Blog
About

230
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      A Cyber-Physical Security Analysis of Synchronous-Islanded Microgrid Operation

      , , ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      testbed, microgrid, smart grid, cyber security, vulnerability, synchronous islanded generation

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Cyber-security research in the field of smart grids is often performed with a focus on either the power and control domain or the Information and Communications Technology (ICT) domain. The characteristics of the power equipment or ICT domain are commonly not collectively considered. This work provides an analysis of the physical effects of cyber-attacks on microgrids – a smart grid construct that allows continued power supply when disconnected from a main grid. Different types of microgrid operations are explained (connected, islanded and synchronous-islanding) and potential cyber-attacks and their physical effects are analyzed. A testbed that is based on physical power and ICT equipment is presented to validate the results in both the physical and ICT domain.

          Related collections

          Most cited references 20

          • Record: found
          • Abstract: not found
          • Article: not found

          The path of the smart grid

           H Farhangi (2010)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Cyber security in the Smart Grid: Survey and challenges

             Wenye Wang,  Zhuo Lu (2013)
              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Stealth Attacks and Protection Schemes for State Estimators in Power Systems

                Bookmark

                Author and article information

                Contributors
                Conference
                September 2015
                September 2015
                : 52-62
                Affiliations
                Queen’s University Belfast

                AIT Austrian Institute of Technology
                Queen’s University Belfast
                AIT Austrian Institute of Technology
                Article
                10.14236/ewic/ICS2015.6
                © Friedberg et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
                ICS-CSR
                3
                Germany
                17 - 18 September 2015
                Electronic Workshops in Computing (eWiC)
                Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article