Vol. 29 No. 1 (2026) Cover Image
Vol. 29 No. 1 (2026)

Published: March 20, 2026

Pages: 174-180

Original Article

Cyber security for smart inverters and distributed energy resources (DER)

Abstract

The growing use of “distributed energy resources (DER)” will result in a significant increase in the total number of gadgets or devices that users and third parties own and control. These gadgets rely largely on digital communication and control, placing them in danger due to cyber threats. This study presents a comprehensive framework that is resistant to attacks for defending integrated DER and major power grid infrastructure from hostile cyber-attacks, ensuring the safe integration of DER without jeopardizing system dependability and stability. This research focuses on the development of a cyber-physical power system that incorporates a significant integration of DER and analyses the particular cyber security problems brought about by DER integration. Following that, we provide a systematic DER resilience analysis approach, in addition to effective and measurable resilience measurements and concepts concerning design, and we summarize important DER assault scenarios. In conclusion, we suggest preventive, detective, and responsive measures against cyber-attacks, specifically tailored for integrating Distributed Energy Resources (DER) throughout the physical, cyber device, and regulatory levels of an eventual smart grid.

References

  1. S. H. et al., "Energy Web Chain: accelerating the energy transition with an open‑source decentralized blockchain platform," Energy Web Foundation Publ., Oct. 2018. [Online]. Available: https://docslib.org/doc/10577118/the-energy-web-chain-accelerating-the-energy-transition-with-an-open-source-decentralized-blockchain-platform (accessed Apr. 27, 2024).
  2. I. MacGill, A. Bruce, and S. Young, "Renewable energy auctions versus green certificate schemes-lower prices but greater integration costs?," in Proc. IEEE PESGM, Aug. 2019. https://doi.org/10.1109/PESGM40551.2019.8973627
  3. A. Lee et al., "Cyber security for DER systems: National Electric Sector Cybersecurity Organization Resource (NESCOR)," 2013. [Online]. Available: https://smartgrid.epri.com/doc/der%20rpt%2007-30-13.pdf (accessed May 01, 2024).
  4. "Federal renewable energy certificate guide," Office of Federal Sustainability, Council on Environmental Quality, 2016. [Online]. Available: https://www.sustainability.gov/pdfs/federal_rec_guide.pdf (accessed Mar. 01, 2024).
  5. D. Craigen, N. Diakun‑Thibault, and R. Purse, "Defining cybersecurity," Technol. Innov. Manag. Rev., vol. 4, no. 10, pp. 13-21, Oct. 2014. https://doi.org/10.22215/timreview/835
  6. R. Leszczyna, "A review of standards with cybersecurity requirements for smart grid," Comput. Secur., vol. 77, pp. 262-276, Aug. 2018. https://doi.org/10.1016/j.cose.2018.03.011
  7. "NSA and CISA recommend immediate actions to reduce exposure across all operational technologies and control systems," Jul. 2020. [Online]. Available: https://media.defense.gov/2020/Jul/23/2002462846/-1/-1/1/OT_ADVISORY-DUAL-OFFICIAL-20200722.PDF
  8. U. Cali, C. Lima, X. Li, and Y. Ogushi, "DLT/blockchain in transactive energy use cases segmentation and standardization framework," in Proc. IEEE PES Transactive Energy Syst. Conf. (TESC), Minneapolis, MN, USA, 2019, pp. 1-5. https://doi.org/10.1109/TESC.2019.8843372
  9. I.‑C. Lin and T.‑C. Liao, "A survey of blockchain security issues and challenges," Int. J. Netw. Secur., vol. 19, no. 5, pp. 653-659, Sep. 2017.
  10. T. Kenning, "Replication of cyberattacks on energy sector a threat to renewables," PV Tech, Sep. 07, 2018. [Online]. Available: https://www.pv-tech.org/news/replication-of-cyber-attacks-on-energy-sector-a-threat-to-renewables (accessed May 01, 2024).
  11. R. Kern, "Duke Energy hit by 650M cyber attempts to breach systems in 2017," Bloomberg Law News, 2018. [Online]. Available: https://news.bloomberglaw.com/environment-and-energy/duke-energy-hit-by-650m-cyber-attempts-to-breach-systems-in-2017 (accessed May 01, 2024).
  12. B. K. Sovacool, "Energy security: challenges and needs," Wiley Interdiscip. Rev. Energy Environ., vol. 1, no. 1, pp. 51-59, Jun. 2012. https://doi.org/10.1002/wene.13
