UCI Researchers Exploit Solar Inverter Vulnerability

Cyber-physical systems security researchers at the University of California Irvine have disrupted the functioning of a power grid using about $50 worth of equipment tucked inside a disposable coffee cup.

In a presentation delivered at the recent Usenix Security 2020 conference, Mohammad Al Faruque, UCI associate professor of electrical engineering computer science, and his team revealed that the spoofing mechanism can generate a 32% change in output voltage, a 200% increase in low-frequency harmonics power and a 250% boost in real power from a solar inverter.

Al Faruque’s group in UCI’s Henry Samueli School of Engineering has made a habit in recent years of finding exploitable loopholes in systems that combine computer hardware and software with machines and other infrastructure. In addition to heightening awareness about these vulnerabilities, they invent new technologies that are better shielded against attacks.

For this project, Al Faruque and his team used a remote spoofing device to target electromagnetic components found in many grid-tied solar inverters.

“Without touching the solar inverter, without even getting close to it, I can just place a coffee cup nearby and then leave and go anywhere in the world, from which I can destabilize the grid,” Al Faruque said. 

“In an extreme case, I can even create a blackout,” he adds.

Solar inverters convert power collected by rooftop panels from direct to alternating current for use in homes and businesses. Often, the sustainably generated electricity will go into microgrids and main power networks. Many inverters rely on Hall sensors, devices that measure the strength of a magnetic field and are based on a technology that originated in 1879. Hall sensors can be found in cars, freight and passenger trains, and medical devices, among other applications.

The spoofing apparatus assembled by Al Faruque’s team consists of an electromagnet, an Arduino Uno microprocessor and an ultrasonic sensor to measure the distance between the unit and the solar inverter. A Zigbee network appliance is used to control the mechanism within a range of about 100 meters, but that can be replaced by a Wi-Fi router that would enable remote operation from anywhere on the planet.

For Al Faruque, this endeavor – supported by a smart grid security program under the University of California Office of the President – points out gaps in older technologies that even seasoned experts may have overlooked. His group recently received funding from the National Science Foundation to start a project in September centered on building new, more secure Hall sensors that can’t be foiled by a cleverly placed coffee cup.

Photo: A UCI grad student and associate professor performing research in the solar industry

The post UCI Researchers Exploit Solar Inverter Vulnerability appeared first on Solar Industry.

Share this post

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

Appointment Form