Artificial Neural Network-Based Stealth Attack on Battery Energy Storage Systems

As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns related to possible cyber-attacks to these systems rise accordingly. The most of BESS owners knows their systems may be vulnerable, but they often consider only denial of service attacks in their risk assessmen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on smart grid 2021-11, Vol.12 (6), p.5310-5321
Hauptverfasser: Pasetti, Marco, Ferrari, Paolo, Bellagente, Paolo, Sisinni, Emiliano, de Sa, Alan Oliveira, Prado, Charles B. do, David, Rodrigo P., Machado, Raphael Carlos Santos
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns related to possible cyber-attacks to these systems rise accordingly. The most of BESS owners knows their systems may be vulnerable, but they often consider only denial of service attacks in their risk assessment. Unfortunately, other, subtler and more dangerous attacks exist. In this paper we show that a stealth attack to BESSs can be performed by applying a Man-in-the-Middle (MitM) approach. The aim of the attack is to stealthily manage the physical system by hiding the actual behavior of the system to its supervisory controller. In this case the attacker would be able to: (i) degrade the BESS by reducing its expected lifetime, (ii) produce economic losses for the prosumer, and (iii) affect the security and stability of the grid. The feasibility of the attack is demonstrated by providing an example of a stealth MitM attack on a real BESS coupled with a photovoltaic power plant. The proposed case study demonstrates that such attack can be performed without being discovered by end-users and shows that its effects can be severe. Finally, possible strategies to avoid or detect such kind of attack are discussed.
ISSN:1949-3053
1949-3061
1949-3061
DOI:10.1109/TSG.2021.3102833