In the context of decarbonizing the energy system, the European Union has promoted a package of eight different directives known as the Clean Energy Package. Among them, Directive 2018/2001/EU, also known as RED II, has proposed a new legal framework for the development of renewable energy sources (RES) and, more importantly, for increasing citizen participation in the energy transition through two new tools: collective self-consumption systems (CSC) and renewable energy communities (REC). The realization, management, and optimization of these new realities of widespread energy production and consumption require the use of ICT technologies, without which the integrated production, distribution, and efficient use of renewable energy would not be possible. However, the massive use of ICT technologies essential for the operation of such systems brings with it the risk of threats from malicious actors, whose objectives may include undermining the stability, operation, and reliability of the community itself. This paper aims, in the first chapter, to explain the concept of REC and, in the second chapter, to outline the cybersecurity aspects of REC. The third chapter outlines the legal frameworks and privacy issues connected to the community itself. At the end, it will provide an overview of the existing attack surfaces in the energy community and possible mitigations through prevention and defence strategies.

Emerging security and legal challenges within renewable energy communities: key prevention and defence strategies

Silvia Ricciuti;Salvatore Manfredi
2024-01-01

Abstract

In the context of decarbonizing the energy system, the European Union has promoted a package of eight different directives known as the Clean Energy Package. Among them, Directive 2018/2001/EU, also known as RED II, has proposed a new legal framework for the development of renewable energy sources (RES) and, more importantly, for increasing citizen participation in the energy transition through two new tools: collective self-consumption systems (CSC) and renewable energy communities (REC). The realization, management, and optimization of these new realities of widespread energy production and consumption require the use of ICT technologies, without which the integrated production, distribution, and efficient use of renewable energy would not be possible. However, the massive use of ICT technologies essential for the operation of such systems brings with it the risk of threats from malicious actors, whose objectives may include undermining the stability, operation, and reliability of the community itself. This paper aims, in the first chapter, to explain the concept of REC and, in the second chapter, to outline the cybersecurity aspects of REC. The third chapter outlines the legal frameworks and privacy issues connected to the community itself. At the end, it will provide an overview of the existing attack surfaces in the energy community and possible mitigations through prevention and defence strategies.
File in questo prodotto:
File Dimensione Formato  
2024219100.pdf

solo utenti autorizzati

Descrizione: PDF
Tipologia: Documento in Post-print
Licenza: NON PUBBLICO - Accesso privato/ristretto
Dimensione 354.09 kB
Formato Adobe PDF
354.09 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11582/352567
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
social impact