Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards
Abstract
:1. Introduction
1.1. Related Work
1.2. Contributions and Outline
- We analyze the SunSpec cybersecurity standards, focusing on critical aspects such as secure communication, robust authentication processes, automated software updates, and comprehensive logging protocols to ensure the safety and reliability of DER devices.
- We emphasize the importance of remote and automated software update mechanisms and encrypted communication channels for maintaining the security of DER systems. Our survey highlights the adoption of SAE J3072 in conjunction with the IEEE 2030.5 protocol, and its role in securing communication between electric vehicle supply equipment (EVSE) and plug-in electric vehicles (PEVs), particularly in vehicle-to-grid (V2G) operations.
- We present in detail the SunSpec Modbus standard, which aims at enhancing the interoperability between various DER components and supports compliance with grid integration requirements.
- We evaluate the SunSpec Device Information Models, which offer standardize data structures that facilitate seamless communication across the DER systems. Finally, we provide an in-depth analysis of the SunSpec Alliance’s energy storage cybersecurity framework and its proposed blockchain-based security standards.
2. SunSpec Cybersecurity Certification Requirements
- Software Updates/Product Support: The Distributed Energy Resource (DER) devices must (i) support updating mutable security and operational software components, including the operating system, boot loader, applications, libraries, etc.; (ii) provide a mechanism for users to read the current software version; (iii) support remote updates by communicating with a remote server at least once per day to download and install software updates; (iv) support automated updates to streamline the update process; (v) verify the authenticity and integrity of software updates before installing them; and (vi) meet the same security requirements as remote updates in the event that the DER devices support local updates.
- Device Communications: The DER devices must (i) implement secure communication protocols (TLS 1.2 or higher, IPSec version 2 or higher, or SSH-2) for all communications accessing the public internet and (ii) reject deprecated security technologies identified by the NSA and IETF to prevent vulnerabilities.
- Authentication: Regarding the authentication of the DER devices, the SunSpec Alliance (i) requires each user to have unique security credentials for access levels or accounts; (ii) mandates secure authentication mechanisms for all electronic access, locally or remotely; (iii) requires automatic logout after a period of inactivity; (iv) allows authorized users to set session timeout periods; (v) enforces strong password requirements or provides a strength meter; (vi) requires users to create new passwords if defaults are shared or displayed; (vii) implements account lockouts after consecutive failed login attempts; (viii) prevents storage or display of unencrypted passwords; and (ix) supports at least one admin account without brute force prevention.
- Device Security: Regarding the device security, the SunSpec Alliance (i) removes or disables unnecessary interfaces and ports before device transfer and (ii) supports a “factory reset” option for end-of-life or repurposing.
- Logging: The logging requirements include secure storage, timestamps, resolution, accuracy, configuration, security events, remote logs, incident reporting, power setting logs, power cycle logs, and panel logs.
3. SunSpec Requirements for Test Procedure
3.1. SunSpec Requirements SAE J3072 Implementation Using the IEEE 2030.5 Protocol [25]
- SAE J3072 System Architecture Overview:
- System Concept: SAE J3072 defines how the PEVs connect to the EPSs via the EVSE using onboard inverter systems. The communication between the PEVs and the EVSE is managed using the IEEE 2030.5 protocol, which ensures the safe and authorized power discharge from vehicles to the grid.
- Security Considerations: The primary security focus is on the communication between PEVs and EVSE, specifically preventing man-in-the-middle (MITM) attacks. Both the PEV and EVSE must use IEEE 2030.5-compliant certificates and secure HTTPS connections to mitigate these risks. However, due to the point-to-point nature of the physical connection and additional protocols, the likelihood of successful MITM attacks is considered low.
- Communication Architecture: The PEV and EVSE communicate over a physical power line communication (PLC) link, utilizing TCP/IP protocols for secure data transfer. Each connection is unique to ensure proper authentication and data integrity.
- Operations and Compliance: Upon connection, the PEV identifies and authenticates the EVSE, discovers necessary resources, and exchanges information to receive discharge authorization. This authorization is periodically monitored and managed to ensure that the PEV operates within defined limits. If unauthorized activity is detected, the EVSE can revoke discharge permissions and, if necessary, disconnect the PEV.
- Periodic Operations: PEVs continuously send operational data to the EVSE, including metrology and status information, ensuring compliance with site-specific limits and discharge authorizations. The communication frequency and data requirements are dynamically managed by the EVSE.
- Exception Handling: PEVs operate in a default mode unless explicitly authorized to discharge by the EVSE. Authorization can be withdrawn due to communication failures or other exceptions, prompting the PEV to cease discharging within a specified timeframe. Both PEVs and EVSE must be capable of handling such scenarios to maintain system integrity.
