ArticlePDF Available

Wind farm security: Attack surface, targets, scenarios and mitigation

Authors:

Abstract

As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to myriad threats. This paper attempts to clarify the gaps in the understanding of wind farm threats and their implications. The paper describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control system and physical assets. It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage. Additionally, the paper highlights mitigation techniques that provide robust security coverage and reduce the negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented in this paper are common across wind farm deployments. However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Power Grid
Substation
Grounding
Transformer
Grounding
Transformer
Step-Up
Transformer
Collector
Step-Up
Transformer
Step-Up
Transformer
Step-Up
Transformer
Wind Farm
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Operations
Control
System
------------
Wind Farm
Management
Transmission
Control
System
-----------
Energy
Management
Ring Ring Ring
Control Center
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Nacelle
Gear Box
Generator
Main Bearing
Anemometer
Transformers
Hydraulic Unit
Generator Cooler
Yaw Motor
Brake
Pitch Gears
Rotor
Tower
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
OPC : Request
OPC : Response
PAC/PLC
(Master)
OPC
Server
FTPTelnet HTTP
PLCs
(Slave)
ICS Switch
PAC/PLC
(Master)
OPC
Server
FTPTelnet HTTP
PLCs
(Slave)
ICS Switch
CAN Bus/Modbus
Operations Control Network
Operator/
Engineering
Stations
HMI
Historian
Operations Control Network
Transmission Control Network
ICS Switch
PLCs
Circuits
Relays
Operator/
Engineering
Stations
HMI
DNP3
Historian
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
OPC : Request
OPC : Response
OPC Client
HMI
Attacker
Wind Turbines
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Attacker
2. OPC:Request
3. Malicious
OPC:Response
3. Malicious
OPC:Request
2. OPC:Response
1. ARP Poison 1. ARP Poison
OPC Client
HMI
Wind Turbines
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Compromised
Turbine
Targeted Turbines
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
Secure VPN
Tunnels
Substation
Compromised
Turbine
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
ACCEPTED MANUSCRIPT
... In an OWF, multiple stakeholders potentially could cause an infection. J. Staggs et al [65] list attack paths as gaining physical access to an offshore structure and plugging a malicious device; cyber access using vendor network; cyber access using technician equipment; or cyber access through a compromised supply chain. ...
Preprint
Full-text available
Offshore wind farms are becoming ever more important means of energy production. Accordingly, they are started to be considered critical infrastructures with heightened attention on their protection and resilience. This paper studies how the maintenance service can sustain or recover offshore wind farm operations under different stressors. We conduct this study by modeling the failures in an offshore wind farm and how maintenance service is able to correct them. Our model enhances the traditional cause-consequence trees by including dynamical aspects, and the modeling of the maintenance process. Special attention in the maintenance model is given to limited personnel and material resources, as well as limited access to wind turbines. This limit is a result of occasional harsh weather conditions that make conducting repairs unsafe. The model is applied for two representative disturbance scenarios: a cyber-attack leading to high failure rates and a high-impact incident causing numerous simultaneous failures. The second scenario integrates results from a physical power system simulation that are used for depicting the incident. The results show that our model can present scenarios where different stressors challenge the operations. These can be used for testing and defining requirements for future countermeasures to improve the resilience.
... As DRESs play a significant role in satisfying energy demand, they are targeted by attackers too. For example, wind power generation station (WPGS) has several vulnerable areas for cyber-attacks, such as control networks, programmable/automation controllers, network devices, operator stations, engineering workstations, and historians [15]. Also, as wind power generation is recognized as the second for electricity generation among different DRESs [3], there are several research works on the cyber-security of WPGS. ...
Article
Full-text available
With the involvement of cyber-infrastructure, the power grids are susceptible to cyber-attacks, whose consequences can be alarming, especially during attacks on control units. Due to utilizing several control units, the vulnerability of high-voltage direct current (HVDC) transmission systems to cyber-attacks can be severe. Hence, this paper aims to analyze the impacts of cyber-attacks on the well-known modular multilevel converter (MMC) HVDC transmission technology for a smart grid with countermeasures. The ramifications of the false data injection attacks on different control units of the control system of MMC-HVDC are evaluated individually, while introducing the system's vulnerabilities from the control parameters' perspective for voltage controller, current controller, and phase-locked loop. Both positively and negatively biased attacks are considered during investigating the impacts of the false data injection attacks on the controller parameters of the MMC-HVDC transmission system, which can be severe. Hence, a controlled switching unit is proposed as a countermeasure for developing an attack-resilient system. Based on the experimental results using MATLAB/Simulink, the proposed protective system ensures the stable operation of a two-terminal MMC-HVDC transmission system of a wind farm effectively during cyber-attacks. The proposed controlled switching unit-based countermeasure can serve as a guide for attack-resilient applications of MMC-based systems.
