Visible to the public Research on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System

TitleResearch on Cybersecurity Strategy and Key Technology of the Wind Farms’ Industrial Control System
Publication TypeConference Paper
Year of Publication2021
AuthorsHu, Peng, Yang, Baihua, Wang, Dong, Wang, Qile, Meng, Kaifeng, Wang, Yinsheng, Chen, Zhen
Conference Name2021 IEEE International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT)
Date Publishedjul
Keywordscybersecurity, industrial control, industrial control systems, Industrial Control Systems(ICS), Intrusion detection, Key Technologies, Mechatronics, Network security, power grids, pubcrawl, Resiliency, Scalability, scalable systems, security strategies, Solid modeling, wind farm, Wind farms
AbstractAffected by the inherent ideas like "Focus on Function Realization, Despise Security Protection", there are lots of hidden threats in the industrial control system of wind farms (ICS-WF), such as unreasonable IP configuration, failure in virus detection and killing, which are prone to illegal invasion and attack from the cyberspace. Those unexpected unauthorized accesses are quite harmful for the stable operation of the wind farms and regional power grid. Therefore, by investigating the current security situation and needs of ICS-WF, analyzing the characteristics of ICS-WF's architecture and internal communication, and integrating the ideas of the classified protection of cybersecurity, this paper proposes a new customized cybersecurity strategy for ICS-WF based on the barrel theory. We also introduce an new anomalous intrusion detection technology for ICS-WF, which is developed based on statistical models of wind farm network characteristics. Finally, combined all these work with the network security offense and defense drill in the industrial control safety simulation laboratory of wind farms, this research formulates a three-dimensional comprehensive protection solution for ICS-WF, which significantly improves the cybersecurity level of ICS-WF.
DOI10.1109/ICEEMT52412.2021.9601591
Citation Keyhu_research_2021