Next Article in Journal
Future Smart Grids Control and Optimization: A Reinforcement Learning Tool for Optimal Operation Planning
Previous Article in Journal
The Role of Alternate Oxic–Anoxic Cycles in Full-Scale Sludge Stabilization for Energy Savings
Previous Article in Special Issue
Optimal Configuration of Mobile–Stationary Hybrid Energy Storage Considering Seismic Hazards
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges

School of Computer Science and Engineering, Soongsil University, Seoul 06978, Republic of Korea
*
Author to whom correspondence should be addressed.
Energies 2025, 18(10), 2515; https://doi.org/10.3390/en18102515
Submission received: 24 March 2025 / Revised: 8 May 2025 / Accepted: 8 May 2025 / Published: 13 May 2025
(This article belongs to the Special Issue Developments in IoT and Smart Power Grids)

Abstract

:
Ensuring the safe, reliable, and energy-efficient provision of electricity is a complex task for smart grid (SG) management applications. Internet of Things (IoT) and edge computing-based SG applications have been proposed for time-responsive monitoring and controlling tasks related to power systems. Recent studies have provided valuable insights into the potential of machine learning algorithms in SGs, covering areas such as generation, distribution, microgrids, consumer energy market, and cyber security. Integrated IoT devices directly exchange data with the SG cloud, which increases the vulnerability and security threats to the energy system. The review aims to provide a comprehensive analysis of privacy-preserving machine learning (PPML) applications in IoT-Integrated SGs, focusing on non-intrusive load monitoring, fault detection, demand forecasting, generation forecasting, energy-management systems, anomaly detection, and energy trading. The study also highlights the importance of data privacy and security when integrating these applications to enable intelligent decision-making in smart grid domains. Furthermore, the review addresses performance issues (e.g., accuracy, latency, and resource constraints) associated with PPML techniques, which may impact the security and overall performance of IoT-integrated SGs. The insights of this study will provide essential guidelines for in-depth research in the field of IoT-integrated smart grid privacy and security in the future.

1. Introduction

1.1. Background and Importance of Smart Grids (SGs)

Power systems have become essential components of daily life, supporting various activities across households and commercial and industrial sectors. As technology advances and industries transition to Industry 4.0, along with the development of digital twins, the need for a reliable and uninterrupted electricity supply has become paramount [1]. The integration of renewable energy sources, electric vehicles, and smart home systems into smart grids necessitates the installation of smart energy devices at various points in the network. Such integration aims to make the grid intelligent, resilient, scalable, secure, and robust. Additionally, information and communication technologies play a crucial role in monitoring and controlling the reliability, stability, security, and efficiency of the power grid to meet the varying demands of prosumers and distributed renewable energy generation [2].

1.2. Role of IoT in SGs: Opportunities and Challenges

Smart grids involve two-way communication to effectively balance the supply and demand for the reliable provision of power. The Internet of Things (IoT) consists of smart devices distributed across a wide area of the network, connected via the Internet. IoT devices play a crucial role in real-time data collection and facilitate communication between service providers and consumers to support various grid activities, such as monitoring energy consumption, providing tariff information, aiding in decision-making, managing grid operations, controlling power distribution, and localizing faults [3]. The digital transformation of the traditional power grid into a smart grid requires the utilization of IoT-based technologies to collect the node’s data and compute the ML algorithm for related grid tasks [4].

1.3. Need for Privacy-Preserving Machine Learning (PPML) in SGs

The integration of IoT into the power system enhances the intelligence with a risk of potential attacks that could disrupt grid operations, compromise energy trading, leak sensitive consumer information, inject false data into power consumption, and interrupt transactive energy processes [5,6]. Various studies have explored these vulnerabilities and suggested several solutions, including machine learning [7], artificial intelligence [8], blockchain technology [9], and robust authentication systems [10]. Tomin et al. [11] systematically demonstrated the applicability of machine learning techniques for power system security assessment, identifying vulnerabilities and improving decision-making processes within traditional grid infrastructures. IoT technologies have the potential to modernize traditional grids and address challenges associated with smart grids by utilizing machine learning algorithms. However, the widespread deployment of IoT devices throughout the intelligent power system exposes them to privacy and security risks. Monitoring all devices in real time presents a significant challenge and can be costly. Moreover, the big data business model enables the collection of data from edge devices at the physical layer, providing insights that facilitate monetization opportunities for utilities, third-party services, and consumers at the application and user inference layer [12].

1.4. Objectives and Contributions

Internet of Things provides innovative opportunities for power systems to sense, communicate, collect, instruct, operate, process, and make decisions based on an immense amount of data. However, privacy and security issues have become more concerning due to the large number of nodes spread across the smart grid network. Privacy-preserving machine learning (PPML) techniques have been employed in various smart systems, including smart health, smart industry, smart finance, smart cities, and smart grids. The primary aim of this comprehensive study is to explore these PPML solutions within the energy sector. This survey intends to support researchers, practitioners, energy experts and policymakers by providing valuable insights about challenges associated with integrating privacy-preserving intelligence and security within evolving smart grid ecosystems.
The existing literature includes a detailed survey on the structure, protocols, and vulnerabilities of IoT-integrated smart grids [3], while few studies primarily focused on individual PPML techniques addressing privacy concerns in specific applications [13]. Baksh, R. et al. [14] reviewed various attack types and discussed authentication and anonymization as potential mitigation approaches for smart meters, albeit with limited coverage of comprehensive PPML solutions. Cui, L. et al. [15] examined different types of false data-injection attacks that threaten data integrity, confidentiality, and authority across various data sources in power systems, emphasizing conventional machine learning and deep learning methods for anomaly detection. Mirzaee, P. H. [8] provided a broad survey on privacy and security challenges in smart grids, discussing countermeasures, including some PPML techniques analyzed in this work. Similarly, Triantafyllou, A. et al. [16] explored cryptographic and non-cryptographic techniques to safeguard consumer privacy, focusing on consumption data, billing, appliance usage, and user profiling. Existing surveys such as [3] provide a broad discussion of IoT integration in smart grids; they mainly focus on communication frameworks, general architectures, and security overviews. In contrast, this work offers a targeted review of PPML methods and their specific applications within IoT-enabled smart grids. The study systematically analyzes how emerging PPML techniques have being leveraged to safeguard user data across critical applications such as non-intrusive load monitoring, anomaly detection, and energy trading. Furthermore, the survey identifies technical challenges, provides insights into current frameworks and datasets, and highlights research gaps to guide future advancements.
The research survey provides a more holistic perspective by addressing both privacy and security threats in IoT-based smart grids. It presents a detailed review of both cryptographic and non-cryptographic PPML techniques applied across multiple smart grid domains. Furthermore, this work systematically examines technical parameters, relevant datasets, commonly used frameworks and libraries, as well as the opportunities and challenges associated with integrating PPML into IoT-driven smart grids. To ensure a comprehensive survey, the review conducted a structured literature search of the all the mentioned keywords of the study and their combinations across multiple reputable databases, including IEEE Xplore, ScienceDirect, SpringerLink, MDPI, and Wiley. It focuses on the titles and abstracts, followed by a full-text review of peer-reviewed journal articles, conference proceedings, and survey papers published between 2015 and 2025.

1.5. Paper Organization

The organization of the review paper is structured as follows: Section 2 provides an overview of the smart grid architecture and its key components, followed by a subsection on the role of IoT and data flows in IoT-based smart grids. Section 3 details the potential security and privacy threats associated with IoT-based smart grids. In contrast, Section 4 discusses privacy-preserving machine learning methods as mitigation tools for these threats. In Section 5 and Section 6, the study explores the application areas, opportunities, and challenges related to privacy-preserving machine learning in IoT-enabled smart grids. Section 7 addresses open challenges and future directions, concluding with the final section, Section 8.

2. Smart Grid Architecture

Traditional grids are limited to centralized network, one-way power flow, limited control, manual operations, and electromechanical technologies [17]. Information and communication technology (ICT) transforms it into digital technology, distributed networks, two-way communication, remote operations, pervasive control, and self-healing restoration properties.

2.1. Key Components of Smart Grids

The Internet of Things (IoT) plays a crucial role in enhancing smart grid operations, covering every aspect from electricity generation to end-user consumption and energy-storage systems. IoT technology is integral in various areas, including power generation, microgrids, transmission networks, distribution systems, energy storage, consumer interfaces, and smart meters.
  • Power Generation: In the realm of energy generation, IoT aids in analyzing energy production, monitoring distributed energy resources, assessing harmful gas emissions, understanding consumption patterns, predicting energy needs, managing power connections, and coordinating large-scale storage solutions.
  • Transmission and Distribution Systems: To ensure the smooth transmission of power from generators to consumers, IoT devices monitor power flow, detect faults, assess the condition of transmission towers, manage substations, and oversee equipment services. At the distribution end, IoT significantly contributes to distributed energy forecasting, load management, demand response, electric vehicle (EV) integration, and enhancing energy efficiency.
  • Prosumer End: Energy-storage systems help balance power supply and demand during periods of intermittent renewable energy generation. IoT facilitates user interaction in bidirectional grid operations, allowing smart meters to collect data, encourage demand-side participation, manage EV charging schedules, and integrate distributed energy resources (DERs) such as solar power and battery storage at the consumer level.

2.2. IoT Adaptation in Smart Grids

The adaptation of IoT technology has been widely considered at all levels of the electrical grid, including generation, distribution, and consumption. Common IoT devices include sensors, smart meters, Phasor Measurement Units (PMUs), and Advanced Metering Infrastructure (AMI), which facilitate real-time monitoring, control, and balancing of power supply and demand. These devices aid in power flow analysis, state estimation, energy pricing, energy efficiency, and anomaly detection. IoT is integral to data acquisition, processing, transmission, and storage. In smart home energy-management systems and energy markets, IoT devices communicate data to support price-based and incentive-based demand response programs.

2.3. Data Flow: From Edge to Cloud

The architecture of an IoT-based smart environment consists of four layers: physical, network, management, and application. The physical layer includes smart devices that collect data relevant to energy applications. The network layer comprises communication channels that transmit the collected data to the cloud services associated with the management layer. Finally, the cloud handles data analysis, control, and operation of energy networks, which interface with end-users in the application or service layer.

3. Types of Possible Threats in IoT-Based Smart Grids

Integrating IoT technology increases smart grid intelligence and efficiency; however, there are many security issues. The system is highly dynamic and complicated because of the interconnection of IoT devices, and even one weakness [18] might compromise the entire network. This section covers attacks on data, devices, and physical infrastructures and demonstrates how vulnerabilities in smart grids can lead to large-scale disruptions, such as power outages or grid instability, and exploitation of IoT applications.
Threats to smart grids can be classified into four groups: physical threats, network threats, environmental threats, and cyber threats. Physical threats to power systems include unauthorized threats to physical systems or accessibility, while environmental threats are caused by nature, such as extreme heat, extreme cold conditions, or natural disasters. Eavesdropping, traffic inference, and systems access gain are examples of network attacks. However, cyber threats can happen deliberately or unknowingly. Deliberate attacks aim to gain unauthorized access, cause harm, and disrupt system principles [19,20]. Attacks caused by end users who have less knowledge of cyber security issues are unconscious attacks. Usually, these users are manipulated by mal-intended attackers and cause disasters unknowingly. Based on the intent, security attacks are classified into two types: passive and active attacks. The goal of passive attacks is to acquire the transmitted data to discover the architecture, configuration, and typical behavior of the system. Since the data stay unchanged, it is challenging to identify such attacks. Active attacks alter the transmitted data to affect the system operations, which results in the CIA (confidentiality, integrity, and availability) principle [20]. These attacks are destructive and can cause massive loss of sensitive data, systems, or the organization’s reputation.

3.1. Cyber Security Threats

A smart grid consists of multiple systems, where compromising a single system can affect the whole network. The recent integration of advanced technologies into this field comes with cyber threats. Attackers can be amateurs, professionals, or upset employees, and their goals range from cyber warfare, industrial espionage, economic reasons, terrorism, etc. These attacks are classified according to their targets and impacts [20]. The grid is vulnerable to cyber attacks such as malware attacks, man-in-the-middle, and denial-of-service (DoS), as it relies on smart meters, sensors, and networked equipment. Malicious actors may target weaknesses in communication networks, protocols, and legacy systems, which lead to consumer data breaches, disrupt energy delivery [21], or even endanger national security.
The power industry has multiple attack points across its generation, transmission, and distribution systems. Attackers use generation to exploit SCADA (Supervisory Control and Data Acquisition) systems, local control networks, and numerical relays, which lead to system instability or equipment damage. Transmission systems are vulnerable to false data-injection attacks, compromised networks, and manipulated power flow in devices. Distribution systems are prone to remote disconnection, illegal data access, and tampering, which disrupt the flow of operations and customer privacy [21,22]. Comprehensive security measures are needed to eradicate these threats and strengthen the grid against changing threats.
Traditional smart grid control systems primarily relied on centralized SCADA architectures, featuring structured communication protocols and centralized monitoring with relatively fewer entry points for attackers. The integration of IoT technologies into smart grids has significantly expanded the attack surface. IoT devices introduce new vulnerabilities due to their heterogeneous hardware, wireless communications, resource constraints, and dynamic networking [23]. Attacks such as botnet infections, device spoofing, firmware tampering, and side-channel attacks have become more prevalent with the proliferation of IoT endpoints [24,25]. While several cyber attacks (e.g., MITM, DoS) are equally applicable to both SCADA and IoT environments, their frequency, ease of execution, and impact are magnified in IoT-integrated smart grids [3]. Therefore, understanding the evolution of these threats from traditional systems to modern IoT-driven architectures is critical for designing effective privacy-preserving and security-enhancing strategies.