- TLS Encryption: Mutual TLS encryption is mandatory during initial communications to establish a secure connection. Both devices exchange IEEE 2030.5-compliant certificates to authenticate each other.
- Device Certificates: PEV certificates must encode make and model details using Object IDs (OIDs). This information enables the verification of the PEV’s authenticity and suitability for connection.
- IPv6 Usage: All communications utilize IPv6, with specific address blocks and stateless address autoconfiguration for the secure and unique identification of devices on the network.
- Restricted Bridging/Routing: Initially, the EVSE restricts any bridging or routing of PEV communications to prevent unauthorized network access. Bridging may only be enabled after successful PEV authorization.
- Service Discovery: Multicast DNS (mDNS) is employed for discovering services on the network, ensuring that devices can locate necessary resources securely without reliance on external DNS servers.
- Service Discovery: The PEVs and EVSE use mDNS and DNS-SD for service discovery, and they also establish a secure TLS connection before retrieving the DeviceCapability resources.
- Resource Discovery: The PEVs have access to a wide range of resources, e.g., DeviceCapability, Time, EndDeviceList, and DERList, in order to ensure secure data exchange.
- PEV Retrieves Site Limits: The PEVs retrieve site limits from the EVSE in order to guarantee their compatibility and secure communication.
- PEV Sends Info to EVSE: The PEVs send information, e.g., Device Information, Power Status, DER Capability, and DER Settings, to the EVSE in order to guarantee secure data transmission.
- PEV Retrieves Management Information: The PEVs retrieve information, e.g., Function Set Assignments, Time, DER Program List, Default DER Control, and DER Control List, in order to guarantee the secure management and operation.
- DERControl Responses: The EVs send responses to the DERControl commands in order to indicate the status of the control action. These responses are immediately sent upon receiving the control command.
- Mirror Usage Point Setup: The EVs post mirror usage point data, including meter readings such as active power, reactive power, voltage, and frequency. These readings are posted periodically and their update rate is determined by the meter usage point configuration.
- Subscriptions and Notifications: The EVs subscribe to receive notifications about changes in control commands or system configurations. The charging infrastructure sends notifications to EVs when such changes occur.
- Periodic Retrieval of Information: The EVs periodically query the charging infrastructure for updates on control commands, meter readings, and system configurations. This allows the EVs to stay synchronized with the charging infrastructure and respond to the changes in a timely and synchronized manner.
- Sends Periodic Information: The periodic information sent by the PEVs includes updates on the DERStatus, PowerStatus, DERAvailability, Meter Readings (i.e., Active Power, Reactive Power, Voltage, and Frequency), which serve as the heartbeat messages for the detection of the loss of communication. Additionally, the PEVs interact with the new DERControl and adjust the Active Power limits for the site, and also coordinate the charging and discharging processes through the DERControl responses.
3.2. SunSpec Modbus
- IEEE 1547-2018 Standard
- Revision: April 2018 by the IEEE.
- Requirement: Communication interface for DER systems.
- Interfaces: SunSpec Modbus or other standard interfaces.
- Adoption: Mandatory for all DERs in state and local jurisdictions once adopted.
- SunSpec Modbus Interface
- ⋄
- Purpose:
- −
- Defines parameters and settings for DER monitoring and control.
- −
- Enhances interoperability.
- −
- Facilitates voltage regulation, power factor setting, and power export limiting.
- ⋄
- Development:
- −
- Based on Modbus protocol (1980s).
- −
- Created by SunSpec Alliance (2009).
- −
- Extended to cover solar inverters and other DERs.
- ⋄
- Adoption:
- −
- Integrated into ~80% of DER devices.
- −
- Simple to add SunSpec Modbus support for IEEE 1547 compliance.
- SunSpec Modbus and DER Systems
- ⋄
- Communication and Interoperability:
- −
- Protocol: Leverages Modbus protocol for DER devices.
- −
- Communication: Between loggers, servers, and DER devices.
- −
- Information Model: Defines data points and functionality.
- ⋄
- SunSpec Information Models
- −
- Device Information Models: Define data points and functionality.
- −
- Encoding: Uses JSON and CSV formats.
- ⋄
- Certification and Conformance
- −
- Process: Vendors declare implementations in a Protocol Implementation Conformance Statement (PICS).
- −
- Conformance: Verified against SunSpec standards.
3.3. SunSpec Device Information Models to Standardize Device Data Exchange
3.4. SunSpec DER Information Model Specification
3.5. SunSpec Energy Storage Cybersecurity Specifications
3.6. SunSpec Blockchain Cybersecurity Requirements
- Authorized Assessor Audit:
- −
- An authorized Assessor conducts security audits on key generation, key storage within DER Clients, and key exposure in the manufacturing supply chain.
