Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures
Abstract
1. Introduction
- The paper identifies cybersecurity requirements for smart grids, analyzing them in the context of the system’s layered architecture and information security attributes. This approach enables a precise understanding of cybersecurity needs at various system levels, including confidentiality, availability, and integrity.
- An analysis of cybersecurity threats to the smart grid was conducted with reference to specific information security attributes. The article provides an enhanced understanding of which smart grid components are vulnerable to particular types of cyberattacks, as well as the potential impact these attacks may have on system operation and the violation of information security attributes.
- We reviewed countermeasures and security mechanisms, categorizing them according to confidentiality, availability, and integrity. The article identifies the most effective solutions for protecting each of the information security attributes.
- The article proposes a holistic cybersecurity framework for smart grids that integrates architectural layers, requirements, and security measures. This framework can serve as a reference model for designing practical tools and strategies to support the cybersecurity of smart grid systems.
- The article analyzes the technical and organizational challenges associated with implementing the identified countermeasures and security mechanisms. Additionally, it proposes ways to minimize these challenges, making the analysis more useful from an implementation and practical perspective.
2. Materials and Methods
- RQ1: What are the cybersecurity requirements in relation to the multi-layer smart grid architecture and information security attributes?
- RQ2: What are the cybersecurity threats to smart grids in terms of breaches of confidentiality, integrity, and availability?
- RQ3: What cybersecurity measures and safeguards can be implemented in smart grids to ensure the confidentiality, integrity, and availability of data and services?
- RQ4: How can a smart grid cybersecurity framework be designed to meet cybersecurity requirements and address evolving threats?
3. Smart Grid Architecture and Cybersecurity Requirements
- Advanced Metering Infrastructure (AMI): an integrated infrastructure that includes smart meters, software, and advanced communication technologies. AMI enables two-way communication, remote management, and energy consumption measurement (e.g., [24]).
- Cyber-Physical Systems (CPSs): integrate physical and digital components to monitor, analyze, manage, and optimize processes in smart grids. These systems demonstrate the potential for comprehensive energy system transformation, including decarbonization, digitalization, and decentralization (e.g., [28,29]).
- Internet of Things (IoT): includes physical objects equipped with sensors and software that enable connection and exchange of data with other objects via a computer network. IoT in smart grids may have applications in smart cities, smart homes, energy optimization, and the integration of renewable energy sources (e.g., [30]).
- Smart grid cybersecurity should address information security attributes such as confidentiality, integrity, and availability.
- Availability aims to ensure access to data and services at any time upon request by an authorized entity [33]. In the case of smart grids, this attribute is critical and has a high security priority. This means the availability of key data and services to grid operators, energy suppliers, and other authorized parties for reliable energy supply. Smart grid systems should therefore be resistant to attacks that compromise availability, such as DDoS attacks.
- Integrity means protecting data from unauthorized modification or corruption [33]. In smart grids, integrity is crucial to ensuring the reliability and accuracy of data. This applies, for example, to information about energy consumption, data from sensors and measuring devices, voltage values, or power flow. A breach of integrity may destabilize the power grid, and therefore it is necessary to implement appropriate safeguards.
- Confidentiality refers to ensuring that data is accessible only to authorized individuals and protected from unauthorized access [33]. Smart grids rely on the exchange of large amounts of information, much of which is sensitive. Examples include personal data, data from sensors and measurement devices, and information about the topology and status of the power grid. Unauthorized access to this type of data can lead to privacy violations, identity theft, and manipulation. Breaching confidentiality can facilitate attackers’ sabotage, physical attacks, or other security incidents.
- The human factor should be considered in the design and implementation of cybersecurity solutions. End-user errors can lead to security breaches. Furthermore, some cyberattacks exploit human vulnerability to threats, such as phishing. Training and awareness raising are therefore essential to maintaining an acceptable level of security in smart grids. It is also worth noting the concept of cyber hygiene, which has been developed in recent years, referring to a set of principles and behaviors aimed at reducing risky activities in cyberspace [34].
- The design and implementation of smart grid systems requires compliance with legal regulations and standards. These include, among others, energy law, interoperability, personal data protection, and device certification and approval.
4. Cybersecurity Threats to Smart Grids
- Spoofing (S)—attacks that violate integrity and allow the impersonation of an authorized user or device;
- Tampering (T)—attacks that violate integrity through unauthorized data modification;
- Repudiation (R)—attacks that allow for the denial of an action performed in the system;
- Information disclosure (I)—attacks that violate confidentiality, leading to unauthorized access to and disclosure of information;
- Denial of service (D)—attacks that violate availability, blocking or restricting services for authorized users;
- Elevation of privilege (E)—attacks that violate integrity, allowing the acquisition of unauthorized system privileges.
5. Countermeasures and Safeguards
5.1. Confidentiality Protection
5.1.1. Data Encryption
- AES and TLS/SSL protocols, which can be used to encrypt transmissions in Advanced Metering Infrastructure (AMI), e.g., between the control center and energy meters;
- IPSec and VPN protocols, which can be used to encrypt connections in SCADA systems, e.g., between the RTU controller and the central office;
- DNP3 protocol used in energy control and supervision systems can be enhanced with encryption algorithms;
- MQTT-S, CoAP with DTLS, LoRaWAN, and Elliptic Curve Cryptography (ECC) protocols can be used to communicate with IoT devices and sensors that are components of smart grids.
5.1.2. Authentication
- Multi-factor authentication (MFA);
- Digital certificate-based authentication (CBA);
- Federated identity-based authentication (FA).
5.1.3. Access Management
- Discretionary Access Control (DAC): resource permissions are defined by their owner, and decisions to allow or deny access are based on user credentials such as ID and password [56];
- Role-Based Access Control (RBAC): grants access based on user roles and responsibilities, limiting it to necessary data and operations, such as reading, writing, or updating, in accordance with their permissions and responsibilities [56];
- Attribute-Based Access Control (ABAC): enables the implementation of comprehensive and complex access policies based on known user attributes stored in the system [56].
5.2. Integrity Protection
5.2.1. Integrity Verification
5.2.2. Blockchain Technology
- Data immutability: data stored in individual blocks and validated by the network is immutable, providing strong support for the integrity of data processed in smart grids;
- Decentralization: the distributed nature of blockchain significantly complicates integrity attacks, as a copy of the blockchain can be stored on multiple network nodes;
- Cryptographic proof-based security: blockchain utilizes various cryptographic algorithms depending on the specific implementation, including SHA and ECDSA, as well as new types of algorithms that protect the network against future vulnerabilities to quantum computer attacks;
- Consensus algorithms: Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS) algorithms ensure the network’s agreement on the correctness of data in blocks and protect them from future changes;
- Smart contracts: an additional layer that ensures the integrity of business logic by enforcing rules and predefined logic, with any change in the counterparty state being recorded on the BC.
5.2.3. Anomaly Detection
- Data manipulation detection: IDS/IPS can continuously monitor network traffic and detect anomalies that deviate from defined signature or heuristic rules, thereby counteracting data injection attacks in AMI or SCADA systems;
- Attack and unauthorized access blocking: IDSs/IPSs can prevent attacks that attempt to modify control messages, protecting the integrity of communication and control in dedicated smart grid protocols;
- Log auditing and analysis: IDSs/IPSs generate detailed logs from sensor groups, enabling subsequent auditing, incident analysis, and data integrity verification following a potential attack.
5.3. Availability Protection
5.3.1. Counteracting DDoS Attacks
- Network traffic filtering: firewalls can block specific network traffic based on defined rules;
- Network segmentation: Virtual LAN (VLAN) technology for dividing a computer network into separate segments or Virtual Private Networks (VPNs) for connecting distributed subnetworks into a larger network;
- Load balancing: mechanisms for distributing and spreading the load (including network traffic) across multiple servers in a cluster or server farm, thereby reducing the traffic directed to SCADA servers or smart grid control centers;
- Connection limiting: mechanisms for limiting the number of requests and bandwidth for a single client.
5.3.2. Redundancy and Diversity Mechanisms
- Hardware: redundancy can be achieved through the use of redundant infrastructure devices that take over functions in the event of a failure of primary components. Diversity involves using different device models, manufacturers, or architectures, which reduces the risk of system failure due to a single type of hardware.
- Software: redundancy involves the use of redundant system instances (e.g., SCADA, application servers) that are capable of taking over in the event of a failure or attack on the primary systems. Diversity can be achieved through the use of different operating systems (e.g., Linux, BSD) and software to reduce the risk associated with vulnerabilities in a single solution.
- Communication: redundancy involves the use of redundant channels and devices (e.g., backup links and transmission media, routers, clusters, and IoT devices) that guarantee the continuity of data transmission in the event of a failure or attack. Diversity can be achieved through the use of various protocols and transmission technologies (e.g., MQTT, GSM, fiber optics, MPLS routing protocol) to limit the impact of single vulnerabilities on the entire system.
- Data: redundancy of processed data (e.g., operational and configuration data, measurements from smart meters and endpoint devices) can be achieved by creating copies of data in different locations (e.g., backup data centers, real-time server replication, blockchain, RAID arrays). Diversity can be achieved by diversifying the methods of storing, processing, or transmitting data (e.g., different database systems—e.g., SQL, NoSQL, blockchain, as well as different data formats—e.g., XML, JSON), minimizing the risk of data loss due to a single vulnerability, failure, or attack.
5.3.3. Monitoring
- Security Information and Event Management (SIEM) systems: These systems provide a holistic view of network security by analyzing logs from various devices, such as computers, servers, switches, routers, firewalls, antivirus software, and IDS/IPS [73]. In smart grids, SIEM systems can be used to collect and analyze logs from various components of the distributed infrastructure (e.g., smart meters, SCADA systems, PLCs, IoT devices). Based on collected logs, the SIEM engine correlates events to identify malicious activity [74]. The analysis results are displayed in the presentation layer [74]. Modern SIEM systems integrate artificial intelligence algorithms, including machine learning, to increase analysis efficiency.
- Endpoint Detection and Response (EDR) systems: Monitor endpoint activity in real time, detecting suspicious behavior, infections, and security breaches, while supporting searches by collecting detailed telemetry data [75]. Endpoint telemetry, file modifications, and network communications are processed by EDR solutions and forwarded to SIEM systems for further use [75]. EDR systems rely on two key data collection methods: network analysis and host-based information gathering [75]. EDR protects smart grid infrastructure from cyberattacks by providing real-time incident information and collecting logs for security analysis, minimizing the risk of disruptions to the power grid’s availability. However, it is pointed out that certain categories of devices, including industrial control systems, do not support the installation of EDR agents, which is a significant limitation [75]. Agentless EDR systems offer an alternative, offering easier and faster deployment and maintenance by eliminating the need for software installation and updates [75].
- Security Orchestration, Automation, and Response (SOAR) systems: Tools that enable security alert management and incident response by integrating security tools, simplifying repetitive processes, and providing a comprehensive incident management solution [76]. These systems are considered to play a key role in addressing operational challenges [77]. Traditional SOAR systems are primarily based on no-code and low-code approaches, which enhance accessibility and reduce the need for developer involvement [77]. Despite their accessibility, solutions based on no-code/low-code approaches often suffer from limitations, including limited customization options, difficulty managing complex playbooks, and limited flexibility in adapting to dynamically changing threat scenarios [77]. By using Large Language Models (LLMs), modern SOAR platforms can dynamically create code, resulting in more adaptive and scalable automation [77]. In a heterogeneous and distributed smart grid environment, SOAR systems enable the integration of data from AMI, SCADA systems, and IDS/IPS logs.
6. Smart Grid Cybersecurity Framework
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
ABAC | Attribute-Based Access Control |
AES | Advanced Encryption Standard |
AI | Artificial Intelligence |
AMI | Advanced Metering Infrastructure |
BC | Blockchain |
BSD | Berkeley Software Distribution |
CBA | Digital Certificate-Based Authentication |
CoAP | Constrained Application Protocol |
CPS | Cyber-Physical System |
CPPS | Cyber-Physical Power System |
DAC | Discretionary Access Control |
DDoS | Distributed Denial of Service |
DNP3 | Distributed Network Protocol version 3 |
DoS | Denial-of-Service |
DPoS | Delegated Proof of Stake |
DTLS | Datagram Transport Layer Security |
ECC | Elliptic Curve Cryptography |
ECDH | Elliptic Curve Diffie–Hellman algorithm |
ECDSA | Elliptic Curve Digital Signature algorithm |
EDR | Endpoint Detection and Response system |
FA | Federated Identity-Based Authentication |
FDI | False Data Injection Attack |
GSM | Global System for Mobile Communications |
HHO | Harris Hawks optimization algorithm |
HMAC | Hash-based Message Authentication Code |
ICT | Information and Communication Technologies |
IDS | Intrusion Detection System |
IPS | Intrusion Prevention System |
IoT | Internet of Things |
JSON | JavaScript Object Notation |
LLM | Large Language Model |
MitM | Man in the Middle Attack |
MD5 | Message-Digest algorithm 5 |
MFA | Multi-Factor Authentication |
MQTT | Message Queue Telemetry Transport |
MPLS | Multiprotocol Label Switching |
OT | Operational Technology |
PAN | Personal Area Network |
PMU | Phasor Measurement Unit |
PLC | Programmable Logic Controller |
PoE | Proof of Energy |
PoS | Proof of Stake |
PoW | Proof of Work |
RAID | Redundant Array of Independent Disks |
RBAC | Role-Based Access Control |
RTU | Remote Terminal Unit |
SCADA | Supervisory Control And Data Acquisition |
SIEM | Security Information and Event Management |
SGAM | Smart Grid Architecture Model |
SHA | Secure Hash Algorithm |
SKDP | Secure Key Distribution Protocol |
SOAR | Security Orchestration, Automation, and Response systems |
SQL | Structured Query Language |
ST-GCN | Spatial-Temporal Graph Convolutional Network |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TLS/SSL | Transport Layer Security/Secure Sockets Layer |
UAVz | Unmanned Aerial Vehicles |
VLAN | Virtual Local Area Network |
VPN | Virtual Private Network |
WAN | Wide Area Network |
XML | Extensible Markup Language |
References
- Abdulsalam, K.A.; Adebisi, J.; Emezirinwune, M.; Babatunde, O. An Overview and Multicriteria Analysis of Communication Technologies for Smart Grid Applications. e-Prime Adv. Electr. Eng. Electron. Energy 2023, 3, 100121. [Google Scholar] [CrossRef]
- Jasiūnas, J.; Lund, P.D.; Mikkola, J. Energy System Resilience—A Review. Renew. Sustain. Energy Rev. 2021, 150, 111476. [Google Scholar] [CrossRef]
- Ahmad, T.; Zhang, D.; Huang, C.; Zhang, H.; Dai, N.; Song, Y.; Chen, H. Artificial Intelligence in Sustainable Energy Industry: Status Quo, Challenges and Opportunities. J. Clean. Prod. 2021, 289, 125834. [Google Scholar] [CrossRef]
- Kim, S.; Heo, G.; Zio, E.; Shin, J.; Song, J.-G. Cyber Attack Taxonomy for Digital Environment in Nuclear Power Plants. Nucl. Eng. Technol. 2020, 52, 995–1001. [Google Scholar] [CrossRef]
- Krzykowski, M. Legal Aspects of Cybersecurity in the Energy Sector—Current State and Latest Proposals of Legislative Changes by the EU. Energies 2021, 14, 7836. [Google Scholar] [CrossRef]
- Heymann, F.; Henry, S.; Galus, M. Cybersecurity and Resilience in the Swiss Electricity Sector: Status and Policy Options. Util. Policy 2022, 79, 101432. [Google Scholar] [CrossRef]
- Alsuwian, T.; Shahid Butt, A.; Amin, A.A. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability 2022, 14, 14226. [Google Scholar] [CrossRef]
- World Economic Forum. Cyber Resilience in the Electricity Ecosystem: Securing the Value Chain; World Economic Forum: Geneva, Switzerland, 2020; Available online: https://www3.weforum.org/docs/WEF_Securing_the_Electricity_Value_Chain_2020.pdf (accessed on 10 June 2025).
- International Energy Agency. Enhancing Cyber Resilience in Electricity Systems. Available online: https://iea.blob.core.windows.net/assets/0ddf8935-be23-4d5f-b798-3aad1f32432f/Enhancing_Cyber_Resilience_in_Electricity_Systems.pdf (accessed on 10 June 2025).
- Commission Recommendation (EU) 2019/553 of 3 April 2019 on Cybersecurity in the Energy Sector. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv:OJ.L_.2019.096.01.0050.01.ENG&toc=OJ:L:2019:096:TOC (accessed on 10 June 2025).
- Priyadarshini, I.; Kumar, R.; Sharma, R.; Singh, P.K.; Satapathy, S.C. Identifying Cyber Insecurities in Trustworthy Space and Energy Sector for Smart Grids. Comput. Electr. Eng. 2021, 93, 107204. [Google Scholar] [CrossRef]
- Otuoze, A.O.; Mustafa, M.W.; Larik, R.M. Smart Grids Security Challenges: Classification by Sources of Threats. J. Electr. Syst. Inf. Technol. 2018, 5, 468–483. [Google Scholar] [CrossRef]
- International Energy Agency, Smart Grids. Available online: https://www.iea.org/energy-system/electricity/smart-grids (accessed on 14 June 2025).
- Panda, D.K.; Das, S. Smart Grid Architecture Model for Control, Optimization and Data Analytics of Future Power Networks with More Renewable Energy. J. Clean. Prod. 2021, 301, 126877. [Google Scholar] [CrossRef]
- Gopstein, A.; Nguyen, C.; O’Fallon, C.; Hastings, N.; Wollman, D. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 4.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2021. [CrossRef]
- CEN-CENELEC-ETSI Smart Grid Coordination Group. Smart Grid Reference Architecture. Available online: https://www.cencenelec.eu/media/CEN-CENELEC/AreasOfWork/CEN-CENELEC_Topics/Smart%20Grids%20and%20Meters/Smart%20Grids/reference_architecture_smartgrids.pdf (accessed on 4 July 2025).
- IEEE Smart Grid Vision for Computing: 2030 and Beyond; IEEE: New York, NY, USA, 2013. [CrossRef]
- Moura, P.S.; López, G.L.; Moreno, J.I.; De Almeida, A.T. The Role of Smart Grids to Foster Energy Efficiency. Energy Effic. 2013, 6, 621–639. [Google Scholar] [CrossRef]
- Raza, M.A.; Aman, M.M.; Abro, A.G.; Tunio, M.A.; Khatri, K.L.; Shahid, M. Challenges and Potentials of Implementing a Smart Grid for Pakistan’s Electric Network. Energy Strat. Rev. 2022, 43, 100941. [Google Scholar] [CrossRef]
- Mihal, P.; Schvarcbacher, M.; Rossi, B.; Pitner, T. Smart Grids Co-Simulations: Survey & Research Directions. Sustain. Comput. Inform. Syst. 2022, 35, 100726. [Google Scholar] [CrossRef]
- López, G.; Moura, P.; Moreno, J.; Camacho, J. Multi-Faceted Assessment of a Wireless Communications Infrastructure for the Green Neighborhoods of the Smart Grid. Energies 2014, 7, 3453–3483. [Google Scholar] [CrossRef]
- Kermani, M.; Adelmanesh, B.; Shirdare, E.; Sima, C.A.; Carnì, D.L.; Martirano, L. Intelligent Energy Management Based on SCADA System in a Real Microgrid for Smart Building Applications. Renew. Energy 2021, 171, 1115–1127. [Google Scholar] [CrossRef]
- Neis, P.; Wehrmeister, M.A.; Mendes, M.F.; Pesente, J.R. Applying a Model-Driven Approach to the Development of Power Plant SCADA/EMS Software. Int. J. Electr. Power Energy Syst. 2023, 153, 109336. [Google Scholar] [CrossRef]
- Shokry, M.; Awad, A.I.; Abd-Ellah, M.K.; Khalaf, A.A.M. Systematic Survey of Advanced Metering Infrastructure Security: Vulnerabilities, Attacks, Countermeasures, and Future Vision. Future Gener. Comput. Syst. 2022, 136, 358–377. [Google Scholar] [CrossRef]
- Mohsenian-Rad, H. Smart Grid Sensors: Principles and Applications; Cambridge University Press: Cambridge, UK, 2022. [Google Scholar] [CrossRef]
- Nengroo, S.H.; Jin, H.; Lee, S. Management of Distributed Renewable Energy Resources with the Help of a Wireless Sensor Network. Appl. Sci. 2022, 12, 6908. [Google Scholar] [CrossRef]
- Dorji, S.; Stonier, A.A.; Peter, G.; Kuppusamy, R.; Teekaraman, Y. An Extensive Critique on Smart Grid Technologies: Recent Advancements, Key Challenges, and Future Directions. Technologies 2023, 11, 81. [Google Scholar] [CrossRef]
- Wang, Q.; Zhang, G.; Wen, F. A Survey on Policies, Modelling and Security of Cyber-physical Systems in Smart Grids. Energy Convers. Econ. 2021, 2, 197–211. [Google Scholar] [CrossRef]
- Yu, X.; Xue, Y. Smart Grids: A Cyber–Physical Systems Perspective. Proc. IEEE Inst. Electr. Electron. Eng. 2016, 104, 1058–1070. [Google Scholar] [CrossRef]
- Alavikia, Z.; Shabro, M. A Comprehensive Layered Approach for Implementing Internet of Things-Enabled Smart Grid: A Survey. Digit. Commun. Netw. 2022, 8, 388–410. [Google Scholar] [CrossRef]
- Li, J.; Herdem, M.S.; Nathwani, J.; Wen, J.Z. Methods and Applications for Artificial Intelligence, Big Data, Internet of Things, and Blockchain in Smart Energy Management. Energy AI 2023, 11, 100208. [Google Scholar] [CrossRef]
- Szczepaniuk, H.; Szczepaniuk, E.K. Applications of Artificial Intelligence Algorithms in the Energy Sector. Energies 2022, 16, 347. [Google Scholar] [CrossRef]
- Gallo, G.D.; Micucci, D. Internet of Medical Things Systems Review: Insights into Non-Functional Factors. Sensors 2025, 25, 2795. [Google Scholar] [CrossRef] [PubMed]
- Szczepaniuk, E.K.; Szczepaniuk, H. Analysis of Cybersecurity Competencies: Recommendations for Telecommunications Policy. Telecomm. Policy 2022, 46, 102282. [Google Scholar] [CrossRef]
- Hueros-Barrios, P.J.; Rodríguez Sánchez, F.J.; Martín, P.; Jiménez, C.; Fernández, I. Addressing the Cybersecurity Vulnerabilities of Advanced Nanogrids: A Practical Framework. Internet Things 2022, 20, 100620. [Google Scholar] [CrossRef]
- Nejabatkhah, F.; Li, Y.W.; Liang, H.; Reza Ahrabi, R. Cyber-Security of Smart Microgrids: A Survey. Energies 2021, 14, 27. [Google Scholar] [CrossRef]
- Yang, T.; Liu, Y.; Li, W. Attack and Defence Methods in Cyber-physical Power System. IET Energy Syst. Integr. 2022, 4, 159–170. [Google Scholar] [CrossRef]
- European Union Agency for Cybersecurity; Lella, I.; Theocharidou, M.; Tsekmezoglou, E.; Svetozarov Naydenov, R.; Ciobanu, C.; Malatras, A. ENISA Threat Landscape 2022: July 2021 to July 2022. 2022. Available online: https://data.europa.eu/doi/10.2824/764318 (accessed on 8 July 2025).
- European Union Agency for Cybersecurity; Mattioli, R.; Malatras, A.; Hunter, E.N.; Biasibetti Penso, M.G.; Bertram, D.; Neubert, I. Identifying Emerging Cybersecurity Threats and Challenges for 2030. 2023. Available online: https://data.europa.eu/doi/10.2824/117542 (accessed on 8 July 2025).
- Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A Review of False Data Injection Attacks against Modern Power Systems. IEEE Trans. Smart Grid 2017, 8, 1630–1638. [Google Scholar] [CrossRef]
- Reda, H.T.; Anwar, A.; Mahmood, A. Comprehensive Survey and Taxonomies of False Data Injection Attacks in Smart Grids: Attack Models, Targets, and Impacts. Renew. Sustain. Energy Rev. 2022, 163, 112423. [Google Scholar] [CrossRef]
- Boeding, M.; Boswell, K.; Hempel, M.; Sharif, H.; Lopez, J., Jr.; Perumalla, K. Survey of Cybersecurity Governance, Threats, and Countermeasures for the Power Grid. Energies 2022, 15, 8692. [Google Scholar] [CrossRef]
- Tellbach, D.; Li, Y.F. A survey on the cyber-security of distributed generation systems. In Safety and Reliability—Theory and Applications; Čepin, M., Briš, R., Eds.; CRC Press/Balkema: Leiden, The Netherlands, 2017; pp. 83–90. [Google Scholar]
- Wlazlo, P.; Sahu, A.; Mao, Z.; Huang, H.; Goulart, A.; Davis, K.; Zonouz, S. Man-in-the-middle Attacks and Defence in a Power System Cyber-physical Testbed. IET Cyber-Phys. Syst. Theory Appl. 2021, 6, 164–177. [Google Scholar] [CrossRef]
- Khalil, S.M.; Bahsi, H.; Dola, H.O.; Korõtko, T.; McLaughlin, K.; Kotkas, V. Threat Modeling of Cyber-Physical Systems—A Case Study of a Microgrid System. Comput. Secur. 2023, 124, 102950. [Google Scholar] [CrossRef]
- Abdulsalam, Y.S.; Hedabou, M. Security and Privacy in Cloud Computing: Technical Review. Future Internet 2021, 14, 11. [Google Scholar] [CrossRef]
- Sousa-Dias, D.; Amyot, D.; Rahimi-Kian, A.; Bashari, M.; Mylopoulos, J. Cyclic Homomorphic Encryption Aggregation (CHEA)—A Novel Approach to Data Aggregation in the Smart Grid. Energies 2024, 17, 878. [Google Scholar] [CrossRef]
- Deng, S.; Cui, S.; Xu, A. Power Prediction of Regional Photovoltaic Power Stations Based on Meteorological Encryption and Spatio-Temporal Graph Networks. Energies 2024, 17, 3557. [Google Scholar] [CrossRef]
- Zhang, J.; He, B.; Lv, J.; Zhao, C.; Yu, G.; Liu, D. Research on Grid Multi-Source Survey Data Sharing Algorithm for Cross-Professional and Cross-Departmental Operations Collaboration. Energies 2024, 17, 4380. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chahine, K. Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions. Future Internet 2025, 17, 318. [Google Scholar] [CrossRef]
- Kazmi, S.H.A.; Hassan, R.; Qamar, F.; Nisar, K.; Ibrahim, A.A.A. Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions. Symmetry 2023, 15, 1147. [Google Scholar] [CrossRef]
- Khan, A.A.; Kumar, V.; Ahmad, M. An Elliptic Curve Cryptography Based Mutual Authentication Scheme for Smart Grid Communications Using Biometric Approach. J. King Saud Univ. Comput. Inf. Sci. 2022, 34, 698–705. [Google Scholar] [CrossRef]
- AlJanah, S.; Zhang, N.; Tay, S.W. Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications. Cryptography 2025, 9, 35. [Google Scholar] [CrossRef]
- Hafeez, M.A.; Shakib, K.H.; Munir, A. A Secure and Scalable Authentication and Communication Protocol for Smart Grids. J. Cybersecur. Priv. 2025, 5, 11. [Google Scholar] [CrossRef]
- Zhonghua, C.; Goyal, S.B.; Rajawat, A.S. Smart Contracts Attribute-Based Access Control Model for Security & Privacy of IoT System Using Blockchain and Edge Computing. J. Supercomput. 2024, 80, 1396–1425. [Google Scholar] [CrossRef]
- Sarfaraz, A.; Chakrabortty, R.K.; Essam, D.L. AccessChain: An Access Control Framework to Protect Data Access in Blockchain Enabled Supply Chain. Future Gener. Comput. Syst. 2023, 148, 380–394. [Google Scholar] [CrossRef]
- Bakhtiary, V.; Mirabi, M.; Salajegheh, A.; Erfani, S.H. Combo-Chain: Towards a Hierarchical Attribute-Based Access Control System for IoT with Smart Contract and Sharding Technique. Internet Things 2024, 25, 101080. [Google Scholar] [CrossRef]
- Kim, H.; Choi, J. Intelligent Access Control Design for Security Context Awareness in Smart Grid. Sustainability 2021, 13, 4124. [Google Scholar] [CrossRef]
- Chatterjee, T.; Biswas, S.; Shil, S.; Purkait, P.; Ghosh, P. Enhancement of Data Security Scheme with Cryptography Training System in Smart Grid Network. In Proceedings of the 2023 IEEE 3rd Applied Signal Processing Conference (ASPCON), Haldia, India, 24–25 November 2023; IEEE 2023. [Google Scholar] [CrossRef]
- Pavithra, L.; Rekha, D. Prevention of Replay Attack for Isolated Smart Grid. In Next Generation Information Processing System; Advances in Intelligent Systems and Computing; Deshpande, P., Abraham, A., Iyer, B., Ma, K., Eds.; Springer: Singapore, 2021; pp. 251–258. [Google Scholar] [CrossRef]
- Ferreira, J.C. Bridging the Gaps: Future Directions for Blockchain and IoT Integration in Smart Grids. Energies 2025, 18, 772. [Google Scholar] [CrossRef]
- Shamaseen, A.; Qatawneh, M.; Elshqeirat, B. Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues. Energies 2025, 18, 3523. [Google Scholar] [CrossRef]
- Hamdi, N. A Hybrid Learning Technique for Intrusion Detection System for Smart Grid. Sustain. Comput. Inform. Syst. 2025, 46, 101102. [Google Scholar] [CrossRef]
- Wu, Y.; Zang, Z.; Zou, X.; Luo, W.; Bai, N.; Xiang, Y.; Li, W.; Dong, W. Graph Attention and Kolmogorov-Arnold Network Based Smart Grids Intrusion Detection. Sci. Rep. 2025, 15, 8648. [Google Scholar] [CrossRef] [PubMed]
- Wen, M.; Zhang, Y.; Zhang, P.; Chen, L. IDS-DWKAFL: An Intrusion Detection Scheme Based on Dynamic Weighted K-Asynchronous Federated Learning for Smart Grid. J. Inf. Secur. Appl. 2025, 89, 103993. [Google Scholar] [CrossRef]
- Gaggero, G.B.; Girdinio, P.; Marchese, M. Artificial Intelligence and Physics-Based Anomaly Detection in the Smart Grid: A Survey. IEEE Access 2025, 13, 23597–23606. [Google Scholar] [CrossRef]
- Jia, X.; Xia, Y.; Yan, Z.; Gao, H.; Qiu, D.; Guerrero, J.M.; Li, Z. Coordinated Operation of Multi-Energy Microgrids Considering Green Hydrogen and Congestion Management via a Safe Policy Learning Approach. Appl. Energy 2025, 401, 126611. [Google Scholar] [CrossRef]
- Tiwari, R.S.; Sharma, J.P.; Gupta, O.H.; Ahmed Abdullah Sufyan, M. Extension of Pole Differential Current Based Relaying for Bipolar LCC HVDC Lines. Sci. Rep. 2025, 15, 16142. [Google Scholar] [CrossRef]
- Alhashmi, A.; Idwaib, H.; Avci, S.A.; Rahebi, J.; Ghadami, R. Distributed Denial-of-Service (DDoS) on the Smart Grids Based on VGG19 Deep Neural Network and Harris Hawks Optimization Algorithm. Sci. Rep. 2025, 15, 18243. [Google Scholar] [CrossRef]
- Mohamed, M.V.O.; Abdelaziz, A.Y.; Abo-Elyousr, F.K. Blockchain-Based Approach for Load Frequency Control of Smart Grids under Denial-of-Service Attacks. Comput. Electr. Eng. 2024, 116, 109150. [Google Scholar] [CrossRef]
- Laszka, A.; Abbas, W.; Vorobeychik, Y.; Koutsoukos, X. Integrating Redundancy, Diversity, and Hardening to Improve Security of Industrial Internet of Things. Cyber-Phys. Syst. 2019, 6, 1–32. [Google Scholar] [CrossRef]
- Jimada-Ojuolape, B.; Teh, J.; Lai, C.-M. Enhancing Power Grid Reliability with PMU Placement in Flexibly Rated Cyber-Physical Systems. Electric Power Syst. Res. 2025, 241, 111327. [Google Scholar] [CrossRef]
- Sheeraz, M.; Durad, M.H.; Paracha, M.A.; Mohsin, S.M.; Kazmi, S.N.; Maple, C. Revolutionizing SIEM Security: An Innovative Correlation Engine Design for Multi-Layered Attack Detection. Sensors 2024, 24, 4901. [Google Scholar] [CrossRef] [PubMed]
- Ali, G.; Shah, S.; ElAffendi, M. Enhancing Cybersecurity Incident Response: AI-Driven Optimization for Strengthened Advanced Persistent Threat Detection. Results Eng. 2025, 25, 104078. [Google Scholar] [CrossRef]
- Kodituwakku, A.; Gregor, J. InMesh: A Zero-Configuration Agentless Endpoint Detection and Response System. Electronics 2025, 14, 1292. [Google Scholar] [CrossRef]
- Pitkar, H. Cloud Security Automation through Symmetry: Threat Detection and Response. Symmetry 2025, 17, 859. [Google Scholar] [CrossRef]
- Ismail; Kurnia, R.; Brata, Z.A.; Nelistiani, G.A.; Heo, S.; Kim, H.; Kim, H. Toward Robust Security Orchestration and Automated Response in Security Operations Centers with a Hyper-Automation Approach Using Agentic Artificial Intelligence. Information 2025, 16, 365. [Google Scholar] [CrossRef]
- Guo, W.; Zhang, Z.; Chang, L.; Song, Y.; Yin, L. A DDoS Tracking Scheme Utilizing Adaptive Beam Search with Unmanned Aerial Vehicles in Smart Grid. Drones 2024, 8, 437. [Google Scholar] [CrossRef]
- Alomari, M.A.; Al-Andoli, M.N.; Ghaleb, M.; Thabit, R.; Alkawsi, G.; Alsayaydeh, J.A.J.; Gaid, A.S.A. Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions. Energies 2025, 18, 141. [Google Scholar] [CrossRef]
Cybersecurity Measures and Safeguards | Specific Solutions | Challenges and Barriers | Addressing Challenges and Barriers |
---|---|---|---|
Security policies and procedures | implementing compliance policies, developing incident response plans, implementing data protection and privacy policies | insufficient implementation in real business scenarios, inconsistent procedures | regular internal audits, updating policies and procedures, establishment of dedicated working teams |
Risk management | developing a risk management framework based on standards such as the NIST Cybersecurity Framework or ISO/IEC 27001 | difficulty identifying risks due to the distributed and heterogeneous smart grid environment | infrastructure mapping, expert support |
Cybersecurity education campaigns for clients | awareness campaigns, distance learning, webinars with experts, films and educational materials | high cost, lack of customer engagement | implementation of e-learning methods, personalization of educational content for specific target groups |
Employee cybersecurity training | initial training, periodic supplementary training, practical workshops, continuous improvement of awareness, knowledge and skills | low efficiency reflected in real knowledge and skills, varied level of technical knowledge of employees | using activating forms and methods of education, personalizing educational content for specific groups of employees |
Access management | DAC, RBAC, ABAC | complexity of access management; difficulty maintaining access policies for multiple users, locations, and devices; potential performance issues | implementation of automated access management mechanisms, use of edge computing and cloud systems |
IDS/IPS systems | Snort, Suricata, Bro/Zeek | difficulties in detecting anomalies, false alarms, integration problems | optimization of signatures and rules for smart grid, implementation of IDS/IPS based on machine learning, standardization of protocols |
Data encryption at rest | SQLCipher, Cryptsetup, VeraCrypt, dm-crypt/LUKS, GnuPG, OpenSSL | complexity of key management, risk of data loss after key loss, impact on performance | key management automation, emergency key recovery procedures |
Blockchain technology | public and private blockchains, smart contracts | high demand for computing power of PoW algorithms, performance limitations, high costs, lack of standards and guidelines for smart grids | use of energy-efficient consensus algorithms, standardization of solutions, use of open source technologies |
SIEM, EDR, and SOAR systems | Wazuh, TheHive, OSSIM, ELK Stack, Graylog, Shuffle, Cortex | limitations in installing EDR agents, integration problems in OT networks | agentless EDR systems, adapted to the specific needs of OT |
Redundancy and diversity | hardware, software, communication and data solutions | high implementation and maintenance costs | selecting critical infrastructure elements using risk analysis |
Transmission encryption | DNP3 with encryption, TLS/SSL, IPSec, VPN, MQTT-S, CoAP with DTLS, LoRaWAN, ECC | limited computing power of edge devices | use of lightweight encryption protocols, use of Hardware Security Modules |
Device and user authentication | MFA, CBA, and FA authentication | difficult integration with OT systems | use of industrial versions of authorization protocols |
Network segmentation | VLAN, VPN | possible impact on system performance, management difficulties | implementation of network mechanisms ensuring traffic quality, management automation |
Network traffic filtering | Firewalls, packet filtering, and traffic analysis: iptables, pf (BSD), pfSense, Wireshark, tcpdump | possible impact on performance in real-time systems | optimizing rules for industrial protocols and smart grid network traffic |
Load balancing | HAProxy, Traefik, Seesaw, Balance, MetalLB | complexity of managing dynamic network load | AI algorithms for adaptive load management |
Physical security | physical security of end devices, security of access to critical infrastructure, monitoring and surveillance systems, environmental security | infrastructure dispersion, vulnerability to infrastructure sabotage | AI-based early incident detection systems |
Data encryption on end devices | AES, RSA, ECC algorithms, datagram TLS, noise Protocol, Hardware Security Modules, post-quantum encryption algorithms | limited computing power of end devices | use of lightweight encryption algorithms dedicated to embedded devices, use of hardware modules dedicated to encryption |
Integrity verification | HMAC-MD5, HMAC-SHA2, HMAC-SHA3 | MD5 collision potential, SHA2 and SHA3 require more computing power | optimization of the SHA2/SHA3 algorithm for low-performance end devices |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Szczepaniuk, E.K.; Szczepaniuk, H. Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures. Energies 2025, 18, 5017. https://doi.org/10.3390/en18185017
Szczepaniuk EK, Szczepaniuk H. Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures. Energies. 2025; 18(18):5017. https://doi.org/10.3390/en18185017
Chicago/Turabian StyleSzczepaniuk, Edyta Karolina, and Hubert Szczepaniuk. 2025. "Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures" Energies 18, no. 18: 5017. https://doi.org/10.3390/en18185017
APA StyleSzczepaniuk, E. K., & Szczepaniuk, H. (2025). Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures. Energies, 18(18), 5017. https://doi.org/10.3390/en18185017