{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:34:16Z","timestamp":1774578856038,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003945","name":"Link\u00f6ping University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003945","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Energy Inform"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Battery energy storage systems are an important part of modern power systems as a solution to maintain grid balance. However, such systems are often remotely managed using cloud-based control systems. This exposes them to cyberattacks that could result in catastrophic consequences for the electrical grid and the connected infrastructure. This paper takes a step towards advancing understanding of these systems and investigates the effects of cyberattacks targeting them. We propose a reference model for an electrical grid cloud-controlled load-balancing system connected to remote battery energy storage systems. The reference model is evaluated from a cybersecurity perspective by implementing and simulating various cyberattacks. The results reveal the system\u2019s attack surface and demonstrate the impact of cyberattacks that can critically threaten the security and stability of the electrical grid.<\/jats:p>","DOI":"10.1186\/s42162-025-00499-4","type":"journal-article","created":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T17:37:02Z","timestamp":1742492222000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["From balance to breach: cyber threats to battery energy storage systems"],"prefix":"10.1186","volume":"8","author":[{"given":"Frans","family":"\u00d6hrstr\u00f6m","sequence":"first","affiliation":[]},{"given":"Joakim","family":"Oscarsson","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9886-6651","authenticated-orcid":false,"given":"Zeeshan","family":"Afzal","sequence":"additional","affiliation":[]},{"given":"J\u00e1nos","family":"Dani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1916-3398","authenticated-orcid":false,"given":"Mikael","family":"Asplund","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,20]]},"reference":[{"key":"499_CR1","doi-asserted-by":"publisher","unstructured":"Rinaldi G, Cucuzzella M, Menon PP, Ferrara A, Edwards C (2022) Load altering attacks detection, reconstruction and mitigation for cyber-security in smart grids with battery energy storage systems. In: 2022 European Control Conference (ECC), pp. 1541\u20131547. https:\/\/doi.org\/10.23919\/ECC55457.2022.9838515","DOI":"10.23919\/ECC55457.2022.9838515"},{"issue":"6","key":"499_CR2","doi-asserted-by":"publisher","first-page":"4781","DOI":"10.1109\/TPWRS.2020.2997950","volume":"35","author":"A Oshnoei","year":"2020","unstructured":"Oshnoei A, Kheradmandi M, Muyeen SM (2020) Robust control scheme for distributed battery energy storage systems in load frequency control. IEEE Transactions on Power Systems 35(6):4781\u20134791. https:\/\/doi.org\/10.1109\/TPWRS.2020.2997950","journal-title":"IEEE Transactions on Power Systems"},{"key":"499_CR3","doi-asserted-by":"publisher","unstructured":"Saini VK, Yelisetti S, Kumar R, Al-Sumaiti AS (2023) Cloud energy storage management including smart home physical parameters. In: 2023 IEEE IAS Global Conference on Emerging Technologies (GlobConET), pp. 1\u20136. https:\/\/doi.org\/10.1109\/GlobConET56651.2023.10150077","DOI":"10.1109\/GlobConET56651.2023.10150077"},{"key":"499_CR4","doi-asserted-by":"publisher","unstructured":"Trevizan RD, Obert J, De\u00a0Angelis V, Nguyen TA, Rao VS, Chalamala BR (2022) Cyberphysical security of grid battery energy storage systems. IEEE Access 10, 59675\u201359722. https:\/\/doi.org\/10.1109\/ACCESS.2022.3178987","DOI":"10.1109\/ACCESS.2022.3178987"},{"issue":"15","key":"499_CR5","doi-asserted-by":"publisher","first-page":"3860","DOI":"10.3390\/en13153860","volume":"13","author":"AM Mohan","year":"2020","unstructured":"Mohan AM, Meskin N, Mehrjerdi H (2020) A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems. Energies 