1. Introduction
Renewable energy sources (RES), e.g., solar, wind, or hydroelectric power, are replacing fossil fuels to reduce their impact on global climate change [1] and have been reported to account for of all energy sources up to 2023 [2]. As the penetration rate of RES continues to increase, it is critical to examine the emerging security issues of the power grids before RES constructions are finalized. Since most RES generates direct current (DC) power, yet the grids and power consumers operate on alternating current (AC) power, millions of power inverters have to be installed to convert DC power into AC power for each RES, as shown in Figure 1. Thus, the security of power inverters can affect the smooth operation of RES power generation and even the stability of the power grids.
Building on our previous conference paper [3], we present a more detailed analysis of the intentional electromagnetic interference (IEMI) threats to photovoltaic (PV) inverters (also called solar inverters) and propose potential countermeasures. The goal is to provide valuable security insights for device developers and designers. As one of the most important renewable energy sources, new solar capacity added between now and 2030 will account for 80% of the growth in renewable power globally by the end of this decade [2].
In this paper, we focus on the distinct security of inverters, i.e., the threat of intentional electromagnetic interference (IEMI) on the analog sensors of power inverters, since inverters rely on the correct sensing of voltage and current of input power sources as well as the grids to ensure stable and safe power conversion. For instance, without accurate sensing of current and voltage, the inverter may fail to detect islanding conditions (when the grid is down but the inverter is still producing power) and potentially cause fires or electrocute a maintenance technician [4]. Although modern electronic devices are typically designed to withstand normal electromagnetic interference (EMI), recent studies have demonstrated that Intentional Electromagnetic Interference (IEMI) poses significant new threats to sensors [5,6,7,8]. IEMI involves the malicious generation of electromagnetic signals aimed at disrupting or damaging electronic systems. Jie et al. [9] have extensively analyzed the conducted and radiated susceptibility of power electronics to IEMI, highlighting its potential risks. Most PV inverters are installed in unguarded areas, e.g., resident backyards, building rooftops, or power plants in a desert [10], whereby immersing sensors with malicious IEMI signals is possible.
These observations motivate us to perform further investigation into the impact of IEMI on PV inverters, yet the DC–AC power conversion circuits inside inverters generally handle 50 watts up to 50 kilowatts [11] and are a natural and strong source of IEMI by design. For instance, power semiconductor switches that commutate at high switching frequencies will radiate IEMI. Thus, all power inverters have to satisfy the electromagnetic compatibility (EMC) requirements by properly grounding, adding filters, and shielding so that they can operate normally in the presence of self and mutual interference. Although prior work [12] has shown that a static magnetic field can affect Hall sensors at a distance of 10 cm, it is unclear whether an IEMI injection could affect other types of embedded sensors, e.g., voltage sensors, and whether IEMI signals can be crafted to precisely manipulate chosen sensors, as well as their consequences on inverters as a whole.
In this work, we performed a systematic security analysis of the PV inverters on real inverters and microgrid (microgrid is a mini version of the grid, where it contains a group of interconnected loads and distributed energy resources and can connect to the grids or operate in an islanding mode [13,14]), we find that both the embedded current and voltage sensors in PV inverters are vulnerable to IEMI, although they conform to EMC standards on conduction and radiation interference [15,16,17].
In general, EMC includes both EMI and electromagnetic susceptibility (EMS). Intentional electromagnetic interference (IEMI) is considered part of EMS because it intentionally targets and exploits the vulnerabilities of a system. Unlike unintentional EMI, which results from external noise, IEMI deliberately interferes with the system’s electromagnetic environment, causing disruptions in its operation.
We believe that three reasons cause such vulnerabilities. First, the EMC is designed to cope with unintentional electromagnetic interference (EMI), and its frequency band does not cover the range of intentional electromagnetic interference (IEMI). The EMC standard mainly considers two types of EMI: the conducted interference in the range of and the radiated interference in the range of [18,19,20]. Yet, IEMI signals around or higher than may be able to bypass the EMC measures. Second, although low-pass filters are meant to remove all interference signals with a frequency higher than , the real filters are not ideal and can let go of high-frequency signals, such as a phenomenon that has long been recognized in academia, filter leakage [21,22,23,24]. Lastly, it is worth noting that certain inverter designs may inadvertently introduce vulnerabilities to IEMI. For instance, ① the presence of an LCD screen in the inverter may create a gap in EMC protection, providing a potential entry point for IEMI; ② non-ideal alignment of the printed circuit board (PCB) and device layout can result in parasitic capacitance; ③ the asymmetrical arrangement of circuits on the PCB can compromise the inverter’s immunity to common-mode interference; ④ the control algorithms of PV inverters often rely on the assumption that sensor measurements are both reliable and consistent, without sufficient checks in place, which can allow false voltage and current measurements to deceive the control system. While parasitic capacitance remains a common issue in most medium-voltage power electronic converters [25], current research primarily focuses on predicting and mitigating this effect [26,27,28,29,30]. However, many of the proposed methods tend to increase material and manufacturing costs [25].
To illustrate the impact of the aforementioned vulnerabilities in combination, we propose three types of consequences on PV inverters by emitting carefully crafted IEMI, as shown in Figure 1.
-
DoS : The PV inverter shuts down completely, causing an instantaneous power reduction in PV generation to the grid or consumers. -
Damage : The PV inverter can be physically burned out and has to be repaired or replaced. -
Damping : This type of threat causes the output power of PV inverters to be lower than their capability. Long-term continuousDamping will reduce the efficiency of the PV generation.
We have validated the consequences of an IEMI attack on a PV inverter development kit, six single-phase and three-phase commercial kilowatt-level PV inverters, and a rural-scale microgrid operated in the real world, by transmitting IEMI signals at a distance of 100∼ and emission power within . Despite the fact that the power capabilities of PV inverters vary from a few kilowatts to 60 kilowatts, the embedded current and voltage sensors operate on a voltage level of and are all vulnerable to IEMI signals. We have uploaded video demonstrations to the link (
To enhance the security of PV inverters, we investigate the root causes of IEMI threats and propose three detection methods from three levels. (1) From the signal level, we propose a detection method leveraging the distributed effect of IEMI. (2) From the model level, we introduce a detection method based on the energy conservation law. (3) From the combination level, we present a detection method utilizing neural networks. Then, we evaluate the effectiveness of these methods on the Ti C2000 PV inverter, analyze potential influencing factors, and provide a comparison of their characteristics. We hope our work provides valuable insights for designing active defenses against IEMI threats in PV inverters.
To the best of our knowledge, this is the first systematic work analyzing the impact of IEMI on PV inverters and validating the real-world microgrid. Our work is complementary to existing studies on traditional software or communication-related issues, e.g., software vulnerabilities of inverters or DoS and replay attacks against DC microgrids [31,32,33,34,35]. The goal of our work is to raise awareness of the security of power electronic devices in the power grids as RES are increasingly being adopted and they represent an emerging Cyber-Physical Systems (CPS) threat surface. We imagine that our analysis and conclusions may potentially lay the groundwork for analyzing other types of inverters and power electronic devices with similar sensors and control logic. In summary, our contributions are as follows:
We present a systematic security analysis of PV inverters and analyze the vulnerabilities of sensors and control algorithms susceptible to IEMI signals.
We illustrate the adversarial scenarios that can shut down, permanently damage, and dampen the power output of PV inverters, and we validate the threat on commercial PV inverters and a real-world microgrid.
We investigate the underlying causes of these vulnerabilities and propose three effective detection methods to counter these threats.
2. Related Works
This section provides an overview of the existing works, focusing on three aspects: the security of power converters and the defense strategies against IEMI attacks. By analyzing these works, we aim to identify research gaps and highlight the contributions of this study in addressing the new threats.
2.1. Security of the Power Converters
Existing security research on power converters mainly focuses on the digital world, e.g., Liu et al. (2015) studied false data injection (FDI) attacks on power grid state estimation and proposed detection methods [36]. In recent years, analog-world attacks have been proven to be a new type of FDI attack against the power grid. Barua et al. [12] investigated a magnetic field-based attack called Hallspoofing on inverters. This attack manipulates the Hall current sensor by placing an electromagnet next to the inverter, potentially causing the inverter to burn out or shut down. The distinctions between Hallspoofing and our work are described as follows: ① Hallspoofing is limited to manipulating Hall current sensors, whereas our work addresses the threat of IEMI on both Hall and non-Hall sensors. Notably, non-Hall sensors in inverters may render Hallspoofing impractical for precise manipulations. ② Due to the constraints of the magnetic field, the attack distance of Hallspoofing is restricted to a few centimeters. ③ In contrast to Hallspoofing, our analysis is comprehensive, delving into vulnerabilities within the inverter’s control algorithms. ④ We revealed a previously unrecognized threat that can directly result in irreversible physical damage to the inverter. Note that achieving
2.2. Countermeasures Against IEMI Attacks
Current strategies for defending against IEMI threats encompass both passive and active approaches. Passive defenses primarily involve the use of shielding [37,38,39,40] and filtering techniques [41,42,43]. On the other hand, active defenses focus on detection mechanisms, which can be categorized into the following methods: ① incorporating additional detection circuits to monitor EMI [44,45,46,47,48], ② applying secret encoding to critical signals to identify IEMI presence [49,50,51], and ③ developing detection algorithms based on the intrinsic characteristics of sensors [52,53,54,55,56].
In summary, passive defenses can directly mitigate IEMI threats by introducing additional hardware, but they are more costly and have limitations due to components’ physical vulnerabilities (e.g., filter leakage). Of course, many recent works have made efforts in characterization, impedance modeling, and impedance measurement to enhance the filtering effect [57]. Conversely, active defenses are more cost-effective in mitigating the impact of IEMI attacks while providing timely alerts. We believe that the hybrid of passive and active defenses will generate a better effect. Our work proposes three detection methods based on the inverter efficiency feature, the amplitude features of IEMI noise, and hybrid features extracted by the neural network, which indicates a promising direction for future research.
3. Background and Threat Model
3.1. Principle of PV Inverter
PV inverters, like many other types of inverters, are the heart of every PV system. To satisfy various design requirements, PV inverters may have subtle differences in their circuit design [58]. After examining 47 inverters from three leading manufacturers [59,60,61], we found that 43 inverters employ a standard DC–DC–AC topology and this predominant architecture is known as a Two-Stage Power Conversion (TSPC) system [62], which is the focus of this paper. Particularly, a PV inverter consists of a power conversion unit, multiple current and voltage sensors, and control algorithms. Since power generation efficiency is one of the most important goals, a PV inverter will track the PV panel’s maximum power point (MPP) by sensing and incorporating various control algorithms to convert DC power into AC power. To understand the details, we introduce them below.
3.1.1. Power Conversion Unit
A typical TSPC PV inverter contains two parts: the DC–DC stage and the DC–AC stage, as shown in Figure 2.
DC–DC Stage. The primary function of the DC–DC stage is to increase the voltage level from the PV panel output, e.g., ranging from to , to the one required by power grids, i.e., peak for the single-phase and peak for three-phase.
