Cyberthreats to Smart Inverters in Household Photovoltaic Systems
Abstract
1. Introduction
2. Cyberattacks and Their Repercussions on Technological Developments of Smart Inverters in the Residential Sector
2.1. Effects of Cyberattacks on Energy Systems
2.2. Cybersecurity in Europe: Trends and Perspectives
- Directive (EU) 2016/1148 (NIS Directive) requires operators of essential services, including energy providers, to implement risk management and incident notification protocols. This directive forms the basis of national cybersecurity infrastructures throughout the member states [19].
- Regulation (EU) 2019/881 (Cybersecurity Act) creates the framework for EU-wide certification of ICT products and services, covering smart inverters and DER communication devices [20].
- The newly adopted Network Code on Cybersecurity formally integrates cybersecurity requirements into electricity grid operation protocols. It mandates risk assessments, reporting obligations, and supply chain security measures; it explicitly aims to achieve harmonized defense standards for cross-border electricity flows and DER devices [21].
2.3. Cyberattacks on Household Critical Infrastructure and PV Installations: Risks and Vulnerabilities
2.4. Risk Mitigation Strategies and Emerging Best Practices
3. Development of RES and Emerging Cyber Threats in Poland
- Detection of the attack point by identifying the probable target and the vulnerabilities that may be exploited by the attacker;
- Estimation of the direct impact of the attack on a given asset;
- Propagation of the cyberattack through the system;
- Assessment of the impact on high-level tasks.
- Threat modeling—analyzing known vulnerabilities, exploits, and equipment, software, security, and communication systems;
- System modeling—gathering information such as system voltage, the number of customers, topologies, and protection systems (e.g., against overcurrent);
- Impact metrics—assessing resource loss (e.g., the amount of lost kWh), stability (voltage and frequency violations), and security (failures in protection systems).
3.1. Trends in PV Installations in Poland
3.2. Opinion of Poles on RES and Its Impact on Sustainability
3.3. Evolution of PV Technologies
4. Methods and Methodology
- I.
- Definition of the year of the analysis;
- II.
- Collection of data sources from the TSO;
- III.
- Definition of the time of cyberattacks (hour of the day);
- IV.
- Definition of consumption scenarios (maximum, minimum, and average PV solar production);
- V.
- Analysis of the results:
- Step 1: Definition of the year under analysis:
- Step 2: Collection of data sources from the TSO:
- Step 3: Definition of the time of cyberattacks (hour of the day):
- Step 4: Definition of the scenarios:
- Average scenario: This scenario was simulated to analyze the average days of energy consumption in household PV systems.
- Optimistic scenario: This scenario was simulated to analyze the days with the highest solar energy production.
- Pessimistic scenario: This scenario was simulated to analyze the days with the lowest solar energy production.
5. Case Studies
- Optimistic Scenario: This best-case scenario examines an attack when solar output is at its lowest. It was set on 21 January 2023, which was identified as the day with the minimum PV generation of the year. During winter conditions, PV contributes only a small fraction of total electricity production. The attacker’s reach was also assumed to be limited: only 50% of the vulnerable manufacturer’s inverters were successfully taken over. Therefore, both the generation baseline and the extent of the attack were minimal in this scenario. The optimistic scenario envisions a situation where even if a cyberattack occurs, the impact is mitigated by low solar activity and a less effective breach, representing a mild disruption.
- Pessimistic Scenario: This worst-case scenario considers an attack under peak solar generation conditions. It was set on 9 July 2023, which was the day with the highest PV production of the year, when solar irradiance and PV outputs were at their maximum. In this scenario, the attacker was assumed to be highly effective, managing to compromise 90% of the target manufacturer’s inverters. This implies that nearly the entire fleet of that brand’s devices (which equates to about 30% of all PV capacity in Poland) was disabled. The pessimistic scenario combined a maximal generation period with an almost complete failure of a major inverter fleet, providing an estimate of the most severe consequences such a cyberattack could inflict on the power system.