  13. NESCOR, "Wide area monitoring, protection, and control systems (WAMPAC)-standards for cyber security requirements," 2012. [Online]. Available: http://smartgrid.epri.com/doc/ESRFSD.pdf
  14. J. Qi, A. Hahn, X. Liu, J. Wang, and C. Liu, "Cybersecurity for distributed energy resources and smart inverters," IET Cyber‑Phys. Syst., vol. 1, no. 1, pp. 28-39, Dec. 2016. https://doi.org/10.1049/iet-cps.2016.0018
  15. Ü. Cali and C. F. Lima, "Energy informatics using the distributed ledger technology and advanced data analytics," in Practice, Progress, and Proficiency in Sustainability, 2019, pp. 438-481. https://doi.org/10.4018/978-1-5225-8559-6.ch016
  16. E. K. Payne, Q. Wang, L. Shulin, and L. Wu, "Technical risk synthesis and mitigation strategies of distributed energy resources integration with wireless sensor networks and internet of things-review," J. Eng., vol. 2019, no. 18, pp. 4830-4835, Jun. 2019. https://doi.org/10.1049/joe.2018.9325
  17. U. Cali and A. Fifield, "Towards the decentralized revolution in energy systems using blockchain technology," Int. J. Smart Grid Clean Energy, vol. 8, no. 3, pp. 245-256, 2019. https://doi.org/10.12720/sgce.8.3.245-256
  18. "NISTIR 7628 guidelines for smart grid cyber security: vol. 3, supportive analyses and references," Smart Grid Interoperability Panel-Cyber Security Working Group, 2010. [Online]. Available: https://www.smartgrid.gov/files/documents/NISTIR_7628_Guidelines_for_Smart_Grid_Cyber_Security_Vol_3_201001.pdf (accessed Mar. 20, 2024).
  19. ENISA, "Distributed ledger technology & cybersecurity-improving information security in the financial sector," Jan. 18, 2017. [Online]. Available: https://www.enisa.europa.eu/publications/blockchain-security
  20. S. Saxena, H. Farag, A. Brookson, H. Turesson, and H. Kim, "Design and field implementation of blockchain‑based renewable energy trading in residential communities," in Proc. 2nd Int. Conf. Smart Grid Renew. Energy (SGRE), Nov. 2019. https://doi.org/10.1109/SGRE46976.2019.9020672
  21. W. Hua and H. Sun, "A blockchain‑based peer‑to‑peer trading scheme coupling energy and carbon markets," in Proc. Int. Conf. Smart Energy Syst. Technol. (SEST), Sep. 2019. https://doi.org/10.1109/SEST.2019.8849111
  22. P. Xie et al., "Conceptual framework of blockchain‑based electricity trading for neighborhood renewable energy," in Proc. 2nd IEEE Conf. Energy Internet Energy Syst. Integration (EI2), 2018. https://doi.org/10.1109/EI2.2018.8581887
  23. D. Livingston, V. Sivaram, M. Freeman, and M. Fiege, "Applying blockchain technology to electric power systems," JSTOR, 2018. [Online]. Available: https://www.jstor.org/stable/resrep21340
  24. M. Pipattanasomporn, S. Rahman, and M. Kuzlu, "Blockchain‑based solar electricity exchange: conceptual architecture and laboratory setup," in Proc. IEEE ISGT, Feb. 2019. https://doi.org/10.1109/ISGT.2019.8791663
  25. E. B. Barker, "Guideline for using cryptographic standards in the federal government: cryptographic mechanisms," NIST Spec. Publ. 800‑175B, Aug. 2016. https://doi.org/10.6028/NIST.SP.800-175B
  26. D. C. Smith, "Enhancing cybersecurity in the energy sector: a critical priority," J. Energy Nat. Resour. Law, vol. 36, no. 4, pp. 373-380, Sep. 2018. https://doi.org/10.1080/02646811.2018.1516362
  27. P. Bronski et al., "The decentralized autonomous area agent (D3A) market model," Energy Web, 2018. [Online]. Available: https://www.energyweb.org/insights/reports/
  28. A. Teymouri, A. Mehrizi‑Sani, and C. Liu, "Cyber security risk assessment of solar PV units with reactive power capability," in Proc. IECON 2018-44th Annu. Conf. IEEE Ind. Electron. Soc., Oct. 2018. https://doi.org/10.1109/IECON.2018.8591583
  29. "How to recover from a cyber attack," IndustryWeek, Aug. 20, 2019. [Online]. Available: https://www.industryweek.com/sponsored/article/22028043/how-to-recover-from-a-cyber-attack
  30. U.S. Dept. Homeland Security, "Cybersecurity strategy," 2019. [Online]. Available: https://www.cybersecuritystrategydhs.gov/sites/default/files/publications/dhs-cybersecurity-fact-sheet.pdf (accessed Oct. 05, 2020).