Abstract
Micro-grids (MG) enable autonomous operation of remote or islanded power networks such as critical infrastructure assets, but also the integration of Distributed Energy Resources (DER) into power distribution networks coupled to a transmission system, enhancing robustness of and reducing strain on the power network. Micro-grid control technology relies heavily on networked or distributed control techniques which are exposed to cyber-security threats than conventional power networks. Consequences of security violations could manifest as loss of electrical power to critical loads or dangerous operating states; given the severity of the risks every effort should be taken to reduce exposure to vulnerabilities. This chapter reviews common MG architectures and selected system elements feeding into a structured high-level security analysis based on the Systems Theoretic Process Analysis for Security (STPA-Sec) framework to generate causal scenarios for security violations in MGs and, accordingly, to identify the priority areas for future security research in the MG domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ackermann T, Andersson G, Söder L (2001) Distributed generation: a definition. Electr Power Syst Res 57(3):195–204
Bidram A, Davoudi A (2012) Hierarchical structure of microgrids control system. IEEE Trans Smart Grid 3(4):1963–1976
Case DU (2016) Analysis of the cyber attack on the ukrainian power grid. Electricity Information Sharing and Analysis Center (E-ISAC)
Chandorkar MC, Divan DM, Adapa R (1993) Control of parallel connected inverters in standalone ac supply systems. IEEE Trans Ind Appl 29(1):136–143
Domenech B, Ranaboldo M, Ferrer-Martí L, Pastor R, Flynn D (2017) Local and regional microgrid models to optimise the design of isolated electrification projects. Renew Energ 119:795–808
Friedberg I, Laverty D, McLaughlin K, Smith P (2015) A cyber-physical security analysis of synchronous-islanded microgrid operation. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research. British Computer Society, Swindon, pp 52–62
Guerrero JM, Chandorkar M, Lee TL, Loh PC (2013) Advanced control architectures for intelligent microgrids—part I: decentralized and hierarchical control. IEEE Trans Ind Electron 60(4):1254–1262
Guo X, Lu Z, Wang B, Sun X, Wang L, Guerrero JM (2014) Dynamic phasors-based modeling and stability analysis of droop-controlled inverters for microgrid applications. IEEE Trans Smart Grid 5(6):2980–2987
Hafez O, Bhattacharya K (2012) Optimal planning and design of a renewable energy based supply system for microgrids. Renew Energy 45:7–15
Hatziargyriou N, Asano H, Iravani R, Marnay C (2007) Microgrids. IEEE Power Energ Mag 5(4):78–94
Katiraei F, Iravani R, Hatziargyriou N, Dimeas A (2008) Microgrids management. IEEE Power Energ Mag 6(3):54–65
Langner R (2011) Stuxnet: dissecting a cyberwarfare weapon. IEEE Secur Priv 9(3):49–51
Lasseter RH (2011) Smart distribution: coupled microgrids. Proc IEEE 99(6):1074–1082
Lasseter R, Akhil A, Marnay C, Stephens J, Dagle J, Guttromson R, Meliopoulous A, Yinger R, Eto J (2002) The CERTS microgrid concept. White paper for Transmission Reliability Program, Office of Power Technologies, US Department of Energy 2(3), 30
Leveson N (2011) Engineering a safer world: systems thinking applied to safety. MIT Press, Cambridge/London
Levron Y, Guerrero JM, Beck Y (2013) Optimal power flow in microgrids with energy storage. IEEE Trans Power Syst 28(3):3226–3234
Li C, Cao C, Cao Y, Kuang Y, Zeng L, Fang B (2014) A review of islanding detection methods for microgrid. Renew Sust Energ Rev 35:211–220
Li H, Zang C, Zeng P, Yu H, Li Z (2015) A stochastic programming strategy in microgrid cyber physical energy system for energy optimal operation. IEEE/CAA J Automat Sin 2(3):296–303
Majumder R (2013) Some aspects of stability in microgrids. IEEE Trans Power Syst 28(3):3243–3252
Meng L, Sanseverino ER, Luna A, Dragicevic T, Vasquez JC, Guerrero JM (2016) Microgrid supervisory controllers and energy management systems: a literature review. Renew Sust Energ Rev 60:1263–1273
Olivares DE, Mehrizi-Sani A, Etemadi AH, Cañizares CA, Iravani R, Kazerani M, Hajimiragha AH, Gomis-Bellmunt O, Saeedifard M, Palma-Behnke R et al (2014) Trends in microgrid control. IEEE Trans Smart Grid 5(4):1905–1919
Piagi P, Lasseter RH (2006) Autonomous control of microgrids. In: Power engineering society general meeting, 2006. IEEE, Piscataway, pp 1–8
Rocabert J, Luna A, Blaabjerg F, Rodriguez P (2012) Control of power converters in AC microgrids. IEEE Trans Power Electron 27(11):4734–4749
Stern DI, Burke PJ, Bruns SB (2017) The impact of electricity on economic development: a macroeconomic perspective. EEG state-of-knowledge paper series. Oxford: Oxford policy management center for effective glocal action
Tayab UB, Roslan MAB, Hwai LJ, Kashif M (2017) A review of droop control techniques for microgrid. Renew Sust Energ Rev 76:717–727
Ton DT, Smith MA (2012) The us department of energy’s microgrid initiative. Electr J 25(8):84–94
Tsikalakis AG, Hatziargyriou ND (2011) Centralized control for optimizing microgrids operation. In: Power and energy society general meeting, 2011. IEEE, Piscataway, pp 1–8
Williston D, Finney D (2011) Consequences of out-of-phase reclosing on feeders with distributed generators. IEEE SCC21 standards coordinating committee on fuel cells, photovoltaics, dispersed generation, and energy storage, pp 1–8
Young W, Leveson N (2013) Systems thinking for safety and security. In: Proceedings of the 29th Annual Computer Security Applications Conference. ACM, New York, pp 1–8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Beaumont, P., Wolthusen, S. (2019). Micro-Grid Control Security Analysis: Analysis of Current and Emerging Vulnerabilities. In: Gritzalis, D., Theocharidou, M., Stergiopoulos, G. (eds) Critical Infrastructure Security and Resilience. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-00024-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-00024-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00023-3
Online ISBN: 978-3-030-00024-0
eBook Packages: Computer ScienceComputer Science (R0)