DC–AC Stage. The DC–AC stage converts the direct current on the DC bus to the AC that can be fed into the grid through the inverter circuit, with the help of two control algorithms, i.e., voltage control loop and current control loop.
3.1.2. Control Algorithm
The PV inverter relies on control algorithms to maintain the PV panels or arrays working at their maximum power state and convert DC into AC for integration into the grid. There are three main parts: the maximum power point tracking (MPPT) algorithm, the voltage control loop, and the current control loop.
MPPT Algorithm. To maintain the highest energy conversion efficiency in various atmospheres [63,64], the MPPT operates along a voltage-current (V-I) curve to identify the maximum power point (MPP), where the V-I curve is an inherent characteristic of the PV panel and varies with the irradiance and temperature. The most commonly used MPPT algorithm is the Perturb and Observe (P & O) method, where the basic idea is to try adding a perturbation to the inputs of PV inverters and measure the resulting power [65].
Voltage Control Loop. The role of the voltage control loop is to adjust the DC bus voltage to a reference value. The DC bus capacitor functions as an energy buffer to stabilize the DC bus voltage. If the input power exceeds the output power, the capacitor on the DC bus will continue to be charged, which will lead to an increase in and trigger the voltage control loop to raise the output reference current . Before entering the PI control, the coordinate system transformations (Clarke and Park) [66] are applied to the measured three-phase voltage and current.
Protection Mechanism of PV Inverter. In the operation of PV inverters, a set of self-protection mechanisms are incorporated to prevent safety issues that may arise from device damage and circuit failure. The mechanisms considered in this paper include DC bus over-voltage protection, as well as AC over and under-voltage protection [67].
-
DC bus over-voltage protection. The PV inverter continuously monitors the voltage of the DC bus. If the DC voltage exceeds a predefined threshold several times, the inverter disconnects from the grid and stops power generation.
-
AC over and under voltage protection. When the inverter’s output voltage is detected to be higher than the threshold range, it will disconnect itself from the grid. If the output voltage drops outside the allowable range of low voltage crossing (20%), the low voltage crossing function will activate, triggering an alarm.
3.2. Sensors of PV Inverter
As illustrated in Figure 2, PV inverters rely on embedded sensors to measure voltage and current and feed them back to the control loop.
3.2.1. Non-Hall Voltage Sensor
Voltage sensors convert hundreds of volts into a few volts that the analog-to-digital conversion (ADC) module can handle. Besides, since inverters operate in complex electromagnetic environments and tend to generate common mode noise in the circuits, differential operational amplifiers (op−amp) are often employed to suppress noises [68]. A typical structure of a differential op−amp circuit is shown in Figure 3a, and the magnification can be expressed as follows Equation (1):
(1)
where the and are the inverted and in-phase input signals, is the output signal, and are the input resistors, is the feedback resistor and is the ground resistor. The magnification is determined by the resistors of the op−amp. In practice, resistors and usually consist of multiple divider resistors in series, and they step down the high voltage to a low voltage signal within ; thus, for inverters from a few kilowatts to hundreds of kilowatts, the embedded voltage sensors shall be vulnerable to IEMI signals at similar power levels.3.2.2. Hall Current Sensor
Inverters typically use a Hall current sensor, which converts the magnetic field generated by the current into DC or AC voltage based on the Hall effect [69]. As shown in Figure 3b, the current I generates a magnetic field B, and B is proportional to I according to Ampere’s Law. Then the electrons moving on the electrode plate will be subjected to the Lorentz force in B and move to the sides of the electrode plate, and generate an electric field E on the electrode plate. Finally, a balance state will be reached when the electric field force and the Lorentz force are equal, which can be formulated as Equation (2), where d is the width of the electrode plate and q is the electrical charge. Since B is proportional to I and is proportional to B, the Hall sensor’s output is proportional to the current I. Finally, Hall current sensors use a similar op−amp to suppress the common-mode noise in and output the measurement result.
(2)
3.3. Threat Model
This manuscript is an expanded version of
Attack Goal. The attacker’s goal is to covertly cause the shutdown, power reduction, or even burnout of a PV inverter. Though ambitious attackers may target a group of inverters and try to create potentially escalated impacts such as voltage or frequency fluctuations or even blackouts in a local microgrid, we focus on basic attacks against individual inverters in this paper.
Non-contact Access. We assume the attacker can approach the target inverters within a few meters, but they cannot physically touch or damage them due to safety and stealthiness concerns. Alternatively, the adversary can leave a camouflaged IEMI device nearby and control it remotely.
Prior Knowledge. We assume that adversaries could have prior knowledge of the target inverter. Given that many PV inverters are commercial products readily available on the market, the adversary could acquire a PV inverter of the same model and conduct necessary tests beforehand. More favorably, in practice, PV systems in a region often use the same model of PV inverters.
4. Understanding the Impact of IEMI on Embedded Sensors of PV Inverters
In this section, we explore how IEMI affects embedded voltage sensors and current sensors of PV inverters through theoretical analysis and feasibility experiments.
4.1. Analysis of the IEMI Impact on Sensors
4.1.1. Impact of IEMI on Voltage Sensors
The sensor’s PCB usually carries parasitic capacitance and is susceptible to electromagnetic interference in the environment. Besides, the op−amp circuit will further rectify and amplify the coupled signals. The transmission process can be illustrated in Figure 4a, and there are four steps:
-
EMI signal injection. Process ① in Figure 4a is IEMI injection. Electromagnetic fields around the sensor can be injected into sensor circuits (e.g., input nodes) via electromagnetic coupling. Generally, according to the IEMI transmission paths, IEMI coupling methods can be divided into conductive coupling, inductive coupling, capacitive coupling, and radiative coupling (also called radio frequency interference, RFI) [70,71]. Among them, radiative coupling refers to the far-field coupling of higher-frequency signals in the microwave frequency range, which can be transmitted over longer distances. Notably, the conductors (e.g., copper wires and component pins) and the insulator (e.g., PCB substrate) on the sensor’s PCB will form parasitic capacitance, as shown in Figure 4b. These parasitic capacitances are susceptible to the aforementioned high-frequency electric fields, which can introduce interfering signals.
-
Nonlinear rectification effect. The amplifier can rectify the high-frequency AC signal at the input and generate a DC bias at the output. The main reason is that the bipolar junction transistor (BJT) in the op−amp chip contains p-n junction diodes, which are efficient rectifiers due to their nonlinear current–voltage characteristics, especially in low-power op−amps [72]. When a high-frequency signal is injected into the base-emitter junction of an op−amp BJT-based input stage, the output will generate an AC term at twice the input frequency and a DC term [72], which can be described by Equation (3):
(3)
where is the amplitude of the noise signal and is the thermal voltage of the transistor, which is relative to the temperature. -
Asymmetric differential effect. The asymmetric design of the op−amp circuit on the PCB allows the output bias of the op−amp to be positive or negative. As shown in Figure 5, an op−amp channel consists of a differential amplification input stage, an intermediate amplification stage, and a push–pull output stage. The transfer relationship of the differential amplification input stage can be expressed as follows:
where is the differential-mode gain and is the common-mode gain.Figure 5The structure of the OPA2171 used in voltage and current sensors.
[Figure omitted. See PDF]
The asymmetric design of the input stage’s wires results in different frequencies of IEMI coupling. Consequently, the IEMI signals coupled into and will differ, ultimately producing a positive or negative output. This outcome depends on whether the coupled signal is stronger at and . To demonstrate, we build the circuit model of the OPA2171 chip in Simulink and we inject the sinusoidal signal in Figure 6a to , or both, and we find that the output can be positive, negative, or 0, respectively, as shown in Figure 6b–d. Therefore, the attacker can tamper with the sensor’s output to a larger or smaller value by adjusting the frequency of the IEMI signal.
-
Amplification effect. Amplification is the fundamental function of op−amp. Signal inputs will be amplified according to the set gain; however, IEMI signals can enter into various nodes via radiative coupling. As shown in Figure 3a, when the IEMI signal is injected into the node b, it can be considered that . Then, according to Equation (1), the gain will be abnormally large. In other words, even if injecting a millivolt signal at node b, it can be amplified to a few volts in process ③ of Figure 4a.
In conclusion, electromagnetic coupling enables the injection of EMI, the nonlinear rectification converts alternative interference into positive bias, the asymmetric differential effect allows the bias to be positive or negative, and the amplification effect amplifies the injected IEMI signals.
4.1.2. Impact of IEMI on Current Sensors
Unlike the voltage sensor, the current sensor includes not only an op−amp circuit but also a Hall element, which may serve as a new entrance for EMI. Thus, we mainly analyze how IEMI can enter the sensor circuit through the Hall chip.
We have already described that Hall current sensors measure current indirectly by measuring the magnetic field generated by the current, and the measurement relies on the balance of the Lorentz force and electric field force on the electrons, as shown in Equation (2). Thus, an additional magnetic or electric field around the Hall chip will impact the current measurement, either directly or indirectly. Now we discuss them separately:
Impact of magnetic field on Hall sensor. We assume the measured current generates a magnetic field B in the Hall element. Since the output is proportional to B, we quantify this as Equation (4). If IEMI generates a magnetic field nearby, will be superimposed on B. Therefore, the output of the Hall element may be directly manipulated by the IEMI signal, and this relation can described as Equation (5), and the output of the Hall element will be changed by .
(4)
(5)
Impact of electric field on Hall sensor. According to Equation (2), we have
(6)
If an additional electric field exists near the Hall chip, at this point we have
(7)
Thus, the output of the Hall chip will be changed by , where d is the width of the electrode plate.
Then, the affected output will continue to be rectified and amplified by the op−amp and finally generate a bias on the measurement, as shown in ③ and ④ in Figure 7.
It is worth noting that since the output of the Hall chip is fed into the positive input of the op−amp, the IEMI injected into the Hall chip will theoretically result in a positive bias in the current measurement. However, the IEMI can also affect the op−amp of the current sensor, which will cause positive or negative bias.
4.2. Experimental Verification
To verify the previous analysis, we conducted feasibility tests to explore the capability of IEMI to impact sensors of PV inverters.
4.2.1. Can IEMI Impact Voltage and Current Sensors
We conduct an IEMI frequency sweep test on voltage and current sensors. The experiment setup is shown in Figure 8, and the test steps are as follows:
① In the feasibility verification stage, we built the PCBs of the voltage and current sensors according to the schematic of the C2000 PV inverter from Texas Instruments (TI) that we have in hand [73], as shown in Figure 9a,b. ② We use a DC power source RIGOL DP711 [74] to generate a voltage and current to be measured. Then, we use the Arduino UNO to read the voltage every and send the data to the PC through the serial port. The Arduino is wrapped in EM shielding material to prevent EMI. All components are readily available on the market. ③ Subsequently, we use EXG vector signal generator [75] to generate a signal, use amplifier HPA-50W-63+ [76] to amplify it to , and emit it with a 5G directional antenna [77] with at a distance of .