6. Results and Discussions
6.1. Average Scenario
6.2. Optimistic Scenario
6.3. Pessimistic Scenario
6.4. The Repercussions of a Cyberattack on Micro PV Infrastructure
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| AI | Artificial intelligence |
| API | Application programming interface |
| BSI | Federal Office for Information Security |
| CBOS | Centre for Public Opinion Research in Poland |
| CERT | Computer Emergency Response Team |
| CSIRT | Computer Security Incident Response Team |
| DERs | Distributed energy resources |
| DIA | Data integrity attacks |
| DNP3 | Distributed Network Protocol 3 |
| DoS | Denial of service |
| E | Energy |
| EMI | Electromagnetic interference |
| ENISA | European Union Agency for Cybersecurity |
| EU | European Union |
| FDI | False data injection |
| HIL | Hardware-in-the-loop |
| HPC | Hardware performance counter |
| ICS | Industrial control systems |
| IDS | Intrusion detection system |
| IEEE | Institute of Electrical and Electronics Engineers |
| IoT | Internet of things |
| IPS | Intrusion prevention system |
| LAA | Licensed Assisted Access |
| MITM | Man-in-the-middle |
| MLP | Multilayer perceptron |
| NIST | National Institute of Standards and Technology |
| OTA | Over-the-air |
| PSE | Polskie Sieci Elektroenergetyczne, the Polish TSO |
| PTPiREE | Polish Distribution Operators’ association |
| PV | Photovoltaic |
| RES | Renewable energy sources |
| RL | Reinforcement learning |
| s | Energy, MWh |
| SEP | Secure entry point |
| SOC | Security Operations Centers |
| TEE | Trusted Execution Environments |
| TLS | Transport Layer Security |
| TSO | Transmission System Operator |
| VPP | Virtual power plant |
| Greek: | Total energy produced by all sources |
References
- Hernandez, C.D.C.; Montuori, L.; Alcázar-Ortega, M.; Olczak, P. Extreme Climate Events and Energy Market Vulnerability: A Systematic Global Review. Appl. Sci. 2025, 15, 6210. [Google Scholar] [CrossRef]
- Balaras, C.; Dascalaki, E.; Psarra, I.; Cholewa, T. Primary Energy Factors for Electricity Production in Europe. Energies 2022, 16, 93. [Google Scholar] [CrossRef]
- Szczerbowski, R.; Kornobis, D. The proposal of an energy mix in the context of changes in Poland’s energy policy. Energy Policy J. 2019, 22, 5–18. [Google Scholar]
- Montuori, L.; Alcázar-Ortega, M.; Vargas-Salgado, C.; Mansó-Borràs, I. Enabling the natural gas system as smart infrastructure: Metering technologies for customer applications. In Proceedings of the 2020 Global Mosharaka Congress on Electrical Engineering (GMC ElecEng 2020), Valencia, Spain, 4–6 September 2020. [Google Scholar]
- Lodhi, E.; Liu, X.; Xiong, G.; Khan, M.A.; Lodhi, Z.; Nawaz, T.; Dilawar, A.; Tarkoma, S.; Wang, F. SmartPV-AIoT: An AIoT-Integrated Framework for Fault Diagnosis and Remote Monitoring in Photovoltaic Systems. Energy Convers. Manag. X 2025, 27, 101117. [Google Scholar] [CrossRef]
- Eze Ekechukwu, D.; Simpa, P. The Importance of Cybersecurity in Protecting Renewable Energy Investment: A Strategic Analysis of Threats and Solutions. Eng. Sci. Technol. J. 2024, 5, 1845–1883. [Google Scholar] [CrossRef]
- Dygnatowski, S. Cyber Security as a Foundation for the Security of Critical Infrastructure in the Context of Modern Threats. J. KONBiN 2020, 50, 309–320. [Google Scholar] [CrossRef]
- Mohamed, N.; El-Guindy, M.; Oubelaid, A.; Almazrouei, S.K. Smart Energy Meets Smart Security: A Comprehensive Review of AI Applications in Cybersecurity for Renewable Energy Systems. Int. J. Electr. Electron. Res. 2023, 11, 728–732. [Google Scholar] [CrossRef]