13(15):3860. https:\/\/doi.org\/10.3390\/en13153860","journal-title":"Energies"},{"key":"499_CR6","doi-asserted-by":"publisher","unstructured":"Ibraheem MI, Edrisi M, Alhelou HH, Gholipour M, Al-Hinai A (2023) A sophisticated slide mode controller of microgrid system load frequency control under false data injection attack and actuator time delay. IEEE Transactions on Industry Applications, 1\u201310. https:\/\/doi.org\/10.1109\/TIA.2023.3316190","DOI":"10.1109\/TIA.2023.3316190"},{"key":"499_CR7","unstructured":"Darup MS, Alexandru AB, Quevedo DE, Pappas GJ (2020) Encrypted control for networked systems - an illustrative introduction and current challenges. arXiv:2010.00268"},{"key":"499_CR8","doi-asserted-by":"publisher","unstructured":"Xu Z, Zhu Q (2015) Secure and resilient control design for cloud enabled networked control systems. In: Ray, I., Thomas, R.K., C\u00e1rdenas, A.A. (eds.) Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security And\/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015, pp. 31\u201342. ACM,???. https:\/\/doi.org\/10.1145\/2808705.2808708","DOI":"10.1145\/2808705.2808708"},{"key":"499_CR9","doi-asserted-by":"publisher","unstructured":"Nguyen T, Wang S, Alhazmi M, Nazemi M, Estebsari A, Dehghanian P (2020) Electric power grid resilience to cyber adversaries: State of the art. IEEE Access 8, 87592\u201387608. https:\/\/doi.org\/10.1109\/ACCESS.2020.2993233","DOI":"10.1109\/ACCESS.2020.2993233"},{"key":"499_CR10","unstructured":"Oscarsson J, \u00d6hrstr\u00f6m F (2024) Cyberattack evaluation of cloud-controlled energy storage. Master\u2019s thesis. https:\/\/urn.kb.se\/resolve?urn=urn:nbn:se:liu:diva-205693"},{"key":"499_CR11","doi-asserted-by":"publisher","unstructured":"Baumgart I, Borsig M, Goerke N, Hackenjos T, Rill J, Wehmer M (2019) Who controls your energy? on the (in)security of residential battery energy storage systems. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1\u20136. https:\/\/doi.org\/10.1109\/SmartGridComm.2019.8909749","DOI":"10.1109\/SmartGridComm.2019.8909749"},{"key":"499_CR12","doi-asserted-by":"publisher","DOI":"10.3390\/batteries9070382","author":"F Naseri","year":"2023","unstructured":"Naseri F, Kazemi Z, Larsen PG, Arefi MM, Schaltz E (2023) Cyber-physical cloud battery management systems: Review of security aspects. Batteries. https:\/\/doi.org\/10.3390\/batteries9070382","journal-title":"Batteries"},{"key":"499_CR13","doi-asserted-by":"publisher","unstructured":"Kharlamova N, Hashemi S, Tr\u00e6holt C (2020) The cyber security of battery energy storage systems and adoption of data-driven methods. In: 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), pp. 188\u2013192. https:\/\/doi.org\/10.1109\/AIKE48582.2020.00037","DOI":"10.1109\/AIKE48582.2020.00037"},{"key":"499_CR14","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/j.arcontrol.2019.08.002","volume":"48","author":"HS S\u00e1nchez","year":"2019","unstructured":"S\u00e1nchez HS, Rotondo D, Escobet T, Puig V, Quevedo J (2019) Bibliographical review on cyber attacks from a control oriented perspective. Annual Reviews in Control 48:103\u2013128. https:\/\/doi.org\/10.1016\/j.arcontrol.2019.08.002","journal-title":"Annual Reviews in Control"},{"key":"499_CR15","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/OAJPE.2024.3439856","volume":"11","author":"G Battista Gaggero","year":"2024","unstructured":"Battista Gaggero G, Armellin A, Ferro G, Robba M, Girdinio P, Marchese M (2024) Bess-set: A dataset for cybersecurity monitoring in a battery energy storage system. IEEE Open Access Journal of Power and Energy 11:362\u2013372. https:\/\/doi.org\/10.1109\/OAJPE.2024.3439856","journal-title":"IEEE Open Access Journal of Power and Energy"},{"key":"499_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975","volume":"215","author":"M Ghiasi","year":"2023","unstructured":"Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N (2023) A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research 