Wind farm security: attack surface, targets, scenarios and mitigation

As modern society grows more reliant on wind energy, wind farm deployments will become increasingly attractive targets for malicious entities. The geographic scale of wind farms, remoteness of assets, flat logical control networks and insecure control protocols expose wind farms to myriad threats. This paper attempts to clarify the gaps in the understanding of wind farm threats and their implications. The paper describes the anatomy of a generic wind farm and the attack vectors that can be leveraged to target its information technology, industrial control and physical assets. It discusses attack scenarios involving unauthorized wind turbine control, wind turbine damage, wind farm disruption and damage, and substation disruption and damage. Additionally, the paper highlights mitigation techniques that provide robust security coverage and reduce the negative cyber and physical impacts. The attack surface, targets, scenarios and mitigation techniques presented in this paper are common across wind farm deployments. However, it is still possible to add details about the unique aspects of wind farm assets, configurations and operations in order to develop a holistic risk management program geared for a specific wind farm deployment.

[1]  Shuangwen Sheng,et al.  Report on Wind Turbine Subsystem Reliability - A Survey of Various Databases (Presentation) , 2013 .

[2]  Jing Ma,et al.  A security framework for the wind farm communication network , 2011, 2011 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT).

[3]  Wenxia Liu,et al.  A security mechanism of Web Services-based communication for wind power plants , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.

[4]  Wei-Jen Lee,et al.  System impact study for the interconnection of wind generation and utility system , 2005, IEEE Transactions on Industry Applications.

[5]  O. Anaya-Lara,et al.  Communications Requirements and Technology for Wind Farm Operation and Maintenance , 2006, First International Conference on Industrial and Information Systems.

[6]  Sujeet Shenoi,et al.  A Taxonomy of Attacks on the DNP3 Protocol , 2009, Critical Infrastructure Protection.

[7]  Sujeet Shenoi,et al.  Attack taxonomies for the Modbus protocols , 2008, Int. J. Crit. Infrastructure Prot..

[8]  Turan Gonen,et al.  Electric Power Distribution Engineering , 2014 .

[9]  William Shaw,et al.  Cybersecurity for SCADA Systems , 2006 .

[10]  Chen-Ching Liu,et al.  Cyber intrusion of wind farm SCADA system and its impact analysis , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.

[11]  Zhe Chen,et al.  Study of LANs access technologies in wind power system , 2010, IEEE PES General Meeting.

[12]  Zhe Chen,et al.  Intelligent control on wind farm , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[13]  Thomas P. von Hoff,et al.  Security for Industrial Communication Systems , 2005, Proceedings of the IEEE.

[14]  Sean W. Smith,et al.  YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems , 2008, SEC.