Serious Cyber Vulnerabilities Found in Offshore Wind Farms

The global offshore wind industry faces emerging challenges threatening expansion and clean energy deployment. A new study reveals the overlooked threat of cyberattacks on offshore wind farms, as the industry expands rapidly. Researchers warn of vulnerabilities in the complex communication architecture of offshore wind farms, urging manufacturers, utilities, and regulators to address cybersecurity gaps.
Share it now

The global offshore wind industry is facing emerging challenges that threaten the expansion of wind farms and the deployment of clean energy. While governments have set ambitious targets for integrating offshore wind into the energy mix, a new study has revealed a key threat that has been overlooked: cyberattacks on offshore wind farms. The significance of cybersecurity for offshore wind has reached unprecedented levels due to grid modernization and digitalization, and the industry is particularly vulnerable to cyberattacks due to its complex communication architecture.

The expansion of the offshore wind industry has led to an increase in cyberattack threats, especially for wind farms that use voltage-source-converter high-voltage direct-current (VSC-HVDC) connections, which are becoming the most cost-effective solution for harvesting offshore wind energy. Offshore wind farms require more cyber infrastructure than onshore wind due to their remote operation and complex communication networks, making them highly susceptible to cyberattacks. The researchers from Concordia University and Hydro-Quebec emphasize the need for manufacturers, utilities, and regulators to address gaps in the security of operational technologies in order to protect offshore wind farms from cyber threats.

As the integration of renewable energies advances, it is crucial to recognize the unknown vulnerabilities and cyber threats in uncharted territory. Manufacturers, utilities, and regulators must work together to ensure that offshore wind farms are protected from cyberattacks and that their operational technologies are secure.

Source .

 

Share it now