215:108975. https:\/\/doi.org\/10.1016\/j.epsr.2022.108975","journal-title":"Electric Power Systems Research"},{"key":"499_CR17","volume":"163","author":"HT Reda","year":"2022","unstructured":"Reda HT, Anwar A, Mahmood A (2022) Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts. Renewable and Sustainable Energy Reviews 163:112423","journal-title":"Renewable and Sustainable Energy Reviews"},{"key":"499_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.neucom.2019.01.099","volume":"338","author":"MS Mahmoud","year":"2019","unstructured":"Mahmoud MS, Hamdan MM, Baroudi UA (2019) Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges. Neurocomputing 338:101\u2013115. https:\/\/doi.org\/10.1016\/j.neucom.2019.01.099","journal-title":"Neurocomputing"},{"key":"499_CR19","doi-asserted-by":"publisher","unstructured":"Wu Y, Weng J, Qiu B, Wei Z, Qian F, Deng RH (2019) Random delay attack and its applications on load frequency control of power systems. In: 2019 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138. https:\/\/doi.org\/10.1109\/DSC47296.2019.8937611","DOI":"10.1109\/DSC47296.2019.8937611"},{"issue":"3","key":"499_CR20","doi-asserted-by":"publisher","first-page":"422","DOI":"10.3390\/network3030018","volume":"3","author":"M Chauhan","year":"2023","unstructured":"Chauhan M, Shiaeles S (2023) An analysis of cloud security frameworks, problems and proposed solutions. Network 3(3):422\u2013450. https:\/\/doi.org\/10.3390\/network3030018","journal-title":"Network"},{"key":"499_CR21","doi-asserted-by":"publisher","unstructured":"Akbarian F, T\u00e4rneberg W, Fitzgerald E, Kihl M (2023) Detecting and mitigating actuator attacks on cloud control systems through digital twins. In: 2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 1\u20136. https:\/\/doi.org\/10.23919\/SoftCOM58365.2023.10271648","DOI":"10.23919\/SoftCOM58365.2023.10271648"},{"key":"499_CR22","doi-asserted-by":"publisher","unstructured":"Ghiasi M, Dehghani M, Niknam T, Kavousi-Fard A, Siano P, Alhelou HH (2021) Cyber-attack detection and cyber-security enhancement in smart dc-microgrid based on blockchain technology and hilbert huang transform. IEEE Access 9, 29429\u201329440. https:\/\/doi.org\/10.1109\/ACCESS.2021.3059042","DOI":"10.1109\/ACCESS.2021.3059042"},{"key":"499_CR23","doi-asserted-by":"publisher","unstructured":"Gumrukcu E, Arsalan A, Muriithi G, Joglekar C, Aboulebdeh A, Alparslan\u00a0Zehir M, Papari B, Monti A (2022) Impact of cyber-attacks on ev charging coordination: The case of single point of failure. In: 2022 4th Global Power, Energy and Communication Conference (GPECOM), pp. 506\u2013511. https:\/\/doi.org\/10.1109\/GPECOM55404.2022.9815727","DOI":"10.1109\/GPECOM55404.2022.9815727"},{"key":"499_CR24","doi-asserted-by":"publisher","unstructured":"Le TD, Anwar A, Loke SW, Beuran R, Tan Y (2020) Gridattacksim: A cyber attack simulation framework for smart grids. Electronics 9(8). https:\/\/doi.org\/10.3390\/electronics9081218","DOI":"10.3390\/electronics9081218"},{"issue":"1","key":"499_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3607120.3607123","volume":"3","author":"F Oest","year":"2023","unstructured":"Oest F, Frost E, Radtke M, Lehnhoff S (2023) Coupling omnet++ and mosaik for integrated co-simulation of ict-reliant smart grids. SIGENERGY Energy Inform. Rev. 3(1):14\u201325. https:\/\/doi.org\/10.1145\/3607120.3607123","journal-title":"SIGENERGY Energy Inform. Rev."