Next Article in Journal
Experimental Investigation of Flame Characteristics of H2-Enriched Biogas Under Different Swirl Numbers
Previous Article in Journal
Computationally Efficient and Loss-Minimizing Model Predictive Control for Induction Motors in Electric Vehicle Applications
Previous Article in Special Issue
Incentive Determination for Demand Response Considering Internal Rate of Return
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Systematic Review

Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review

by
Jones Márcio Nambundo
1,*,†,
Otávio de Souza Martins Gomes
1,†,
Adler Diniz de Souza
2,† and
Raphael Carlos Santos Machado
3,†
1
Postgraduate Program in Electrical Engineering, Federal University of Itajubá (UNIFEI), Avenida BPS, 1303, Pinheirinho, Itajubá 37540-903, MG, Brazil
2
Postgraduate Program in Science and Technology of Computing, Federal University of Itajubá (UNIFEI), Avenida BPS, 1303, Pinheirinho, Itajubá 37540-903, MG, Brazil
3
Clavis Information Security, Aloísio Teixeira Street, 278, Building 3, Room 307, Rio de Janeiro 25250-050, RJ, Brazil
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Energies 2025, 18(6), 1445; https://doi.org/10.3390/en18061445
Submission received: 24 January 2025 / Revised: 21 February 2025 / Accepted: 5 March 2025 / Published: 14 March 2025
(This article belongs to the Special Issue Modeling, Optimization, and Control in Smart Grids: 2nd Edition)

Abstract

:
Smart meters are a vital part of the smart grid, enabling energy management, real-time control, and data collection. Despite advances in technology, there is still a lack of content and limited understanding of the specific cybersecurity threats facing these devices, as well as the effectiveness of existing mitigation strategies. This study analyzed 41 articles sourced from three academic databases (Scopus, Web of Science, and IEEE Xplore). A cutting-edge study was conducted, including a comprehensive review of relevant literature on smart meters, cybersecurity vulnerabilities, and mitigation strategies. Elements were selected based on pre-assessment and classification processes, and the data were extracted and combined to provide detailed insights into the new devices. The study identified several significant cybersecurity risks for smart meters, including data breaches, unauthorized access, data manipulation, denial-of-service (DoS) attacks, and malware introduction. The study also highlighted the vulnerabilities exploited by these threats, such as undocumented communications, weak authentication, and outdated software. Recommended mitigation strategies include strengthening access and authentication mechanisms, securing communication systems, regular software updates, code management, anomaly detection, and access control. The findings indicate that although there are good strategies and methods to mitigate these cyber threats, significant research gaps remain. These gaps include design requirements, software and firmware updates, physical security, the use of big data to detect vulnerabilities, user data privacy, and inconsistencies in machine learning algorithms. Future research should focus on these aspects to improve the stability and reliability of smart meters.