We record the deviation of the measurements in Figure 10. For the voltage sensor, the measured voltage can be decreased by and increased by at most. For the current sensor, the measured current can be increased by up to and decreased by up to . The result demonstrates that IEMI can effectively affect the voltage and current sensor’s outputs. Notably, in the test of the Hall current sensor, the deviation in the measurement is predominantly positive. This verifies our previous analysis of the impact of IEMI on current sensors.
To further verify that the IEMI can impact the Hall chip directly, we conducted a small test: We measured the output of the Hall chip using RF wines to avoid wire coupling, with the sample rate of , and compare the effect of IEMI on . The result shows that IEMI can directly impact the Hall chip by inducing a bias and a oscillation on the output of the Hall element.
4.2.2. Whether the Impact Is Controllable
To explore the IEMI manipulation capability on sensors, we tested two kinds of IEMI signal modulation methods:
① Frequency modulation (FM). Figure 10a,b reveals that sensors have different “sensitivity” to IEMI signals of various frequencies. It appears that adjusting the signal frequency may manipulate the target sensor’s output. However, we can also find that the sensor’s output varies significantly as the frequency changes. Therefore, achieving precise control of sensor values with FM proves challenging.
② Amplitude modulation (AM). Another signal modulation method is AM, as described in Equation (8), where is the modulation signal, and and are the amplitude and frequency of the carrier signal .
(8)
Since the offset of the sensor’s output is proportional to the amplitude of the IEMI signal, we first select a carrier signal that can impact the sensor’s output, and then set to the “desired” curve, which is also the envelope of .
In this scenario, assuming that one wants the measured voltage to first increase or decrease and then change as the triangular or sine wave, we conducted an experiment using AM. The result is highly “favorable” for an adversary, as depicted in Figure 11. Although the real voltage or current remains constant, the measured values change precisely by the , such as triangular and sine waves.
4.2.3. Verification of the Universality and Extensibility
Commercial PV inverters usually contain multiple types of sensors. To analyze the universality of the threat, we propose two questions: ① What is the impact of IEMI on different Hall sensors? ② If there are multiple sensors, can IEMI only impact a single target sensor or control multiple target sensors simultaneously?
Universality. To answer the first question, we evaluate the impact of IEMI on seven different Hall sensors, including four analog sensors and three digital sensors. Hall digital sensors include a speed sensor, a north pole sensor, and a water flow sensor. The result is presented in Table 1. We can find that both wired and wireless Hall current sensors are susceptible to EMI, and wireless Hall current sensors exhibit a higher degree of susceptibility. Hall sensors with digital outputs, like speed sensors, may experience bit-flipping under EMI.
Extensibility. Since IEMI signals of different frequencies can be injected into different nodes of the victim circuit, we can establish a frequency sweep model for each sensor and implement the following: ① “one-to-one” manipulation: select a frequency that exclusively affects the target sensor without impacting others; ② “many-to-many” manipulation: when manipulating several sensors simultaneously, owing to the superposition of IEMI signals, we can employ different channels to emit IEMI signals of various frequencies. This feature also highlights one of the advantages of IEMI over constant magnetic field attacks in Hallspoofing [12]: higher extensibility in signal design through signal multiplexing.
5. Understanding the Impact of Sensor Spoofing on PV Inverters
Here, we analyze how the spoofing of sensors affects the operation of PV inverters. We build the PV inverter circuit model and implement the control algorithms outlined in Section 3 using Simulink.
5.1. Impact of DC Bus Voltage Sensor
Deceiving the DC bus sensor will directly affect the DC bus voltage control loop. The function of the voltage control loop is to maintain the DC bus voltage as its reference value set by the manufacturer. When an IEMI signal introduces a deviation in on the measured bus voltage, it will lead to Equation (9):
(9)
where is the DC bus voltage under attack. Then, the controller will adjust to be equal to , and the real DC bus voltage will become under control. This will cause the following damages.5.1.1. Breakdown of DC Bus Capacitor
If the IEMI signal introduces a negative to the measured , the real DC bus voltage will increase and the aging of the DC bus capacitor will accelerate. The capacitor will break down when the voltage exceeds the rated voltage of the . While the inverter incorporates over-voltage and under-voltage protection mechanisms, the vulnerability could persist, potentially leading to physical damage. This risk emerges when the adversary intentionally avoids injecting with a substantial magnitude in a single instance. This is attributed to continuously manipulating sensor values to appear within their normal range while the real DC bus voltage is spoofed. The adversary may want to ensure that during the injection of the IEMI signal, the sensor value does not trigger the under-voltage protection mechanism, allowing the IEMI to circumvent the protective measures. Afterward, the inverter loses its ability to operate correctly due to the deficiency in the ’s capacity to balance the input and output power.
The simulation results are given in Figure 12a. It can be observed that the real DC bus voltage is increased by , , and after sensor manipulation. Looking at Figure 12a for the case of , the transient voltage offset will trigger the protection instantly and shut down the inverter.
5.1.2. DC Bus Under-Voltage
Similarly, an adversary can decrease the real DC bus voltage by injecting a positive into the voltage measurement. If the real DC bus voltage drops below the lower threshold, the output AC voltage will be lower than the grid voltage. In that case, the current will be reversed, and the power will flow back from the grid to the inverter, and the protection mechanisms will be triggered to shut down the inverter. This process is shown in Figure 12b when .
Hence, in summary, the impact of sensor spoofing on the DC bus voltage can be articulated as follows:
Impact 1:
To begin, it is imperative to carefully select the frequency of the IEMI signal through preliminary frequency testing. This choice can potentially augment the measured . Given that PV inverters of similar application levels, such as residential PV inverters ranging from 1 kW to 60 kW, typically share similar PCB dimensions, the frequencies susceptible to IEMI do not show substantial variations. Drawing from our empirical observations, commonly falls within the range of to . Subsequently, as the adversary approaches the PV inverter, it becomes necessary to transmit the IEMI signal at the designated frequency for a brief duration, typically spanning a few seconds.
Impact 2:
First, the adversary needs to find the frequency that can efficiently decrease the measurement of and generate the carrier signal . Since the victim system takes time to reach the stability of after each manipulation, the adversary can design as, Equation (10), where k and are the scale factor and initial value of . Generally, the smaller k is, the easier it is to avoid triggering the self-protection mechanism, but it takes a longer time. Finally, the adversary obtains by AM, as shown in Figure 13b.
(10)
To avoid triggering the protection mechanism, for the TI C2000 PV inverter [67], the target is , and the safety range is ∼. It indicates that the adversary needs to allow time for the controller to adjust within this range after each manipulation.
5.2. Impact of Grid Voltage and Current Sensors
The measured grid voltage and current serve as feedback for the current control loop. Manipulations on these sensors have different effects on single-phase and three-phase PV inverters. The three-phase inverter supplies a three-phase AC power output; the phases are 120° between each other, and commonly used in industrial and commercial settings. The single-phase inverter outputs one-phase AC power, typically employed in residential PV generations.
5.2.1. Single-Phase PV Inverter
We take the manipulation of grid current as an instance. If the injected deviation is constant, there will be a “transient effect” on the real grid current. This is similar to the case in which the inverter suffers from sudden grid current changes while the control loops manage to restore the current. To illustrate, let be constant and positive, then the controller will decrease the current, and the inverter’s output power will decrease. However, when the output power becomes less than the input power, the DC bus capacitor will charge, leading to , and the current reference will increase. In this regard, the reference will rise again to catch up with the manipulated current.
If the injected deviation is time-varying, like a sinusoidal signal, the PV inverter will not enter into a steady state. The simulation result is shown in Figure 14a. The larger the magnitude of the injected deviation , the higher the degree of oscillation in the grid current. When the oscillation reaches a certain level, the grid current and voltage will exceed the threshold and trigger the protection mechanism, and the inverter will shut down.
5.2.2. Three-Phase PV Inverter
As mentioned in the background, the three-phase voltage and current output of the PV inverter need to be transformed into the coordinate system through the Clark transformation and Park transformation before entering the control loop. In fact, due to this coordinate system transformation, a constant injected deviation into the three-phase voltage and current measurements could not affect the inverter’s output. This is because it will be filtered out by the Clark transformation matrix. Thus the Hallspoofing attacks in [12] may fail in such a scenario.
Therefore, the impact of grid voltage and current sensor manipulation in the three-phase PV inverter will only manifest when the injections are “unequal”. As illustrated in Figure 14b, compared to the single-phase inverter that needs to inject a time-varying , the three-phase inverter only needs to inject a constant into one phase but not other phases to achieve a similar impact (inverter shutting down). The coordinate system is time-varying, making the component on each axis of the time-invariant signal also time-varying. We now summarize the impact of grid voltage and current sensor spoofing on PV inverters:
Impact:
(11)
where is the AC frequency, and is the amplitude of . Since the grid imposes strict limitations on input voltage and current, an with a few amps is enough to achieve the impact ofFirst, the adversary needs to find the frequency and that can increase and decrease the measured AC current. Then, they may design the modulation signal as follows:
(12)
Finally, obtain the IEMI signal , as shown in Figure 13a,
(13)
The adversary only needs to continuously transmit the signal for a few seconds when passing by the target inverter.
5.3. Impact of PV Voltage and Current Sensors
The PV voltage and current sensors are used for the MPPT algorithm and the DC–DC stage. Since the MPPT algorithm regulates the input power of the inverter by controlling the input voltage, manipulating and can impact the output power of the PV inverter.
Injecting a constant offset on the PV voltage sensor or on the PV current sensor only shifts the V-I curve without changing its “shape”. Thus, the MPPT algorithm will still find the correct MPP with false measured or by the P&O algorithm.
However, if the adversary can design a fake V-I curve with a different shape from the original one, the MPPT algorithm will be misled into finding the fake MPP, resulting in decreased power. To inject a fake V-I curve, the adversary needs to make the spoofed points (, ) move on a fixed but false curve by manipulating the measured or . We will specify this method in the following:
Impact:
For the
It is important to note that most MPPT algorithms, such as Perturb and Observe (P&O) and Incremental Conductance (IncCond), are typically designed as closed-loop control systems. The input of the closed-loop control system is the variable used to adjust the operating point of the photovoltaic (PV) array, such as the duty cycle D, and the output is the optimized target variable, such as the PV power , voltage , or current . As a result, there is a pole that determines the dynamic response and stability, and the imaginary part of the pole determines the oscillation frequency of the system response. Therefore, if the attacker can find the pole of the MPPT and inject a disturbance at the resonance frequency, it could potentially trigger significant instability or large-scale loss of control in the MPPT system. We assume that the closed-loop transfer function of the system can be expressed as Equations (14) and (15),
(14)
(15)
where is the dynamic model of the PV array, is the dynamic model of DC–DC converter, is the dynamic model of the controller, and is the feedback of PV power, respectively. Then in order to find the oscillation frequency of the MPPT system, we need to find the poles of the closed-loop transfer function, that is, the s-values that make the denominator zero, as shown in Equation (16).(16)
The oscillation frequency of the MPPT closed-loop system is determined by the closed-loop poles of the system. We assume that the calculated pole is s, then we can obtain the oscillation frequency of the MPPT system, as shown in Equation (17).