- Ahmed, I.; El-Rifaie, A.M.; Akhtar, F.; Ahmad, H.; Alaas, Z.; Ahmed, M.M.R. Cybersecurity in microgrids: A review on advanced techniques and practical implementation of resilient energy systems. Energy Strategy Rev. 2025, 58, 101654. [Google Scholar] [CrossRef]
- Stecuła, K. Analysis of Asymmetric VR Games—Steam Platform Case Study. Technol. Soc. 2024, 78, 102673. [Google Scholar] [CrossRef]
- Stecuła, K. Virtual Reality Applications Market Analysis—On the Example of Steam Digital Platform. Informatics 2022, 9, 100. [Google Scholar] [CrossRef]
- Wolniak, R.; Stecuła, K.; Aydın, B. Digital Transformation of Grocery In-Store Shopping-Scanners, Artificial Intelligence, Augmented Reality and Beyond: A Review. Foods 2024, 13, 2948. [Google Scholar] [CrossRef] [PubMed]
- Wolniak, R.; Stecuła, K. Artificial Intelligence in Smart Cities—Applications, Barriers, and Future Directions: A Review. Smart Cities 2024, 7, 1346–1389. [Google Scholar] [CrossRef]
- Czajkowski, A.; Remiorz, L.; Pawlak, S.; Remiorz, E.; Szyguła, J.; Marek, D.; Paszkuta, M.; Drabik, G.; Baron, G.; Paduch, J. Global Water Crisis: Concept of a New Interactive Shower Panel Based on IoT and Cloud Computing for Rational Water Consumption. Appl. Sci. 2021, 11, 4081. [Google Scholar] [CrossRef]
- Keith, S.; Victoria, P.; Suzanne, L.; Marshall, A.; Adam, H. Guide to Industrial Control Systems (ICS) Security; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2015.
- U.S. Department of Energy’s Office of Cybersecurity. Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid. 2022. Available online: https://www.energy.gov/sites/default/files/2022-10/Cybersecurity%20Considerations%20for%20Distributed%20Energy%20Resources%20on%20the%20U.S.%20Electric%20Grid.pdf (accessed on 30 July 2025).
- Oliver, D.; Lucas, T.; Lindani, M. A review on cybersecurity for distributed energy resources: Opportunities for South Africa. J. Infrastruct. Policy Dev. 2024, 8, 8631. [Google Scholar]
- Zografopoulos, I.; Hatziargyriou, N.D.; Konstantinou, C. Distributed Energy Resources Cybersecurity Outlook: Vulnerabilities, Attacks, Impacts, and Mitigations. IEEE Syst. J. 2023, 17, 6695–6709. [Google Scholar] [CrossRef]
- European Union. EUR-Lex. 2016. Available online: https://eur-lex.europa.eu/eli/dir/2016/1148/oj/eng (accessed on 30 July 2025).
- European Union. EUR-Lex. 2019. Available online: https://eur-lex.europa.eu/eli/reg/2019/881/oj/eng (accessed on 30 July 2025).
- European Union. Energy. 2024. Available online: https://energy.ec.europa.eu/news/new-network-code-cybersecurity-eu-electricity-sector-2024-03-11_en (accessed on 30 July 2025).
- ENTSO-E. ENCS. 2022. Available online: https://encs.eu/news/entso-e-and-eu-dso-entity-submit-network-code-on-cybersecurity-to-acer/ (accessed on 30 July 2025).
- Cryar, R.; Saleem, D.; Peterson, J.; Hupp, W. Gap Analysis of Supply Chain. February 2023. Available online: https://docs.nrel.gov/docs/fy23osti/84752.pdf (accessed on 30 July 2025).
- Mcfarlane, S. Rogue Communication Devices Found in Chinese Solar Power Inverters. Reuters, 15 May 2025. Available online: https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/ (accessed on 30 July 2025).
- Wehrmann, B. Solar PV Hardware Opens Door to Chinese Interference in German Power Supply Security—Agency. Clean Energy Wire, 20 January 2025. Available online: https://www.cleanenergywire.org/news/solar-pv-hardware-opens-door-chinese-interference-german-power-supply-security-agency (accessed on 30 July 2025).