1. Introduction

Advances in technology and the digitalization of energy systems have made smart grids an innovative strategy to maximize the amount of electricity consumed and distributed. While technological advancements and the digitalization of energy systems are promising, there are also technical challenges. One of these challenges is cybersecurity, especially when it comes to protecting the data generated by smart meters. Smart meters collect detailed information about energy use. This information is useful for improving distribution and efficiency, but it can also be an attractive target for cybercriminals. Therefore, protecting this information is very important. That is why protecting this sensitive information is of utmost importance. The expectation is that the use of smart meters by the end of 2023 will become increasingly more of a priority. There are around 29.5 million smart meters in operation in the UK [1]. In the United States, the number is even higher, with around 128 million smart meters by the end of 2023. However, this technological advancement is not without competition [2].
Cybersecurity has become a major issue, especially when it comes to protecting data collected by smart meters. The relationship between various devices and systems also poses significant problems. The lack of common standards can hinder effective communication between different devices and systems. Connecting these devices to networked communications exposes systems to multiple threats and highlights the importance of a secure cybersecurity strategy to ensure data integrity and known and owned privacy [3]. The introduction of smart meters represents a major advancement in energy consumption management and monitoring, providing a detailed overview of electricity consumption in real time. However, collecting and transmitting sensitive data through these devices creates vulnerabilities that can be exploited by hackers. Therefore, adequately protecting this information becomes an urgent task to ensure the reliability and security of the smart grid [4].
The Systematic Mapping Review of cyber threats to smart meters in smart grids is proposed in this paper. The major objectives are to identify the most significant cyber threats to smart meter data, examine advanced metering infrastructure vulnerabilities that could be used in cyberattacks, evaluate the efficacy of cybersecurity protocols and measures, identify areas in need of more research, and identify gaps in the body of existing literature.
This work was structured into eight sections. Section 2, Related Work, reviewed previous research on the topic. Section 3 described the Research Methodology, including the criteria used to select and compare different articles. Section 4 presented and discussed the Main Findings. Section 5 addressed the Research Questions. Section 6 identified Gaps and suggested Future Research Directions. Finally, Section 7, Emerging Cyber Threats, explored new risks posed by AI-based attacks and quantum computing, assessing their potential impact on smart grid security. Finally, Section 8, Conclusion, summarized the principal findings and outlined strategic recommendations for strengthening cybersecurity in smart meter infrastructures.

2. Related Works

Different studies on Systematic Mapping Reviews (SMRs) and Systematic Literature Reviews (SLRs) have been conducted in the field of cybersecurity for smart meters. In this section, we review relevant research addressing similar topics.
As mentioned in [5], it addresses cybersecurity vulnerabilities in smart grids, highlighting risks such as user awareness deficiencies and unauthorized access. It proposes mitigation techniques, including consumer education, system protection, and multi-factor authentication. The conclusion emphasizes the need for a collaborative approach to tackle security challenges during the transition to smart grids.
In [6], a literature review is conducted on key technologies for vulnerability mitigation, such as cyber threat intelligence (CTI) sharing platforms, artificial intelligence, natural language processing (NLP), detection, and visualization models. It also discusses the use of risk assessment and management architectures, where semantic languages are used for threat information exchange, helping with dynamic risk assessment and improving vulnerability management.
In [7], the authors present an innovative solution that combines advanced cryptography and blockchain technology to strengthen the security and reliability of smart grids, addressing existing vulnerabilities and preparing the infrastructure for a more decentralized and secure future. The solution utilizes a hybrid authentication and handshake algorithm (BSHAHA), which employs both symmetric and asymmetric cryptography. BSHAHA demonstrates itself to be a robust solution for authentication and data security in smart grids. The paper referenced [8] emphasizes that there is no universally optimal solution for all security challenges in smart grids. Instead, it advocates for a holistic approach that integrates various technologies and methodologies. Among the prominent solutions discussed are blockchain, artificial intelligence (AI), and advanced encryption systems, which collectively enhance the security and resilience of smart grids.
The study presented in [9] explores the detection of irregularities in smart meter data. These anomalies may arise from various sources, including information security breaches, data entry errors, and inconsistencies that affect the accuracy of readings. The authors propose leveraging machine learning techniques to analyze numerical data and identify unusual patterns. Additionally, they recommend examining historical data to detect significant deviations, aiming to minimize these issues and enhance the reliability of smart meters. Meanwhile, the research in [10] discusses the relationship between anomie and smart grids, highlighting the challenges posed by the interoperability of physical and network systems. This integration exposes the infrastructure to cyber threats, such as false data injection (FDI) attacks, which can compromise the integrity of information processed by state estimation (SE) systems. To mitigate these vulnerabilities, the study suggests employing advanced intrusion detection and localization techniques, including Convolutional Neural Networks (CNNs) and bad data detectors (BDDs).
In [11], the authors propose a CTI model designed to strengthen the security of an organization’s core processes and strategies through technologies such as artificial intelligence, blockchain, and multi-factor authentication. The primary objective is to enhance organizational resilience against cyber threats and promote continuous information sharing to improve security. In [12], the authors look at smart grid vulnerabilities and recommend using technological solutions to reduce risks. The use of tree-based algorithms, which greatly improve attack detection and allow for more efficient responses, is emphasized in the study. It also suggests implementing strong authentication and encryption procedures to guard against illegal access and data alteration and maintain the confidentiality and integrity of information.
To detect cyberattacks targeting energy theft in renewable energy systems, in [13], the authors utilized deep learning techniques, integrating data from smart meters, weather predictions, and SCADA systems. This methodology encourages smart meter adoption, leading to enhanced accuracy in energy consumption reporting. Their mitigation strategy, employing deep neural networks like recurrent and convolutional networks, achieved a high detection rate of 99.3% with a low false negative rate of 0.22%. In [14], the authors presented a review of security and privacy risks, exploring both traditional and machine learning-driven (supervised and unsupervised) countermeasures to identify anomalous patterns indicative of threats.
In [15], the authors proposed a multilayer security framework designed to protect against attacks, ensure data integrity, and prevent energy fraud. Their system leverages LoRaWAN, a technology well suited for IoT applications that prioritize energy efficiency and wide-area coverage due to its long range and low power consumption.
Security is significantly enhanced with the use of AES encryption, an advanced standard that protects information against unauthorized access. In addition, we have implemented unidirectional data transmission, a strategy that makes data interception and manipulation difficult, as the flow of information occurs in only one direction, making it more complex for an attacker to insert themselves into the communication. The system is also designed to mitigate distributed denial-of-service (DDoS) attacks, which aim to destabilize the network by overloading devices with excessive traffic.