- −
- Audit results are stored on the blockchain for transparency and integrity.
- Key Generation and Provisioning:
- −
- The Key Generator creates and provides private/public key pairs into DER Clients, ensuring adherence to audited processes.
- −
- Keys can be provisioned during manufacturing or installation, with mechanisms to securely store and control access to the private key.
- Manufacturer Responsibilities:
- −
- Manufacturers produce DER Clients, ensuring compliance with audited processes for key handling and provisioning.
- −
- Manufacturers register each device’s key on the blockchain, linking it to audited processes and device information.
- Certificate Authority (CA) Issuance:
- −
- CAs issue certificates based on blockchain-verified information, ensuring secure mapping between public keys and device attributes.
- −
- Certificates are essential for secure TLS sessions between DER Clients and DER Servers, facilitating mutual authentication.
- DER Server Validation:
- −
- DER Servers validate DER Client certificates during TLS handshakes using blockchain data, ensuring that the trustworthiness of private key management meets minimum security requirements.
- A CA issues X.509 certificates containing DER Client public keys and policy parameters.
- Certificates are used for authentication during communication with DER Servers.
- DER Servers query the blockchain using extracted key identifiers from certificates.
- Blockchain provides additional cybersecurity information beyond traditional mechanisms like OCSP and CRL.
- Lifecycle stages include manufacturing, distribution, installation, and decommissioning.
- Blockchain records ownership transfers, end-of-life events, and key revocations.
- Involves multiple actors (manufacturers, distributors, installers) ensuring secure key provisioning and ownership transfer.
- Different scenarios (component integration, service provision) affect blockchain recording requirements.
4. Gap Analysis on SunSpec Alliance Standards
4.1. Gap Analysis
4.2. Addressing Gaps in SunSpec Standards
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Zografopoulos, I.; Hatziargyriou, N.D.; Konstantinou, C. Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations. IEEE Syst. J. 2023, 17, 6695–6709. [Google Scholar] [CrossRef]
- Sangoleye, F.; Jao, J.; Faris, K.; Tsiropoulou, E.E.; Papavassiliou, S. Reinforcement Learning-Based Demand Response Management in Smart Grid Systems with Prosumers. IEEE Syst. J. 2023, 17, 1797–1807. [Google Scholar] [CrossRef]
- Patrizi, N.; LaTouf, S.K.; Tsiropoulou, E.E.; Papavassiliou, S. Prosumer-Centric Self-Sustained Smart Grid Systems. IEEE Syst. J. 2022, 16, 6042–6053. [Google Scholar] [CrossRef]
- Xie, J.; Rahman, A.; Sun, W. Bayesian GAN-Based False Data Injection Attack Detection in Active Distribution Grids with DERs. IEEE Trans. Smart Grid 2024, 15, 3223–3234. [Google Scholar] [CrossRef]
- Ahn, B.; Kim, T.; Ahmad, S.; Mazumder, S.K.; Johnson, J.; Mantooth, H.A.; Farnell, C. An Overview of Cyber-Resilient Smart Inverters Based on Practical Attack Models. IEEE Trans. Power Electron. 2024, 39, 4657–4673. [Google Scholar] [CrossRef]
- Battista Gaggero, G.; Armellin, A.; Ferro, G.; Robba, M.; Girdinio, P.; Marchese, M. BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System. IEEE Open Access J. Power Energy 2024, 11, 362–372. [Google Scholar] [CrossRef]
- Gupta, K.; Sahoo, S.; Panigrahi, B.K. A Monolithic Cybersecurity Architecture for Power Electronic Systems. IEEE Trans. Smart Grid 2024, 15, 4217–4227. [Google Scholar] [CrossRef]
- Barbierato, L.; Salvatore Schiera, D.; Orlando, M.; Lanzini, A.; Pons, E.; Bottaccioli, L.; Patti, E. Facilitating Smart Grids Integration Through a Hybrid Multi-Model Co-Simulation Framework. IEEE Access 2024, 12, 104878–104897. [Google Scholar] [CrossRef]
- Zhang, H.; Yu, C.; Zeng, M.; Ye, T.; Yue, D.; Dou, C.; Xie, X.; Hancke, G.P. Homomorphic Encryption-Based Resilient Distributed Energy Management Under Cyber-Attack of Micro-Grid with Event-Triggered Mechanism. IEEE Trans. Smart Grid 2024, 15, 5115–5126. [Google Scholar] [CrossRef]