- Kuruvila, A.P.; Zografopoulos, I.; Basu, K.; Konstantinou, C. Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids. Int. J. Electr. Power Energy Syst. 2021, 132, 107150. [Google Scholar] [CrossRef]
- Yang, F.; Dan, Z.; Pan, K..; Yan, C.; Ji, X.; Xu, W. ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters. In Proceedings of the Network and Distributed System Security (NDSS) Symposium 2025, San Diego, CA, USA, 24–28 September 2024. [Google Scholar] [CrossRef]
- Bragatto, T.; Bucarelli, M.A.; Bucarelli, M.S.; Carere, F.; Geri, A.; Maccioni, M. False Data Injection Impact on High RES Power Systems with Centralized Voltage Regulation Architecture. Sensors 2023, 23, 2557. [Google Scholar] [CrossRef] [PubMed]
- Awad, H.; Bayoumi, E.H.E. Next-Generation Smart Inverters: Bridging AI, Cybersecurity, and Policy Gaps for Sustainable Energy Transition. Technologies 2025, 13, 136. [Google Scholar] [CrossRef]
- Hui, X.; Karumba, S.; Chau, S.C.-K.; Ahmed, M. Destabilizing Power Grid and Energy Market by Cyberattacks on Smart Inverters. In Proceedings of the 16th ACM International Conference on Future and Sustainable Energy Systems, Rotterdam, The Netherlands, 17–20 June 2025. [Google Scholar]
- Topallaj, K.; McKerrell, C.; Ramanathan, S.; Zografopoulos, I. Impact Assessment of Cyberattacks in Inverter-Based Microgrids. arXiv 2025. [Google Scholar] [CrossRef]
- Harrou, F.; Taghezouit, B.; Bouyeddou, B.; Sun, Y. Cybersecurity of photovoltaic systems: Challenges, threats, and mitigation strategies: A short survey. Front. Energy Res. 2023, 11, 1274451. [Google Scholar] [CrossRef]
- Achaal, B.; Adda, M.; Berger, M.; Ibrahim, H.; Awde, A. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. Cybersecurity 2024, 7, 10. [Google Scholar] [CrossRef]
- Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
- Comșiț, A.-M.; Cotfas, D.T.; Cotfas, A.P.A. A Review of Smart Photovoltaic Systems Which Are Using Remote-Control, AI, and Cybersecurity Approaches. Appl. Sci. 2024, 14, 7838. [Google Scholar] [CrossRef]
- Chu, Z.; Lakshminarayana, S.; Chaudhuri, B.; Teng, F. Mitigating Load-Altering Attacks Against Power Grids Using Cyber-Resilient Economic Dispatch. IEEE Trans. Smart Grid 2022, 14, 3164–3175. [Google Scholar] [CrossRef]
- Junjian, Q.; Adam, H.; Xiaonan, L.; Jiabhui, W.; Liu, C.-C. Cybersecurity for distributed energy resources and smart inverters. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 28–39. [Google Scholar] [CrossRef]
- Syrmakesis, A.D.; Hatziargyriou, N.D. Cyber resilience methods for smart grids against false data injection attacks: Categorization, review and future directions. Front. Smart Grids 2024, 3, 1397380. [Google Scholar] [CrossRef]
- Asad, A.K.; Omar, A.B.; Ahmed, S. Intelligent Anomaly Mitigation in Cyber-Physical Inverter-based Systems. In Proceedings of the 2021 IEEE Energy Conversion Congress and Exposition (ECCE), Vancouver, BC, Canada, 10–14 October 2021. [Google Scholar] [CrossRef]
- Simona, R.; Nicolae-Daniel, F.; Dragoș, P.; Răzvan, R. Securing Photovoltaic Systems as Critical Infrastructure: A Multi-Layered Assessment of Risk, Safety, and Cybersecurity. Sustainability 2025, 17, 4397. [Google Scholar] [CrossRef]
- McCarthy, J.; Marron, J.; Faatz, D.; Rebori-Carretero, D.; Wiltberger, J.; Urlaub, N. Cybersecurity for Smart Inverters: Guidelines for Residential and Light Commercial Solar Energy Systems; NIST Interagency/Internal Report (NISTIR): Gaithersburg, MD, USA, 2024. [CrossRef]
- Sumukh, S.; Srinivasan, M.K.; Williamson, S. Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System: State of the Art Review. Appl. Sci. 2021, 11, 780. [Google Scholar] [CrossRef]
- Sakshi, M.; Anderson, K.; Miller, B.; Boyer, K.; Warren, A. Microgrid resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies. Appl. Energy 2020, 264, 114726. [Google Scholar] [CrossRef]
- Ahmad, M.S.; Amr, Y.; Davor, S.; Hatem, Z.; Ehab, E.-S. Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters. In Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society (IES), Singapore, 16–19 October 2023. [Google Scholar] [CrossRef]
- Ahmad, N.A.; Saif, A.-K.; Marwa, Q. Anomaly Detection in Smart Grids: A Survey From Cybersecurity Perspective. In Proceedings of the 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), Doha, Qatar, 20–22 March 2022. [Google Scholar] [CrossRef]
- Preetha, T.; Michael, H.; Preston, M.; Ashley, E.; Jared, J. Anomaly Detection in a Smart Microgrid System Using Cyber-Analytics: A Case Study. Energies 2023, 16, 7151. [Google Scholar] [CrossRef]
- Samuel, K.; Chau, C.-K.; Hammond, P.; Mohi, A.; Helge, J. Systematic Study of Cybersecurity Threats for Smart Inverters. In Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, Singapore, 4–7 June 2024. [Google Scholar] [CrossRef]
- BoHyun, A.; Taesic, K.; Seerin, A.; Sudip, K.M.; Jay, J.; Alan, M.H.; Chris, F. An Overview of Cyber-Resilient Smart Inverters based on Practical Attack Models. In Proceedings of the 10th International Conference on Modern Power Systems (MPS), Cluj-Napoca, Romania, 21–23 June 2023. [Google Scholar] [CrossRef]
- Roberts, C.; Ngo, S.-T.; Milesi, A.; Peisert, S.; Arnold, D.; Saha, S.; Scaglione, A.; Johnson, N.; Kocheturov, A.; Fradkin, D. Deep Reinforcement Learning for DER Cyber-Attack Mitigation. In Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 11–13 November 2020. [Google Scholar] [CrossRef]
- Christophem, L. Solar Power Europe. Available online: https://www.solarpowereurope.org/insights/interactive-data/total-eu-27-solar-pv-capacity-a-growth-story (accessed on 1 August 2025).
- European Union. Energy. Available online: https://energy.ec.europa.eu/topics/renewable-energy/renewable-energy-directive-targets-and-rules/renewable-energy-directive_en (accessed on 1 August 2025).
- Vairavasundaram, I.; Varadarajan, V.; Pavankumar, P.J.; Kanagavel, R.K.; Ravi, L.; Vairavasundaram, S. A Review on Small Power Rating PV Inverter Topologies and Smart PV Inverters. Electronics 2021, 10, 1296. [Google Scholar] [CrossRef]
- Sampaio, M.F.; Oliveira, C.G.R.; London, J.B.A., Jr. Modeling of smart inverter functions executed by photovoltaic systems for power flow analysis. Electr. Power Syst. Res. 2025, 248, 111873. [Google Scholar] [CrossRef]
- Xin, Z.; Liuchen, C.; Riming, S.; Katelin, S. Power system support functions provided by smart inverters—A review. CPSS Trans. Power Electron. Appl. 2018, 3, 25–35. [Google Scholar] [CrossRef]
- Rondón-Cordero, V.H.; Montuori, L.; Alcázar-Ortega, M.; Siano, P. Advancements in hybrid and ensemble ML models for energy consumption forecasting: Results and challenges of their applications. Renew. Sustain. Energy Rev. 2025, 224, 116095. [Google Scholar] [CrossRef]
- Kim, Z. Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. 2016. Available online: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/ (accessed on 2 November 2025).
- Pagliery, J. Scary questions in December 23rd Ukraine energy grid hack. 2016. [Google Scholar]
- Jakobson, G. Mission cyber security situation assessment using impact dependency graphs. In Proceedings of the 14th International Conference on Information Fusion, Chicago, IL, USA, 5–8 July 2011. [Google Scholar]
- Ye, J.; Giani, A.; Elasser, A.; Mazumder, S.K.; Farnel, C.L.; Mantooth, H.A.; Kim, T.; Liu, J.; Chen, B.; Seo, G.-S.; et al. A Review of Cyber–Physical Security for Photovoltaic Systems. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 4879–4901. [Google Scholar] [CrossRef]
- Teymouri, A.; Mehrizi-Sani, A.; Liu, C.-C. Cyber Security Risk Assessment of Solar PV Units with Reactive Power Capability. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society, Washington, DC, USA, 21–23 October 2018. [Google Scholar]
- Liu, X.; Shahidehpour, M.; Cao, Y.; Wu, L.; Wei, W.; Liu, X. Microgrid Risk Analysis Considering the Impact of Cyber Attacks on Solar PV and ESS Control Systems. IEEE Trans. Smart Grid 2017, 8, 1330–1339. [Google Scholar] [CrossRef]
- Baines, J. Actively Exploited Industrial Control Systems Hardware—SolarView Series—Blog—VulnCheck. 2023. Available online: https://www.vulncheck.com/blog/solarview-exploitation (accessed on 2 November 2025).