(17)
Since we assume the attacker can conduct a pre-test on the target inverter, she can identify the disturbance frequency by modeling analysis or the frequency-sweep test.
To investigate, we make the following simulation: we inject a disturbance of amplitude , frequency and (System resonance frequency) into the MPPT system, as shown in Figure 15a,b. We can find that utilizing the poles of the closed-loop system can disturb the power to a greater extent.
6. Threat Evaluation
In this section, we first evaluate the IEMI threats on PV inverters and then test on a rural-scale microgrid operated in the real world to explore the impact on the grid. To our knowledge, this is the first work validating the IEMI threat on the real-world microgrid. To ensure the safety and legality of the research, we conducted all indoor experiments in an electromagnetic shielding room, and we contacted the manufacturer and local distribution grid operator about the testing details to avoid ethical problems.
6.1. Evaluation of PV Inverters
6.1.1. Experiment Setup
As shown in Figure 16, the experimental setup comprises victim and adversary devices. The victim devices are off-the-shelf PV inverters and adversary devices are used to emit IEMI signals.
Victim Devices. To investigate the impact of IEMI attack on different solar inverters, we selected a TI C2000 inverter development kit designed by Texas Instruments in Boulevard Dallas [67], five single-phase commercial solar inverters [78,79,80,81], and a three-phase commercial solar inverter [82], as shown in Figure 17.
The inverters [67,78,79,80,83] are tested under laboratory conditions, and two models of inverters designed by GoodWe [81] are tested in a real-world microgrid.
Compared with commercial inverters, the TI inverter development kit has the following features: ① lower power and higher safety; ② most of the process variables can be read from the upper computer; ③ open-source control programs. In comparison, commercial PV inverters ① have better EMC countermeasures (such as special enclosures and internal filtering circuits); ② operate at higher power levels (several kWs), posing risks for conducting
Test-bed devices. To support the victim inverter’s operation, we use a programmable solar panel emulator TEWERD TPV1000 [84] to emulate solar panels and a RIGOL RP1025D high voltage differential probe [85] to acquire the real voltage. In particular, in the experiment of SMA three-phase solar inverter, we adopted the Chroma regenerative grid simulator 61809 [86] to simulate the three-phase grid and support the SMA three-phase solar inverter.
Adversary devices. The adversary devices are the same as those introduced in Section 4. They are used to generate, amplify, and emit IEMI signals. To prevent the adversary devices from causing conducted interference to the victim’s PV inverter through the public grid, we added a fourth-order low-pass filter between the adversary devices and the grid to eliminate conducted interference.
6.1.2. Evaluation of DoS
We have introduced in Section 5 that
As we can see, before
It is worth noting that when launching a
6.1.3. Evaluation of Damage
The result is depicted in Figure 18b. In phase ①, the PV inverter works correctly and remains stable at the target value of around . In phase ②, we emit an IEMI signal and the controller increases the real beyond . At around , the DC capacitor gets a dielectric breakdown and burns out after a few seconds. However, the PV inverter is “unconscious”, and continues to rise from to . To prevent any danger, we terminate the test and cut off the power supply at and the voltage decreases to 0, as shown in video (
6.1.4. Evaluation of Damping
Based on the analysis in Section 5, if the adversary is assumed to have feedback information such as the input voltage and current , they can pose a greater threat by decreasing the maximum power quantitatively. Here, we focus on the scenario where no feedback information is available and evaluate the
For the C2000 PV inverter, we set the input power of the inverter to . We first find the IEMI frequency of that can increase the voltage sensor’s output, and then we use the AM method to modulate the attack signal. Notably, based on the previous analysis, we carefully find the oscillation frequency of the MPPT system to set as the baseband signal’s frequency by testing in the low-frequency range (e.g., 0∼). During
For commercial inverters, we set the same V-I curve with a maximum power point of in the PV emulator. In the usual case, they can work stably at , and . Then, we conduct the
Compared with
6.2. Evaluation of PV Microgrid
To demonstrate the threat of IEMI to the real-world grid, we collaborate with the local distribution grid operator and conduct the
The microgrid has a capacity of , and the maximum generated power of PV is . The total load is usually between and . To ensure a continuous and stable power supply, the microgrid is designed with a battery energy storage (BES) system. It can operate in grid-connected or islanding mode, serving a discrete footprint of a remote mountain village. The PV microgrid contains two types of five PV inverters designed by GooDWe with the power of and .
In the islanding mode of the microgrid, we first evaluated
It can be observed that there is a decrease in the microgrid frequency by . This shift is caused by the deficiency in PV generation at the point, prompting the BES system from the P/Q control [87] to V/f control [88]. The P/Q mode controls the output power of the PV-BES system, while the V/f mode controls the output voltage/frequency by the BES output. This indicates that the microgrid is now solely powered by the BES system, and the battery energy is continuously depleting. Notably, such a condition, mainly when the battery is low on energy, may cause more severe consequences.
However, we are not permitted to conduct the experiments under conditions of extreme low power storage that leads to over-discharging, as it could harm the health of the BES. Thus, we modeled the entire microgrid and simulated the consequence of
6.3. Influence Quantification
Based on the principle of EMI, the IEMI distance and power can influence the threat. In this subsection, we analyze the influence of IEMI distance and power on the threat effect under the threat model.
6.3.1. Influence of IEMI Distance and Power on Inverter Sensors
Here, we evaluate the effects on the deviation of the DC bus voltage at , using , , and as the total power. The result is depicted in Figure 20a. We can see that higher power allows for a greater working distance. Taking the C2000 PV inverter as an instance, the self-protection mechanism will be triggered when the suddenly changes by . With a IEMI device, the inverter can be affected at a distance of around .
We placed the antenna at distances of and from the target PV inverter and tested the effects of power on the deviation of the DC bus voltage . The result is shown in Figure 20b. For the adversary’s target to generate a offset on , when the distance is , the adversary only needs an IEMI power of .
6.3.2. Influence of IEMI Distance and Power to DoS the Commercial Inverter
Since commercial inverters respond similarly to EMI, we chose a well-selling commercial inverter, Kstar BluE-G, and recorded the maximum distance to perform
7. Discussion
In this section, we analyze the limits, diversity, and countermeasures of the proposed IEMI threats.
7.1. Limitation
7.1.1. Subject to Power and Distance
The IEMI power and distance are crucial impact factors of the IEMI threats. Essentially, our work represents one type of attack exploiting analog signals. Such analog attacks have to follow the law of physics and a larger impact distance requires a more powerful transmitter. Notably, we find that
7.1.2. Limited Impact Scale
Different from cyber-attacks that may cause large-scale outages, the impact of our attack is limited to PV inverters and potentially local PV microgrids. For a larger-scale grid, there may be greater resilience to compensate for the PV power. Thus, for attackers with different goals, IEMI may not always be the best approach. Besides, attackers with physical access to the inverter may launch simpler attacks with more predictable consequences. Nonetheless, IEMI attacks can be stealthier than cyberattacks in terms of digital traces, and they are also safer for attackers compared with direct physical attacks. We believe the proposed IEMI threat is applicable to local microgrid-scale attack scenarios where the attack needs to be stealthy and difficult to trace back.
7.2. Diversity
7.2.1. Diversity of the Impact
We propose
7.2.2. Diversity of the Victim
This study highlights the vulnerability of op−amp−based voltage and current sensors in PV inverters to EMI. While a PV inverter is a typical example of a power electronic device, the scope of potential victims can extend. Similar sensor technologies and energy conversion processes are prevalent in various applications, including power grids, electric vehicles, and industrial machinery. Additionally, the control algorithms employed in different inverters partly exhibit similar characteristics. For instance, the battery storage inverter may adopt the TSPC system [90], implying the presence of a DC bus capacitor in such inverters and the associated impact of
7.3. Exploitability
7.3.1. Large-Scale Impact
The proposed IEMI impacts may cause consequences to the microgrid that go beyond those achieved in our evaluation, under specific conditions where there are both solar PV and synchronous generators in a grid. Particularly, for the
7.3.2. Closed-Loop Attack
One limitation of this work is that the attacker has no access to the sensor’s output as feedback to launch closed-loop attacks, such as quantitatively decreasing the output power. Notably, side-channel attacks can exploit physical side effects such as power consumption, electromagnetic emissions, or even timing variations in the system to extract sensitive information, such as the voltage and current value. Therefore, this work can be further improved by combining it with side-channel attacks in the future.
7.4. Electromagnetic Compatibility Standards
Grid operating parameters and Electromagnetic Compatibility (EMC) standards for photovoltaic (PV) inverters vary significantly across regions. For instance, SMA PV inverters designed for the European market must comply with the EN 61000 series standards [94], while those tailored for other markets adhere to the GB/T 17626.x standards [95]. They have different requirements in terms of scope of application, test methods, test limits, and so on.
However, we find that all tested solar inverters conforming to different EMC standards remain vulnerable to certain IEMI attacks. We believe this vulnerability primarily arises from the non-ideal characteristics of electronic components in EMC designs. For example, the differential op amp circuit cannot completely eliminate common mode interference, and the filter device has filter leakage for high-frequency noise. The existence of these physical hardware vulnerabilities makes it difficult to completely eliminate the IEMI threats improving EMC standards. Therefore, we prefer to look into proactive detection defense methods to deal with this type of threat.
8. Countermeasures
Since the sensor’s deviation under the IEMI attack is similar to the normal operating conditions, current IEMI attack detection methods cannot determine the reliability of the sensor data. In this section, we investigate three methods from the signal level, model level, and combination level, respectively, aiming at converting serious threats (e.g., physical damage) into light threats (e.g., DoS) and providing timely alerts to managers.
8.1. Detection on the Sensor Level
The coupling of IEMI has the distributed effect [96], which means that IEMI cannot be injected into the target node individually but will affect multiple nodes at the same time. During the attack, the wanted IEMI noise is injected into the input node of the voltage sensor. It is rectified, amplified, and filtered by the op−amp circuit, resulting in a DC deviation. At the same time, the IEMI will also induce other unavoidable effects, which can be leveraged as detection features. For instance, the output node of the voltage sensor can also cause noise and superimpose to the sensor deviation, as shown in Figure 22.
To investigate, we conducted an IEMI attack experiment on the Ti C2000 solar inverter. We recorded the DC bus voltage sensor’s output at a sample rate of . To examine the impact of IEMI frequency, we employed the IEMI with the frequency of , and to increase the sensor value, and used the IEMI with the frequency of and IEMI with the frequency of to decrease the sensor value, maintaining the same IEMI power and distance () and distance ().
The sensor’s output is shown in Figure 23. We can see that different frequencies can cause different deviations, but the IEMI noise on the sensor’s output is not significant. This is mainly because the IEMI does not form a resonant electromagnetic coupling to the sensor’s output node.
