中间人攻击
服务拒绝攻击
计算机安全
网络攻击
计算机科学
电力系统
网格
工程类
可靠性工程
功率(物理)
认证(法律)
物理
万维网
几何学
互联网
量子力学
数学
作者
Marco Pasetti,Paolo Ferrari,Paolo Bellagente,Emiliano Sisinni,Alan Oliveira de Sá,Charles B. Prado,Rodrigo Pereira David,Raphael C. S. Machado
出处
期刊:IEEE Transactions on Smart Grid
[Institute of Electrical and Electronics Engineers]
日期:2021-08-05
卷期号:12 (6): 5310-5321
被引量:27
标识
DOI:10.1109/tsg.2021.3102833
摘要
As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns related to possible cyber-attacks to these systems rise accordingly. The most of BESS owners knows their systems may be vulnerable, but they often consider only denial of service attacks in their risk assessment. Unfortunately, other, subtler and more dangerous attacks exist. In this paper we show that a stealth attack to BESSs can be performed by applying a Man-in-the-Middle (MitM) approach. The aim of the attack is to stealthily manage the physical system by hiding the actual behavior of the system to its supervisory controller. In this case the attacker would be able to: (i) degrade the BESS by reducing its expected lifetime, (ii) produce economic losses for the prosumer, and (iii) affect the security and stability of the grid. The feasibility of the attack is demonstrated by providing an example of a stealth MitM attack on a real BESS coupled with a photovoltaic power plant. The proposed case study demonstrates that such attack can be performed without being discovered by end-users and shows that its effects can be severe. Finally, possible strategies to avoid or detect such kind of attack are discussed.
科研通智能强力驱动
Strongly Powered by AbleSci AI