- Liu, Z.; Wang, L. A Distributionally Robust Defender-Attacker-Defender Model for Resilience Enhancement of Power Systems Against Malicious Cyberattacks. IEEE Trans. Power Syst. 2023, 38, 4986–4997. [Google Scholar] [CrossRef]
- Tuyen, N.D.; Quan, N.S.; Linh, V.B.; Van Tuyen, V.; Fujita, G. A Comprehensive Review of Cybersecurity in Inverter-Based Smart Power System Amid the Boom of Renewable Energy. IEEE Access 2022, 10, 35846–35875. [Google Scholar] [CrossRef]
- Callenes, J.; Poshtan, M. Dynamic Reconfiguration for Resilient State Estimation Against Cyber Attacks. IEEE Trans. Emerg. Top. Comput. 2024, 12, 559–571. [Google Scholar] [CrossRef]
- Trevizan, R.D.; Obert, J.; De Angelis, V.; Nguyen, T.A.; Rao, V.S.; Chalamala, B.R. Cyberphysical Security of Grid Battery Energy Storage Systems. IEEE Access 2022, 10, 59675–59722. [Google Scholar] [CrossRef]
- Albunashee, H.M.; Farnell, C.; Suchanek, A.; Haulmark, K.; McCann, R.A.; Di, J.; Mantooth, A. A Test Bed for Detecting False Data Injection Attacks in Systems with Distributed Energy Resources. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 1303–1315. [Google Scholar] [CrossRef]
- Xiong, X.; Sun, C.; Ni, W.; Wang, X. Three-Dimensional Trajectory Design for Unmanned Aerial Vehicle-Based Secure and Energy-Efficient Data Collection. IEEE Trans. Veh. Technol. 2023, 72, 664–678. [Google Scholar] [CrossRef]
- Ju, Y.; Cao, Z.; Chen, Y.; Liu, L.; Pei, Q.; Mumtaz, S.; Dong, M.; Guizani, M. NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks with Asynchronous Deep Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2024, 25, 2627–2640. [Google Scholar] [CrossRef]
- Ju, Y.; Gao, Z.; Wang, H.; Liu, L.; Pei, Q.; Dong, M.; Mumtaz, S.; Leung, V.C.M. Energy-Efficient Cooperative Secure Communications in mmWave Vehicular Networks Using Deep Recurrent Reinforcement Learning. IEEE Trans. Intell. Transp. Syst. 2024, 1–16. [Google Scholar] [CrossRef]
- Wang, Y.; Xiao, J.; Wei, Z.; Zheng, Y.; Tang, K.T.; Chang, C.H. Security and Functional Safety for AI in Embedded Automotive System—A Tutorial. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 1701–1707. [Google Scholar] [CrossRef]
- Wang, W.; Sadjadi, S.M.; Rishe, N. A Survey of Major Cybersecurity Compliance Frameworks. In Proceedings of the 2024 IEEE 10th Conference on Big Data Security on Cloud (BigDataSecurity), New York, NY, USA, 10–12 May 2024; pp. 23–34. [Google Scholar] [CrossRef]
- Parmar, M.; Miles, A. Cyber Security Frameworks (CSFs): An Assessment Between the NIST CSF v2.0 and EU Standards. In Proceedings of the 2024 Security for Space Systems (3S), Noordwijk, The Netherlands, 27–28 May 2024; pp. 1–7. [Google Scholar] [CrossRef]
- Safitri, E.H.N.; Kabetta, H. Cyber-Risk Management Planning Using NIST CSF V1.1, ISO/IEC 27005:2018, and NIST SP 800-53 Revision 5 (A Study Case to ABC Organization). In Proceedings of the 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs), Bogor, Indonesia, 22–24 August 2023; pp. 332–338. [Google Scholar] [CrossRef]
- Randle, B.; Nunneley, J.; Fox, B.; Cox, C.; Madianos, G.; Blair, J.; Daharsh, J.; Hong, S.; Beran, M.; Lydic, B.; et al. SunSpec Alliance Interoperability Specification-Inverter Controls Model; SunSpec Alliance: San Jose, CA, USA, 2013. [Google Scholar]
- SunSpec. Cybersecurity Certification. Available online: https://sunspec.org/wp-content/uploads/2024/03/SunSpec-Cybersecurity-Certification-Requirements-Release-2024-v2-clean.pdf (accessed on 6 October 2024).
- SunSpec. Cybersecurity Certification Release 2024 Test Procedure. Available online: https://sunspec.org/wp-content/uploads/2024/03/SunSpec-Cybersecurity-Certification-Test-Procedure-Release-2024-240319-clean.pdf (accessed on 6 October 2024).
- IEEE Standards Association. Available online: https://standards.ieee.org/ieee/2030.5/5897/ (accessed on 6 October 2024).