},{"key":"499_CR26","unstructured":"Mosaik. Accessed: 2025-01-01. https:\/\/mosaik.offis.de\/"},{"key":"499_CR27","doi-asserted-by":"publisher","unstructured":"Kumar B, Bhongade S (2016) Load disturbance rejection based pid controller for frequency regulation of a microgrid. In: 2016 Biennial International Conference on Power and Energy Systems: Towards Sustainable Energy (PESTSE), pp. 1\u20136. https:\/\/doi.org\/10.1109\/PESTSE.2016.7516459","DOI":"10.1109\/PESTSE.2016.7516459"},{"key":"499_CR28","unstructured":"Cybersecurity for Resilient Energy Communities of the Future. Accessed: 2025-01-01. https:\/\/www.vinnova.se\/en\/p\/cybersecurity-for-resilient-energy-communities-of-the-future\/"},{"key":"499_CR29","doi-asserted-by":"publisher","unstructured":"Fette I, Melnikov A (2011) The websocket protocol. Technical report. https:\/\/doi.org\/10.17487\/RFC6455","DOI":"10.17487\/RFC6455"},{"key":"499_CR30","doi-asserted-by":"publisher","unstructured":"Behera BB, Mohanty RK, Pattanayak BK (2022) A deep fusion model for automated industrial iot cyber attack detection and mitigation. IJEER 10(3), 604\u2013613. https:\/\/doi.org\/10.37391\/IJEER.100332","DOI":"10.37391\/IJEER.100332"},{"key":"499_CR31","doi-asserted-by":"publisher","unstructured":"Ganesan R, Shah A, Jajodia S, Cam H (2017) A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center, pp. 177\u2013207. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-66505-4_8","DOI":"10.1007\/978-3-319-66505-4_8"},{"key":"499_CR32","doi-asserted-by":"publisher","unstructured":"de Souza E, Ardakanian O, Nikolaidis I (2020) A co-simulation platform for evaluating cyber security and control applications in the smart grid. In: ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp. 1\u20137. https:\/\/doi.org\/10.1109\/ICC40277.2020.9149212","DOI":"10.1109\/ICC40277.2020.9149212"},{"key":"499_CR33","doi-asserted-by":"publisher","unstructured":"Hardy TD, Palmintier B, Top PL, Krishnamurthy D, Fuller JC (2024) Helics: A co-simulation framework for scalable multi-domain modeling and analysis. IEEE Access 12, 24325\u201324347. https:\/\/doi.org\/10.1109\/ACCESS.2024.3363615","DOI":"10.1109\/ACCESS.2024.3363615"},{"key":"499_CR34","unstructured":"Oscarsson J, \u00d6hrstr\u00f6m F. The Simulator. https:\/\/gitlab.liu.se\/joaos226\/cyberattack-evaluation-of-cloud-controlled-energy-storage Accessed Accessed: 2024-10-10"},{"key":"499_CR35","unstructured":"Frekvensstabilitet - Svenska Kraftn\u00e4t. Accessed: 2025-01-01"},{"key":"499_CR36","unstructured":"Modig N, Eriksson R, Ruokolainen P, \u00d8deg\u00e5rd JN, Weizenegger S, Fechtenburg TD (2022) Overview of frequency control in the nordic power system. Nordic Analysis Group"},{"key":"499_CR37","unstructured":"Kontrollrummet - Svenska Kraftn\u00e4t. Accessed: 2025-01-01. https:\/\/www.svk.se\/om-kraftsystemet\/kontrollrummet\/"},{"key":"499_CR38","unstructured":"Normal Elf\u00f6rbrukning F\u00f6r Villa & L\u00e4genhet. Accessed: 2025-01-01. https:\/\/www.vattenfall.se\/fokus\/tips-rad\/vad-ar-normal-elforbrukning\/"},{"key":"499_CR39","unstructured":"Unik Kartl\u00e4ggning: Batteriparker \u00f6kar Enormt - Risk F\u00f6r \u00f6veretablering. Accessed: 2025-01-01. https:\/\/www.nyteknik.se\/energi\/unik-kartlaggning-batteriparker-okar-enormt-risk-for-overetablering\/4230110"},{"key":"499_CR40","unstructured":"Pixii Home. Accessed: 2025-01-01. https:\/\/www.pixii.com\/wp-content\/uploads\/2024\/05\/2024-05-26_Ver.2.3_Pixii_Home.pdf"},{"key":"499_CR41","unstructured":"Drifttillst\u00e5nden - Svenska Kraftn\u00e4t. Accessed: 2025-01-01. https:\/\/www.svk.se\/contentassets\/7dfa08444dab4d3aba1adbbc38456c2b\/systemdrifttillstanden.pdf"}],"container-title":["Energy Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00499-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42162-025-00499-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42162-025-00499-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T17:37:16Z","timestamp":1742492236000},"score":1,"resource":{"primary":{"URL":"https:\/\/energyinformatics.springeropen.com\/articles\/10.1186\/s42162-025-00499-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,20]]},"references-count":41,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["499"],"URL":"https:\/\/doi.org\/10.1186\/s42162-025-00499-4","relation":{},"ISSN":["2520-8942"],"issn-type":[{"value":"2520-8942","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,20]]},"assertion":[{"value":"9 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}],"article-number":"39"}}