Microgrid resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies

Sakshi Mishra, Katherine Anderson, Brian Miller, Adam Warren, Kyle Boyer

Research output: Contribution to journalArticlepeer-review

118 Scopus Citations

Abstract

Microgrids are being increasing deployed to improve the operational flexibility, resilience, coordinated-energy management capabilities, self-adequacy, and increased reliability of power systems. This strong market growth is also driven by advances in power electronics, improved control systems, and the rapidly falling price and increased adoption of distributed energy generation technologies, like solar photovoltaics and storage. In the event of grid outages, microgrids can provide a backup source of power; providing resilience to the critical loads; however, this requires that the microgrid itself is resilient to physical and cyber threats. Building highly resilient microgrids requires a methodological assessment of potential threats, identification of vulnerabilities, and design of mitigation strategies. This paper provides a comprehensive review of threats, vulnerabilities, and mitigation strategies and develops a definition for microgrid resilience. The paper also develops a methodology for designing resilient microgrids by considering how microgrid designers and site owners evaluate threats, vulnerabilities, and consequences and choose the microgrid features required to address these threats under different situations.

Original languageAmerican English
Article number114726
Number of pages17
JournalApplied Energy
Volume264
DOIs
StatePublished - 2020

Bibliographical note

Publisher Copyright:
© 2020 Elsevier Ltd

NREL Publication Number

  • NREL/JA-7A40-74636

Keywords

  • Cyber-physical microgrid
  • DERs
  • Microgrid
  • Reliability
  • Resilience
  • Resilience metric
  • Risk assessment

Fingerprint

Dive into the research topics of 'Microgrid resilience: A holistic approach for assessing threats, identifying vulnerabilities, and designing corresponding mitigation strategies'. Together they form a unique fingerprint.

Cite this