3.1.1. Malware Attacks

Any piece of code or program designed and introduced to damage, exploit, or disrupt computer systems, networks, or devices is known as malware [26]. It can take different forms and is typically used by cybercriminals to gain unauthorized access, monitor traffic, and steal data from systems. A backdoor can be an inadvertent feature in a network, software, or system that permits illegal access or control via malware attacks. It bypasses normal authentication processes or security mechanisms, enabling a threat actor to gain privileged access to the system or its resources [27]. In a smart grid, these attacks can disrupt power generation, distribution, and consumption, impact critical infrastructure, and cause damage to grid components. Ransomware is a type of attack where threat actors infiltrate a system, encrypt critical data or control functions, and then demand a ransom payment to restore access and functionality.
The Industroyer malware, which was created to target Industrial Control Systems (ICSs), is a prime example. It was the root of a significant cyberattack on Ukraine’s power grid in 2016 [28]. Industroyer gained illegal control over circuit breakers and substation equipment by taking advantage of vulnerabilities in the grid’s communication protocols. This resulted in an extensive region of Kyiv being without electricity for nearly an hour. The incident showed how power distribution systems might be exploited by malware, resulting in blackouts and compromising grid stability [29,30]. The Colonial Pipeline Ransomware Attack in 2021 was one of the most significant cyber threats targeting critical infrastructure in the United States. A ransomware group, DarkSide, trespassed on the Colonial Pipeline and deployed ransom to encrypt files on the network. The attackers broke through the system using a Virtual Private Network (VPN) account that lacked multi-factor authentication (MFA), which opened access to the entire business IT system. To prevent the further spread and secure the critical structure, the company had to shut down its entire pipeline system [31]. Although the attack was not targeted toward the smart grid, the fragility of interconnected systems and the lack of intrusion-detection and -prevention systems (IDPSs) made it vulnerable, causing more damage to the infrastructure. To prevent such incidents, robust cybersecurity measures, including intrusion detection, network segmentation, and timely software patching, are essential in modern grids.

3.1.2. Denial of Services (DoS)

DoS is the type of attack where the attacker or a group of attackers attempt to make computer or network services unavailable for the target users. Similarly, when the attacks flood from multiple compromised resources, overwhelming the target with excessive traffic is known as a Distributed Denial-of-Service (DDoS) attack [32]. These attacks are frequently used to damage businesses and organizations, carry out cyber warfare, or extort individuals. In a smart grid, a DoS attack can cause significant disruption since it targets vital infrastructure that generates, transmits, and distributes electricity.
According to NETSCOUT Arbor’s 13th Annual Worldwide Infrastructure Security Report, DoS assaults account for 87% of the real dangers faced by service providers [33], while the 14th Annual Report in March 2019 stated it as 95%. Since smart grids rely on real-time data communication between various sensors, smart meters, and control systems, a DoS attack can overload these communication channels, causing delays or failures in grid operations. For example, if an attacker overloads the SCADA system with traffic, it might not process legitimate commands for load balancing [34] or fault detection in time. Due to delayed responses, this may result in grid instability, power outages, or even physical damage to transformers and substations. Attacking an Advanced Metering Infrastructure (AMI) could hinder utilities’ ability to manage electricity distribution remotely, causing extensive service interruptions. While not as devastating as a DDoS, a DoS attack can lead to significant downtime [35] and financial loss.
Depending on the attacker’s goal, target, and grid’s vulnerability, a DoS attack can be categorized into various sub-attacks, as shown in Figure 1. These attacks are strong enough to temporarily shut down systems or entire networks, so protecting the smart grid is crucial for smooth operation and services. However, the smart grid is different from traditional systems, which require meticulous threat analysis and management. Hence, sector-specific standards and guidelines are developed. For example, the USA’s [36] electrical industry is obliged to adhere to NERC-CIP 002-009 and the NISTIR 7628 [37] Guidelines for Smart Grid Cybersecurity that offer a framework for developing cybersecurity strategies. In threat analysis, filtering is adopted to drop the malicious packets on a network to prevent DoS attacks. Usually, filtering is done on perimeter devices such as firewalls, following security policies. When the threat is near, the filtering mechanism works well, consuming less bandwidth. Firewalls also help with network segmentation, intrusion detection, and access control. However, it is not a good option for low-end grid devices and fast events. Intrusion-Detection Systems (IDSs) are developed to alert when a false positive rate is high. The blocking method of intrusions makes IDSs into Intrusion-Prevention Systems (IPSs). The IDS mechanism has been divided into three parts—(a) signature-based detection, (b) anomaly-based detection, and (c) specification-based detection, which provide security at various levels. Furthermore, load balancing and network architecture redundancy help reduce service interruptions. Deploying deep packet inspection (DPI) can help to detect and block malicious traffic. To continuously strengthen the grid against threats, such defense measures need to be implemented at the right time.

3.1.3. Man-in-the-Middle

This type of cybersecurity breach happens when the intruder positions itself between two communication parties, monitoring and potentially altering their data transmission secretly. In the context of a smart grid as detailed in Table 1, this could happen when an attacker inserts themselves between communication channels, such as smart meters and control centers, exploiting vulnerabilities in the network protocols or wireless transmissions. While the transmission seems normal, the intruder can perform false data-injection (FDI) and false command-injection (FCI) attacks that can hinder grid operations. Such attacks result in the injection of erroneous data, power outages, ineffective distribution, and compromised system security, which set off management failures and increase the grid’s resilience to future attacks.
Using secure communication protocols and robust encryption constitutes one of the primary defenses against MITM attacks. Unauthorized parties cannot intercept or alter data if end-to-end encryption is implemented using techniques such as AES-256 [51] or secure transmission protocols like TLS 1.3 and IPsec. In addition, to minimize the threat of spoofing or session hijacking, mutual authentication techniques such as digital signatures or certificate-based authentication (PKI) ensure that both communicating parties are validated prior to data exchange. Installing intrusion-detection and -prevention systems to monitor anomalies in network traffic is another essential step [49]. Machine learning (ML) methods can be applied to these systems and identify suspicious patterns that indicate MITM attacks, such as data replay or packet injection. Anomaly detection and real-time monitoring facilitate the early identification and mitigation of security issues before they escalate into serious breaches.
Enforcing robust identity and access management (IAM) procedures will further improve security. Role-based access control (RBAC) and multi-factor authentication (MFA) for distant users and grid operators can prevent illegal access to sensitive grid components. Secure key management, utilizing hardware security modules (HSMs) or trusted platform modules (TPMs) for cryptographic key management and fault-tolerance [52], shields against key compromise for encryption methods. Finally, to prevent hardware-based MITM attacks, smart grid components such as communication hubs, substations, and smart meters must be physically protected. The risk of physical compromises turning into cyberattacks decreases by implementing tamper-resistant hardware and conducting frequent security audits. By combining these security measures, smart grid operators can guarantee the security and durability of the power grid while also drastically reducing the possibility of MITM attacks.

3.2. Data-Oriented Threats

In contrast with traditional power grids, which function based on predefined schedules and manual controls, smart grids collect massive amounts of data using sensors, AMI, and IoT devices from energy-management systems, smart meters, and substations. These data are then analyzed using AI and ML to predict demand patterns, prevent outages, and enhance grid efficiency. For example, smart grids dynamically adjust power distribution based on real-time load monitoring, which assures stability and reduces energy waste. Data-driven automation is also used to detect faults, reroute electricity, and integrate renewable energy sources like solar and wind. Since the grid relies on data too much [53,54], protecting data security, availability, and integrity is essential to avoid cyber threats and operational disruptions.

3.2.1. Data Breaches and Leakage

Unauthorized access to sensitive, confidential, or protected data causes a breach. A data breach in a smart grid could expose critical operational details, raising security threats and causing system failures. Since smart grids depend on real-time data sharing between substations, control centers, and smart meters, any security flaw might give hackers the opportunity to intercept, alter, or steal private data [55]. Breaches can occur due to weak authentication methods, lack of encryption, insider threats, or cyberattacks such as malware and phishing. Attackers might target AMI to alter energy consumption records, disrupt billing systems, or cause power outages [56,57].
The Ukraine power grid cyberattack in 2015 gives a practical illustration of a smart grid data breach. Here, attackers infiltrated the network of multiple power distribution companies using phishing emails. They targeted human operators by sending emails; once the employees opened the attachments, malware known as BlackEnergy infected the network and allowed remote access to the attackers [58]. The attackers used stolen credentials to log into SCADA systems remotely and manually operated the Industrial Control Systems (ICSs) to disconnect power. This led to power outages affecting 230,000 people for several hours. This not only demonstrated how grids could be compromised but also highlighted the importance of network segmentation, robust authentication methods, continuous monitoring, and employee cybersecurity awareness in preventing such attacks. The attack impact might have been reduced if the utilities had implemented MFA, sophisticated intrusion-detection systems, and network isolation [59] into place.
Data leakage can happen due to the unauthorized or unintended transmission of sensitive data to an external party. Unlike a data breach, which involves an active attack, data leakage takes place due to misconfigurations, insider negligence, or malware infections. Cloud storage vulnerabilities, email misdelivery, weak authentication, or physical device theft can also cause data leakage [60]. One common risk is insecure communication channels, where energy consumption data are transmitted without proper encryption, allowing attackers to intercept it. This can compromise both consumer privacy and grid security. Smart grids rely on continuous data exchange between smart meters, substations, and control centers, making them vulnerable to leaks if security measures are weak.
The smart meter data leakage incident in 2017 that severely impacted several utilities and customers occurred at Pacific Gas and Electric Company (PG&E) in California. A third-party vendor that provided cloud-based data storage and analytics services for the utilities’ Advanced Metering Infrastructure (AMI) systems was associated with the incident [61]. These systems collect and manage data from smart meters deployed across residential and commercial locations. The exposed data included detailed energy consumption patterns, which, if compromised, could have led to serious privacy concerns. Utilities involved in this incident were forced to review their security protocols and enhance data encryption and access control mechanisms to prevent similar incidents from occurring in the future. This also contributed to increased regulatory scrutiny on data privacy and security within the smart grid industry.

3.2.2. Data Poisoning

Data poisoning falls into the category of cyberattacks, where malicious actors deliberately introduce incorrect or misleading data into a system. Information gathered from sensors, smart meters, and other connected devices is essential for predicting demand, maximizing energy use, and preserving system stability. If attackers gain access to the data streams or sensors, they could inject false readings or manipulate sensor data. This could result in inaccurate readings of energy consumption, grid loads, or environmental factors such as temperature and humidity, which are essential for optimizing energy flow and responding to real-time conditions. An example of a data poisoning incident in the smart grid occurred in 2020 when Russian hackers launched a cyberattack targeting the USA energy sector. The Russian hacking group, known as APT29 or Cozy Bear, used sophisticated spear-phishing emails to gain initial access to the networks of several USA utility companies. The attackers used advanced malware to exploit vulnerabilities in these companies’ systems. The goal was not just to steal data but to potentially manipulate or disrupt critical systems [62]. While the attack did not directly result in widespread damages, it certainly exposed the vulnerabilities in the way that critical infrastructure data are handled in the organization. This incident showed the importance of strong security measures and the need for data integrity management in the smart grid system.

3.3. Physical Layer Attacks

In a smart grid, physical layer attacks target the power system’s hardware, including sensors, substations, smart meters, and communication infrastructure. These attacks directly modify, destroy, or interfere with physical devices, in contrast to cyberattacks that use software vulnerabilities. Attackers may physically alter smart meters, cut power lines, or jam signals the tools to disrupt the grid operation [63]. Physical layer attacks can occur through various methods, each affecting the grid differently. One common form of attack involves tampering with smart meters, where attackers alter readings to manipulate billing information, leading to energy theft and financial losses for utilities. Another common attack is signal jamming, where malicious actors use radio frequency (RF) jammers to disrupt wireless communication between smart meters, sensors, and control centers [64]. This interference can cause delays in data transmission or lead to a complete loss of communication, impacting real-time grid monitoring and control.
Preventing physical layer attacks requires a combination of security measures, including physical protection, real-time monitoring, and advanced communication security. One of the first steps is enhancing physical security at critical infrastructure sites. This can be achieved by installing surveillance cameras, motion detectors, and access control systems to restrict unauthorized entry. Smart meters and communication devices should also be housed in tamper-proof enclosures to prevent direct manipulation or theft. Anomaly detection and continuous monitoring play an important role in identifying potential threats before they escalate. It can analyze unusual patterns of physical activity, alerting operators to potential threats [64]. Additionally, redundant communication networks should be implemented to ensure grid stability in case of jamming or disruption. Techniques such as frequency hopping and spread spectrum communication can make it difficult for attackers to interfere with smart grid signals. In order to reduce physical dangers, security awareness and training are equally crucial. Grid operators and utility workers should be trained to react properly in the event of an incident and educated on the dangers of physical attacks. The grid’s resilience can be further increased by conducting regular security audits, vulnerability assessments, and emergency response drills. Smart grid operators can promise a more secure and stable energy network and significantly reduce the danger of physical layer attacks by using these preventive measures.

4. Privacy-Preserving Machine Learning Techniques

This section provides a comprehensive survey of privacy-preserving machine learning approaches, specifically in the context of smart grids for possible attacks discussed in Table 2. The study examined eight techniques recognized by various governing bodies worldwide, as highlighted in the privacy-related reports from the USA (https://catalog.data.gov/dataset/national-strategy-to-advance-privacy-preserving-data-sharing-and-analytics, accessed on 15 March 2025), UK (https://royalsociety.org/news-resources/projects/privacy-enhancing-technologies/, accessed on 15 March 2025), Europe (https://cros.ec.europa.eu/PET4OS, accessed on 20 March 2025), and the OECD (https://www.oecd.org/en/publications/emerging-privacy-enhancing-technologies_bf121be4-en.html, accessed on 20 March 2025). The techniques covered are as follows:
  • Anonymization
  • Differential privacy (DP)
  • Synthetic data (SD)
  • Secure multiparty computation (SMPC)
  • Homomorphic encryption (HE)
  • Zero-knowledge proof (ZKP)
  • Trusted execution environment (TEE)
  • Federated learning (FL)
Table 2. A summary of existing research papers related to smart grid attacks.
Table 2. A summary of existing research papers related to smart grid attacks.
Mentioned AttacksTarget SystemsVulnerabilityCountermeasure
CIA Triad Attacks [10,21]Customer Information Systems (CIS), SCADA, Smart Meters, and Cloud StoragePrivacy breaches, incorrect energy distribution, communication blockage, inaccessible resources, and causes financial lossIntrusion-Detection and -Prevention Systems, data masking and anonymization, and access control mechanisms
Ransom Attacks [31,65]Communication networks, Automation, and Centralized control systemsWidespread power outages and operational disruptions leading to infrastructure damage and financial lossMulti-Factor Authentication, ID&PS, and robust access control
Data Breach and Leakage [58]SCADA, Smart meters, Cloud storage systemsPrivacy violations and grid operation disruptions leading to financial loss and reputation damageStrong encryption, access control, regular security audits, and monitoring of data-sharing protocols
DoS/DDoS [66,67]SCADA, Advance Metering Infrastructure (AMI)Communication overload, flow disruption, and incorrect data transferState-of-the-art security protocols to provide secure communication
Single Point of Failure [68,69]Critical Substations and Transformers, Communication Hubs, and Cloud-based Grid Management PlatformsComplete system crash, communication breakdown, de-sync operations, and could impose cyberattacksAdopting distributed control architecture, blockchain for authentication, and robust anomaly detection
Man-in-the-Middle [48,66]Communication network, SCADA, Energy-management system (EMS)Misconfigurations, energy blackouts, incorrect billing, and damaged infrastructureCryptographic security measures, network-monitoring and -protecting techniques
False Data Injection,
Meter Spoofing [70,71]
Smart meters, State estimation systems, Distributed Energy Resource (DER) managementCompromised meter unresponsive to critical grid operations and utility requestsEnhanced meter security with data integrity and validation methods to secure physical access
Data Manipulation,
Identity theft attacks [72]
Customer Information Systems, SCADA, DER ManagementDetect identity-based security vulnerabilities in the system, leads to data tampering and privacy breachStrong data encryption methods, blockchain-based identification, and authentication methods to prevent identity theft and impersonating
Malicious Energy Traders [73]Demand Response Systems, AMI, Billing and Payment InfrastructureEnergy theft and fraud, billing chaos, and exploit demand-response systems to destabilize the power gridReal-Time Monitoring and Alerts system, blockchain for transactions and AI-Powered Fraud Detections

4.1. Anonymization

In smart grid systems, attackers can cleverly disguise themselves within critical infrastructure, thereby evading cybersecurity measures such as firewalls, data diodes, and intrusion-detection or anomaly-detection systems. Deceptive devices installed at various communication points in smart grids and industrial control systems signal the system when these protective mechanisms are breached. The K-anonymous smokescreen configuration of indistinguishable Intelligent Electronic Devices (IEDs) at substations undermines attackers and highlights the potential threat of honeypots within the IEC 62351 standard topology [74].
Distribution systems have been upgraded with digital communication technology involving devices in consumer households, like smart meters. Distributed energy resource management incorporates different nodes for load aggregation based on the location and type of load associated with substations, segments, feeders, consumer services, and more. Each associated point is susceptible to privacy breaches of personally identifiable information (PII), which can be anonymized via a generalization hierarchy [75] allowing for the grouping of transformers, segments, and Distributed Energy Resources (DERs) using the K-anonymity approach. Similarly, a continuous K s -anonymization approach [76] modifies the grouping of smart meter data streams with equivalence classes (EQ) that comprise at least k unique individuals.
Despite the anonymization technique helps protect personally identifiable information (PII) from direct identification, it remains vulnerable to privacy leakage due to data mining approaches. Quasi-identifier (QI) attributes, such as timestamps and the locations of smart meters, can indirectly reveal energy usage patterns, habits, and living standards of individual households. A hybrid framework [77] that integrates K-anonymity data generalization with differential privacy in the preprocessing of energy data provides better protection for user privacy than using individual anonymization techniques.

4.2. Differential Privacy

Data acquisition from smart meters to the control center through an ICT network enables a smart grid to achieve reliable, efficient, and flexible data processing for balancing power distribution and dynamically adjusting electricity prices. However, such data-sharing programs can expose energy users’ consumption habits and daily activities. Homomorphic encryption involves significant computational costs, making it unsuitable for real-time data analytics and operations. Masking, another approach, introduces random noise via a trusted third party, which is often impractical. Local Differential Privacy (LDP), on the other hand, operates directly within the smart meters and does not require a third party for local random perturbation of client energy data [78]. The privacy budget in traditional Differential Privacy (DP) increases with the streaming of data from smart meters, making it vulnerable during large time-domain events. Spectral Differential Privacy (SpDP) [79] addresses this issue by bounding noise based on the frequency domain representation of smart meter data, showing better performance than trajectory-level DP (TrDP), even over extended time periods.
Smart grids are equipped with control centers that interact, cooperate, and perform data aggregation for heterogeneous IoT-based appliances. Differential attacks from adversaries can provide insights into aggregated multi-subset and multi-dimensional energy data. Fog computing mitigates the computational, transmission, and security burdens of cloud networks by directly interacting with and aggregating data from various devices. This method employs two differential privacy techniques, using noise from geometric and Laplace distributions [80]. Additionally, the incorporation of Personalized Differential Privacy (PDP) [81] can alleviate the privacy concerns associated with fog computing by adapting the selection of non-uniform noise for individual nodes based on their proximity to the control center.
Modern power systems are integrated with Distributed Energy Resources (DERs), the Internet of Things (IoT), robust communication channels, advanced phasor measurement units, and prosumers’ management devices. The inter-connectivity, along with exposure, fragmentation, and digitization, complicates smart grid operations and makes them more fragile to cyber attacks. Smart grid operations must precisely monitor system states and matrices at central control centers, transmission nodes, and distribution points to ensure reliable electricity provision without violating system constraints. Unauthorized reconnaissance of system states can disrupt grid integrity through false data injection, leading to power outages, equipment damage, and financial losses. A collective DP defense mechanism utilizing chi-squared noise distribution [82] supports anomaly detection in power systems under false data-injection attacks while preserving the privacy of system matrices. A detailed overview of several DP methods applied in the energy sector is provided in Table 3.

4.3. Synthetic Data

The modern smart grid is characterized by fine-grained generation, consumption, state estimation, and control data across various system domains, including IoT devices at central power plants, transmission networks, distribution nodes, and consumer endpoints. The dynamics of cutting-edge research in smart grids heavily rely on the availability of easily accessible and open-source data. However, challenges such as historical data scarcity, incomplete observations, device malfunctions, and privacy concerns regarding real-time energy data limit the scope of research and the application of machine learning (ML) approaches in realistic settings. Physical-based methods can simulate synthetic data to address the challenges of complex and insecure data collection, incorporating detailed information about the environment, structure, social factors, financial aspects, and behavioral properties.
ML algorithms on closed-source datasets often outperform model-driven approaches in smart grid applications, including renewable energy (RE) prediction, load forecasting, state estimation, and event detection. Privacy concerns and potential cyberattacks restrict utilities and consumers from publishing and collecting sensitive data. Generative Adversarial Networks (GANs) can learn the conditional probability of essential spatial and temporal features from real energy data by comparing the outputs of generative and discriminative models. Recurrent neural networks (RNNs) with ARIMA and Fourier transform features [86] replace the convolutional neural networks (CNNs) of image GANs for generating better-quality time series AMI data without violating the privacy regulations.
In machine learning-based Non-Intrusive Load Monitoring (NILM), the task of disaggregating energy data from low-frequency net energy meters to high-frequency appliance-level consumption necessitates diverse, interconnected smart household appliances. Malicious attacks aimed at uncovering insights into living habits, appliance types, financial status, and dynamic pricing programs discourage consumers from sharing their appliance-level data. ProfileSR-GAN [87] upscale the low-resolution smart meter data to generate high-resolution power flow or energy disaggregation data by using the GANs model. Additionally, Variational Autoencoders (VAEs) and Gaussian Mixture Models (GMMs) can assess the quality, sensitivity, and privacy of synthetic data derived from smart meters [88]. Some techniques related to synthetic data have been discussed in Table 4.

4.4. Secure Multiparty Computation

The Secure Multiparty Computation (SMPC) cryptographic scheme entertains multiple parties to compute a function without revealing the sensitive data of individual parties. In this scheme, a secret S is divided into n shares, and a minimum of k shares is required for the parties to reconstruct the secret S through arithmetic operations such as multiplication, addition, or both. SMPC plays a vital role in protecting data within smart grids and safeguarding the privacy of individual energy users against both internal and external threats. Tasks related to energy, such as load aggregation or billing, can only be executed by parties possessing the respective distributed shares of the secret.
Data-aggregation algorithms employ various aggregate functions—such as sum, average, minimum, maximum, and quantiles—depending on the architecture and data-sharing mechanisms in place. Overgrid acts as a graphical interface to access various grid utilities within the power system. A privacy-preserving scheme for a peer-to-peer (P2P) decentralized setup has been developed for community-based demand response programs in smart buildings [93]. This technique incorporates distributed data aggregation using a secure multiparty computation approach known as PP-Overgrid.
The advanced metering infrastructure, a subsystem of the smart grid, involves sharing information with a trusted entity to facilitate accurate and reliable billing. Distributed information sharing and cryptographic techniques ensure the confidentiality of consumers without relying on any trusted entity, particularly in cases of suspected malicious privacy breaches. The secure MPC utilizes Shamir’s secret sharing in conjunction with a distributed file system to store and protect electricity usage data, thereby enabling a secure billing process [94]. Furthermore, a clustered-based distributed MPC algorithm [95] has been employed to aggregate the energy consumption of consumers in a ring structure, utilizing both private and public keys.
Edge devices in the smart grid collect and share vast amounts of energy data with various decentralized electricity sales and transmission entities to enhance operational efficiency. The integration of blockchain technology and decentralized energy markets with real-time edge computing boosts the privacy and security of confidential data sharing through multiparty computation (MPC). BPM4SG [96] utilizes data segmentation, smart contracts, encryption, and ring signatures to establish a dual-privacy framework for both data owners and utilities. The power flow analysis (PFA) parameters of two distinct grids can be secured using the linear Newton method and a universal composability framework, which provides secure multiparty computation (SMPC) protocols for smart meters and predictive data. Table 5 summarizes several secure MPC approaches along with their specific contributions.

4.5. Homomorphic Encryption

The integration of electric vehicles and renewable energy resources, combined with robust communication via IoT devices, enhances the cybersecurity of smart grids. Homomorphic encryption (HE) is a cryptographic technique that transforms plaintext into ciphertext, ensuring secure communication and facilitating aggregation tasks while protecting against eavesdropping and untrusted malicious actors. One critical issue with this highly secure cryptographic system is the communication and computational cost associated with securing the ciphertext. The Paillier homomorphic encryption scheme reduces latency and data size by encrypting only the aggregated data at intermediate upstream nodes in an end-to-end smart meter network [103].
In transactive energy, the confidentiality and privacy of electricity users are essential for a flexible power distribution policy. The ElGamal cryptosystem offers homomorphic encryption [104] to safeguard sensitive participant pricing and energy data, thus supporting secure contract clearing and auctions in local energy markets. The Diffie-Hellman assumption requires fewer computational multiplication operations to encrypt the tuple of public keys shared within the transactive energy markets. Summation and variance are two metrics mainly used to evaluate the computational performance of HE [105]. A cost-benefit analysis can be conducted using these two metrics across various trusted boundaries for service providers, third parties, and peer consumers in smart metering systems.
Intelligent devices are employed for real-time monitoring of energy consumption, facilitating an automated, reliable, efficient, and economical distribution of electricity among multiple consumers. The two-way communication between smart meters and electricity providers over a public network can expose data to adversaries who may intercept it during transmission. A symmetric homomorphic secure smart grid system maintains confidentiality and integrity against threats and malicious attacks through a forward authentication mechanism for sharing session keys. The privacy of smart meters is protected by forwarding the aggregated encrypted electricity data from the Aggregation Provider (AP) [106]. Several homomorphic encryption methods implemented in the smart grid domain are summarized in Table 6.

4.6. Zero-Knowledge Proof

Zero-knowledge proof (ZKP) approaches focus on verifying participants in smart grid activities, such as prosumers and EV consumers, while not concerning themselves with the sharing of information among smart grid entities. These methods address privacy issues that arise from revealing daily routines through transaction and location logs. The ZKP authentication scheme typically involves three entities: the issuer, the holder, and the verifier. A trusted service provider issues verifiable credentials for holders, such as energy users, while the verifier authenticates the users’ digital signatures provided by the issuer for the services requested by the holder. ZKP offers a secure authentication scheme for EV charging providers, protecting against replay and impersonation attacks from malicious EV users [111]. Charging stations verify the digital signatures of EV consumers against the utility service provider where users are registered, which helps reduce the risk of malicious clients.
Peer-to-peer energy-trading mechanisms have been widely adopted by consumers in electricity markets for distributed energy management and demand response. A significant challenge in peer-to-peer energy trading is the potential for privacy violations and information leakage by malicious agents [112]. Consensus with Innovation (C+I) and the Power Transfer Distribution Factor (PTDF) have been used to maximize social welfare while adhering to physical network constraints. The ZKP protocol has been implemented to evaluate various performance metrics, including convergence, line congestion management, scalability, computational efficiency, and supply chain operations. In micro-grid energy trading, the power flow takes precedence over energy prices, making the transaction history stored on servers vulnerable to malicious attacks. ZKP aids in distinguishing between benign and malicious prosumers, while the Fiat-Shamir approach ensures secure communication channels for micro-grid trading price schemes [113].

4.7. Trusted Execution Environment

The nexus of the Internet of Things (IoT) and smart grids makes the systems vulnerable, particularly to privacy and security threats, as they involve interconnections among utility companies, manufacturers, third-party operators, and various intelligent devices. A Trusted Execution Environment (TEE) offers a hardware-based solution with cryptographic functions to enhance the security of IoT-integrated systems [114]. TEE creates a secure area within the central processing unit (CPU) that isolates sensitive data and running code from malicious software, preventing unauthorized access to that data. Without such protection, malicious software could compromise the operating system of IoT-based smart grid applications, potentially gaining full control and bypassing security measures. TEEs typically utilize compact on-chip hardware systems, such as Arm TrustZone [115] and Intel Software Guard Extensions (SGX) [116], to isolate sensitive programs from the rich execution environment (REE). They store authentication or cryptographic keys, as well as sensitive data and code that rely on these keys.
Smart grid operations often depend on a cloud-based trusted party to store data or perform tasks related to energy management. Cloud service providers are generally considered semi-honest, as they may be curious about sensitive consumer data and can access personal information. SecGrid utilized a low-computation approach using Intel SGX, rather than relying on more resource-intensive cryptographic techniques like secure multi-party computation (SMPC) or homomorphic encryption (HE), to enable secure and efficient functionalities in smart grids, such as data aggregation, dynamic pricing, and load forecasting [117]. Although adversaries might have full control over the software applications and the operating system of the central utility, the certified hardware can still perform secure operations under the TEE.

4.8. Federated Learning

Federated learning (FL) facilitates collaborative learning among different entities within smart grids (SGs), which can include prosumers, micro-grids, smart homes, SCADA networks, Intelligent Electronic Device (IED) nodes, distributed subsystems, and generation companies. This collaboration aims to perform common tasks while ensuring the privacy of sensitive data at the edges. Deep learning (DL) techniques capture the features and patterns of smart meter data to enhance a global model without requiring the sharing of individual energy data [118]. In hierarchical smart grids, a central control system is responsible for monitoring the overall power system, which is supported by edge-based SCADA systems that collect data from IED nodes. Power systems often experience abrupt power swings during disturbances, and anomaly-detection operations can identify such swings as cybersecurity threats, such as false data injections. FedDiSC approach leverages the ability to discriminate between benign and malicious disturbances in the power system to ensure reliable and stable grid operations [119].
Synchrophasors, also known as phasor measurement units (PMUs), are widely deployed across power systems for monitoring purposes, including wide-area voltage control, damping control, and protection systems. However, PMU networks are susceptible to various cyberattacks, including denial of service, data spoofing, malicious code injection, and fault replay attacks [120]. FL addresses the challenges of multi-dimensional, non-IID data distribution and the issue of free-riding in energy trading, where some clients provide low-quality data to maximize incentives. Energy data owners (EDOs) collect information from a variety of energy users, incorporating different combinations of appliances and usage habits for both domestic and commercial purposes. A Deep Q-Network reinforcement learning model has been implemented in a federated setup to penalize free-riding users, with EDOs acting as clients and energy service providers (ESPs) aggregating the parameters [121].
Centralized machine learning (ML) for real-time anomaly detection has notable disadvantages, including connectivity issues, communication bandwidth limitations, latency, and privacy and security concerns that may violate privacy regulations. TensorFlow Federated (TFF) framework has been used to compare various DL anomaly-detection models in both federated and centralized setups, while the Flower framework established a federated testbed using a CPU workstation as the server and Raspberry Pi as energy clients [122]. Self-signed certificates for SSL/TLS protocols have been adopted to secure communication channels against eavesdropping and man-in-the-middle (MITM) attacks on model updates. Power system state owners face threats from sheath attacks that involve injecting false data to disrupt smooth operations, potentially leading to power outages. A bi-level optimization problem has been proposed to detect false data injections (FDIs) in a federated setup, incentivizing clients based on data size and quality for the measurement matrix (H) in the IEEE 32-bus system, with a single node as the attack point and 100 Monte Carlo-based scenarios [123]. Table 7 presents the contributions of FL approaches involved in various energy-related tasks within modern power systems.

5. Applications of PPML in IoT-Integrated Smart Grids

5.1. Non-Intrusive Load Monitoring (NILM)

Energy disaggregation from smart meter consumption into household appliances can provide insights into usage patterns, financial status, and device attributes of users. Decentralized learning with Laplace noise applied to the net energy meter of consumers can help protect consumer behavior, while random permutation further strengthens privacy against NILM attacks [83]. Differentially private NILM adds Laplace noise to power usage datasets to prevent malicious entities from reconstructing exact appliance usage.

5.2. Fault Detection, Energy Theft, and Diagnostics

Non-technical losses, which include equipment failures, power outages, energy theft, cyberattacks, and faulty energy devices, can result in an annual global revenue loss of approximately USD 96 billion [131]. Federated fault detection enables real-time identification of voltage fluctuations and fraud detection across smart meters without exposing raw grid data. Homomorphic encryption (HE) protects billing verification against energy theft, while multiple grid entities can collaboratively perform secure multiparty computation (SMPC) to detect fraudulent meter readings while ensuring zero data leakage.

5.3. Demand Forecasting

The scalability and integration of microgrids require a significant number of IoT devices to be distributed across the network for bidirectional communication and information sharing among various nodes and prosumers. Generative Adversarial Networks (GANs) can extract statistical components to produce pseudo household usage data [89] and power-injection data [90] in a distributed system, addressing concerns related to device scarcity and privacy. Physics-informed diffusion models leverage data-driven machine learning along with model-driven mathematical properties for synthetic load generation of solar-integrated consumers [132].

5.4. Generation Forecasting

Smart grid insights into renewable energy generation at the prosumer level can influence electricity prices when renewable energy (RE) is not available and can also be sold data to private advertising firms. Differentially private load monitoring (DPLM), using Gaussian noise during peak hours [85], effectively protects real-time power-generation data from solar and wind resources on the consumer end, as well as information on the availability of RE for demand response and load forecasting.

5.5. Anomaly Detection

Deep learning models require a substantial amount of smart grid data, yet privacy regulations can limit data availability. Machine learning techniques can utilize HE to secure the training processes for prediction, anomaly detection, fault localization, and energy theft tasks within smart grids [133]. A cloud-based billing system connected to smart meter sensors employs a lightweight Domingo-Ferrer’s HE scheme [107] to encrypt and decrypt aggregated energy and cost data through various arithmetic operations. Similarly, household appliances within a home area network (HAN) may use lattice-based HE [134] to authenticate messages for low-computing IoT devices.

5.6. Energy Trading

Dynamic pricing of electricity facilitates consumer participation in local electricity markets for distributed energy management, allowing for the shifting of interruptible appliances to off-peak hours. An Alternating Direction Method of Multipliers (ADMM)-based multiparty computation (MPC) protocol employs Shamir secret sharing and ElGamal commitments to secure peer-to-peer trading within uncertain local electricity markets [98]. Quadratic programming and blockchain contracts provide additional security for bidirectional MPC protocols within a network-constrained P2P energy billing scheme based on Karush–Kuhn–Tucker (KKT) conditions [135].

5.7. Electric Vehicles

Electric vehicles (EVs) change the dynamics of smart grids through real-time monitoring of the vehicular energy network, facilitating energy dispatch and establishing variable energy markets for EV clients that enter and exit randomly [136]. Peer-to-peer (P2P) energy trading relies on reliable and secure network topology for sharing private energy transaction data among EVs. The location data of EVs contains sensitive information about their users, making it vulnerable to breaches by adversaries at untrusted nodes responsible for data aggregation or energy dispatching. A decentralized blockchain approach utilizing k-anonymity [137] can be adopted as an energy-trading network to secure energy transactions and protect the location privacy of EV owners.

6. Integration of PPML and IoT in Smart Grid Domains

6.1. Challenges in Integrating IoT and PPML in SGs

By the end of 2025, it has been estimated that 19 percent of 30.9 billion IoT devices will be deployed in the smart energy sector [138]. IoT devices within the smart grid vary in terms of computation and communication capabilities, leading to the use of different standards and protocols. The lack of standardized IoT protocols for smart grids compromises the security, reliability, and interoperability of these devices. Additionally, the big data collected over the extensive network of smart grids often consists of unstructured and complex patterns across different modalities, making implementing effective PPML techniques challenging. Furthermore, IoT systems utilizing PPML need to be robust and timely enough to address the concept drift problem in machine learning. This ensures that real-time data changes over time do not negatively impact tasks such as anomaly detection, fault analysis, forecasting, and status monitoring. Table 8 shows the computational and communication overheads involve in the different PPML approaches to intergrated with the IoT-based smart grids.

6.2. Frameworks and Libraries of PPML

PPML approaches have been widely adopted in various application areas, such as smart cities, smart healthcare, and smart finance. Several frameworks and libraries have been provided to support academic and industrial advancements in these domains. A selection of open-source platforms utilized by the PPML research studies are presented in Table 9.

6.3. Performance Analysis: Accuracy, Latency, and Resource Constraints

PPML, IoT, and smart grids are three extensive areas of study, each associated with its individual set of challenges regarding implementation, analysis, and deployment. Most of the privacy and security evaluations in the PPML studies have been carried out on the energy task metrics, with few studies of HE and SMC having communication and computation costs. In contrast, for DP, the associated privacy metrics depend on the tradeoff between noise parameters and performance. There are no standard metrics for PPML mechanisms, but as cyberattacks aim to degrade the performance of the ML approach and steal information sharing, thus studies computing the energy-related task metrics with communication and computation costs may better demonstrate the realistic scenario of resource-constraint IoT devices deployment in SGs.

7. Opportunities and Open Challenges

7.1. Emerging Trends in PPML for SGs

In the realm of smart grids, two significant challenges arise within the cybersecurity domain: privacy preservation and data security. The privacy-related issue involves exposing energy consumers’ habits and routines, which can be exploited for personal attacks, advertising, and surveillance. Data security attacks generally focus on manipulating information for monetary gain and competition within energy markets. While the privacy-preserving mechanisms can enhance existing frameworks to protect user privacy and secure grid data, which also present certain trade-offs and challenges. For instance, homomorphic encryption (HE) is computationally intensive, allowing unlimited operations but necessitating an expensive bootstrapping process [152]. Homomorphic Encryption (HE) involve complex algebraic operations on ciphertexts, leading to increased computational latency and energy consumption unsuitable for resource-constrained IoT devices. Secure Multiparty Computation (MPC) protocols require multiple rounds of communication among distributed nodes, raising challenges in bandwidth-limited environments. Differential Privacy (DP) alone is insufficient for complete privacy protection and requires integration with other techniques [153]. It also introduces random noise to outputs, which, if not carefully calibrated, can degrade model accuracy and create convergence difficulties. Zero-knowledge proofs (ZKPs) facilitate anonymous authentication with relatively low overhead; however, efficiency may be compromised when relying on a trusted third party [143]. Furthermore, Federated Learning (FL) encounters obstacles, such as device heterogeneity, high communication costs, and a lack of standardized benchmarking methods [154]. Utilizing multiple techniques can offer enhanced privacy and security for user authentication, as well as data confidentiality and integrity, but this approach also increases computational and communication complexities. Addressing the such complexities while maintaining acceptable performance metrics is crucial for the practical deployment of PPML in IoT-based smart grids. Future research should aim at developing lightweight, adaptive PPML algorithms tailored for dynamic, decentralized, and computation-limited energy systems.

7.2. Addressing Scalability and Interoperability Issues

A variety of PPML techniques have been proposed to address data privacy challenges in smart grids. However, some of these techniques necessitate substantial changes to current operations, while others encounter scalability and performance limitations. The Internet of Things (IoT) devices within smart grids generate vast amounts of real-time data, which can benefit machine learning (ML) training and lead to new insights in the energy sector. The integration of interconnected IoT devices also heightens security threats by exposing potentially vulnerable nodes. Moreover, challenges enhance with multi-modalities, as the functionality of IoT devices varies according to the specific area of interest within the smart grid. Integrating LoRa (Long Range) technology with PPML techniques can mitigate privacy and security risks while maintaining low overhead to secure data and model-updates transmission, reducing the computational burden on resource-constrained devices [155]. While LoRa offers significant advantages in terms of range and power efficiency, but have limited data rate and potential susceptibility to interference may affect the scalability of PPML applications. Identifying and addressing such barriers is crucial for adoption of privacy-aware solutions in smart grids. Future research should focus on optimizing PPML algorithms for LoRa networks, considering both computational complexity and communication latency.

7.3. Future Research Directions: PPML in Decentralized Grids and Blockchain Integration

Blockchain technology features a decentralized architecture that facilitates smart contracts and certificates for peer-to-peer interactions and information sharing. It offers immutable, and transparent transaction mechanisms, which can significantly enhance the information security of energy Internet infrastructures [156]. It has been employed in energy-trading platforms to ensure smart and secure transactions. Integrating blockchain with IoT-based smart grids and efficient PPML can enhance privacy, confidentiality, authenticity, and integrity within power systems. Centralized networks tend to create bottlenecks in the computational and communication capabilities of service providers, aggregators, and control centers. The inclusion of new sub-networks, prosumers, and energy participants can be limited by these capabilities. In contrast, decentralization improves the scalability of the grid by optimizing energy tasks through peer-to-peer communication.

8. Conclusions

Smart grid digitalization supports bi-directional information and energy sharing among various grid components, including appliances, Intelligent Electronic Devices (IEDs), prosumers, operators, control centers, and energy markets. An increase in connectivity introduces cybersecurity threats, particularly with the integration of the Internet of Things (IoT), edge computing, and data-driven algorithms. To address these vulnerabilities and potential attacks within the intelligent power system, privacy-preserving machine learning (PPML) techniques have been employing. This study aims to highlight the importance of PPML approaches in the context of IoT-based smart grids. The survey explored the critical role of privacy-preserving machine learning (PPML) techniques in IoT-integrated smart grids, which are essential for enhancing both data security and operational efficiency. While the research in this field is promising, significant challenges remain for practical deployment. The review provides valuable insights into various cybersecurity threats and the mechanisms of PPML related to data-driven grid operations, including dynamic pricing, load management, demand response, fault localization, anomaly detection, state estimation, and optimal energy dispatch and scheduling. It also discussed the challenges associated with privacy, scalability, heterogeneity, and interoperability of PPML methods in IoT-based smart grids while suggesting that blockchain technology and decentralized learning may be promising directions for future research. The integration of PPML into IoT-based smart grids is a transformative step forward, but it requires a concerted effort from all stakeholders to address the challenges and seize the opportunities in this rapidly evolving domain.

Author Contributions

Conceptualization, M.A. and B.J.C.; methodology, M.A. and B.J.C.; formal analysis, M.A., M.S. and B.J.C.; investigation, M.A. and M.S.; resources, B.J.C.; writing—original draft preparation, M.A. and M.S.; writing—review and editing, M.A., M.S. and B.J.C.; visualization, M.A., M.S., S.S.A. and B.J.C.; supervision, B.J.C.; project administration, B.J.C.; funding acquisition, B.J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the MSIT Korea under the NRF Korea (RS-2025-00557379, 90%) and the Information Technology Research Center (ITRC) support program (IITP-2025-RS-2020-II201602, 10%) supervised by the IITP.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflicts of interest. The funders has no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Abbreviations

The following abbreviations are used in this manuscript:
SGSmart Grid
IoTInternet of Things
PPMLPrivacy-Preserving Machine Learning
CPSCyber–Physical System
DPDifferential Privacy
MPCMultiparty Computation
HEHomomorphic Encryption
FLFederated Learning
TEETrusted Execution Environment
ZKPZero-Knowledge Proof
ICTInformation and Communication Technology
EVElectric Vehicle
DERDistributed Energy Resource
AMIAdvanced Metering Infrastructure
PMUPhasor Measurement Unit
CIAConfidentiality, Integrity, and Availability
DoSDenial-of-Service
DDoSDistributed Denial-of-Service
SCADASupervisory Control and Data Acquisition
ICSIndustrial Control System
VPNVirtual Private Network
MFAMulti-Factor Authentication
IDPSIntrusion-Detection and -Prevention System
IDSIntrusion-Detection System
DPIDeep Packet Inspection
FDIFalse Data Injection
FCIFalse Command Injection
MITMMan-In-The-Middle
AESAdvanced Encryption Standard
TSLTransport Layer Security
PKIPublic Key Infrastructure
MLMachine Learning
IAMIdentity and Access Management
RBACRole-Based Access Control
TPMTrusted Platform Modules
PG&EPacific Gas and Electric Company
EMSEnergy Management System
SDSynthetic Data
SMPCSecure Multiparty Computation
IEDIntelligent Electronic Device
EQEquivalence Classes
PIIPersonally Identifiable Information
QIQuasi-Identifier
LDPLocal Differential Privacy
SpDPSpectral Differential Privacy
TrDPTrajectory-level DP
PDPPersonalized Differential Privacy
NILMNon-Intrusive Load Monitoring
DDPDistributed Differential Privacy
RDPRandom Differential Privacy
DPMLDifferentially Private Machine Learning
PPMM-DAPrivacy-Preserving Multi-Dimensional and Multi-Subset Data Aggregation
GANGenerative Adversarial Network
RNNRecurrent Neural Network
CNNConvolutional Neural Network
NILMNon-Intrusive Load Monitoring
VAEVariational Autoencoder
GMMGaussian Mixture Model
DP-SGDDifferentially Private Stochastic Gradient Descent
SD3Stable Diffusion 3

References

  1. Hu, Y. Research on Industry 4.0 smart grid monitoring and energy management based on data mining and Internet of Things technology. Therm. Sci. Eng. Prog. 2024, 54, 102830. [Google Scholar] [CrossRef]
  2. Faheem, M.; Shah, S.B.H.; Butt, R.A.; Raza, B.; Anwar, M.; Ashraf, M.W.; Ngadi, M.A.; Gungor, V.C. Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges. Comput. Sci. Rev. 2018, 30, 1–30. [Google Scholar] [CrossRef]
  3. Goudarzi, A.; Ghayoor, F.; Waseem, M.; Fahad, S.; Traore, I. A survey on IoT-enabled smart grids: Emerging, applications, challenges, and outlook. Energies 2022, 15, 6984. [Google Scholar] [CrossRef]
  4. Ahmad, T.; Madonski, R.; Zhang, D.; Huang, C.; Mujeeb, A. Data-driven probabilistic machine learning in sustainable smart energy/smart energy systems: Key developments, challenges, and future research opportunities in the context of smart grid paradigm. Renew. Sustain. Energy Rev. 2022, 160, 112128. [Google Scholar] [CrossRef]
  5. Ozay, M.; Esnaola, I.; Vural, F.T.Y.; Kulkarni, S.R.; Poor, H.V. Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 2015, 27, 1773–1786. [Google Scholar] [CrossRef]
  6. Kim, Y.; Hakak, S.; Ghorbani, A. Smart grid security: Attacks and defence techniques. IET Smart Grid 2023, 6, 103–123. [Google Scholar] [CrossRef]
  7. Berghout, T.; Benbouzid, M.; Muyeen, S. Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects. Int. J. Crit. Infrastruct. Prot. 2022, 38, 100547. [Google Scholar] [CrossRef]
  8. Mirzaee, P.H.; Shojafar, M.; Cruickshank, H.; Tafazolli, R. Smart grid security and privacy: From conventional to machine learning issues (threats and countermeasures). IEEE Access 2022, 10, 52922–52954. [Google Scholar] [CrossRef]
  9. Mohammed, S.H.; Al-Jumaily, A.; Singh, M.S.J.; Jiménez, V.P.G.; Jaber, A.S.; Hussein, Y.S.; Al-Najjar, M.M.A.K.; Al-Jumeily, D. A review on the evaluation of feature selection using machine learning for cyber-attack detection in smart grid. IEEE Access 2024, 12, 44023–44042. [Google Scholar] [CrossRef]
  10. Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
  11. Tomin, N.V.; Kurbatsky, V.G.; Sidorov, D.N.; Zhukov, A.V. Machine learning techniques for power system security assessment. IFAC-PapersOnLine 2016, 49, 445–450. [Google Scholar] [CrossRef]
  12. Al-Ali, A.; Gupta, R.; Zualkernan, I.; Das, S.K. Role of IoT technologies in big data management systems: A review and Smart Grid case study. Pervasive Mob. Comput. 2024, 100, 101905. [Google Scholar] [CrossRef]
  13. Zheng, R.; Sumper, A.; Aragüés-Peñalba, M.; Galceran-Arellano, S. Advancing Power System Services with Privacy-preserving Federated Learning Techniques: A Review. IEEE Access 2024, 12, 76753–76780. [Google Scholar] [CrossRef]
  14. Baksh, R.; Itoo, S.; Ahmad, M. A comprehensive and secure scheme for privacy-preserving smart meter data aggregation in the smart grid. Sustain. Energy Grids Netw. 2024, 39, 101461. [Google Scholar] [CrossRef]
  15. Cui, L.; Qu, Y.; Gao, L.; Xie, G.; Yu, S. Detecting false data attacks using machine learning techniques in smart grid: A survey. J. Netw. Comput. Appl. 2020, 170, 102808. [Google Scholar] [CrossRef]
  16. Triantafyllou, A.; Jimenez, J.A.P.; Torres, A.D.R.; Lagkas, T.; Rantos, K.; Sarigiannidis, P. The challenges of privacy and access control as key perspectives for the future electric smart grid. IEEE Open J. Commun. Soc. 2020, 1, 1934–1960. [Google Scholar] [CrossRef]
  17. Ali, M.; Khan, M.U.; Ali, H.; Haseeb Nawaz, M.; Imran, K.; Wazir, R. Feasibility study for designing a standalone community based energy system to remove energy poverty in rural areas of Pakistan. In Proceedings of the International Conference on Renewable, Applied and New Energy Technologies (ICRANET 2018), Islamabad, Pakistan, 19–22 November 2018; pp. 113–118. [Google Scholar]
  18. Xie, W.; Jiang, Y.; Tang, Y.; Ding, N.; Gao, Y. Vulnerability detection in iot firmware: A survey. In Proceedings of the 2017 IEEE 23rd International conference on parallel and distributed systems (ICPADS), Shenzhen, China, 15–17 December 2017; pp. 769–772. [Google Scholar]
  19. Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M.; Ghadimi, N. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
  20. Gunduz, M.Z.; Das, R. Analysis of cyber-attacks on smart grid applications. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP ), Malatya, Turkey, 28–30 September 2018; pp. 1–5. [Google Scholar]
  21. Pandey, R.K.; Misra, M. Cyber security threats—Smart grid infrastructure. In Proceedings of the 2016 National Power Systems Conference (NPSC), Bhubaneswar, India, 19–21 December 2016; pp. 1–6. [Google Scholar]
  22. Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber threats to smart grids: Review, taxonomy, potential solutions, and future directions. Energies 2022, 15, 6799. [Google Scholar] [CrossRef]
  23. El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
  24. Gupta, B.B.; Akhtar, T. A survey on smart power grid: Frameworks, tools, security issues, and solutions. Ann. Telecommun. 2017, 72, 517–549. [Google Scholar] [CrossRef]
  25. Alomari, M.A.; Al-Andoli, M.N.; Ghaleb, M.; Thabit, R.; Alkawsi, G.; Alsayaydeh, J.A.J.; Gaid, A.S. Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions. Energies 2025, 18, 141. [Google Scholar] [CrossRef]
  26. Kramer, S.; Bradfield, J.C. A general definition of malware. J. Comput. Virol. 2010, 6, 105–114. [Google Scholar] [CrossRef]
  27. Thomas, S.L.; Francillon, A. Backdoors: Definition, deniability and detection. In Proceedings of the Research in Attacks, Intrusions, and Defenses: 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, 10–12 September 2018; Proceedings 21. Springer: Berlin/Heidelberg, Germany, 2018; pp. 92–113. [Google Scholar]
  28. Whitehead, D.E.; Owens, K.; Gammel, D.; Smith, J. Ukraine cyber-induced power outage: Analysis and practical mitigation strategies. In Proceedings of the 2017 70th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 3–6 April 2017; pp. 1–8. [Google Scholar]
  29. Baezner, M. Cyber and Information Warfare in the Ukrainian Conflict; Technical report, CSS Cyberdefense Hotspot Analysis, No. 1; Center for Security Studies (CSS), ETH Zürich: Zurich, Switzerland, October 2018; Available online: https://www.research-collection.ethz.ch/handle/20.500.11850/321570 (accessed on 20 February 2025).
  30. Kozak, P.; Klaban, I.; Šlajs, T. Industroyer cyber-attacks on Ukraine’s critical infrastructure. In Proceedings of the 2023 International Conference on Military Technologies (ICMT), Brno, Czech Republic, 23–26 May 2023; pp. 1–6. [Google Scholar]
  31. Beerman, J.; Berent, D.; Falter, Z.; Bhunia, S. A review of colonial pipeline ransomware attack. In Proceedings of the 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India, 1–4 May 2023; pp. 8–15. [Google Scholar]
  32. Gasti, P.; Tsudik, G.; Uzun, E.; Zhang, L. DoS and DDoS in named data networking. In Proceedings of the 2013 22nd International Conference on Computer Communication and Networks (ICCCN), Nassau, Bahamas, 30 July–2 August 2013; pp. 1–7. [Google Scholar]
  33. Alcoy, P.; Bjarnason, S.; Bowen, P.; Chui, C.F.; Kasavchnko, K. Arbor’s 13th Annual Worldwide Infrastructure Security Report. Netscouth: Pune, Maharashtra, 1 January 2018. [Google Scholar]
  34. Huseinović, A.; Mrdović, S.; Bicakci, K.; Uludag, S. A survey of denial-of-service attacks and solutions in the smart grid. IEEE Access 2020, 8, 177447–177470. [Google Scholar] [CrossRef]
  35. Yılmaz, E.N.; Sayan, H.H.; Üstünsoy, F.; Gönen, S.; Karacayılmaz, G. Cyber security analysis of DoS and MitM attacks against PLCs used in smart grids. In Proceedings of the 7th International Istanbul Smart Grids and Cities Congress and Fair (ICSG), Istanbul, Turkey, 25–26 April 2019; Volume 36, p. 40. [Google Scholar]
  36. Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies; US-CERT Defense In Depth: Washington, DC, USA, 2009.
  37. Pillitteri, V.Y.; Brewer, T.L. Guidelines for Smart Grid Cybersecurity: NISTIR 7628 Revision 1; National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2014. [Google Scholar]
  38. Rajesh, L.; Satyanarayana, P. Detection and blocking of replay, false command, and false access injection commands in scada systems with modbus protocol. Secur. Commun. Networks 2021, 8887666, 15. [Google Scholar]
  39. Cruz, T.; Rosa, L.; Proença, J.; Maglaras, L.; Aubigny, M.; Lev, L.; Jiang, J.; Simões, P. A cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans. Ind. Inform. 2016, 12, 2236–2246. [Google Scholar] [CrossRef]
  40. Yang, Y.; McLaughlin, K.; Sezer, S.; Littler, T.; Im, E.G.; Pranggono, B.; Wang, H. Multiattribute SCADA-specific intrusion detection system for power networks. IEEE Trans. Power Deliv. 2014, 29, 1092–1102. [Google Scholar] [CrossRef]
  41. Yang, Y.; Xu, H.Q.; Gao, L.; Yuan, Y.B.; McLaughlin, K.; Sezer, S. Multidimensional intrusion detection system for IEC 61850-based SCADA networks. IEEE Trans. Power Deliv. 2016, 32, 1068–1078. [Google Scholar] [CrossRef]
  42. Almalawi, A.; Fahad, A.; Tari, Z.; Alamri, A.; AlGhamdi, R.; Zomaya, A.Y. An efficient data-driven clustering technique to detect attacks in SCADA systems. IEEE Trans. Inf. Forensics Secur. 2015, 11, 893–906. [Google Scholar] [CrossRef]
  43. Zhang, F.; Kodituwakku, H.A.D.E.; Hines, J.W.; Coble, J. Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data. IEEE Trans. Ind. Inform. 2019, 15, 4362–4369. [Google Scholar] [CrossRef]
  44. Maglaras, L.A.; Jiang, J. A novel intrusion detection method based on OCSVM and K-means recursive clustering. EAI Endorsed Trans. Secur. Saf. 2015, 2, e5. [Google Scholar] [CrossRef]
  45. Maglaras, L.A.; Jiang, J.; Cruz, T.J. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems. J. Inf. Secur. Appl. 2016, 30, 15–26. [Google Scholar] [CrossRef]
  46. Pashaei, A.; Akbari, M.E.; Lighvan, M.Z.; Charmin, A. Early Intrusion Detection System using honeypot for industrial control networks. Results Eng. 2022, 16, 100576. [Google Scholar] [CrossRef]
  47. Yusheng, W.; Kefeng, F.; Yingxu, L.; Zenghui, L.; Ruikang, Z.; Xiangzhen, Y.; Lin, L. Intrusion detection of industrial control system based on Modbus TCP protocol. In Proceedings of the 2017 IEEE 13th International Symposium on Autonomous Decentralized System (ISADS), Bangkok, Thailand, 22–24 March 2017; pp. 156–162. [Google Scholar]
  48. Elrawy, M.F.; Hadjidemetriou, L.; Laoudias, C.; Michael, M.K. Detecting and classifying man-in-the-middle attacks in the private area network of smart grids. Sustain. Energy Grids Netw. 2023, 36, 101167. [Google Scholar] [CrossRef]
  49. Slunjski, M.; Sumina, D.; Groš, S.; Erceg, I. Off-the-shelf solutions as potential cyber threats to industrial environments and simple-to-implement protection methodology. IEEE Access 2022, 10, 114735–114748. [Google Scholar] [CrossRef]
  50. Nam, S.Y.; Jurayev, S.; Kim, S.S.; Choi, K.; Choi, G.S. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN. Eurasip J. Wirel. Commun. Netw. 2012, 2012, 89. [Google Scholar] [CrossRef]
  51. Kumar, N.; Mishra, V.M.; Kumar, A. Smart grid security with AES hardware chip. Int. J. Inf. Technol. 2020, 12, 49–55. [Google Scholar] [CrossRef]
  52. Wu, D.; Zhou, C. Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2011, 2, 375–381. [Google Scholar] [CrossRef]
  53. Tu, C.; He, X.; Shuai, Z.; Jiang, F. Big data issues in smart grid—A review. Renew. Sustain. Energy Rev. 2017, 79, 1099–1107. [Google Scholar] [CrossRef]
  54. Gough, M.B.; Santos, S.F.; AlSkaif, T.; Javadi, M.S.; Castro, R.; Catalão, J.P. Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Ind. Inform. 2021, 18, 707–718. [Google Scholar] [CrossRef]
  55. Vojković, G.; Milenković, M.; Katulić, T. IoT and smart home data breach risks from the perspective of data protection and information security law. Bus. Syst. Res. Int. J. Soc. Adv. Innov. Res. Econ. 2020, 11, 167–185. [Google Scholar] [CrossRef]
  56. Peretti, K.K. Data breaches: What the underground world of “carding” reveals. Santa Clara Comput. High Tech. 2008, 25, 375. [Google Scholar]
  57. Manworren, N.; Letwat, J.; Daily, O. Why you should care about the Target data breach. Bus. Horizons 2016, 59, 257–266. [Google Scholar] [CrossRef]
  58. Case, D.U. Analysis of the cyber attack on the Ukrainian power grid. Electr. Inf. Shar. Anal. Cent. (E-ISAC) 2016, 388, 3. [Google Scholar]
  59. Khan, R.; Maynard, P.; McLaughlin, K.; Laverty, D.; Sezer, S. Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Belfast, UK, 23–25 August 2016; pp. 53–63. [Google Scholar]
  60. Nayak, S.K.; Ojha, A.C. Data Leakage Detection and Prevention: Review and Research Directions. In Machine Learning and Information Processing; Swain, D., Pattnaik, P.K., Gupta, P.K., Eds.; Springer: Singapore, 2020; pp. 203–212. [Google Scholar]
  61. Blunt, K. California Burning: The Fall of Pacific Gas and Electric–and What It Means for America’s Power Grid; Penguin: London, UK, 2022. [Google Scholar]
  62. Allen, J. An Examination of US Offensive Cyber Operations in Response to Russian State Sponsored Attacks Against the US Energy Sector. Master’s Thesis, Utica College, Utica, NY, USA, 2020. [Google Scholar]
  63. Lee, E.K.; Gerla, M.; Oh, S.Y. Physical layer security in wireless smart grid. IEEE Commun. Mag. 2012, 50, 46–52. [Google Scholar] [CrossRef]
  64. Islam, S.N.; Baig, Z.; Zeadally, S. Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures. IEEE Trans. Ind. Inform. 2019, 15, 6522–6530. [Google Scholar] [CrossRef]
  65. Basnet, M.; Poudyal, S.; Ali, M.H.; Dasgupta, D. Ransomware detection using deep learning in the SCADA system of electric vehicle charging station. In Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Conference-Latin America (ISGT Latin America), Lima, Peru, 15–17 September 2021; pp. 1–5. [Google Scholar]
  66. Liu, S.; Liu, X.P.; El Saddik, A. Denial-of-Service (dos) attacks on load frequency control in smart grids. In Proceedings of the 2013 IEEE Pes Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6. [Google Scholar]
  67. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef]
  68. Samuel, O.; Javaid, N. GarliChain: A privacy preserving system for smart grid consumers using blockchain. Int. J. Energy Res. 2022, 46, 21643–21659. [Google Scholar] [CrossRef]
  69. Dong, X.; Lin, H.; Tan, R.; Iyer, R.K.; Kalbarczyk, Z. Software-defined networking for smart grid resilience: Opportunities and challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, New York, NY, USA, 14 April 2015; pp. 61–68. [Google Scholar]
  70. Wei, L.; Rondon, L.P.; Moghadasi, A.; Sarwat, A.I. Review of cyber–physical attacks and counter defense mechanisms for advanced metering infrastructure in smart grid. In Proceedings of the 2018 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Denver CO, USA, 16–19 April 2018; pp. 1–9. [Google Scholar]
  71. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
  72. Dehalwar, V.; Kolhe, M.L.; Deoli, S.; Jhariya, M.K. Blockchain-based trust management and authentication of devices in smart grid. Clean. Eng. Technol. 2022, 8, 100481. [Google Scholar] [CrossRef]
  73. Li, M.; Hu, D.; Lal, C.; Conti, M.; Zhang, Z. Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things. IEEE Trans. Ind. Inform. 2020, 16, 6564–6574. [Google Scholar] [CrossRef]
  74. Yang, D.; Mashima, D.; Lin, W.; Zhou, J. DecIED: Scalable k-anonymous deception for iec61850-compliant smart grid systems. In Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, Taipei, Taiwan, 6 October 2020; pp. 54–65. [Google Scholar]
  75. Alsaid, M.; Bulusu, N.; Adham, M.; Bass, R.B. Distributed energy resource management systems: Preserving customer privacy through k-anonymity. In Proceedings of the 2023 IEEE Power & Energy Society General Meeting (PESGM), Orlando FL, USA, 16–20 July 2023; pp. 1–5. [Google Scholar]
  76. Brunn, C.; von Voigt, S.N.; Tschorsch, F. Analyzing Continuous K s-Anonymization for Smart Meter Data. In Proceedings of the European Symposium on Research in Computer Security, The Hague, The Netherlands, 25–29 September 2023; Springer: Berlin/Heidelberg, Germany, 2023; pp. 272–282. [Google Scholar]
  77. Zhai, F.; Liang, X.; Qin, Y.; Li, B.; Shen, L.; Xie, J. Privacy-preserving method for sensitive partitions of electricity consumption data based on hybrid differential privacy and k-anonymity. J. Phys. Conf. Ser. 2024, 2806, 012010. [Google Scholar] [CrossRef]
  78. Gai, N.; Xue, K.; Zhu, B.; Yang, J.; Liu, J.; He, D. An efficient data aggregation scheme with local differential privacy in smart grid. Digit. Commun. Netw. 2022, 8, 333–342. [Google Scholar] [CrossRef]
  79. Parker, K.; Hale, M.; Barooah, P. Spectral differential privacy: Application to smart meter data. IEEE Internet Things J. 2021, 9, 4987–4996. [Google Scholar] [CrossRef]
  80. Zhao, S.; Xu, S.; Han, S.; Ren, S.; Wang, Y.; Chen, Z.; Chen, X.; Lin, J.; Liu, W. PPMM-DA: Privacy-preserving multi-dimensional and multi-subset data aggregation with differential privacy for fog-based smart grids. IEEE Internet Things J. 2023, 11, 6096–6110. [Google Scholar] [CrossRef]
  81. Bhattacharjee, A.; Badsha, S.; Sengupta, S. Personalized privacy preservation for smart grid. In Proceedings of the 2021 IEEE International Smart Cities Conference (ISC2), Manchester, UK, 7–10 September 2021; pp. 1–7. [Google Scholar]
  82. Ravi, N.; Scaglione, A.; Peisert, S.; Pradhan, P. Differentially Private Communication of Measurement Anomalies in the Smart Grid. arXiv 2024, arXiv:2403.02324. [Google Scholar]
  83. Zheng, Z.; Wang, T.; Bashir, A.K.; Alazab, M.; Mumtaz, S.; Wang, X. A decentralized mechanism based on differential privacy for privacy-preserving computation in smart grid. IEEE Trans. Comput. 2021, 71, 2915–2926. [Google Scholar] [CrossRef]
  84. Qashlan, A.; Nanda, P.; Mohanty, M. Differential privacy model for blockchain based smart home architecture. Future Gener. Comput. Syst. 2024, 150, 49–63. [Google Scholar] [CrossRef]
  85. Hassan, M.U.; Rehmani, M.H.; Kotagiri, R.; Zhang, J.; Chen, J. Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 2019, 131, 69–80. [Google Scholar] [CrossRef]
  86. Fekri, M.N.; Ghosh, A.M.; Grolinger, K. Generating energy data for machine learning with recurrent generative adversarial networks. Energies 2019, 13, 130. [Google Scholar] [CrossRef]
  87. Song, L.; Li, Y.; Lu, N. ProfileSR-GAN: A GAN based super-resolution method for generating high-resolution load profiles. IEEE Trans. Smart Grid 2022, 13, 3278–3289. [Google Scholar] [CrossRef]
  88. Chai, S.; Chadney, G.; Avery, C.; Grunewald, P.; Van Hentenryck, P.; Donti, P.L. Defining’Good’: Evaluation Framework for Synthetic Smart Meter Data. arXiv 2024, arXiv:2407.11785. [Google Scholar]
  89. Zhang, C.; Kuppannagari, S.R.; Kannan, R.; Prasanna, V.K. Generative adversarial network for synthetic time series data generation in smart grids. In Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aalborg, Denmark, 29–31 October 2018; pp. 1–6. [Google Scholar]
  90. Mestav, K.R.; Tong, L. State estimation in smart distribution systems with deep generative adversary networks. In Proceedings of the 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21–23 October 2019; pp. 1–6. [Google Scholar]
  91. Zhang, S.; Cheng, Y.; Yu, N. Generating synthetic net load data with physics-informed diffusion model. arXiv 2024, arXiv:2406.01913. [Google Scholar]
  92. Aldegheishem, A.; Anwar, M.; Javaid, N.; Alrajeh, N.; Shafiq, M.; Ahmed, H. Towards sustainable energy efficiency with intelligent electricity theft detection in smart grids emphasising enhanced neural networks. IEEE Access 2021, 9, 25036–25061. [Google Scholar] [CrossRef]
  93. Croce, D.; Giuliano, F.; Tinnirello, I.; Giarré, L. Privacy-preserving overgrid: Secure data collection for the smart grid. Sensors 2020, 20, 2249. [Google Scholar] [CrossRef]
  94. Ababneh, M.; Kolachala, K.; Vishwanathan, R. Private and Secure Smart Meter Billing. In Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, Nagasaki, Japan, 30 May 2022; pp. 15–25. [Google Scholar]
  95. Rahman, M.A.; Manshaei, M.H.; Al-Shaer, E.; Shehab, M. Secure and private data aggregation for energy consumption scheduling in smart grids. IEEE Trans. Dependable Secur. Comput. 2015, 14, 221–234. [Google Scholar] [CrossRef]
  96. Guan, Z.; Zhou, X.; Liu, P.; Wu, L.; Yang, W. A blockchain-based dual-side privacy-preserving multiparty computation scheme for edge-enabled smart grid. IEEE Internet Things J. 2021, 9, 14287–14299. [Google Scholar] [CrossRef]
  97. von der Heyden, J.; Schlüter, N.; Binfet, P.; Asman, M.; Zdrallek, M.; Jager, T.; Darup, M.S. Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation. IEEE Trans. Smart Grid 2024, 16, 344–355. [Google Scholar] [CrossRef]
  98. Franke, M.; Stanojev, O.; Mitridati, L.; Hug, G. Privacy-preserving distributed market mechanism for active distribution networks. Electr. Power Syst. Res. 2024, 234, 110616. [Google Scholar] [CrossRef]
  99. Wang, N.; Chau, S.C.K.; Zhou, Y. Privacy-preserving energy storage sharing with blockchain and secure multi-party computation. Acm Sigenergy Energy Inform. Rev. 2021, 1, 32–50. [Google Scholar] [CrossRef]
  100. Mustafa, M.A.; Cleemput, S.; Aly, A.; Abidin, A. A secure and privacy-preserving protocol for smart metering operational data collection. IEEE Trans. Smart Grid 2019, 10, 6481–6490. [Google Scholar] [CrossRef]
  101. Xie, S.; Wang, H.; Hong, Y.; Thai, M. Privacy preserving distributed energy trading. In Proceedings of the 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), Singapore, 29 November–1 December 2020; pp. 322–332. [Google Scholar]
  102. Fan, H.; Fan, X.; Wei, W.; Hao, T.; Chen, K.; Wang, G.; Xu, W. Privacy preserving ultra-short-term prediction in clustered wind farms with encrypted data sharing: A secure multi-party computation approach. Expert Syst. Appl. 2025, 278, 127218. [Google Scholar] [CrossRef]
  103. Saputro, N.; Akkaya, K. Performance evaluation of smart grid data aggregation via homomorphic encryption. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, 1–4 April 2012; pp. 2945–2950. [Google Scholar]
  104. Foti, M. Privacy-preserving market-driven transactive energy system using homomorphic encryption. In Proceedings of the 2023 19th International Conference on the European Energy Market (EEM), Lappeenranta, Finland, 6–8 June 2023; pp. 1–8. [Google Scholar]
  105. Xu, W.; Sun, J.; Cardell-Oliver, R.; Mian, A.; Hong, J.B. A privacy-preserving framework using homomorphic encryption for smart metering systems. Sensors 2023, 23, 4746. [Google Scholar] [CrossRef] [PubMed]
  106. Guo, C.; Jiang, X.; Choo, K.K.R.; Tang, X.; Zhang, J. Lightweight privacy preserving data aggregation with batch verification for smart grid. Future Gener. Comput. Syst. 2020, 112, 512–523. [Google Scholar] [CrossRef]
  107. Alabdulatif, A.; Kumarage, H.; Khalil, I.; Atiquzzaman, M.; Yi, X. Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. IET Wirel. Sens. Syst. 2017, 7, 182–190. [Google Scholar] [CrossRef]
  108. Braeken, A.; Kumar, P.; Martin, A. Efficient and privacy-preserving data aggregation and dynamic billing in smart grid metering networks. Energies 2018, 11, 2085. [Google Scholar] [CrossRef]
  109. Bos, J.W.; Castryck, W.; Iliashenko, I.; Vercauteren, F. Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling. In Proceedings of the International Conference on Cryptology in Africa, Dakar, Senegal, 24–26 May 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 184–201. [Google Scholar]
  110. Mai, V.; Khalil, I. Design and implementation of a secure cloud-based billing model for smart meters as an Internet of Things using homomorphic cryptography. Future Gener. Comput. Syst. 2017, 72, 327–338. [Google Scholar] [CrossRef]
  111. Parameswarath, R.P.; Gope, P.; Sikdar, B. User-empowered privacy-preserving authentication protocol for electric vehicle charging based on decentralized identity and verifiable credential. ACM Trans. Manag. Inf. Syst. (TMIS) 2022, 13, 1–21. [Google Scholar] [CrossRef]
  112. Li, Z.; Xu, H.; Zhai, F.; Zhao, B.; Xu, M.; Guo, Z. A privacy-preserving, two-party, secure computation mechanism for consensus-based peer-to-peer energy trading in the smart grid. Sensors 2022, 22, 9020. [Google Scholar] [CrossRef]
  113. Ma, Y.; Qiu, J.; Sun, X.; Tao, Y. A Novel Cryptography-based Architecture to Achieve Secure Energy Trading in Microgrid. IEEE Trans. Smart Grid 2023, 15, 2056–2072. [Google Scholar] [CrossRef]
  114. Sebastian, D.; Agrawal, U.; Tamimi, A.; Hahn, A. DER-TEE: Secure distributed energy resource operations through trusted execution environments. IEEE Internet Things J. 2019, 6, 6476–6486. [Google Scholar] [CrossRef]
  115. Li, Z.; Mashima, D.; Ong, W.S.; Esiner, E.; Kalbarczyk, Z.; Chang, E.C. On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers. In Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, Singapore, 1–5 July 2024; pp. 947–961. [Google Scholar]
  116. Will, N.C.; Valadares, D.C.G.; Santos, D.F.D.S.; Perkusich, A. Intel software guard extensions in Internet of Things scenarios: A systematic mapping study. In Proceedings of the 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud), Rome, Italy, 23–25 August 2021; pp. 342–349. [Google Scholar]
  117. Li, S.; Xue, K.; Wei, D.S.; Yue, H.; Yu, N.; Hong, P. SecGrid: A secure and efficient SGX-enabled smart grid system with rich functionalities. IEEE Trans. Inf. Forensics Secur. 2019, 15, 1318–1330. [Google Scholar] [CrossRef]
  118. Ali, M.; Singh, A.K.; Kumar, A.; Ali, S.S.; Choi, B.J. Comparative analysis of data-driven algorithms for building energy planning via federated learning. Energies 2023, 16, 6517. [Google Scholar] [CrossRef]
  119. Husnoo, M.A.; Anwar, A.; Reda, H.T.; Hosseinzadeh, N.; Islam, S.N.; Mahmood, A.N.; Doss, R. FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination. Energy AI 2023, 14, 100271. [Google Scholar] [CrossRef]
  120. Singh, V.K.; Tucker, E.; Rath, S. Federated Machine Learning-Based Anomaly Detection System for Synchrophasor Network Using Heterogeneous Data Sets; Technical Report; National Renewable Energy Laboratory (NREL): Golden, CO, USA, 2024. [Google Scholar]
  121. Su, Z.; Wang, Y.; Luan, T.H.; Zhang, N.; Li, F.; Chen, T.; Cao, H. Secure and efficient federated learning for smart grid with edge-cloud collaboration. IEEE Trans. Ind. Inform. 2021, 18, 1333–1344. [Google Scholar] [CrossRef]
  122. Jithish, J.; Alangot, B.; Mahalingam, N.; Yeo, K.S. Distributed anomaly detection in smart grids: A federated learning-based approach. IEEE Access 2023, 11, 7157–7179. [Google Scholar] [CrossRef]
  123. Lin, W.T.; Chen, G.; Huang, Y. Incentive edge-based federated learning for false data injection attack detection on power grid state estimation: A novel mechanism design approach. Appl. Energy 2022, 314, 118828. [Google Scholar] [CrossRef]
  124. Husnoo, M.A.; Anwar, A.; Reda, H.T.; Hosseinzadeh, N.; Islam, S.N.; Mahmood, A.N.; Doss, R. Fedisa: A semi-asynchronous federated learning framework for power system fault and cyberattack discrimination. In Proceedings of the IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken NJ, USA, 20 May 2023; pp. 1–6. [Google Scholar]
  125. Taheri, S.I.; Davoodi, M.; Ali, M.H. A modified modeling approach of virtual power plant via improved federated learning. Int. J. Electr. Power Energy Syst. 2024, 158, 109905. [Google Scholar] [CrossRef]
  126. Yang, Y.; Wang, Z.; Zhao, S.; Wu, J. An integrated federated learning algorithm for short-term load forecasting. Electr. Power Syst. Res. 2023, 214, 108830. [Google Scholar] [CrossRef]
  127. Li, Y.; Li, Y. Semi-supervised federated learning for collaborative security threat detection in control system for distributed power generation. Eng. Appl. Artif. Intell. 2025, 148, 110374. [Google Scholar] [CrossRef]
  128. Gupta, H.; Agarwal, P.; Gupta, K.; Baliarsingh, S.; Vyas, O.; Puliafito, A. Fedgrid: A secure framework with federated learning for energy optimization in the smart grid. Energies 2023, 16, 8097. [Google Scholar] [CrossRef]
  129. Li, Y.; Wang, R.; Li, Y.; Zhang, M.; Long, C. Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach. Appl. Energy 2023, 329, 120291. [Google Scholar] [CrossRef]
  130. Ali, S.S.; Ali, M.; Bhatti, D.M.S.; Choi, B.J. dy-TACFL: Dynamic Temporal Adaptive Clustered Federated Learning for Heterogeneous Clients. Electronics 2025, 14, 152. [Google Scholar] [CrossRef]
  131. Barros, R.M.R.; da Costa, E.G.; Araujo, J.F. Maximizing the financial return of non-technical loss management in power distribution systems. IEEE Trans. Power Syst. 2021, 37, 1634–1641. [Google Scholar] [CrossRef]
  132. Adewole, K.S.; Torra, V. Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks. In Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT), Rome, Italy, 10–12 July 2023; SciTePress: Setúbal, Portugal, 2023; pp. 279–286. [Google Scholar]
  133. Syed, D.; Refaat, S.S.; Bouhali, O. Privacy preservation of data-driven models in smart grids using homomorphic encryption. Information 2020, 11, 357. [Google Scholar] [CrossRef]
  134. Abdallah, A.; Shen, X.S. A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 2016, 9, 396–405. [Google Scholar] [CrossRef]
  135. Zhou, X.; Wang, B.; Guo, Q.; Sun, H.; Pan, Z.; Tian, N. Bidirectional privacy-preserving network-constrained peer-to-peer energy trading based on secure multiparty computation and blockchain. IEEE Trans. Power Syst. 2023, 39, 602–613. [Google Scholar] [CrossRef]
  136. Ali, S.S.; Kumar, A.; Ali, M.; Singh, A.K.; Choi, B.J. Temporal adaptive clustering for heterogeneous clients in federated learning. In Proceedings of the 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam, 17–19 January 2024; pp. 11–16. [Google Scholar]
  137. Long, Y.; Chen, Y.; Ren, W.; Dou, H.; Xiong, N.N. Depet: A decentralized privacy-preserving energy trading scheme for vehicular energy network via blockchain and k-anonymity. IEEE Access 2020, 8, 192587–192596. [Google Scholar] [CrossRef]
  138. El-Afifi, M.I.; Sedhom, B.E.; Padmanaban, S.; Eladl, A.A. A review of IoT-enabled smart energy hub systems: Rising, applications, challenges, and future prospects. Renew. Energy Focus 2024, 51, 100634. [Google Scholar] [CrossRef]
  139. Tran, H.Y.; Hu, J.; Pota, H.R. Smart meter data obfuscation with a hybrid privacy-preserving data publishing scheme without a trusted third party. IEEE Internet Things J. 2022, 9, 16080–16095. [Google Scholar] [CrossRef]
  140. Ramana K., V.; Yadav G., H. K.; Basha P., H.; Sambasivarao, L.; Rao, Y.B.K. Secure and efficient energy trading using homomorphic encryption on the green trade platform. Int. J. Intell. Syst. Appl. Eng. 2023, 12, 345–360. [Google Scholar]
  141. Vu, D.H.; Luong, T.D.; Ho, T.B. An efficient approach for secure multi-party computation without authenticated channel. Inf. Sci. 2020, 527, 356–368. [Google Scholar] [CrossRef]
  142. Ali, M.; Kumar, A.; Choi, B.J. Privacy Preserving Federated Learning for Energy Disaggregation of Smart Homes. IET Cyber-Phys. Syst. Theory Appl. 2025, 10, e70013. [Google Scholar] [CrossRef]
  143. Chen, Z.; Jiang, Y.; Song, X.; Chen, L. A survey on zero-knowledge authentication for Internet of Things. Electronics 2023, 12, 1145. [Google Scholar] [CrossRef]
  144. Ziller, A.; Trask, A.; Lopardo, A.; Szymkow, B.; Wagner, B.; Bluemke, E.; Nounahon, J.M.; Passerat-Palmbach, J.; Prakash, K.; Rose, N.; et al. Pysyft: A library for easy federated learning. Fed. Learn. Syst. Towards-Next-Gener. AI 2021, 965, 111–139. [Google Scholar]
  145. Ma, J.; Zheng, Y.; Feng, J.; Zhao, D.; Wu, H.; Fang, W.; Tan, J.; Yu, C.; Zhang, B.; Wang, L. {SecretFlow-SPU}: A performant and {User-Friendly} framework for {Privacy-Preserving} machine learning. In Proceedings of the 2023 USENIX Annual Technical Conference (USENIX ATC 23), Boston MA, USA, 10–12 July 2023; pp. 17–33. [Google Scholar]
  146. Bhadani, R. A Survey on Differential Privacy for SpatioTemporal Data in Transportation Research. arXiv 2024, arXiv:2407.15868. [Google Scholar]
  147. Zeng, Z.; Fang, Z.; Chen, L.; Gao, Y.; Zheng, K.; Chen, G. FedCTQ: A Federated-Based Framework for Accurate and Efficient Contact Tracing Query. In Proceedings of the 2024 IEEE 40th International Conference on Data Engineering (ICDE), Utrecht, The Netherlands, 13–16 May 2024; pp. 4628–4642. [Google Scholar]
  148. Benaissa, A.; Retiat, B.; Cebere, B.; Belfedhal, A.E. Tenseal: A library for encrypted tensor operations using homomorphic encryption. arXiv 2021, arXiv:2104.03152. [Google Scholar]
  149. Ali, M.; Kumar, A.; Choi, B.J. Power Quality Forecasting of Microgrids Using Adaptive Privacy-Preserving Machine Learning. In Proceedings of the International Conference on Applied Cryptography and Network Security, Abu Dhabi, United Arab Emirates, 5–8 March 2024; Springer: Berlin/Heidelberg, Germany, 2024; pp. 235–245. [Google Scholar]
  150. Keller, M. MP-SPDZ: A versatile framework for multi-party computation. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 9–13 November 2020; pp. 1575–1590. [Google Scholar]
  151. Foley, P.; Sheller, M.J.; Edwards, B.; Pati, S.; Riviera, W.; Sharma, M.; Moorthy, P.N.; Wang, S.h.; Martin, J.; Mirhaji, P.; et al. OpenFL: The open federated learning library. Phys. Med. Biol. 2022, 67, 214001. [Google Scholar] [CrossRef]
  152. Acar, A.; Aksu, H.; Uluagac, A.S.; Conti, M. A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput. Surv. (CSUR) 2018, 51, 1–35. [Google Scholar] [CrossRef]
  153. Husnoo, M.A.; Anwar, A.; Chakrabortty, R.K.; Doss, R.; Ryan, M.J. Differential privacy for IoT-enabled critical infrastructure: A comprehensive survey. IEEE Access 2021, 9, 153276–153304. [Google Scholar] [CrossRef]
  154. Almanifi, O.R.A.; Chow, C.O.; Tham, M.L.; Chuah, J.H.; Kanesan, J. Communication and computation efficiency in federated learning: A survey. Internet Things 2023, 22, 100742. [Google Scholar] [CrossRef]
  155. Senol, N.S.; Baza, M.; Rasheed, A.; Alsabaan, M. Privacy-Preserving Detection of Tampered Radio-Frequency Transmissions Utilizing Federated Learning in LoRa Networks. Sensors 2024, 24, 7336. [Google Scholar] [CrossRef] [PubMed]
  156. Zeng, Z.; Li, Y.; Cao, Y.; Zhao, Y.; Zhong, J.; Sidorov, D.; Zeng, X. Blockchain technology for information security of the energy Internet: Fundamentals, features, strategy and application. Energies 2020, 13, 881. [Google Scholar] [CrossRef]
Figure 1. Categorization of the DoS attacks in smart grids.
Figure 1. Categorization of the DoS attacks in smart grids.
Energies 18 02515 g001
Table 1. Comparison of various intrusion-detection schemes for man-in-the-middle attacks, depending on the attack scenario.
Table 1. Comparison of various intrusion-detection schemes for man-in-the-middle attacks, depending on the attack scenario.
Features and Capabilities of IDSsIntrusion-Detection Schemes
[38][39][40,41][42][43][44,45][46][47][48][49][50]
Identify Two-way/One-way MITM attacks
Identify ARP poisoning-based MITM attacks
Identify eavesdropped packets
Identify MITM while intercepting
Identify attack victims
Consider customer privacy
Table 3. Differential privacy approaches used in IoT-integrated smart grids.
Table 3. Differential privacy approaches used in IoT-integrated smart grids.
DP ApproachDP MechanismAlgorithmTasksAdversaries or Attacks TypesPrivacy ParametersTask MetricsDataset
DDP (2021) [83]Laplace noiseEnergy aggregationNILMDishonest but non-intrusiveAccumulative error/Aggregation errorPrecision, Recall, F1-score6 households real-world, Switzerland
RDP (2024) [84]Gaussian noiseNeural NetworkClassification (attack/normal)Inference attacksPrivacy budget ( ϵ ) against accuracyCategorical cross-entropy loss, accuracy, F1-scoreUNSW-NB15, NSL-KDD, and ToN-IoT
DPML (2019) [85]Laplace noise with peak-factorEnergy aggregationDemand ResponseEavesdropping, curious-but-honest utility/aggregatorPrivacy budget ( ϵ )Percentage error of kWh(%)NREL
PPMM-DA (2023) [80]Geometric and Laplace noiseMultidimensional energy aggregationLoad monitoringDifferential attack, collision attack, eavesdropping, active attackPrivacy budget ( ϵ )Relative errorMathematical model
DP Chi-square (2024) [82]Gaussian noiseSystem state estimationAnomaly detectionStealth attack, FDI attack, untrusted third partyPrivacy budget ( ϵ , σ )Area under the ROC (AUROC)Values from mathematical model
PDP (2021) [81]Local DP on trusted distanceGraph TheoryEnergy PredictionCorrelation, collusion attacksPrivacy budget ( ϵ )Root mean squared error (RMSE)EPFL-Campus real-world
Table 4. Synthetic data analytics approaches used in IoT-integrated smart grids.
Table 4. Synthetic data analytics approaches used in IoT-integrated smart grids.
Synthetic Data ApproachML AlgorithmsEnergy TasksEvaluation MetricesDataset
DP-SGD (2024) [88]Faraday algorithmGenerate smart meter energyQuantile values, accuracy, precisionLow Carbon London (LCL)
K-Mean (2018) [89]Generative adversarial network (GAN)Short-term predictionMAPEPecan Street
R-GAN(2019) [86]Recurrent generative adversarial network (R-GAN)Load generationMAPE, MAEUCI-Energy, Building Genome
Bayesian NN (2019) [90]Generative adversarial network (GAN)System state estimationMSEIEEE-118, Pecan Street
ProfileSR-GAN (2022) [87]GAN-based on maximum-a-posterioriNILMMSE, Peak load error (PLE)Pecan Street
PDM (2024) [91]Physics-informed diffusion modelLoad and solar generationt-SNE, QS, MAE, RMSEPecan Street
SMOTEENN (2021) [92]AlexNet and light gradient boosting (LGB)Electricity theft detectionAUC, recall, precision, F1-scoreState grid corporation of China (SGCC)
Table 5. Secure multi-party computation methods used in IoT-integrated smart grids.
Table 5. Secure multi-party computation methods used in IoT-integrated smart grids.
Ref.SG DomainPrivacy Concerns/ParametersContribution
(2022) [94]Consumer billingsRoutine, Appliance types and preferencesShamir secret sharing-based SMPC with five key algorithms including setup, blinded reading generation, interpolation, and final reading calculation ensures secure energy consumption billing. The system assumes an honest-but-curious utility provider, while smart meters may be malicious, facing passive (peer or leader compromise) and active (malicious peer or leader behavior) attacks.
(2024) [97]State estimation, optimal power flowMeasurement matrixEfficient SMPC approach for Newton-Raphson method power flow analysis (PFA) leverages secret sharing, Cartesian formulation, and sparsity optimization. The system operates in semi-honest and malicious adversarial settings without relying on a Trusted Third Party.
(2024) [98]Day-ahead energy forecastingGlobal iteration, relative accuracyPrivacy-preserving distributed market mechanism using SMPC and the Shamir secret-sharing scheme employs the Consensus ADMM algorithm and a chance-constrained LinDistFlow model for an uncertainty-aware joint market of energy and reserves. A recovery scheme handles missing network measurements, supporting day-ahead energy balancing under a static, honest-but-curious setting.
(2021) [99]Day-ahead energy-storage schedulingEnergy data breaches, computation and communication costsSMPC framework for energy-storage sharing enables confidential cost-sharing and verifiable virtual net metering settlement without trusted third parties. It address risks from dishonest users, data misuse, and privacy breaches while balancing privacy protection and performance.
(2019) [100]Transmission, Distribution fees balancingComputation and communication costsMPC-based protocol for secure smart metering data collection incorporates three aggregation algorithms: Naïve Aggregation (NAA), No Comparison Aggregation (NCAA), and Non-Interactive Aggregation (NIAA). It enables distribution, transmission, and balancing fee calculations using real smart metering data while considering malicious behavior from both internal and external entities, including grid operators and suppliers.
(2020) [101]Energy market pricingIndividual profiles and incentivesPrivate Energy Market (PEM) ensures optimal pricing through a Nash Equilibrium-based Stackelberg game under a semi-honest adversarial model without a trusted third party. The approach maintains privacy, individual rationality, and incentive compatibility, addressing risks where local generation and demand data may reveal user consumption patterns.
(2024) [102]Wind energy forecastsComputation time, Spatial, and temporal patternsPrivacy-preserving ultra-short-term wind power-forecasting method using secure multiparty computation (MPC) and pwXGBoost, an encrypted variant of XGBoost operates under a semi-honest model and leverages real-world data from 27 wind farms in China, capturing nonlinear spatial and temporal correlations for improved prediction accuracy.
Table 6. Homomorphic encryptions mechanism used in IoT-integrated smart grids.
Table 6. Homomorphic encryptions mechanism used in IoT-integrated smart grids.
HE ApproachSG DomainML ApproachSecurity ConcernsEvaluationDataset
Pailler-based asymmetric (2022) [94]Distributed Grid fault localization and energy forecastingDNNInference, reverse engineering, eavesdroppingComputational complexity of DNN activation function, execution timeIEEE-68 bus system
Domingo-Ferrer (2017) [107]Cloud-based billingLoad aggregationData integrity, availabilityLong execution time15 min based Melbourne smart meters
CKKS-based (2023) [105]Consumer smart metersLoad aggregationConsumer behavior and absence eventSummation, variance, memory and time consumptionDAIAD project real-world
Elliptic curve (2018) [108]Dynamic billingLoad aggregationConfidentiality, integrity, authenticationComputation and communication overheadMathematical model
Fan-Vercauteren somewhat (2017) [109]Energy forecastingANN with GMDH data imputationConsumer behaviorperformance cost in MSE, time in msIrish smart meter
Asymmetric (2017) [110]Energy pricingFixed-point arithmetic aggregationConsumer privacy and confidentialityComputation timeReal-world Smart project
Table 7. Federated learning methods used in IoT-integrated smart grids.
Table 7. Federated learning methods used in IoT-integrated smart grids.
FL ApproachSG TaskContribution
FedDiSa (2023) [124]Fault and attack classificationFederated learning with secure and lightweight communication for power system state estimation and classification of disturbance and cybersecurity events in the SCADA sub-system nodes connected to IED nodes for data collection and Central control center for model aggregation.
Multi-task FL (2024) [125]VPP energy predictionMulti-task FL shows comparable optimization results as that of mathematical algorithms such as HBMO and TLBO in term of generation cost, while FL showed faster convergence than other mathematical ML approaches.
VMD-FK-SecureBoost (2023) [126]Short-term load forecastingVMD-FK-SecureBoost provides secure aggregation under distributed setup to address the data heterogeneity of highly variable energy client data. VMD extract the features of individual clients which is support by K-means clustering mechanism to aggregate the same weights of the cohort using secureboost ML forecasting algorithm.
FedUPS (2025) [127]Anomaly detectionCentralized processing of security threat detections associated with the interconnected distribution network have the shortcoming of communication burdens, data leakage and performance degradation for real-time operations. FedUPS proposed a semi-supervised FL to dynamically aggregate the parameter with a thresold to filter the clients with poor data for a distributed power control system.
FedGrid (2023) [128]Generation and load forecastingIntegration of both highly variable load and renewable energies make energy management a difficult task in a cyber-physical SG. FedGrid optimized the demand and supply management by predicting the corresponding load and generation of every component in the secure federated setup.
FedDRL (2023) [129]Wind energy forecastingFedDRL combines the deep learning with reinforcement approach to predict the ultra-short term prediction of wind farms which reluctant to share island data due to commercial liabilities.
dy-TACFL (2025) [130]EV station energy predictiondy-TACFL employs affinity propagation to adaptive clusters and predicts the energy of EV charging stations according to client behavior in a heterogeneous, time-varying environment.
Table 8. Computational complexity and overhead analysis of PPML techniques for IoT-based smart grids.
Table 8. Computational complexity and overhead analysis of PPML techniques for IoT-based smart grids.
PPML TechniqueComputational ComplexityCommunication OverheadSuitability for IoT Devices
HE (2022/23) [139,140] O ( n d ) for circuit depth d; bootstrapping O ( n 2 log n ) Low (encrypted inference only)Low (due to high computation and memory requirements)
SMPC (2020) [141] O ( m · k ) rounds and O ( m 2 · k ) cryptographic operationsHigh (multiple k rounds between m parties)Moderate to Low
FL (2025) [142] O ( E · C · R ) where E: epochs, C: clients, R: roundsHigh (transmitting model weights | w | per round)Moderate (affected by communication and heterogeneity)
DP (2019) [85] O ( N ) per SGD iteration (noise affects convergence speed)LowHigh (efficient but may impact model accuracy)
ZKP (2023) [143]Depends on protocol; typically polynomialModerate (interactive protocols)Moderate
Table 9. Frameworks and libraries used for PPML approaches (DP: Differential Privacy; MPC: Multiparty Computation; HE: Homomorphic Encryption; FL: Federated Learning; TEE: Trusted Execution Environment).
Table 9. Frameworks and libraries used for PPML approaches (DP: Differential Privacy; MPC: Multiparty Computation; HE: Homomorphic Encryption; FL: Federated Learning; TEE: Trusted Execution Environment).
Framework/LibrariesDescriptionDPMPCHEFLTEE
PySyft [144]Open source python library supporting deep learning-
SecretFlow [145,146,147]Python (3.8–3.11) and C++ (14/17/20)-based libraries for privacy-preserving data intelligence and machine learning
CrypTen [126]Open source cryptographic protocol by Meta----
TenSEAL [148]OpenMined privacy framework for deep learning models----
TensorFlow Federated [149]Open source framework by Google Inc., for federated deep learning networks---
MP-SPDZ [150]Open source library based on SPDZ-2 with 34 MPC protocols----
PaddleFL [150]Open source federated framework integrated with PaddlePaddle DL platform and other PPML techniques-
OpenFL [151]Open source framework to run distributed learning under Intel SGX environment---
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ali, M.; Suchismita, M.; Ali, S.S.; Choi, B.J. Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges. Energies 2025, 18, 2515. https://doi.org/10.3390/en18102515

AMA Style

Ali M, Suchismita M, Ali SS, Choi BJ. Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges. Energies. 2025; 18(10):2515. https://doi.org/10.3390/en18102515

Chicago/Turabian Style

Ali, Mazhar, Moharana Suchismita, Syed Saqib Ali, and Bong Jun Choi. 2025. "Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges" Energies 18, no. 10: 2515. https://doi.org/10.3390/en18102515

APA Style

Ali, M., Suchismita, M., Ali, S. S., & Choi, B. J. (2025). Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges. Energies, 18(10), 2515. https://doi.org/10.3390/en18102515

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop