systems conference August 2015
Cyber-power system security in a smart grid environment conference January 2012
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication journal January 2015
Authenticated anonymous secure on demand routing protocol in VANET (Vehicular adhoc network) conference February 2017
Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources journal July 2015
Cyber attack models for smart grid environments journal December 2017
Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS) conference January 2012
Electric Utility Enterprise Architecture to Support the Smart Grid - Enterprise Architecture for the Smart Grid [Electric Utility Enterprise Architecture to Support the Smart Grid - Enterprise Architecture for the Smart Grid] conference September 2014
Cyber security attacks on network with transition mechanisms conference December 2015
Defending mechanisms for protecting power systems against intelligent attacks conference May 2015
An open network management architecture: OSI/NM Forum architecture and concepts journal July 1990
What protection engineers need to know about networking conference March 2015
A survey on ARP cache poisoning and techniques for detection and mitigation
  • Meghana, Jitta Sai; Subashri, T.; Vimal, K. R.
  • 2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN), 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) https://doi.org/10.1109/ICSCN.2017.8085417
conference March 2017
UDP based chat application conference April 2010
Analysis of low-rate TCP DoS attack against FAST TCP
  • Dong, Kuo; Yang, Shoubao; Wang, Shaolin
  • 2006 6th International Conference on Intelligent Systems Design and Applications, Sixth International Conference on Intelligent Systems Design and Applications https://doi.org/10.1109/ISDA.2006.12
conference October 2006
Research on the effects of transport protocols on the application performance based on OPNET conference June 2016
Real time test bed development for power system operation, control and cyber security conference September 2010
Design of framework and analysis of Internet of things at data link layer conference August 2017
Context Information based Cyber Security Defense of Protection System conference June 2007
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
  • Kolahi, Samad S.; Treseangrat, Kiattikul; Sarrafpour, Bahman
  • 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15) https://doi.org/10.1109/ICCSPA.2015.7081286
conference February 2015
Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security conference November 2017
Orchestration of reliable three-layer networks conference July 2017
Security problems in the TCP/IP protocol suite journal April 1989
Maximizing Ethernet Security by Switch-Based Single Secure Domain conference April 2010
Secure group communication schemes for dynamic heterogeneous distributed computing journal September 2017
An Architecture for Multi-Security Level Network Traffic conference October 2006
IP network-based trust management system
  • Wang, Yan-hong
  • 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2011), 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) https://doi.org/10.1109/FSKD.2011.6019936
conference July 2011
Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis conference March 2009

Cited By (1)

Assessing the Impact of Cybersecurity Attacks on Power Systems journal February 2019

Similar Records

PV Cyber Security Research (Final Report)
Technical Report · Tue Jan 15 00:00:00 EST 2019 · OSTI ID:1478184

GRIDCHAIN: AN AUDITABLE BLOCKCHAIN FOR SMART GRID DATA INTEGRITY AND IMMUTABILITY
Technical Report · Tue Mar 31 00:00:00 EDT 2020 · OSTI ID:1478184

A critical review of cyber-physical security for building automation systems
Journal Article · Thu Mar 09 00:00:00 EST 2023 · Annual Reviews in Control · OSTI ID:1478184