Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Attack Surface of Wind Energy Technologies in the United States

Technical Report ·
DOI:https://doi.org/10.2172/2297403· OSTI ID:2297403

Low cost, reliable electrical energy production from wind relies upon automation and control systems, arguably more so than traditional thermal generation. These same systems, however, can serve as the target of adversaries’ cyber-attacks. Idaho National Laboratory (INL), at the request of the Department of Energy’s (DOE’s) Office of Cybersecurity, Energy Security, and Emergency Response (CESER) and Energy Efficiency and Renewable Energy’s (EERE’s) Wind Energy Technologies Office (WETO), evaluated a generalized wind plant architecture to understand the classes of potential threat actors and the vectors that could enable a cyber-attack. This evaluation explores the attack surface of a representative wind plant, identifying potential methods and vectors that an adversary could leverage to conduct a cyber-attack. Included in this assessment are some recommended mitigations and approaches. Each recommendation requires a full security evaluation, cost/benefit analysis, and risk analysis by each owner and operator.

Research Organization:
Idaho National Laboratory (INL), Idaho Falls, ID (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC07-05ID14517
OSTI ID:
2297403
Report Number(s):
INL/RPT--24-76133-Rev000
Country of Publication:
United States
Language:
English

Similar Records

Cybersecurity for the Operational Technology Environment (CyOTE)
Program Document · Mon Jul 22 00:00:00 EDT 2024 · OSTI ID:2428893

HP in Cybersecurity: CyOTE
Conference · Thu Aug 12 00:00:00 EDT 2021 · OSTI ID:1894927