Considering that the inverter sensor’s sample rate () is much lower than the IEMI frequency, IEMI noise cannot be clearly distinguished from normal noise in terms of frequency, but the sample rate will not limit the noise amplitude. Thus, we select the Standard Deviation (STD) as the feature of the IEMI noise, quantifying the variation or dispersion in a set of data values and indicating how much the data points deviate from the average. The STD can be expressed as Equation (18):
(18)
Then, we recorded the sensor’s output and calculated the STD under normal conditions and during IEMI attacks of different frequencies. The sensor’s output is depicted in Figure 23, and the STD is illustrated in Figure 24. We observed that (1) IEMI of the same power but different frequencies leads to different STDs on the sensor output. This is mainly because IEMI of different frequencies causes different coupling efficiencies and further induces different noise at the sensor output node; (2) regardless of whether IEMI increases or decreases the sensor output, the STD exceeds that under normal conditions. Therefore, we can conclude that the STD can serve as a feature to detect IEMI attacks.
Impact of attack power. According to our above analysis, a higher IEMI power may produce a larger STD to the output of the sensor output. To investigate, we attacked the sensor using IEMI with different power (, , , and , respectively) and the same frequency (). The sensor’s output under different IEMI powers is shown in Figure 25, and the sensor’s STD is shown in Figure 26. We can find that higher power can cause a larger STD of the sensor’s output.
8.2. Detection on the Model Level
8.2.1. Detection Principle
Since a PV inverter is an energy converter, it does not produce or consume energy by nature (except for a small amount of loss). At the same time, the sensor’s value may violate this physical law when manipulated by IEMI attacks. Therefore, we propose a detection algorithm based on the inverter’s energy conservation law.
In general, the difference between the input power and output power of the inverter in a steady state represents the circuit’s loss power, which can be expressed by Equation (19):
(19)
where the and are the input current and voltage of the PV panel, and are the output current and voltage to the grid, is the power factor (generally ∼1), and is the power losses due to transformers and switch devices inside the inverter (generally accounts for about 8∼). To simplify, we can calculate the energy conversion efficiency as Equation (20):(20)
Since many International standards [97,98,99] require a conversion efficiency of at least 90% for the PV inverter’s regular operation, the should be around 0.9 during regular operation. If or , it indicates that at least one of , , , or has been manipulated, such as in the
8.2.2. Evaluation
To investigate whether the proposed detection method, based on inverter features, can detect IEMI attacks and distinguish them from the power degradation caused by natural factors (such as temperature drop and cloud cover), we designed and implemented the following experiment:
The proposed IEMI attacks involve , , and and include
The result is shown in Figure 27. As we can see (1) from to , the input and output power has a fluctuation within , and the oscillates between and 1; (2) from to , the PV inverter works in a normal state and the is stable at ; (3) from to , we implement the
8.2.3. Impact Factors
Although we have successfully detected a
Impact of working power. Since each component within the inverter has different operating efficiencies at different working powers, the working power of the inverter may affect the efficiency . In this experiment, we set the Ti C2000 solar inverter to operate at , respectively, and calculate . The result in Figure 28a shows that the inverter’s efficiency can be kept above if the working power is greater than a threshold value (such as ).
Impact of attack strength. Since the proposed detection methods rely on the sensors’ deviation determined by the attack strength, we need to investigate the impact of the attack strength on the detection effect. We implemented the
The result shown in Figure 28b indicates that IEMI-induced sensor deviations of or more can cause to oscillate by more than , which can be easily detected. In contrast, IEMI-induced sensor deviations of less than cannot be detected and do not pose significant threats to the inverter. Therefore, we can conclude that most attacks manipulating , , , and will cause a detectable deviation in the .
8.3. Detection on the Combination Level
Since an inverter is a relatively fixed system, there are complex intrinsic connections between the various sensors and neural networks are better at extracting these features. Based on this idea, we explore a neural network-based detection method, which is more likely to become a future direction.
Condition analysis. To build a neural network model and deploy it on the inverter’s MUC (Microcontroller Unit, e.g., Ti C2000), we need to consider the following factors:
(1). Data: The input data need to take into account the intrinsic connections between different sensors, and the intrinsic connections between a sensor’s data frames;
(2). Model: The training of the model before leaving the factory can be offline, but it needs to be online to detect anomalies after being deployed to the inverter, so it is important to conserve arithmetic as much as possible;
(3). Deployment: Since IEMI attacks take effect in seconds, the inverter only needs to detect IEMI attacks at second-level intervals.
Dataset building. Since this paper presents a completely new threat to PV inverters, there is no open-source dataset of this threat. Here, we take the Ti C2000 micro solar inverter as an example and build the dataset by collecting five sensors’ data under normal and attack conditions. To cover different normal conditions, we set the inverter to work at , , and , respectively. To cover different attack conditions, we set the attack power to , , , , respectively. We take 100 frames of five sensors’ data of the inverter in as a sample (), and collect a total of 5000 samples of data, containing positive samples (IEMI attack) and negative samples (No attack). Among them, 4000 samples are set as the training set, 500 samples as the testing set, and 500 samples as the validation set. The label of each sample is denoted by 0 or 1, with 0 representing no attack and 1 representing an IEMI attack.
Model building. In order to extract the intrinsic connections between different sensors and different data frames, we employed a lightweight convolution neural network (CNN) with matrix inputs to achieve the binary classification tasks. As shown in Figure 29, the model consists of two convolution layers, a flattened layer and a fully connected layer. The first convolution layer adopts four filters of size with a stride of 1, followed by a max-pooling layer with a window and a stride of 2. The second convolution layer adopts eight filters of size with a stride of 1, followed by another max-pooling layer with the same window size and stride. The output from the second pooling layer is flattened into a vector and passed through a fully connected layer for binary classification. The model is computationally efficient, making it well-suited for resource-constrained applications. The model contains a total of about multiplication and addition operations, and for the Ti C2000 microcontroller, it takes about to complete an operation.
Evaluation. Here, we evaluate the effectiveness of CNN models in detecting IEMI attacks. The test set of 500 samples obtained from the Ti C2000 micro solar inverter contains 147 positive samples (of the IEMI attack) and 353 negative samples. We used the trained model to classify the test data, and the results showed that 344 out of 353 sets of negative samples were identified as negative samples and nine sets were incorrectly identified as positive samples; 141 out of 147 sets of positive samples were identified as positive samples, and six sets were incorrectly identified as negative samples, as shown in Table 3. To gain a more comprehensive understanding of the performance of the binary classification model, we further calculated four key metrics: Accuracy, Precision, Recall, and the F1 Score, as shown in Table 4.
8.4. Comparison of the Three Detection Methods
Among the three proposed detection methods, the detection based on the distributed effect of IEMI can detect attacks on any sensors, but the noise feature can be affected by attack parameters; the detection based on the conservation of energy only needs to calculate the efficiency of the inverter, but it can only detect attacks on the input and output sensors; the detection based on the neural network can extract features and detect attacks most efficiently, but brings more arithmetic expense.
The detailed comparison is shown in Figure 30. In conclusion, we believe the third method is most likely to be the future direction because the detection effect and arithmetic consumption can be significantly optimized by improving neural network models in the following work.
9. Conclusions
This study presents a comprehensive analysis of the security vulnerabilities in photovoltaic (PV) inverters, focusing on the effects of intentional electromagnetic interference (IEMI) signals around 1 GHz on their voltage and current sensors. Three primary impacts are identified:
Conceptualization, F.Y. and K.P.; methodology, K.P.; software, K.P.; validation, F.Y.; formal analysis, F.Y.; investigation, C.Y.; resources, F.Y.; data curation, F.Y.; writing, K.P.; visualization, X.J.; supervision, K.P.; project administration, W.X.; funding acquisition, W.X. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
The data presented in this study are available on request from the corresponding author.
We thank Zihao Dan and Rui Wang for their contributions to the experimental platform setup. Special thanks to the State Grid Lishui Power Supply Company of Lishui, China for their support during the micro-grid experiments.
The authors declare no conflicts of interest.
The following abbreviations are used in this manuscript:
PV | Photovoltaic |
ADC | Analog-to-Digital Converter |
EMI | Electromagnetic Interference |
STD | Standard Deviation |
DoS | Denial of Service |
EMC | Electromagnetic Compatibility |
BES | Battery Energy Storage System |
MPPT | Maximum Power Point Tracking |
P&Q | Power and Reactive Power |
DC | Direct Current |
AC | Alternating Current |
PCB | Printed Circuit Board |
op−amp | Operational Amplifier |
CNN | Convolutional Neural Network |
P&O | Perturb and Observe |
RFI | Radio Frequency Interference |
BJT | Bipolar Junction Transistor |
AM | Amplitude Modulation |
RES | Renewable Energy Sources |
FDI | False Data Injection |
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1. An illustration of the IEMI threat: IEMI can affect PV inverters and cause DoS or physical damage, or damping the power output.
Figure 2. A typical PV inverter can be modeled as a three-layer structure: Power conversion unit-Sensor-Control algorithms.
Figure 4. The principle of IEMI impact on voltage sensors. The IEMI signal is coupled into the sensor circuit, and then rectified, amplified by the op−amp, and ultimately turned into an offset on the output. (a) Transmission process of IEMI signals in the voltage sensor. (b) The parasitic capacitance of sensor’s PCB.
Figure 7. The principle of IEMI impact on Hall current sensors. The IEMI signal is injected into the Hall chip and generates a noise [Forumla omitted. See PDF.]. Then the noise will be rectified, amplified by the op−amp, and result in a deviation on the output.
Figure 9. The voltage and current sensors’ PCB we designed for the initial feasibility test.
Figure 10. The result of the IEMI frequency test on the voltage and current sensors. The IEMI power and distance are set to [Forumla omitted. See PDF.] and [Forumla omitted. See PDF.].
Figure 11. The experiment result of manipulation with a single-frequency signal and an AM signal on the sensor. ①: Without EMI; ②: Single-frequency EMI; ③: AM-modulated EMI.
Figure 12. The simulation of the DC bus voltage manipulation. We add a fake [Forumla omitted. See PDF.] on the measured DC bus voltage and record the real DC bus voltage under control. For [Forumla omitted. See PDF.], ①: [Forumla omitted. See PDF.] V, ②: [Forumla omitted. See PDF.] V, ③: [Forumla omitted. See PDF.] V, ④: [Forumla omitted. See PDF.] V, ⑤: [Forumla omitted. See PDF.] V; for [Forumla omitted. See PDF.], ①: [Forumla omitted. See PDF.] V, ②: [Forumla omitted. See PDF.] V, ③: [Forumla omitted. See PDF.] V.
Figure 14. The simulations of grid current sensors spoofing. It gives the simulated waveform of the real current value and the sensor output value when the single-phase and three-phase grid current measurement is manipulated. (a) Single-phase PV inverter. ①: [Forumla omitted. See PDF.] A, ②: [Forumla omitted. See PDF.] A, ③: [Forumla omitted. See PDF.] A. (b) Three-phase PV inverter. ①: [Forumla omitted. See PDF.] A, ②: [Forumla omitted. See PDF.] A, ③: [Forumla omitted. See PDF.] A.