- Brumfield, C. Hijack of Monitoring Devices Highlights Cyber Threat to Solar Power Infrastructure. 2024. Available online: https://www.csoonline.com/article/2119281/hijack-of-monitoring-devices-highlights-cyber-threat-to-solar-power-infrastructure.html (accessed on 2 November 2025).
- Nicut, M. Prosumatorii Au Deja Capacități Instalate De 900 MW. Primesc Cu Mare Întârziere Banii Pe Energia Livrată, Stocarea Jest O Necesitate, Problemy Z Tensiunea În Rețele. 2023. Available online: https://www.economica.net/capacitate-prosumatori-baterii_678486.html (accessed on 2 November 2025).
- Dudău, R. Prosumatorii și Limitele Actuale ale Sistemelor de Distribuție. EPG—Think Tank. 2023. Available online: https://www.enpg.ro/prosumatorii-si-limitele-actuale-ale-sistemelor-de-distributie/ (accessed on 4 November 2025).
- Sowiński, R.; Komorowska, A. Forecasting electricity prices in the Polish Day-Ahead. Polityka Energetyczna Energy Policy J. 2025, 28, 211–230. [Google Scholar] [CrossRef]
- PSE Summary of Quantitative Data on the Functioning of the National Power System in 2023. 2024.
- PSE KSE Energy Power Demand. Available online: https://www.pse.pl/dane-systemowe/funkcjonowanie-kse/raporty-dobowe-z-pracy-kse/zapotrzebowanie-mocy-kse (accessed on 25 October 2025).
- Elektroenergetyczne, P.S. PPS operation—power generation of generating units. 2025. [Google Scholar]
- Institute for Renewable Energy (IEO). Photovoltaic Market in Poland 2024; Institute for Renewable Energy: Warsaw, Poland, 2024; Available online: https://ieo.pl/raport-rynek-fotowoltaiki-w-polsce-2024 (accessed on 25 October 2025).
- PTPiREE. Mikroinstalacje W Polsce. Stan NA 30 Czerwca; PTPiREE: Poznań, Poland, 2025. (In Polish) [Google Scholar]
- PTPiREE. Micro-Installations in Poland; PTPiREE: Poznań, Poland, 2025. [Google Scholar]
- Paulina, S.; Katarzyna, B.; Postawy, K.E. Opinie i oczekiwania Polek i Polaków. 2023. [Google Scholar]
- Michał, F.; Beata, R. Opinia Publiczna o Polityce Energetycznej. Available online: https://www.cbos.pl/SPISKOM.POL/2024/K_056_24.PDF (accessed on 25 October 2025).
- Wittels, M.; Traczyk, A. Polityka Klimatyczna z Ludzką Twarzą. Oczekiwania Polek i Polaków Wobec Zielonej Transformacji. 2024. Available online: https://www.moreincommon.pl/nasze-projekty/polityka-klimatyczna-z-ludzka-twarza (accessed on 25 October 2025).