- Available online: https://webstore.ansi.org/standards/sae/sae30722021?srsltid=AfmBOorPb4qajsxLM2sym_uo3mIZnHrWvqK0VCswYlIZkGz4QcgJvyZj (accessed on 6 October 2024).
- SunSpec. IEEE 2030.5 V2G-AC Profile Implementation Guide for SAE J3072. Available online: https://sunspec.org/wp-content/uploads/2022/06/SunSpec-IEEE-2030.5-V2G-AC-Profile-TEST-1.0.pdf (accessed on 6 October 2024).
- SunSpec. MODBUS INTERFACE. Available online: https://sunspec.org/wp-content/uploads/2019/09/SunSpec-Modbus-FactSheet-RevA-2019-07-web.pdf (accessed on 6 October 2024).
- SunSpec. Technology Overview. Available online: https://sunspec.org/wp-content/uploads/2022/05/SunSpec-Technology-Overview-20220301.pdf (accessed on 6 October 2024).
- SunSpec. Device Information Model Specification. Available online: https://sunspec.org/wp-content/uploads/2022/05/SunSpec-Device-Information-Model-Specificiation-V1-1-final.pdf (accessed on 6 October 2024).
- SunSpec. DER Information Model Specification. Available online: https://sunspec.org/wp-content/uploads/2021/04/SunSpec-DER-Information-Model-Specification-V1-0.pdf (accessed on 6 October 2024).
- IEC 61850-7-420:2021. Available online: https://webstore.iec.ch/en/publication/34384 (accessed on 6 October 2024).
- SunSpec. Energy Storage Models. Available online: https://sunspec.org/wp-content/uploads/2019/08/SunSpec-Alliance-Specification-Energy-Storage-ModelsD4rev0.pdf (accessed on 6 October 2024).
- SunSpec. Blockchain to Record Private Key Properties in DER Equipment. Available online: https://sunspec.org/wp-content/uploads/2021/03/SunSpecAlliance_BlockchainWG_Specification_BlockchainTo\RecordPrivateKeyProperties_29032021.pdf (accessed on 6 October 2024).
- National Institute of Standards and Technology. The NIST Cybersecurity Framework (CSF) 2.0. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf (accessed on 8 September 2024).
Benefit | Description |
---|---|
Simple Integration | Short step for manufacturers familiar with Modbus to comply with IEEE 1547-2018 |
Cost-Effective | Low cost due to existing network interfaces in most DER devices |
Easy Compliance | Provides royalty-free specs, reference software, and development tools |
Component | Interface |
---|---|
Inverter | SunSpec Modbus |
PV Module | SunSpec Modbus |
Meter | SunSpec Modbus |
Tracker | SunSpec Modbus |
Storage | SunSpec Modbus |
Gateway | SunSpec Modbus |
Standard | Interface |
---|---|
IEEE 1547-2018 | Establishes the communication requirements for DER systems. |
IEEE 2030.5 | Specifies internet communication protocols used in DER systems. |
IEEE 1815 | Defines protocols for utility network communication. |
Model | Description |
---|---|
Common Model | Provides basic identification details about the physical device, such as manufacturer, model, and serial number. This model is always included in a SunSpec-compliant device. |
Standard Models | Specify common data points implemented by devices within a given category. These models ensure that devices within the same category share a common set of data points for interoperability. |
Vendor Models | Defined by individual device vendors, these models include data points unique to the vendor’s specific implementation. Although they must adhere to certain rules, they do not follow the SunSpec Standard Model review process. Each Vendor Model requires an identifier assigned by SunSpec. |
Key Aspects of SunSpec Device Information Models | Description |
---|---|
Standardization | The models ensure a consistent method for defining and using device data. |
Communication Interfaces | They support data exchange via Modbus and JSON, making them versatile for different applications. |
Model Structure | The models consist of various elements such as models, points, point groups, symbols, and comments to represent device data comprehensively. |
Element | Description |
---|---|
Model | Logical grouping of data points with a unique model ID. |
Point | Defines a device data point with a value. |
Point Group | Groups multiple points or other point groups. |
Symbol | Name–value pair representing constant values for points. |
Comment | Annotations for documenting elements. |
Attribute | Description | Model | Point Group | Point | Symbol |
---|---|---|---|---|---|
ID | Element name, unique within the group | R | R | R | R |
Points | Array of point definitions | R | |||
Groups | Array of point group definitions | O | |||
Value | Constant value associated with the element | R | |||
Type | Element type | R | R | ||
Count | Occurrence count of the element | O | O | ||
Size | Element size, mandatory for strings | O | |||
Scale Factor | Scale factor point for the element | O | |||
Units | Units associated with the element | O | |||
Access | Read or read/write access | O | |||
Mandatory | Indicates if element is mandatory | O | |||
