Cyberphysical security of grid battery energy storage systems
IEEE Access, 2022•ieeexplore.ieee.org
This paper presents a literature review on current practices and trends on cyberphysical
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical
to the operation of Smart Grids powered by intermittent renewable energy resources. To
achieve this goal, utility-scale and consumer-scale BESS will have to be fully integrated into
power systems operations, providing ancillary services and performing functions to improve
grid reliability, balance power and demand, among others. This vision of the future power …
security of grid-connected battery energy storage systems (BESSs). Energy storage is critical
to the operation of Smart Grids powered by intermittent renewable energy resources. To
achieve this goal, utility-scale and consumer-scale BESS will have to be fully integrated into
power systems operations, providing ancillary services and performing functions to improve
grid reliability, balance power and demand, among others. This vision of the future power …
This paper presents a literature review on current practices and trends on cyberphysical security of grid-connected battery energy storage systems (BESSs). Energy storage is critical to the operation of Smart Grids powered by intermittent renewable energy resources. To achieve this goal, utility-scale and consumer-scale BESS will have to be fully integrated into power systems operations, providing ancillary services and performing functions to improve grid reliability, balance power and demand, among others. This vision of the future power grid will only become a reality if BESS are able to operate in a coordinated way with other grid entities, thus requiring significant communication capabilities. The pervasive networking infrastructure necessary to fully leverage the potential of storage increases the attack surface for cyberthreats, and the unique characteristics of battery systems pose challenges for cyberphysical security. This paper discusses a number of such threats, their associated attack vectors, detection methods, protective measures, research gaps in the literature and future research trends.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果