nical report, North American Electric Reliability Cor-
poration.
anon. (2018a). IEEE standard for smart energy profile ap-
plication protocol. IEEE Std 2030.5-2018.
anon. (2018b). Interoperability strategic vision: A GMLC
white paper. PNNL-27320. Technical report, Pacific
Northwest National Laboratory.
Bodeau, D. J., McCollum, C. D., and Fox, D. B. (2018).
Cyber threat modeling: Survey, assessment, and rep-
resentative framework. Technical report, Homeland
Security Systems Engineering & Development Insti-
tute.
Carvalho, P., Correia, P., and Ferreira, L. (2008). Dis-
tributed reactive power generation control for voltage
rise mitigation in distribution networks. IEEE Trans.
on Power Sys., 23(2):766–772.
Defend, B. and Kursawe, K. (2013). Implementation of
privacy-friendly aggregation for the smart grid. In
ACM Workshop on Smart Energy Grid Security, page
65–74, New York, NY, USA.
Deng, R., Xiao, G., Lu, R., Liang, H., and Vasilakos,
A. (2017). False data injection on state estima-
tion in power systems—attacks, impacts, and defense:
A survey. IEEE Trans. on Industrial Informatics,
13(2):411–423.
Deng, R., Zhuang, P., and Liang, H. (2019). False data
injection attacks against state estimation in power
distribution systems. IEEE Trans. on Smart Grid,
10(3):2871–2881.
Fernando, N., Acken, J., and Bass, R. (2021). Develop-
ing a distributed trust model for distributed energy re-
sources. In IEEE Conf. on Tech. for Sustainability.
Herberg, U., Mashima, D., Jetcheva, J. G., and Mirzazad-
Barijough, S. (2014). OpenADR 2.0 deployment ar-
chitectures: Options and implications. In IEEE Int.
Conf. on Smart Grid Comm., pages 782–787.
Hoke, A., Giraldez, J., Palmintier, B., Ifuku, E., Asano, M.,
Ueda, R., and Symko-Davies, M. (2018). Setting the
smart solar standard: Collaborations between Hawai-
ian Electric and the National Renewable Energy Lab-
oratory. IEEE Power & Energy Mag., 16(6):18–29.
Hossain, M. and Ali, M. (2013). Small scale energy stor-
age for power fluctuation minimization with spatially
diverged PV plants. Proc. IEEE Southeastcon.
Isozaki, Y., Yoshizawa, S., F., Y., Ishii, H., Ono, I., Onoda,
T., and Hayashi, Y. (2016). Detection of cyber attacks
against voltage control in distribution power grids
with PVs. IEEE Trans. on Smart Grid, 7(4):1824–
1835.
Kalluri, R., Mahendra, L., Kumar, R., and Prasad, G.
(2016). Simulation and impact analysis of denial-of-
service attacks on power SCADA. In National Power
Sys. Conf.
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security & Privacy, 9(3):49–51.
Lee, E., Gadh, R., and Gerla, M. (2013). Energy service
interface: Accessing to customer energy resources for
smart grid interoperation. IEEE J. on Selected Areas
in Comm., 31(7):1195–1204.
Li, F., Yan, X., Xie, Y., Sang, Z., and Yuan, X. (2019). A re-
view of cyber-attack methods in cyber-physical power
system. In IEEE 8th Int. Conf. on Adv. Power Sys.
Automation & Protection, pages 1335–1339.
Liang, G., Weller, S., Zhao, J., Luo, F., and Dong, Z. (2017).
The 2015 Ukraine blackout: Implications for false
data injection attacks. IEEE Trans. on Power Sys.,
32(4):3317–3318.
Marnell, K., Eustis, C., and Bass, R. (2020). Resource study
of large-scale electric water heater aggregation. IEEE
Open Access J. of Power & Energy, 7:82–90.
Myagmar, S., Lee, A., and Yurcik, W. (2005). Threat mod-
eling as a basis for security requirements. In Proc. of
the IEEE Symp. on Requ. Eng. for Inf. Security.
Obert, J., Cordeiro, P., Johnson, J., Lum, G., Tansy, T.,
Pala, M., and Ih, R. (2019). Recommendations for
trust and encryption in DER interoperability stan-
dards. Technical report, Sandia National Laboratories,
SAND2019–1490.
Obi, M., Slay, T., and Bass, R. (2020). Distributed energy
resource aggregation using customer-owned equip-
ment: A review of literature and standards. Energy
Reports, 6:2358–2369.
Pliatsios, D., Sarigiannidis, P., Lagkas, T., and Sarigianni-
dis, A. (2020). A survey on SCADA systems: Secure
protocols, incidents, threats and tactics. IEEE Comm.
Surveys & Tutorials, 22(3):1942–1976.
Salinas, S. A. and Li, P. (2016). Privacy-preserving energy
theft detection in microgrids: A state estimation ap-
proach. IEEE Trans. on Power Sys., 31(2):883–894.
Saltzer, J. and Schroeder, M. (1975). The protection of in-
formation in computer systems. Proc. of the IEEE,
63(9):1278–1308.
Slay, T. and Bass, R. (2021). An energy service interface for
distributed energy resources. In IEEE Conf. on Tech.
for Sustainability.
Teixeira, A., D
´
an, G., Sandberg, H., Berthier, R., Bobba, R.,
and Valdes, A. (2014). Security of smart distribution
grids: Data integrity attacks on integrated volt/VAR
control and countermeasures. In American Control
Conf., pages 4372–4378.
Wei-jing, Z., He-chun, Z., Shi-ying, Y., and Tong, L.
(2019). A homomorphic encryption-based privacy
preserving data aggregation scheme for smart grid.
In 15th Int. Conf. on Comp. Intelligence & Security,
pages 315–319.
Widergren, S., Melton, R., Khandekar, A., Nordman, B.,
and Knight, M. (2019). The plug-and-play electricity
era: Interoperability to integrate anything, anywhere,
anytime. IEEE Power & Energy Mag., 17(5):47–58.
Zarina, P., Mishra, S., and Sekhar, P. (2012). Deriving in-
ertial response from a non-inertial PV system for fre-
quency regulation. IEEE Int. Conf. on Power Electr.,
Drives and Energy Sys., pages 1245–1249.
SMARTGREENS 2022 - 11th International Conference on Smart Cities and Green ICT Systems
116