Label | Short label for the element | R | R | O | O |
Description | Element description | O | O | O | O |
Symbols | Name–value pair for enumerated values | O | O | O |
Numeric Types | Floating Point Types | Other Types |
---|---|---|
int16, int32, int64: Signed integers of 16, 32, and 64 bits, respectively. | float32: 32-bit floating-point number. | string: UTF-8 encoded string. |
uint16, uint32, uint64: Unsigned integers of 16, 32, and 64 bits, respectively. | float64: 64-bit floating-point number. | sunssf: Scale factor for applying multipliers or dividers. |
raw16: 16-bit raw value. | pad: 16-bit pad used for alignment. | |
acc16, acc32, acc64: Unsigned accumulators of 16, 32, and 64 bits, respectively. | ipaddr: Unsigned 32-bit IPv4 address. | |
bitfield16, bitfield32, bitfield64: Bitfields of 16, 32, and 64 bits, respectively. | ipv6addr: 16-byte IPv6 address. | |
enum16, enum32: Enumerations of 16 and 32 bits, respectively. | eui48: 48-bit MAC address. |
Symbol | Description | Access |
---|---|---|
Ena | Enables or disables the function. | Read/Write |
AdptCrvReq | Selects a new curve setting. | Read/Write |
AdptCrvRslt | Result of the AdptCrvReq operation. | Read-Only |
NPt | Number of possible curve points. | Read-Only |
NCrv | Number of curve instances. | Read-Only |
ActPt | Number of active points in the curve. | Read/Write |
Model Name | Description |
---|---|
DER AC Measurement | Measurement data, status, and alarm information. |
DER Capacity | Capacity-related information. |
DER Enter Service | Enter service-related data. |
DER AC Controls | AC control settings and parameters. |
DER Volt-Var | Voltage–var control settings and parameters. |
DER Volt-Watt | Voltage–watt control settings and parameters. |
DER Trip LV | Low-voltage trip settings and parameters. |
DER Trip HV | High-voltage trip settings and parameters. |
DER Trip LF | Low-frequency trip settings and parameters. |
DER Trip HF | High-frequency trip settings and parameters. |
DER Frequency Droop | Frequency droop settings and parameters. |
DER Watt-Var | Watt–var control settings and parameters. |
DER Storage Capacity | Storage capacity-related information. |
DER DC Measurement | DC measurement data and parameters. |
Region | DER Behavior | Precedence Hierarchy |
---|---|---|
Trip | DER trips when region is entered. | 1 (highest) |
May Trip | DER may continue operating or trip. | 3 |
Momentary Cessation | DER ceases energizing but does not trip. | 2 |
Group/Point Name | Label | Data Type | RW Access | Mandatory (M) | Static (S) |
---|---|---|---|---|---|
DERCapacity | DER Capacity group ID | uint16 | - | M | S |
L | DER Capacity Model Length | uint16 | - | M | S |
WMaxRtg | Active Power Max Rating | uint16 | - | - | S |
WOvrExtRtg | Active Power (Over-Excited) Rating | uint16 | - | - | S |
WUndExtRtg | Active Power (Under-Excited) Rating | uint16 | - | - | S |
VAMaxRtg | Apparent Power Max Rating | uint16 | - | - | S |
VarMaxInjRtg | Reactive Power Injected Rating | uint16 | - | - | S |
WChaRteMaxRtg | Charge Rate Max Rating | uint16 | - | - | S |
VNomRtg | AC Voltage Nominal Rating | uint16 | - | - | S |
AMaxRtg | AC Current Max Rating | uint16 | - | - | S |
Group/Point Name | Label | Data Type | RW Access | Mandatory (M) | Static (S) |
---|---|---|---|---|---|
WMax | Active Power Max Setting | uint16 | RW | - | - |
WOvrExtPF | Specified Over-Excited PF | uint16 | RW | - | - |
WMaxUndExt | Active Power (Under-Excited) Setting | uint16 | RW | - | - |
VAMax | Apparent Power Max Setting | uint16 | RW | - | - |
VarMaxInj | Reactive Power Injected Setting | uint16 | RW | - | - |
VNom | Nominal AC Voltage Setting | uint16 | RW | - | - |
AMax | AC Current Max Setting | uint16 | RW | - | - |
Model # | Name | Summary | Availability |
---|---|---|---|
802 | Battery Base Model | Key monitoring and control points of all batteries | TEST |
803 | Lithium-ion Battery Bank | Monitoring and control of lithium-ion battery banks | TEST |
804 | Lithium-ion Battery String | Monitoring and control of lithium-ion battery strings | TEST |
805 | Lithium-ion Battery Module | Monitoring and control of lithium-ion battery modules | TEST |
806 | Flow Battery Bank | Monitoring and control of flow battery banks | N/A |
807 | Flow Battery String | Monitoring and control of flow battery strings | TEST |
808 | Flow Battery Module | Monitoring and control of flow battery modules | N/A |
809 | Flow Battery Stack | Monitoring and control of flow battery stacks | N/A |
Aspect | Description |
---|---|
Battery Type Enumeration (Typ) | Enumerates the type of battery connected, aiding Modbus masters in identification. |
Battery Alarms and Warnings (Evt1) | Bitfield for managing alarms and warnings; includes standard and custom alarm capabilities. |
Alarm Reset (AlmRst) | Resets latched alarms upon receiving a value of 1; updates Evt1 to reflect alarm reset status. |
External Battery Measurements | Registers: V (External Battery Voltage), A (Total DC Current), W (Total Power). |
Max/Min Cell Voltage (CellVMax/CellVMin) | Provides maximum and minimum voltages across all cells; essential for monitoring cell performance. |
Optional Location Data | Registers: CellVMaxStr, CellVMaxMod, CellVMinStr, CellVMinMod; specify location of extreme voltages. |
Dynamic Limits | Registers: AChaMax (Max Charge Current), ADisChaMax (Max Discharge Current), VMax (Max Voltage), VMin (Min Voltage). |
Operational Boundaries | Communicates maximum and minimum operational limits for current and voltage; ensures safe operations. |
Battery States (State) | Enumerates operational states (Disconnected, Initializing, Connected, Fault). |
State Transitions | Managed via SetOp commands; reflect state changes such as connect/disconnect operations. |
Inverter State (SetInvState) | Indicates current state of connected inverter to coordinate battery operations. |
Temperature Monitoring | Registers: ModTmpMax (Max Module Temperature), ModTmpMin (Min Module Temperature). |
Location-Specific Data | Registers: ModTmpMaxStr, ModTmpMaxMod, ModTmpMinStr, ModTmpMinMod; provide temperature location. |
String-Level Metrics | Registers: StrVMax, StrVMin (Voltage); StrAMax, StrAMin (Current); StrSoC, StrSoH (State/Health). |
Operational Details | String state (StrSt), fault reasons (StrDisRsn), and health metrics at string level. |
Actor | Description |
---|---|
Manufacturer | Responsible for device manufacturing and key registration on the blockchain. |
Authorized Assessor | Independent evaluator of key creation and provisioning processes, auditing device security. |
Key Generator | Entity creating and provisioning cryptographic keys into DER devices. |
Certificate Authority | Issues digital certificates based on blockchain information to validate DER device identities. |
Governing Body | Oversees the blockchain governance, establishing rules and security protocols. |
DER Client | Equipment in the DER space using registered keys for secure communications. |
DER Server | Web server endpoint managing communications with DER Clients based on key security levels. |
Use Case Description | Key Features |
---|---|
Manufacturer registers private/public key pairs on blockchain for DER devices. | Secure key creation and provisioning processes. |
Authorized Assessor audits and stores evaluation reports on blockchain. | Independent verification of device security measures. |
Certificate Authority validates device identities using blockchain information for TLS sessions. | Issuance of digital certificates based on verified device keys. |
DER Server makes trust decisions based on blockchain data regarding device security properties. | Secure communication with DER Clients based on certified key security levels. |
SunSpec | |
---|---|
Organizational Context (GV.OC) | Insufficiently Addressed: The SunSpec documentation provides an overview of interoperability processes and standards for Distributed Energy Resource (DER) systems, including the SunSpec Alliance’s specification process, information models, and conformance and certification requirements. However, it falls short in addressing critical aspects such as the organizational mission, stakeholder expectations, and legal, regulatory, and contractual requirements related to cybersecurity risk management decisions. Additionally, the documentation lacks the identification of specific internal or external stakeholders and does not adequately cover the cybersecurity-related expectations of DERs beyond what is discussed in the specifications. It also fails to address the communication of organizational objectives and services, as the focus remains primarily on the technical cybersecurity requirements for the devices. |
Risk Management Strategy (GV.RM) | Insufficiently Addressed: The SunSpec framework insufficiently addresses organizational-level risk management strategies, priorities, constraints, risk tolerance, and objectives. Its focus is primarily on technical specifications and requirements for device cybersecurity, such as software updates, secure communications, and authentication mechanisms. Overall, it lacks comprehensive organizational recommendations or a broader perspective on risk management strategies. |
Roles, Responsibilities, and Authorities (GV.RR) | Insufficiently Addressed: The coverage of accountability and responsibility in the SunSpec framework is insufficiently addressed in several key areas. SunSpec emphasizes the device-level certification and specifies the manufacturer requirements to ensure device security and integrity; however, it only indirectly fosters organizational accountability. The framework partially outlines the responsibilities regarding the software updates, communication security, and authentication but lacks a comprehensive discussion on cybersecurity roles beyond these device-specific mandates. Additionally, SunSpec addresses the resource allocation for compliance with cybersecurity standards; however, it does not consider the broader implications of resource management for the overall cybersecurity efforts. Furthermore, there is no mention of human resource practices. |
Policy (GV.PO) | Addressed |
Oversight (GV.OV) | Insufficiently Addressed: SunSpec does not address organizational-level risk management strategy review and adjustment. It primarily focuses on the technical requirements for device cybersecurity. |
Cybersecurity Supply Chain Risk Management (GV.SC) | Not Addressed: SunSpec does not explicitly address roles and responsibilities beyond the device manufacturer and certifying bodies. It focuses solely on the device-level cybersecurity requirements. |
Asset Management (ID.AM) | Insufficiently Addressed: The SunSpec certification focuses on individual device-type testing rather than comprehensive organizational hardware inventories. It ensures devices are certified individually but does not mandate comprehensive organizational inventory management. |
Risk Assessment (ID.RA) | Not Addressed: SunSpec focuses on type testing for individual devices, not organizational vulnerabilities. |
Improvement (ID.IM) | Insufficiently Addressed: The SunSpec certification focuses primarily on device-specific cybersecurity requirements and type testing. Evaluations for organizational improvements, such as cybersecurity risk assessments across all functions, are not within the scope. |
Identity Management, Authentication, and Access Control (PR.AA) | Insufficiently Addressed: SunSpec specifies requirements for managing authentication credentials securely (e.g., DER/AUTH/REQ-01, DER/AUTH/REQ-06). However, it focuses more on device-specific credentials rather than the organizational management of identities across all authorized entities. |
Awareness and Training (PR.AT) | Not Addressed: The SunSpec Cybersecurity Certification document primarily focuses on device-level cybersecurity requirements for DER devices. It does not address organizational training and awareness programs for personnel, which are outside the scope of device certification. |
Data Security (PR.DS) | Insufficiently Addressed:SunSpec does not explicitly specify requirements for protecting data-at-rest explicitly. It primarily focuses on device-level security and software updates. |
Platform Security (PR.PS) | Insufficiently Addressed: SunSpec does not explicitly discuss configuration management practices. |
Technology Infrastructure Resilience (PR.IR) | Insufficiently Addressed: The SunSpec documentation does not address protection from environmental threats such as physical damage, natural disasters, or other non-cyber-related environmental risks. The scope is limited to cybersecurity requirements for devices. |
Continuous Monitoring (DE.CM) | Insufficiently Addressed: SunSpec focuses on device type testing rather than network monitoring. It ensures that devices communicate securely but does not specify the continuous monitoring of networks themselves. |
Adverse Event Analysis (DE.AE) | Not Addressed |
Incident Management (RS.MA) | Not Addressed |
Incident Analysis (RS.AN) | Insufficiently Addressed: The SunSpec documentation primarily focuses on device-level cybersecurity requirements, such as secure software updates, secure communications, and authentication mechanisms. SunSpec emphasizes the importance of security measures and incident prevention (like software update integrity and secure communications); it does not explicitly detail procedures for incident analysis and root cause determination. |
Incident Response Reporting and Communication (RS.CO) | Not Addressed |
Incident Mitigation (RS.MI) | Not Addressed |
Incident Recovery Plan Execution (RC.RP) | Not Addressed |
Incident Recovery Communication (RC.CO) | Not Addressed |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Tsikteris, S.; Diamantopoulos Pantaleon, O.; Tsiropoulou, E.E. Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards. Energies 2024, 17, 5017. https://doi.org/10.3390/en17195017
Tsikteris S, Diamantopoulos Pantaleon O, Tsiropoulou EE. Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards. Energies. 2024; 17(19):5017. https://doi.org/10.3390/en17195017
Chicago/Turabian StyleTsikteris, Sean, Odyssefs Diamantopoulos Pantaleon, and Eirini Eleni Tsiropoulou. 2024. "Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards" Energies 17, no. 19: 5017. https://doi.org/10.3390/en17195017
APA StyleTsikteris, S., Diamantopoulos Pantaleon, O., & Tsiropoulou, E. E. (2024). Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards. Energies, 17(19), 5017. https://doi.org/10.3390/en17195017