Figure 15. Simulation of injecting perturbations of different frequencies into the MPPT control system. The red dots represent the positions at which the perturbations are injected.
Figure 17. The tested single-phase solar inverters and three-phase solar inverters under laboratory conditions.
Figure 18. The experiment results of DoS and Damage. (a) Result of DoS. ①: Before EMI, ②: IEMI begins, ③: After EMI. (b) Result of Damage. ①: Before EMI, ②: IEMI begins, ③: Burning out, ④: After EMI.
Figure 19. The impact of DoS on a real-world PV microgrid’s frequency. Stage ①: real-world experiment, Stage ②: simulation. (a) Experiment setup in the real-world microgrid. (b) Impact of DoS on microgrid frequency.
Figure 20. The influence of distance and power to manipulate inverter sensors and DoS a commercial inverter. The nonmonotonicity in (c) is mainly because the power will affect the electromagnetic field distribution of the antenna, which is not linear.
Figure 22. The detection method based on the distributed effect of IEMI. IEMI coupled before the transducer is converted to DC bias, while IEMI coupled behind the transducer remains AC noise, which can be regarded as a detection feature.
Figure 23. The voltage sensor’s output under different IEMI attack frequencies. (a) is under normal state, (b–f) are under IEMI attack with the attack power of [Forumla omitted. See PDF.] and frequency of [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] and [Forumla omitted. See PDF.].
Figure 25. The sensor’s output under different IEMI attack power. (a) is under normal state, while (b–f) are under IEMI attack at a frequency of [Forumla omitted. See PDF.] and power levels of [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], and [Forumla omitted. See PDF.], respectively.
Figure 27. The experiment result of the detection of Damping attack on the TI C2000 solar inverter. [Forumla omitted. See PDF.]: Initialization, [Forumla omitted. See PDF.] and [Forumla omitted. See PDF.]: Normal operation, [Forumla omitted. See PDF.]: Damping attack, [Forumla omitted. See PDF.]: Manual reduce power by half.
Figure 28. The impact of inverter working power and sensor’s deviation under attack on [Forumla omitted. See PDF.]. (a) The efficiency [Forumla omitted. See PDF.] under different working power. (b) The maximum deviation of efficiency [Forumla omitted. See PDF.] under different sensor’s deviation caused by IEMI attack.
Figure 29. The structure of the lightweight CNN model. Including 2 convolution layers, a flattened layer and a fully connected layer.
Figure 30. The comparison of the three methods. Method 1 is based on the distribution of IEMI, method 2 is based on the conservation of energy, and method 3 is based on neural networks. The “3” means excellent, “2” means good, “1” means fair.
Result of IEMI impact on seven Hall sensors.
Sensor | Sensor | Output | Measure- | Test Parameters | Output | |||||
---|---|---|---|---|---|---|---|---|---|---|
Freq. (MHz) | Pow. (W) | Original | Pos. | Pos. | Neg. | Neg. | ||||
Current | WCS1800 (Wire) | Analog | 0∼30 A | 685/1030 | 10 | 5 A | 15.7 A | +214.00% | −1.1 A | −1.00% |
Current | WCS1800 (Wireless) | Analog | 0∼35 A | 1000/876 | 10 | 5 A | 31.5 A | +530.00% | −1.6 A | −1.00% |
Current | ACS712 (20 A) | Analog | 0∼20 A | 779/1223 | 10 | 5 A | 13.2 A | +164.00% | −1.2 A | −1.00% |
Current | ACS712 (5 A) | Analog | 0∼5 A | 627/1212 | 10 | 2.5 A | 5.1 A | +104.00% | −1.75 A | −1.00% |
Speed | 3144 | Digital | 0/1 | 677 | 10 | 0/1 | bit-flap | +100.00% | bit-flap | −1.00% |
North pole | 3144 | Digital | 0/1 | 724 | 10 | 0/1 | bit-flap | +100.00% | bit-flap | −1.00% |
Water flow | YF-S401 | Digital | 0/1 | 1322 | 10 | 0/1 | bit-flap | +100.00% | bit-flap | −1.00% |
Result of IEMI attacks on PV inverters.
Inverter | | | | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
On DC Side | On AC Side | Pow. | Freq. | Result | Freq. | Pow.(W) | Pow.(W) | Pow. | |||||
Pow. | Freq. | Success | Pow. | Freq.(MHz) | Success | ||||||||
Ti C2000 | 5 | 735 | 100% | 5 | 1036/1490 | 100% | 10 | 1000 | 100% | 760 | 80 | 25 | 68.75% |
Ginlong | 10 | 916 | 100% | 10 | 625/1210 | 80% | - | - | - | 1192 | 1980 | 1390 | 29.8% |
Kstar | 10 | 749 | 100% | 10 | 990/810 | 90% | - | - | - | 998 | 1995 | 1560 | 21.8% |
Huawei | 10 | 1150 | 100% | 10 | 980/1020 | 80% | - | - | - | 1330 | 1960 | 1420 | 27.6% |
SMA | 10 | 675 | 100% | 10 | 1125 | 100% | - | - | - | 753 | 2950 | 2660 | 9.8% |
GW (LCD, 50 kW) | 20 | 920 | 100% | - | - | - | - | - | - | 960 | 35.6k | 2k | 94.3% |
GW (LED, 60 kW) | 20 | 945 | 100% | - | - | - | - | - | - | - | - | - | - |
Confusion Matrix for Model Evaluation.
Predicted Positive | Predicted Negative | |
---|---|---|
Actual Positive | 141 (TP) | 6 (FN) |
Actual Negative | 9 (FP) | 344 (TN) |
Evaluation Metrics.
Metric | Accuracy | Precision | Recall | F1 Score |
---|---|---|---|---|
Value | 94% | 96% | 97% | 97% |
References
1. Moosavian, S.; Rahim, N.; Selvaraj, J.; Solangi, K. Energy policy to promote photovoltaic generation. Renew. Sustain. Energy Rev.; 2013; 25, pp. 44-58. [DOI: https://dx.doi.org/10.1016/j.rser.2013.03.030]
2. International Energy Agency (IEA). Renewables 2024: Executive Summary. 2024; Available online: https://www.iea.org/reports/renewables-2024/executive-summary (accessed on 18 February 2025).
3. Yang, F.; Dan, Z.; Pan, K.; Yan, C.; Ji, X.; Xu, W. ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters. arXiv; 2024; arXiv: 2409.17873
4. Teoh, W.Y.; Tan, C.W. An overview of islanding detection methods in photovoltaic systems. Int. J. Electr. Comput. Eng.; 2011; 5, pp. 1341-1349.
5. Selvaraj, J.; Dayanıklı, G.Y.; Gaunkar, N.P.; Ware, D.; Gerdes, R.M.; Mina, M. Electromagnetic induction attacks against embedded systems. Proceedings of the 2018 on Asia Conference on Computer and Communications Security; Incheon, Korea, 4–8 June 2018; pp. 499-510.
6. Dayanıklı, G.Y.; Sinha, S.; Muniraj, D.; Gerdes, R.M.; Farhood, M.; Mina, M. Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22); Boston, MA, USA, 10–12 August 2022; pp. 953-970.
7. Kune, D.F.; Backes, J.; Clark, S.S.; Kramer, D.; Reynolds, M.; Fu, K.; Kim, Y.; Xu, W. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors. Proceedings of the 2013 IEEE Symposium on Security and Privacy; San Francisco, CA, USA, 19–22 May 2013; pp. 145-159. [DOI: https://dx.doi.org/10.1109/SP.2013.20]
8. Tu, Y.; Rampazzi, S.; Hao, B.; Rodriguez, A.; Fu, K.; Hei, X. Trick or heat? attack on amplification circuits to abuse critical temperature control systems. arXiv; 2019; arXiv: 1904.07110
9. Jie, H.; Zhao, Z.; Zeng, Y.; Chang, Y.; Fan, F.; Wang, C.; See, K.Y. A review of intentional electromagnetic interference in power electronics: Conducted and radiated susceptibility. IET Power Electron.; 2024; 17, pp. 1487-1506. [DOI: https://dx.doi.org/10.1049/pel2.12685]
10. Parida, B.; Iniyan, S.; Goic, R. A review of solar photovoltaic technologies. Renew. Sustain. Energy Rev.; 2011; 15, pp. 1625-1636. [DOI: https://dx.doi.org/10.1016/j.rser.2010.11.032]
11. Electric, N.S. Inverter Basics and Selecting the Right Mode. 2023; Available online: https://www.solar-electric.com/learning-center/inverter-basics-selection.html/?srsltid=AfmBOorGaqr-Ia8tqZ1TvRR7-yK-GvfwL2k4nB1vzc2JSJud_qVPU7A0 (accessed on 25 February 2024).
12. Barua, A.; Al Faruque, M.A. Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter. Proceedings of the 29th USENIX Security Symposium (USENIX Security 20); Berkeley, CA, USA, 12–14 August 2020; pp. 1273-1290.
13. USDE. Grid Systems. 2025; Available online: https://www.energy.gov/oe/grid-systems (accessed on 19 February 2025).
14. Lasseter, R.H.; Paigi, P. Microgrid: A conceptual solution. Proceedings of the 2004 IEEE 35th Annual Power Electronics Specialists Conference (IEEE Cat. No. 04CH37551); Aachen, Germany, 20–25 June 2004; Volume 6, pp. 4285-4290.
15. Stracqualursi, E.; Di Lorenzo, G.; Calcara, L.; Araneo, R. EMC Issues in High-Power Grid-Connected Photovoltaic Plants: An Update After 15 Years. IEEE Trans. Electromagn. Compat.; 2024; 66, pp. 1633-1645. [DOI: https://dx.doi.org/10.1109/TEMC.2024.3440848]
16. Degner, T.; Enders, W.; Schülbe, A.; Daub, H. EMC and safety design for photovoltaic systems (ESDEPS). Proceedings of the Sixteenth European Photovoltaic Solar Energy Conference; Glasgow, UK, 1–5 May 2020; pp. 2253-2256.
17. Nooshabadi, M.T. Design Methodology for PV Converters Optimization Including the Impact of EMC. Ph.D. Thesis; University of Teheran: Tehran, Iran, 2024.
18. Wu, H.; Fang, J.; Tang, H. Study on EMC of High Power Photovoltaic Grid-connected Inverter. Proceedings of the High Power Converter Technology; Online, 22 October 2014; pp. 60-79.
19. Williams, T. EMC for Product Designers; Newnes: Oxford, UK, 2016.
20. Paul, C.R.; Scully, R.C.; Steffka, M.A. Introduction to Electromagnetic Compatibility; John Wiley & Sons: Hoboken, NJ, USA, 2022.
21. Li, G.; Yang, J.; Huang, X. The Study of EMI/RFI and Its Rejection. Proc. Epsa; 2002; 14, pp. 36-44.
22. Wang, X.; Wild, T.; Schaich, F.; Dos Santos, A.F. Universal filtered multi-carrier with leakage-based filter optimization. Proceedings of the European Wireless 2014, 20th European Wireless Conference; Barcelona, Spain, 14–16 May 2014; pp. 1-5.
23. Chen, C.; Willeke, K. Characteristics of face seal leakage in filtering facepieces. Am. Ind. Hyg. Assoc. J.; 1992; 53, pp. 533-539. [DOI: https://dx.doi.org/10.1080/15298669291360120]
24. An, L.; Sepehri, N. Hydraulic actuator leakage fault detection using extended Kalman filter. Int. J. Fluid Power; 2005; 6, pp. 41-51. [DOI: https://dx.doi.org/10.1080/14399776.2005.10781210]
25. Murata, Y.; Takahashi, K.; Kanamoto, T.; Kubota, M. Analysis of Parasitic Couplings in EMI Filters and Coupling Reduction Methods. IEEE Trans. Electromagn. Compat.; 2017; 59, pp. 1880-1886. [DOI: https://dx.doi.org/10.1109/TEMC.2017.2690457]
26. Qu, Z.; Zhu, Z.; Liu, Y.; Yu, M.; Ye, T.T. Parasitic capacitance modeling and measurements of conductive yarns for e-textile devices. Nat. Commun.; 2023; 14, 2785. [DOI: https://dx.doi.org/10.1038/s41467-023-38319-6] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/37188687]
27. Hammad, E.; Khalil, A.M.; Farraj, A.; Kundur, D.; Iravani, R. A Class of Switching Exploits Based on Inter-Area Oscillations. IEEE Trans. Smart Grid; 2017; 9, pp. 4659-4668. [DOI: https://dx.doi.org/10.1109/TSG.2017.2666046]
28. Fan, L.; Knott, A.; Jørgensen, I.H.H. Layout capacitive coupling and structure impacts on integrated high voltage power MOSFETs. Proceedings of the 2016 12th Conference on Ph.D. Research in Microelectronics and Electronics (PRIME); Lisbon, Portugal, 27–30 June 2016; pp. 1-4. [DOI: https://dx.doi.org/10.1109/PRIME.2016.7519493]
29. Li, Y.; Wang, S.; Sheng, H.; Lakshmikanthan, S. Reduction and Cancellation Techniques for the Near Field Capacitive Coupling and Parasitic Capacitance of Inductors. Proceedings of the 2018 IEEE Symposium on Electromagnetic Compatibility, Signal Integrity and Power Integrity; Long Beach, CA, USA, 30 July–3 August 2018; pp. 432-437. [DOI: https://dx.doi.org/10.1109/EMCSI.2018.8495188]
30. Kjærsgaard, B.F.; Liu, G.; Nielsen, M.R.; Wang, R.; Dalal, D.N.; Aunsborg, T.S.; Jørgensen, J.K.; Yan, Z.; Jacobsen, J.; Wu, R. et al. Parasitic Capacitive Couplings in Medium Voltage Power Electronic Systems: An Overview. IEEE Trans. Power Electron.; 2023; 38, pp. 9793-9817. [DOI: https://dx.doi.org/10.1109/TPEL.2023.3269582]
31. Westerhof, W. HORUS SCENARIO. Available online: https://horusscenario.com/ (accessed on 25 February 2024).
32. Benkraouda, H.; Chakkantakath, M.A.; Keliris, A.; Maniatakos, M. Snifu: Secure network interception for firmware updates in legacy plcs. Proceedings of the 2020 IEEE 38th VLSI Test Symposium (VTS); San Diego, CA, USA, 5–8 April 2020; pp. 1-6.
33. Mo, Y.; Sinopoli, B. Secure control against replay attacks. Proceedings of the 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton); Monticello, IL, USA, 30 September–2 October 2009; pp. 911-918.
34. Wang, H.; Ruan, J.; Ma, Z.; Zhou, B.; Fu, X.; Cao, G. Deep learning aided interval state prediction for improving cyber security in energy internet. Energy; 2019; 174, pp. 1292-1304. [DOI: https://dx.doi.org/10.1016/j.energy.2019.03.009]
35. Sahoo, S.; Peng, J.C.H.; Devakumar, A.; Mishra, S.; Dragičević, T. On detection of false data in cooperative DC microgrids—A discordant element approach. IEEE Trans. Ind. Electron.; 2019; 67, pp. 6562-6571. [DOI: https://dx.doi.org/10.1109/TIE.2019.2938497]
36. Liu, S.; Zhang, J.; Chen, Y.; Xie, L. False data injection attacks against state estimation in power grid systems. IEEE Trans. Power Syst.; 2015; 30, pp. 1166-1175. [DOI: https://dx.doi.org/10.1109/TSG.2018.2813280]
37. Geetha, S.; Satheesh Kumar, K.; Rao, C.R.; Vijayan, M.; Trivedi, D. EMI shielding: Methods and materials—A review. J. Appl. Polym. Sci.; 2009; 112, pp. 2073-2086. [DOI: https://dx.doi.org/10.1002/app.29812]
38. Kondawar, S.B.; Modak, P.R. Theory of EMI shielding. Materials for Potential Emi Shielding Applications; Elsevier: Amsterdam, The Netherlands, 2020; pp. 9-25.
39. Thomassin, J.M.; Jérôme, C.; Pardoen, T.; Bailly, C.; Huynen, I.; Detrembleur, C. Polymer/carbon based composites as electromagnetic interference (EMI) shielding materials. Mater. Sci. Eng. Rep.; 2013; 74, pp. 211-232. [DOI: https://dx.doi.org/10.1016/j.mser.2013.06.001]
40. Wang, L.; Ma, Z.; Zhang, Y.; Chen, L.; Cao, D.; Gu, J. Polymer-based EMI shielding composites with 3D conductive networks: A mini-review. SusMat; 2021; 1, pp. 413-431. [DOI: https://dx.doi.org/10.1002/sus2.21]
41. Ye, S.; Eberle, W.; Liu, Y.F. A novel EMI filter design method for switching power supplies. IEEE Trans. Power Syst.; 2004; 19, pp. 1668-1678. [DOI: https://dx.doi.org/10.1109/TPEL.2004.836629]
42. Wang, S.; Lee, F.C.; Chen, D.Y.; Odendaal, W.G. Effects of parasitic parameters on EMI filter performance. IEEE Trans. Power Syst.; 2004; 19, pp. 869-877. [DOI: https://dx.doi.org/10.1109/TPEL.2004.826527]
43. Luo, F.; Boroyevich, D.; Mattavelli, P. Improving EMI filter design with in circuit impedance mismatching. Proceedings of the 2012 Twenty-Seventh Annual IEEE Applied Power Electronics Conference and Exposition (APEC); Orlando, FL, USA, 5–9 February 2012; pp. 1652-1658.
44. Adami, C.; Braun, C.; Clemens, P.; Jöster, M.; Ruge, S.; Suhrke, M.; Schmidt, H.U.; Taenzer, H.J. HPM detector system with frequency identification. Proceedings of the 2014 International Symposium on Electromagnetic Compatibility; Raleigh, NC, USA, 4–8 August 2014; pp. 140-145.
45. Adami, C.; Braun, C.; Clemens, P.; Suhrke, M.; Schmidt, H.; Taenzer, A. HPM detection system for mobile and stationary use. Proceedings of the 10th International Symposium on Electromagnetic Compatibility; York, UK, 26–30 September 2011; pp. 1-6.
46. Dawson, J.; Flintoft, I.; Kortoci, P.; Dawson, L.; Marvin, A.; Robinson, M.; Stojilovic, M.; Rubinstein, M.; Menssen, B.; Garbe, H. et al. A cost-efficient system for detecting an intentional electromagnetic interference (IEMI) attack. Proceedings of the 2014 International Symposium on Electromagnetic Compatibility; Raleigh, NC, USA, 4–8 August 2014; pp. 1252-1256.
47. Tu, Y.; Tida, V.S.; Pan, Z.; Hei, X. Transduction shield: A low-complexity method to detect and correct the effects of emi injection attacks on sensors. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security; Hong Kong, 7–11 June 2021; pp. 901-915.
48. Zhang, Y.; Rasmussen, K. Detection of Electromagnetic Signal Injection Attacks on Actuator Systems. Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses; Limassol, Cyprus, 26–28 October 2022; pp. 171-184.
49. Köhler, S.; Baker, R.; Martinovic, I. Signal injection attacks against ccd image sensors. Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security; Nagasaki, Japan, 30 May–3 June 2022; pp. 294-308.
50. Ruotsalainen, H.; Treytl, A.; Sauter, T. Watermarking based sensor attack detection in home automation systems. Proceedings of the 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA); Vasteras, Sweden, 7–10 September 2021; pp. 1-8.
51. Shoukry, Y.; Martin, P.; Yona, Y.; Diggavi, S.; Srivastava, M. Pycra: Physical challenge-response authentication for active sensors under spoofing attacks. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security; Denver, CO, USA, 12–16 October 2015; pp. 1004-1015.
52. Fang, K.; Wang, T.; Yuan, X.; Miao, C.; Pan, Y.; Li, J. Detection of weak electromagnetic interference attacks based on fingerprint in IIoT systems. Future Gener. Comput. Syst.; 2022; 126, pp. 295-304. [DOI: https://dx.doi.org/10.1016/j.future.2021.08.020]
53. Kasmi, C.; Esteves, J.L. IEMI threats for information security: Remote command injection on modern smartphones. IEEE Trans. Electromagn. Compat.; 2015; 57, pp. 1752-1755. [DOI: https://dx.doi.org/10.1109/TEMC.2015.2463089]
54. Kasmi, C.; Lopes-Esteves, J. Automated analysis of the effects induced by radio-frequency pulses on embedded systems for EMC Functional Safety. Proceedings of the 2015 1st URSI Atlantic Radio Science Conference (URSI AT-RASC); Gran Canaria, Spain, 16–24 May 2015; 1.
55. Muniraj, D.; Farhood, M. Detection and mitigation of actuator attacks on small unmanned aircraft systems. Control Eng. Pract.; 2019; 83, pp. 188-202. [DOI: https://dx.doi.org/10.1016/j.conengprac.2018.10.022]
56. Wang, K.; Mitev, R.; Yan, C.; Ji, X.; Sadeghi, A.R.; Xu, W. GhostTouch: Targeted Attacks on Touchscreens Without Physical Touch. Proceedings of the 31st USENIX Security Symposium (USENIX Security 22); Boston, MA, USA, 10–12 August 2022; USENIX Association: Boston, MA, USA, 2022; Available online: https://www.usenix.org/conference/usenixsecurity22/presentation/wang-kai (accessed on 20 February 2025).
57. Jie, H.; Zhao, Z.; Li, H.; Wang, C.; Chang, Y.; See, K.Y. Characterization and Circuit Modeling of Electromagnetic Interference Filtering Chokes in Power Electronics: A Review. IEEE Trans. Power Syst.; 2025; 40, pp. 920-943. [DOI: https://dx.doi.org/10.1109/TPEL.2024.3454152]
58. Islam, M.; Mekhilef, S.; Hasan, M. Single phase transformerless inverter topologies for grid-tied photovoltaic system: A review. Renew. Sustain. Energy Rev.; 2015; 45, pp. 69-86. [DOI: https://dx.doi.org/10.1016/j.rser.2015.01.009]
59. SUNGROW Technologies Co., Ltd. String Inverter of Sungrow. 2023; Available online: https://en.sungrowpower.com/ProductsHome/14/16/string-inverter (accessed on 25 February 2024).
60. TMEIC Technologies Co., Ltd. PV Inverters. Available online: https://www.tmeic.com/products/pv-inverters (accessed on 25 February 2024).
61. Huawei Technologies Co., Ltd. FusionSolar. Available online: https://solar.huawei.com/eu/Products/FusionSolar (accessed on 25 February 2024).
62. Dogga, R.; Pathak, M. Recent trends in solar PV inverter topologies. Solar Energy; 2019; 183, pp. 57-73. [DOI: https://dx.doi.org/10.1016/j.solener.2019.02.065]
63. Motahhir, S.; El Hammoumi, A.; El Ghzizal, A. The most used MPPT algorithms: Review and the suitable low-cost embedded board for each algorithm. J. Clean. Prod.; 2020; 246, 118983. [DOI: https://dx.doi.org/10.1016/j.jclepro.2019.118983]
64. Sarvi, M.; Azadian, A. A comprehensive review and classified comparison of MPPT algorithms in PV systems. Energy Syst.; 2022; 13, pp. 281-320. [DOI: https://dx.doi.org/10.1007/s12667-021-00427-x]
65. Harrag, A.; Messalti, S. Variable step size modified P&O MPPT algorithm using GA-based hybrid offline/online PID controller. Renew. Sustain. Energy Rev.; 2015; 49, pp. 1247-1260.
66. Yang, Y.; Ruan, Y.; Shen, H.Q.; Tang, Y.Y.; Yang, Y. Grid-connected inverter for wind power generation system. J. Shanghai Univ. (Engl. Ed.); 2009; 13, pp. 51-56. [DOI: https://dx.doi.org/10.1007/s11741-009-0110-3]
67. Ti Technologies Co., Ltd. C2000 Solar Micro Inverter Quick Start Guide. 2014; Available online: https://www.ti.com/lit/pdf/tidu406 (accessed on 25 February 2024).
68. Baekhyn0506. Characteristics and Diagramming of Operational Amplifier Circuits. [EB/OL]. 2022; Available online: https://www.elecfans.com/analog/202208161878428.html (accessed on 20 February 2025).
69. Biglarbegian, M.; Nibir, S.J.; Jafarian, H.; Parkhideh, B. Development of current measurement techniques for high frequency power converters. Proceedings of the 2016 IEEE International Telecommunications Energy Conference (INTELEC); Austin, TX, USA, 23–27 October 2016; pp. 1-7. [DOI: https://dx.doi.org/10.1109/INTLEC.2016.7749133]
70. Cadence System Analysis. EMI Types and Coupling Methods. Available online: https://resources.system-analysis.cadence.com/blog/msa2022-emi-types-and-coupling-methods (accessed on 10 February 2024).
71. Soni, A. What is Electromagnetic Coupling?. Available online: https://www.ansys.com/blog/saving-chips-from-electromagnetic-coupling (accessed on 10 February 2024).
72. Analog Devices. RFI Rectification Concepts. Available online: https://www.analog.com/media/en/training-seminars/tutorials/MT-096.pdf (accessed on 25 January 2024).
73. Ti Technologies Co., Ltd. Grid-Tied Solar Micro Inverter with MPPT Schematic (Rev. A). Available online: https://www.ti.com/lit/pdf/tidr767 (accessed on 28 February 2024).
74. RIGOL Technologies Co., Ltd. DP711 Programmable Liner DC Power Supply. 2016; Available online: https://beyondmeasure.rigoltech.com/acton/attachment/1579/f-06b5/1/-/-/-/-/DP700%20Data%20Sheet.pdf (accessed on 25 January 2024).
75. Keysight Technologies. EXG X-Series Signal Generators N5171B. Available online: https://www.keysight.com/us/en/assets/7018-03381/data-sheets/5991-0039.pdf (accessed on 25 January 2024).
76. Mini-Circuits Technologies Co., Ltd. High Power Amplifier HPA-50W-63+. Available online: https://www.minicircuits.com/pdfs/HPA-50W-63+.pdf (accessed on 25 January 2024).
77. Shenzhen Shengda Communication Equipment Co., Ltd. The 5G Directional Antenna. Available online: https://www.alibaba.com/product-detail/High-Gain-Waterproof-Outdoor-800-2500MHZ_62344368753.html (accessed on 25 January 2024).
78. Ginlong Technologies Co., Ltd. Solis S6 Single Phase Inverter. Available online: https://www.ginlong.com/uploads/file/Solis_Manual_S6-GR1P(2,5-6)K_FN_EUR_V1,2(20221116).pdf (accessed on 25 January 2024).
79. Kstar Technologies Co., Ltd. String Grid-Tied PV Inverter BIuE-G 3000D/4000D/5000D/5000D-AU/6000D. Available online: https://www.kstar.com/product/detail/106.html (accessed on 25 January 2024).
80. Huawei Technologies Co., Ltd. Huawei SUN2000-2/3/3.68/4/4.6/5/6ktl-l1. 2024; Available online: https://solar.huawei.com/hu-HU/download?p=%2F-%2Fmedia%2FSolar%2Fattachment%2Fpdf%2Feu%2Fdatasheet%2FSUN2000-2-6KTL-L1.pdf (accessed on 25 January 2024).
81. GoodWe Technologies Co., Ltd. GOODWE GW50K-MT. Available online: https://en.goodwe.com/Ftp/EN/Downloads/User%20Manual/GW_MT_User%20Manual-EN.pdf (accessed on 25 January 2024).
82. AG, S.S.T. Sunny Boy 3.0/3.6/4.0/5.0/6.0. Available online: https://files.sma.de/assets/278585.pdf (accessed on 6 January 2025).
83. AG, S.S.T. Sunny Tripower Smart Energy 5.0/6.0/8.0/10.0. 2023; Available online: https://files.sma.de/downloads/STPxx-3SE-40-DS-en-20.pdf (accessed on 6 January 2025).
84. TEWERD Technologies Co., Ltd. TEWERD TPV1000. Available online: https://www.tewerd.com/PVsimulator.html (accessed on 25 January 2024).
85. RIGOL Technologies Co., Ltd. RP1000D Series High Voltage Differential Probe. 2021; Available online: https://beyondmeasure.rigoltech.com/acton/attachment/1579/f-01c6/1/-/-/-/-/file.pdf (accessed on 25 January 2024).
86. Chroma ATE, Inc. REGENERATIVE GRID SIMULATOR MODEL 61809/61812/61815. 2025; Available online: https://www.chromaate.com/downloads/catalogue/Power/61815-EN.pdf (accessed on 12 January 2025).
87. Dong, S.; Kremers, E.; Brucoli, M.; Brown, S.; Rothman, R. Residential PV-BES systems: Economic and grid impact analysis. Energy Procedia; 2018; 151, pp. 199-208. [DOI: https://dx.doi.org/10.1016/j.egypro.2018.09.048]
88. Chen, Z.; Ding, M.; Su, J. Modeling and control for large capacity battery energy storage system. Proceedings of the 2011 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT); Weihai, China, 6–9 July 2011; pp. 1429-1436.
89. Intelligence and Security Committee of Parliament. 1547.4-2011-IEEE Guide for Design, Operation, and Integration of Distributed Resource Island Systems with Electric Power Systems; IEEE: Piscataway, NJ, USA, 2011.
90. Liu, M.; Cao, X.; Cao, C.; Wang, P.; Wang, C.; Pei, J.; Lei, H.; Jiang, X.; Li, R.; Li, J. A review of power conversion systems and design schemes of high-capacity battery energy storage systems. IEEE Access; 2022; 10, pp. 52030-52042. [DOI: https://dx.doi.org/10.1109/ACCESS.2022.3174193]
91. Kirby, B.J.; Dyer, J.; Martinez, C.; Shoureshi, R.A.; Guttromson, R.; Dagle, J. Frequency Control Concerns in the North American Electric Power System; United States Department of Energy: Washington, DC, USA, 2003.
92. Ghafouri, M.; Kabir, E.; Moussa, B.; Assi, C. Coordinated charging and discharging of electric vehicles: A new class of switching attacks. ACM Trans.-Cyber-Phys. Syst. (TCPS); 2022; 6, pp. 1-26. [DOI: https://dx.doi.org/10.1145/3524454]
93. MathWork. Performance of Three PSS for Interarea Oscillations. 2024; Available online: https://ww2.mathworks.cn/help/sps/ug/performance-of-three-pss-for-interarea-oscillations.html?searchHighlight=Kundur&s_tid=srchtitle_support_results_2_Kundur (accessed on 17 April 2024).
94. European Committee for Standardization. EN 61000 Series: Electromagnetic Compatibility (EMC). 2019; Available online: https://www.cenelec.eu/ (accessed on 20 February 2025).
95. Chinese National Standardization Administration. GB/T 17626.x Series: Electromagnetic Compatibility (EMC) Testing. 2019; Available online: http://www.sac.gov.cn/ (accessed on 20 February 2025).
96. Mardiguian, M. Combined effects of several, simultaneous, EMI couplings. Proceedings of the IEEE International Symposium on Electromagnetic Compatibility, Symposium Record (Cat. No. 00CH37016); Washington, DC, USA, 21–25 August 2000; Volume 1, pp. 181-184. [DOI: https://dx.doi.org/10.1109/ISEMC.2000.875559]
97. IEEE Standards Association. IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces; IEEE: Piscataway, NJ, USA, 2018.
98.
99.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
As renewable energy sources (RES) continue to expand and the use of power inverters has surged, inverters have become crucial for converting direct current (DC) from RES into alternating current (AC) for the grid, and their security is vital for maintaining stable grid operations. This paper investigates the security vulnerabilities of photovoltaic (PV) inverters, specifically focusing on their internal sensors, which are critical for reliable power conversion. It is found that both current and voltage sensors are susceptible to intentional electromagnetic interference (IEMI) at frequencies of 1 GHz or higher, even with electromagnetic compatibility (EMC) protections in place. These vulnerabilities can lead to incorrect sensor readings, disrupting control algorithms. We propose an IEMI attack that results in three potential outcomes: Denial of Service (DoS), physical damage to the inverter, and power output reduction. These effects were demonstrated on six commercial single-phase and three-phase PV inverters, as well as in a real-world microgrid, by emitting IEMI signals from 100 to 150 cm away with up to 20 W of power. This study highlights the growing security risks of power electronics in RES, which represent an emerging target for cyber-physical attacks in future RES-dominated grids. Finally, to cope with such threats, three detection methods that are adaptable to diverse threat scenarios are proposed and their advantages and disadvantages are discussed.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer