Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations

The share of renewable and distributed energy resources (DERs), like wind turbines, solar photovoltaics and grid-connected batteries, interconnected to the electric grid is rapidly increasing due to reduced costs, rising efficiency, and regulatory requirements aimed at incentivizing a lower-carbon e...

Full description

Bibliographic Details
Main Authors: Megan Culler, Hannah Burroughs
Format: Article
Language:English
Published: MDPI AG 2021-05-01
Series:Energies
Subjects:
Online Access:https://www.mdpi.com/1996-1073/14/11/3067
_version_ 1797532756655210496
author Megan Culler
Hannah Burroughs
author_facet Megan Culler
Hannah Burroughs
author_sort Megan Culler
collection DOAJ
description The share of renewable and distributed energy resources (DERs), like wind turbines, solar photovoltaics and grid-connected batteries, interconnected to the electric grid is rapidly increasing due to reduced costs, rising efficiency, and regulatory requirements aimed at incentivizing a lower-carbon electricity system. These distributed energy resources differ from traditional generation in many ways including the use of many smaller devices connected primarily (but not exclusively) to the distribution network, rather than few larger devices connected to the transmission network. DERs being installed today often include modern communication hardware like cellular modems and WiFi connectivity and, in addition, the inverters used to connect these resources to the grid are gaining increasingly complex capabilities, like providing voltage and frequency support or supporting microgrids. To perform these new functions safely, communications to the device and more complex controls are required. The distributed nature of DER devices combined with their network connectivity and complex controls interfaces present a larger potential attack surface for adversaries looking to create instability in power systems. To address this area of concern, the steps of a cyberattack on DERs have been studied, including the security of industrial protocols, the misuse of the DER interface, and the physical impacts. These different steps have not previously been tied together in practice and not specifically studied for grid-connected storage devices. In this work, we focus on grid-connected batteries. We explore the potential impacts of a cyberattack on a battery to power system stability, to the battery hardware, and on economics for various stakeholders. We then use real hardware to demonstrate end-to-end attack paths exist when security features are disabled or misconfigured. Our experimental focus is on control interface security and protocol security, with the initial assumption that an adversary has gained access to the network to which the device is connected. We provide real examples of the effectiveness of certain defenses. This work can be used to help utilities and other grid-connected battery owners and operators evaluate the severity of different threats and the effectiveness of defense strategies so they can effectively deploy and protect grid-connected storage devices.
first_indexed 2024-03-10T11:04:49Z
format Article
id doaj.art-cc37bf7ea8e6421eaeccf84879461035
institution Directory Open Access Journal
issn 1996-1073
language English
last_indexed 2024-03-10T11:04:49Z
publishDate 2021-05-01
publisher MDPI AG
record_format Article
series Energies
spelling doaj.art-cc37bf7ea8e6421eaeccf848794610352023-11-21T21:17:07ZengMDPI AGEnergies1996-10732021-05-011411306710.3390/en14113067Cybersecurity Considerations for Grid-Connected Batteries with Hardware DemonstrationsMegan Culler0Hannah Burroughs1Idaho National Laboratory, Idaho Falls, ID 83415, USALawrence Livermore National Laboratory, Livermore, CA 94550, USAThe share of renewable and distributed energy resources (DERs), like wind turbines, solar photovoltaics and grid-connected batteries, interconnected to the electric grid is rapidly increasing due to reduced costs, rising efficiency, and regulatory requirements aimed at incentivizing a lower-carbon electricity system. These distributed energy resources differ from traditional generation in many ways including the use of many smaller devices connected primarily (but not exclusively) to the distribution network, rather than few larger devices connected to the transmission network. DERs being installed today often include modern communication hardware like cellular modems and WiFi connectivity and, in addition, the inverters used to connect these resources to the grid are gaining increasingly complex capabilities, like providing voltage and frequency support or supporting microgrids. To perform these new functions safely, communications to the device and more complex controls are required. The distributed nature of DER devices combined with their network connectivity and complex controls interfaces present a larger potential attack surface for adversaries looking to create instability in power systems. To address this area of concern, the steps of a cyberattack on DERs have been studied, including the security of industrial protocols, the misuse of the DER interface, and the physical impacts. These different steps have not previously been tied together in practice and not specifically studied for grid-connected storage devices. In this work, we focus on grid-connected batteries. We explore the potential impacts of a cyberattack on a battery to power system stability, to the battery hardware, and on economics for various stakeholders. We then use real hardware to demonstrate end-to-end attack paths exist when security features are disabled or misconfigured. Our experimental focus is on control interface security and protocol security, with the initial assumption that an adversary has gained access to the network to which the device is connected. We provide real examples of the effectiveness of certain defenses. This work can be used to help utilities and other grid-connected battery owners and operators evaluate the severity of different threats and the effectiveness of defense strategies so they can effectively deploy and protect grid-connected storage devices.https://www.mdpi.com/1996-1073/14/11/3067batterycybersecuritycyber-physical securitydistributed energy resource
spellingShingle Megan Culler
Hannah Burroughs
Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
Energies
battery
cybersecurity
cyber-physical security
distributed energy resource
title Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
title_full Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
title_fullStr Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
title_full_unstemmed Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
title_short Cybersecurity Considerations for Grid-Connected Batteries with Hardware Demonstrations
title_sort cybersecurity considerations for grid connected batteries with hardware demonstrations
topic battery
cybersecurity
cyber-physical security
distributed energy resource
url https://www.mdpi.com/1996-1073/14/11/3067
work_keys_str_mv AT meganculler cybersecurityconsiderationsforgridconnectedbatterieswithhardwaredemonstrations
AT hannahburroughs cybersecurityconsiderationsforgridconnectedbatterieswithhardwaredemonstrations