Cyber security in power electronic systems

Subham Sahoo*

*Corresponding author for this work

Research output: Contribution to book/anthology/report/conference proceedingBook chapterResearchpeer-review

2 Citations (Scopus)

Abstract

Grid-connected power electronic converters are crucial technologies that allow the electrical grid to interface renewable energy sources, energy storage systems, electrical vehicles, microgrids, and high-voltage DC transmission lines. As the number of power electronic converters in modern grids continues to grow, their monitoring and coordinated grid-supportive services have become subjects of increased practical interest. Recent standards have also specified mandatory set of control parameters for grid-tied converters, which should be monitored by a remote entity that sends commands through a communication network. Although remote control capability enables numerous new control functions for grid-tied converters, it also makes them vulnerable to cyber attacks. Hence, this chapter aims to shed light on portions of the power electronic converter control systems, which are vulnerable to cyber attacks. Next, some of the prominent cyber attacks are overviewed by considering numerous grid-tied converter applications. Further, some of the common cyber attack detection and mitigation principles have been discussed in brief. Finally, this chapter is concluded with a summary and guidelines for further research in cyber security in power electronic systems.

Original languageEnglish
Title of host publicationControl of Power Electronic Converters and Systems
EditorsFrede Blaabjerg
Number of pages22
Volume3
PublisherAcademic Press
Publication date2021
Pages199-220
ISBN (Electronic)978-0-12-819432-4
DOIs
Publication statusPublished - 2021

Bibliographical note

Publisher Copyright:
© 2021 Elsevier Ltd.

Keywords

  • Cyber attacks
  • Cyber physical systems
  • Cyber security
  • Distributed generation
  • Power electronic converters
  • Voltage source converters

Fingerprint

Dive into the research topics of 'Cyber security in power electronic systems'. Together they form a unique fingerprint.

Cite this