... Although deep learning-based adversarial attack was first proposed in the computer vision field, in recent years, the increasing attacks on ICSs have raised concerns among scholars regarding the reliability of DLSSs. A study demonstrated that attacks on the edge network of wind power plants can result in the repeated stopping of the turbines, resulting in severe wear and damage to the equipment [10]. Another study proposed an adversarial attack method named universal adversarial perturbation, which was specially designed to destroy the data-driven health state sensing system during aircraft operation and induce the failure of the turbofan engine by providing excessive prediction [11]. ...
Article
Deep learning-based soft sensors (DLSSs) have been demonstrated to exhibit significantly improved sensing accuracy; however, their vulnerability to adver-sarial attacks affects their reliability, thus hindering their widespread application. To improve the reliability of DLSSs, in this article, we conducted a systematic investigation of the adversarial attack and defense of DLSSs. By considering the task requirements of DLSSs and the actual scenarios that attackers may encounter, a framework based on black-box attack and proactive defense was proposed to realize the adversarial attack and defense of soft sensors. The adversarial attack was implemented through the proposed knowledge-guided adversarial attack (KGAA) method. By reconstructing the optimization model and introducing the mechanism knowledge into the objective function, the KGAA method could overcome the ill-posed problem of adversarial attack optimization when attacking a regression model. Moreover, based on the KGAA, a corresponding KGAA adversarial training defense method was proposed to achieve proactive defense. The attack and defense methods were verified in terms of the thermal deformation sensing of an air preheater rotor. Compared to other attacks, the KGAA exhibited higher imperceptibility, rationality, and stability; it can thus be considered a practical attack. The implementation of KGAA adversarial training enhances the adversarial robustness of DLSSs, thus aiding the defense of DLSSs to various attacks and improving their reliability. Index Terms-Adversarial attack and defense, air pre-heater, deep learning, soft sensor reliability, soft sensors.
... The adversary knowledge includes both the cyber-domain operational information [55], and can be classified as 1) White-box with full knowledge; 2) Gray-box with partial knowledge; 3) Blackbox with zero knowledge [56]. The adversary access includes physical access through serial/USB/Ethernet interfaces [57], remote access through phishing emails [58], and close proximity access through wireless compromise [59]. The adversary resource consists of substantial and limited privileges. ...
Preprint
Full-text available
The rapid development of information and communications technology has enabled the use of digital-controlled and software-driven distributed energy resources (DERs) to improve the flexibility and efficiency of power supply, and support grid operations. However, this evolution also exposes geographically-dispersed DERs to cyber threats, including hardware and software vulnerabilities, communication issues, and personnel errors, etc. Therefore, enhancing the cyber-resiliency of DER-based smart grid - the ability to survive successful cyber intrusions - is becoming increasingly vital and has garnered significant attention from both industry and academia. In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. Then, the defense-in-depth strategies encompassing prevention, detection, mitigation, and recovery are comprehensively surveyed, systematically classified, and rigorously compared. A CRE framework is subsequently proposed to incorporate the five key resiliency enablers. Finally, challenges and future directions are discussed in details. The overall aim of this survey is to demonstrate the development trend of CRE methods and motivate further efforts to improve the cyber-resiliency of DER-based smart grid.
Article
With the increasing proportion of wind power generation in the power system, the vulnerabilities of the cyber links of wind turbines (WTs) are gradually exposed. The time-delay attack (TDA) by flooding the communication link between the rotor speed sensor and the controller may reduce the wind generation or overload the WT drive train. This paper attempts to develop an adaptive observer-based resilient control method for WT to defend against TDA. An attack model is established to characterize the behavior which delays the transfer of the rotor speed information to the WT controller, and the real-time adaptive state observers are designed to offset the delayed sensor information caused by the TDA. An adaptive resilient torque control is developed to ensure the optimal rotor speed output, and the attack resilience level of the WT considering the TDA is evaluated. Extensive studies on the 1.5 MW WT illustrate that the proposed resilient control scheme has the ability to mitigate the effect of TDA and guarantee the output performance of the WT system.
ResearchGate has not been able to resolve any references for this publication.