- Zhong, Q.; Zhao, B.; Ji, Y.; Li, Q.; Yang, X.; Chu, M.; Hu, Y.; Li, L.; Li, S.; Xu, H.; et al. Solvent-Engineering-Assisted Ligand Exchange Strategy for High-Efficiency AgBiS2 Quantum Dot Solar Cells. Angew. Chem. Int. Ed. 2024, 63, e202412590. [Google Scholar] [CrossRef]
- Ji, Y.; Zhong, Q.; Zhao, B.; Li, Q.; Yang, X.; Chu, M.; Hu, Y.; Li, L.; Li, S.; Xu, H.; et al. Surface Engineering Enables Efficient AgBiS2 Quantum Dot Solar Cells. Nano Lett. 2024, 24, 10418–10425. [Google Scholar] [CrossRef]
- Su, L. Room Temperature Growth of CsPbBr3 Single Crystal for Asymmetric MSM Structure Photodetector. J. Mater. Sci. Technol. 2024, 187, 113–122. [Google Scholar] [CrossRef]
- Kwon, H.; Lim, J.W.; Kim, D.H. Plasmonic Perovskite Photodetector with High Photocurrent and Low Dark Current Mediated by Au NR/PEIE Hybrid Layer. J. Mater. Sci. Technol. 2025, 218, 45–53. [Google Scholar] [CrossRef]
- PSE. Dane Systemowe. 2024. Available online: https://www.pse.pl/dane-systemowe (accessed on 25 October 2025).
- Goiana-da-Silva, F.; Madureira-Fonseca, D.; Tude Graça, D.; Moitinho De Almeida, M.; Cabral Pinho, M.; Sá, J.; Moreira, R.; Cabral, L.; Pereira, N.; Nunes, A.M. When the lights went out: Impacts of the April 2025 Iberian blackout on the Portuguese National Health Service sovereignty—A reflection on national defence, health sovereignty, risk, and infrastructural dependency. Front. Public Health 2025, 13, 1630933. [Google Scholar] [CrossRef] [PubMed]
- PISM. Consequences of the Iberian Blackout Stretch Across Europe. Available online: https://pism.pl/publications/consequences-of-the-iberian-blackout-stretch-across-europe (accessed on 25 October 2025).
- Zhang, R.; Dehghanian, P.; Li, Y. AI-in-the-Loop Resilience Enhancement of Cyber–Physical Electric Power Systems Against Electromagnetic Pulse Attacks. IEEE Trans. Reliab. 2025, 1–15. [Google Scholar] [CrossRef]













| Threat | Impact of Vulnerability | Mitigation Strategy | Ref. |
|---|---|---|---|
| Firmware tampering, remote control takeover | Undetected firmware compromise leading to remote shutdowns or grid destabilization | Hardware performance counters (HPCs), ML classifiers for firmware integrity | [26] |
| Malicious setpoint injection | Voltage oscillations, loss of grid stability, and equipment stress | MLP-based detection of malicious control parameters before application | [44] |
| False data/integrity attacks | Corrupted monitoring/control data, delayed responses, and stealth attacks | Data-driven detection: low-rank methods, autoencoders, IDS | [45] |
| General anomaly detection in microgrids | Delayed detection of unusual events, poor situational awareness | Cyber-analytics on local device behavior without SCADA dependency | [46] |
| Self-healing/self-adaptive inverter vulnerabilities | Inverter commits malicious actions based on tampered commands, even if isolated | Self-adaptation and verification frameworks in control design | [47] |
| Holistic defense combining multiple methods | Piecemeal mitigation leaves gaps, a full framework improves layered defenses | Signature, model-based AI, watermarks, resilience-by-design framework | [48] |
| Active attacker impact during attacks | Persistent attack effects, lack of adaptive response causes prolonged degradation | Deep RL to reconfigure clean DER units and mitigate effects | [49] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Toś, B.; Montuori, L.; Oná Ayécaba, A.O.; Olczak, P. Cyberthreats to Smart Inverters in Household Photovoltaic Systems. Sustainability 2025, 17, 10000. https://doi.org/10.3390/su172210000
Toś B, Montuori L, Oná Ayécaba AO, Olczak P. Cyberthreats to Smart Inverters in Household Photovoltaic Systems. Sustainability. 2025; 17(22):10000. https://doi.org/10.3390/su172210000
Chicago/Turabian StyleToś, Bartosz, Lina Montuori, Andrés Ondó Oná Ayécaba, and Piotr Olczak. 2025. "Cyberthreats to Smart Inverters in Household Photovoltaic Systems" Sustainability 17, no. 22: 10000. https://doi.org/10.3390/su172210000
APA StyleToś, B., Montuori, L., Oná Ayécaba, A. O., & Olczak, P. (2025). Cyberthreats to Smart Inverters in Household Photovoltaic Systems. Sustainability, 17(22), 10000. https://doi.org/10.3390/su172210000

