The Hidden Threat: How Rogue Communication
This investigative article exposes the discovery of undocumented communication devices hidden in Chinese-made solar inverters, creating
Solar Power Plant Network Packet-Based Anomaly Detection System
In this paper, artificial intelligence (AI) aided network packet-based anomaly detection systems are proposed to protect the Programmable Logic Controller (PLC) that controls the inverters
The Silent Battle: Detecting Rogue Hardware in Critical Solar
Step-by-step guide: Solar inverters and controllers should never reside on the same network as critical SCADA systems. Use firewall rules, both on host devices and network appliances, to enforce strict
Intrusion Detection and Mitigation System for Smart Inverters Based
This paper presents an intrusion detection and mitigation system (IDMS) for smart inverters, which leverages machine learning algorithms and environmental sensor data to enhance
AMI data-based remote detection of PV inverter grid support
Smart inverters with grid support functions are commonly used in distributed solar photovoltaic systems to prevent overvoltage by curtailing energy. However, estimating energy
Cybersecurity for Smart Inverters: Guidelines for Residential and
These recommendations involve changes to 496 inverter design, changes to inverter software and firmware, or addition of new front-end 497 devices to protect inverter interfaces.
Systematic Security Analysis of Sensors and Controls
This paper investigates the security vulnerabilities of photovoltaic (PV) inverters, specifically focusing on their internal sensors, which are critical
Securing Solar Energy Infrastructures: A Deep Learning
This paper introduces a deep learning–based intrusion detection system for protecting solar energy infrastructures in the face of emerging cyber threats.
U.S. officials Investigating Rogue Communication
U.S. energy officials have launched an investigation after discovering unauthorized communication equipment embedded within Chinese
Securing Inverter Communication: Proactive Intrusion Detection
To address the gap of DER cybersecurity and secure the grid-edge to motivate a holistic, defense-in-depth approach, a proactive intrusion detection and mitigation system (PIDMS) device
PDF version includes complete article with source references. Suitable for printing and offline reading.