3. Research Methodology

This research adhered to the guidelines outlined in [16] for conducting a systematic mapping study (SMS). The decision to use this method was motivated by a number of factors. It offers a structured and methodical approach to identifying, evaluating, and interpreting all pertinent studies pertaining to a specific research question, focus area, or phenomenon of interest. An SMS is a clearly defined and methodical method for reviewing and analyzing empirical evidence related to a particular method or technique, pinpointing existing research gaps and areas, and supplying the foundational knowledge necessary to guide future research endeavors for scholars or practitioners. In contrast to traditional literature reviews, systematic mapping studies demand more time and effort; however, they yield a more profound comprehension of the subject matter and a more robust groundwork for formulating research inquiries [17]. A standard systematic mapping research protocol typically involves the following five distinct stages:
1.
Formulation of research questions;
2.
Definition of the search process and search string;
3.
Definition of the study selection process, including inclusion and exclusion criteria;
4.
Extracting data and mapping data to specific research questions;
5.
Data analysis and results extraction.

3.1. Definition of Research Questions

The first step in conducting an SMS is defining the research questions. This process is crucial for ensuring the appropriate selection of relevant articles. The aim of this study is to explore the cyber threats, vulnerabilities, and cybersecurity measures related to smart meter data within smart grids. With these objectives in mind, the following research questions were formulated to guide the study:
  • QP1: What are the main cyber threats to smart meter data in smart grids?
  • QP2: What vulnerabilities in smart meter infrastructure can be exploited by cyberattacks?
  • QP3: What are the common strategies and technologies used to mitigate cybersecurity risks in smart grids?
  • QP4: What are the current research gaps in cybersecurity for smart meter data?
The first research question is to begin collecting information from the newspaper about the types of cybersecurity threats in order to determine which one is the most threatening in response to QP1. Subsequently, the second research question focuses on vulnerabilities within smart meter infrastructure that can be exploited by cyberattacks, aiming to identify the most susceptible areas to threats. The third research question evaluates the effectiveness of current cybersecurity measures and protocols in protecting smart meter data. This analysis aims to highlight practices that are working well and identify areas for improvement. The fourth research question aims to identify gaps in current research and suggest areas for future research, thereby providing further directions for research in this rapidly developing field. Finally, the fifth research question offers recommendations to enhance cybersecurity for smart meter data in smart grid networks, ensuring robust protection against emerging threats.

3.2. Search Protocol and Selection

To conduct an effective systematic review, it is essential to establish a robust search protocol and clear article selection criteria. This protocol needs to be carefully outlined to ensure the inclusion of pertinent and high-quality studies. In this study, the PICOC strategy (Population, Intervention, Comparison, Outcome, Context) will be adopted to guide the search and selection process, as detailed below:
  • Population: Smart meters used in smart grids;
  • Intervention: Cybersecurity measures and strategies implemented to protect data;
  • Comparison: Comparison of different cybersecurity strategies and their effectiveness;
  • Outcome: Identification of threats, vulnerabilities, effectiveness of security measures, and research gaps;
  • Context: Cybersecurity in the context of smart grids.
The research was performed in Scopus, Web of Science, and IEEE Xplore, chosen for their comprehensiveness and relevance in the fields of technology and cybersecurity. The search string is specific to ensure comprehensive and targeted article collection, as shown in Table 1.
These search strategies were chosen to ensure the inclusion of relevant studies published over a 10-year period from 2013 to 2024. The article selection process will be conducted in several stages. Initially, a preliminary search will be conducted to identify all potentially relevant articles. Next, the titles and abstracts of these articles will be reviewed for initial screening, eliminating those that are clearly unrelated to the research questions. The remaining articles will be fully assessed for relevance and methodological quality. Inclusion and exclusion criteria will be applied rigorously as shown in Table 2 and Table 3. Inclusion criteria encompass articles published in peer-reviewed journals or recognized conferences. Opinion articles, non-peer-reviewed studies, and non-academic publications will be excluded.
Figure 1 presents the PRISMA 2020 flowchart, adapted from [18]. This systematization is important so that the scientific document acquisition and selection procedure can benefit from reproducibility and, thus, promote methodological robustness for the process. The initial search resulted in a total of 2910 articles, distributed in the IEEE (1161 articles), Scopus (1352 articles), and Web of Science (397 articles) repositories. This resulted in a total of 1400 duplicates and false positives that were removed before the screening process, as shown in Table 4.
Next, specific inclusion and exclusion criteria were applied, as illustrated in Figure 1, reducing the set to 41 selected articles, described in Table 5. This search reflects the necessary comprehensiveness to capture a full spectrum of research related to the topic. However, the application of rigorous inclusion and exclusion criteria was essential to ensure the relevance and quality of the studies considered in the final analysis. The process of reducing the number of articles followed a structured protocol, which included screening titles and abstracts, followed by a full reading of the remaining articles.
To facilitate this systematic review, we employed the Parsifal v2.2 software [19], which enabled a more efficient and reproducible selection process.
Table 5. Articles selected through systematic mapping of literature.
Table 5. Articles selected through systematic mapping of literature.
TitleRefYear
A Review of Anomaly Detection Techniques in Advanced Metering Infrastructure[20]2020
A Review of Smart Grid Anomaly Detection Approaches Pertaining to Artificial Intelligence[21]2024
A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security[22]2024
A Deep Learning Framework to Identify Remedial Action Schemes against False Data Injection Cyberattacks Targeting Smart Power Systems[23]2024
A Novel Approach for Detection of Cyber Attacks in Microgrid SCADA System[24]2023
A Novel False Data Method Targeting on Time-Series in Smart Grid[25]2023
A Review of Cyber-Resilient Smart Grid[26]2022
A Review of Features, Vulnerabilities, Cyber-Attacks and Protective Actions in Smart Grid Systems[27]2023
A Review of Various Modern Strategies for Mitigation of Cyber Attacks in Smart Grids[28]2019
A Review on Cyber Security Issues and Mitigation Methods in Smart Grid Systems[29]2017
A Survey on Smart Grid Metering Infrastructures: Threats and Solutions[30]2015
Analyzing Attack Resilience of an Advanced Meter Infrastructure Reference Model[31]2016
Anomaly Detection in Smart Meters: Analytical Study[9]2022
Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks[32]2015
Cyber Security Vulnerabilities of Smart Metering Based on LPWAN Wireless Communication Technologies[33]2020
Real-Time Detection of Cyber-Attacks in Modern Power Grids with Uncertainty Using Deep Learning[34]2022
Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges[35]2018
Security Aspects in Smart Meters: Analysis and Prevention[36]2020
Smart Meter Vulnerability Assessment under Cyberattack Events—An Attempt to Safeguard[37]2023
Smart Meter Security: Vulnerabilities, Threat Impacts, and Countermeasures[38]2019
Using Smart Meter Data to Predict and Identify Consumer Vulnerability[39]2023
Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks[40]2021
Invasion Analysis of Smart Meter in AMI System[41]2021
Smart Meter Data Privacy: A Survey[3]2017
Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism[42]2017
Simulation of SCADA System for Advanced Metering Infrastructure in Smart Grid[43]2020
Intrusion Detection Tool for Residential Consumers Equipped with Smart Meters[44]2023
Smart Meters: Cyber Security Issues and Their Solutions[45]2023
Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection[46]2023
Intrusion Detection System for Smart Meters[47]2020
Semi Supervised Cyber Attack Detection System for Smart Grid[48]2022
Security and Privacy Challenges, Solutions, and Open Issues in Smart Metering: A Review[49]2021
Securing the Smart Grid: A Comprehensive Analysis of Recent Cyber Attacks[50]2024
Smart Meter Data Analytics for Load Prediction Using Extreme Learning Machines and Artificial Neural Networks[51]2019
Cyber Security Enhancement of Smart Grids via Machine Learning—A Review[52]2020
Cybersecurity Threats, Detection Methods, and Prevention Strategies in Smart Grid: Review[5]2023
Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach[53]2023
Non-Intrusive Load Monitoring Based Demand Prediction for Smart Meter Attack Detection[54]2021
Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges[55]2012
Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures)[14]2022
During this initial screening, many articles were excluded (rejected) for not directly addressing the research questions or for presenting redundant studies or studies of lower methodological quality. Additionally, it was crucial to conduct a qualitative assessment of the selected articles to ensure that only relevant studies were retained and contributed to the objectives of the SMS. Our objective scoring system ensured a fair and transparent selection process, resulting in 41 articles representing the most relevant and methodologically sound research. This rigorous approach reduced the number of studies and strengthened the foundation of the conclusions.
To ensure the quality and reliability of the selected articles, we conducted a rigorous quality assessment process. This assessment focused on the relevance of the work to the research field. We asked ourselves the following questions:
  • Does this article significantly contribute to advancing knowledge in the area of study?
  • Publication in a relevant journal or conference: Was the article published in a prestigious journal or conference recognized in the field of study?
These questions helped ensure that only the most relevant and reliable articles were considered in the final analysis.

3.3. Bias Risk Assessment

To assess the reliability of the included studies, a risk of bias evaluation was conducted using Parsifal v2.2, following the PRISMA 2020 guidelines. This process enabled a structured and transparent selection of the analyzed scientific articles. The risk of bias assessment considered four main categories:
  • Selection bias: Assesses whether the inclusion and exclusion criteria were applied in a clear and objective manner;
  • Information bias: Refers to the methodological quality of the studies and the reliability of the extracted data;
  • Publication bias: Identifies potential gaps due to the non-publication of studies with negative or inconclusive results;
  • Reporting bias: Examines whether the studies reported all data in a complete and transparent manner.
The studies were classified into three categories:
  • Low risk of bias: Robust and well-described methodology, with reliable data;
  • Moderate risk of bias: Some methodological limitations, but with still usable data;
  • High risk of bias: Significant methodological flaws, potentially compromising the results.
Although rigorous criteria were applied to minimize bias in the selection and analysis of the studies, some limitations inherent in the systematic review process were considered, as follows:
  • Publication bias: It is possible that studies with negative or neutral results were not included, as these studies are less frequently published. To mitigate this bias, widely recognized databases (Scopus, Web of Science, and IEEE Xplore) were used to capture the broadest spectrum of possible publications.
  • Selection bias: The exclusion of studies that did not meet the established methodological criteria may have limited the diversity of the analyzed approaches. However, this filtering was necessary to ensure the quality and reliability of the extracted data.
  • Information bias: Some studies included in the review did not present sufficient methodological details, which may have impacted the accuracy of data extraction. To minimize this problem, the data were analyzed by more than one reviewer, ensuring a consensus in the interpretation of the findings.
  • Methodological bias: The inclusion of studies published in the last 10 years may have excluded older references, but this decision was based on the need to capture the most current trends in cybersecurity for smart meters.
Despite these limitations, the methodological approach used, including the use of Parsifal v2.2 and adherence to PRISMA 2020, ensures the transparency and reproducibility of the review process. Future studies may expand this analysis by including gray literature, pre-prints, and quantitative meta-analyses to strengthen the evidence on cybersecurity risks in smart meters.

3.4. Data Extraction

After selecting 41 papers included in this study, data extraction was conducted to answer the original research questions. The main information extracted is as follows:
  • Study title;
  • Authors;
  • Publication year;
  • Objectives;
  • Methodology;
  • Key findings;
  • Cybersecurity threats identified;
  • Security measures discussed;
  • Effectiveness of measures;
  • Identified gaps;
  • Recommendations.
Each category of information was carefully documented to allow for a detailed analysis and comprehensive synthesis of the data. This meticulous process ensures that all research questions are addressed thoroughly and accurately, providing a solid foundation for the conclusions and recommendations of this study. The selected articles are placed in Table 5, where we can see their names and publication years.

4. Results

4.1. Cyber Threats and Vulnerabilities in Smart Meters in Smart Grids

In this section, the main findings obtained after reviewing the selected articles in Section 2 will be discussed. An initial analysis identified the primary cyber threats and vulnerabilities, comparing their frequency across the selected articles for this systematic mapping. Various cybersecurity threats and security vulnerabilities were discussed, as illustrated in Table 6 and Table 7. Threats are actions aimed at taking advantage of security flaws in a system, causing negative impacts. As shown in [30], the authors analyze the main threats to advanced measurement infrastructures in smart grids and the solutions proposed to mitigate them. Threats include physical attacks, network attacks (such as DoS and eavesdropping), data integrity attacks, and privacy attacks. Physical attacks involve direct manipulation of smart grid hardware components. This could include damage to smart meters, data concentrators, or communications links. The impact of physical attacks can be significant, as they can disrupt the flow of information and lead to incorrect billing or even service interruptions.
A vulnerability is a flaw in a system or its design that allows malicious actors to execute unauthorized commands, access confidential information, or perform denial-of-service attacks. Such breaches enable attackers to exploit electronic data, potentially tracking customer behavior and compromising their privacy.
Figure 2 illustrates the primary cyber threats identified in the systematic mapping study. Among the most prevalent threats, “data tampering/manipulation” was highlighted in 91.67% of the studies, underscoring high concern and frequent discussion of this threat in research. This reflects the relevance of this threat in cybersecurity contexts for smart meters. The threat of “unauthorized access” appeared in 75.00% of the studies, indicating it as one of the main vulnerabilities exploited in cyberattacks, which underscores the need for robust authentication and authorization systems. Additionally, “privacy breaches” were mentioned in 58.33% of the studies, highlighting significant concerns regarding the protection of personal data and sensitive information.
The Percentage of Appearance ( P A t ) of a specific threat can be calculated by the following formula:
PA t = n t N t × 100
where
  • n t is the number of times the threat is mentioned, and
  • N t is the total number of mentions of all threats in the articles.
Figure 3 shows the main security vulnerabilities of advanced metering infrastructures (PQ2) identified in the systematic mapping study. The legend describes the most frequent vulnerabilities, with “Weak Encryption” standing out at 58.33%. This vulnerability is highlighted as the most common, indicating that many smart metering systems may be vulnerable to attacks due to the use of weak encryption algorithms or inadequate implementation of encryption to protect sensitive data. “Weak Authentication Mechanisms” are present in 50.00% of the articles, suggesting that many smart meters may not have robust methods to properly verify and authenticate the identity of users and devices accessing the system. “Insecure Communication Protocols”, present in 41.67% of the articles, point to the use of communication protocols that are not adequately secure, leaving the transmitted data vulnerable to interception and manipulation by attackers.
The Percentage of Appearance ( P A v ) of a specific vulnerability can be calculated by the following formula:
PA v = n v N v × 100
where
  • n v is the number of times the vulnerability is mentioned, and
  • N v is the total number of mentions of all vulnerabilities in the articles.

4.2. Attack Mitigation Techniques

Attack mitigation techniques in smart grids, as presented in Table 8, are crucial for protecting advanced metering infrastructure from threats and vulnerabilities. Several articles propose solutions to mitigate risks such as false data injection attacks (FDIAs), denial-of-service (DoS) attacks, data manipulation in smart meters, and SCADA system invasions. For FDIAs, deep learning models are used to detect anomalies in real time, while network segmentation and redundant systems limit the impact of DoS attacks. Data manipulation in smart meters is mitigated using machine learning techniques and intrusion detection tools. In the case of SCADA systems, multilayer networks and semi-supervised detection prevent invasions. Additionally, smart meter data privacy is protected through anonymization and encryption techniques. These strategies, listed in Table 8, address critical vulnerabilities in smart grids, enhancing security and aligning with the cybersecurity risk mitigation strategies outlined in QP3.
These mitigation techniques range from traditional methods such as encryption and authentication mechanisms to more advanced approaches such as using machine learning and neural networks for anomaly and intrusion detection. In [36], the authors propose preventive measures for security aspects in smart meters, including the use of encryption to protect sensitive data and ensure the integrity of communications in the smart metering infrastructure. In [32], the authors emphasize the importance of securely managing cryptographic keys, continually educating employees on cybersecurity practices, and creating an organizational culture focused on security awareness. These measures are designed to maintain integrity, take measures in smart plans, ensure reliability in operations, and ensure the management of important information.
Table 9 summarizes some of the deep learning and machine learning techniques that have proven effective in detecting anomalies and intrusions in smart grids. This table is a useful tool for comparing different DL and ML methods and understanding the most commonly used methods in the smart grid field. Each method has its own strengths and limitations, and the choice of method can vary depending on the type of data and the specific problem being solved.
The paper in [20] covers a range of flaw detection techniques, such as statistical methods, machine learning algorithms, and data analysis strategies. These techniques are utilized to detect anomalies within the data gathered by advanced metering infrastructure (AMI) systems, thereby safeguarding data integrity and security. In [30], various techniques are being studied to mitigate threats to advanced accounting infrastructure. These include encryption and digital signatures to ensure the security and authenticity of measurement data. It also discusses advanced anomaly detection techniques to identify unusual patterns that may indicate attacks or failures. Network segmentation is also considered a containment measure to protect critical parts of the infrastructure while exposing them to potential attacks. This combined strategy aims to increase the resilience of smart networks to cyber and operational threats.

5. Discussion

The results and answers to the research questions in Section 3 are discussed below.
QP1: What are the main cyber threats to smart meter data in smart electrical grids?
The main cybersecurity threats to smart meter data in smart grids, as presented in Table 6, were identified based on a systematic review of several articles. These threats can significantly compromise the security and efficiency of these networks. Among the most highlighted threats in the selected articles, four stand out: data tampering/manipulation with 91.67, unauthorized access with 75% frequency in articles, privacy leaks with 58.33%, and denial-of-service (DoS)/distributed denial-of-Service (DDoS) with 50.00%. These threats were selected from several discussed in the articles reviewed, standing out for their potential impact and the frequency with which they were mentioned in the literature. The systematic analysis reinforces the importance of mitigating these threats to ensure the security and efficiency of smart grids.
QP2: What vulnerabilities in smart meter infrastructure can be exploited by cyberattacks?
Based on the frequency of occurrence identified in the reviewed articles, and as shown in Table 6 and Table 7 analyzing the frequency data, it is clear that vulnerabilities in smart meter infrastructure represent serious security risks in cybernetics. The high incidence of issues related to weak encryption, poor authentication, insecure communication protocols, and inadequate data protection reflects the widespread vulnerability of these systems. These issues are discussed in multiple studies due to their critical importance for the integrity and security of data in smart meters. Therefore, mitigating these vulnerabilities is essential to protect these systems against potential cyberattacks and ensure the reliability of smart grids.
QP3: What are the common strategies and technologies used to mitigate cybersecurity risks in smart grids?
To answer this question about the common strategies and technologies used to mitigate cybersecurity risks in smart electrical grids, consider the data provided by the selected articles summarized in Table 8 and Table 9. The common strategies include using advanced deep learning techniques (such as Convolutional Neural Networks and Autoencoders) and machine learning (such as Support Vector Machines and Random Forest) for anomaly detection and the prediction of anomalous behavior.
Encryption is crucial for protecting sensitive data, and vulnerability analysis, anomaly detection, and thorough security testing are essential methods for identifying and addressing weaknesses before they are exploited by cyberattacks. For example, one of the major vulnerabilities in smart grids is false data injection (FDIA), as discussed in [22]. This type of attack can severely compromise the integrity and operation of energy systems. To mitigate this threat, we can implement the deep learning methods described in [23,42]. In this study, we propose creating a model that learns common data patterns and detects anomalies that indicate attacks, which can identify and mitigate FDIA attacks in real time. Another important vulnerability is the vulnerability of the power grid to denial-of-service (DoS) attacks, as detailed in [26]. These attacks can disrupt the control and communication systems. To address this issue, the authors in [28] propose network segmentation and defense-in-depth techniques to limit the impact of such attacks, while the authors in [50] propose the use of redundant networks and the implementation of a fast recovery system to improve resilience against DoS attacks, minimizing downtime and damage. Furthermore, the manipulation of metering data from smart meters is a significant vulnerability, as discussed in [36]. To mitigate this vulnerability, the authors in [20] propose the implementation of machine learning and statistical anomaly detection methods that can identify anomalous patterns in measurement data. Complementing this approach, the authors in [44] propose developing a dedicated intrusion detection tool for smart meters that monitors data traffic and detects manipulation attempts in real time. Some mitigation solutions have been proposed in the literature regarding intrusions and manipulations of SCADA systems in microgrids, as discussed in [24]. For instance, the authors in [34] suggest the evaluation of cyber and physical vulnerabilities through complex multilayer networks, identifying critical points that require additional protection to prevent intrusions. Similarly, the authors in [48] propose the development of semi-supervised detection systems that combine supervised and unsupervised machine learning to identify intrusion attempts in SCADA systems of microgrids.
Finally, the exposure to privacy attacks in smart meters, as reviewed [3], is a growing concern. To mitigate this vulnerability, the authors in [35] suggest the implementation of data anonymization and aggregation techniques, which protect user privacy by preventing direct association between the collected data and specific individuals. Additionally, the authors in [49] propose the use of advanced encryption and access control techniques to ensure that only authorized users can access measurement data, thereby protecting consumer privacy.
QP4: What gaps exist in current research on the cybersecurity of smart meter data?
Analyzing the previous questions and the data provided in Figure 2 and Figure 3 and Table 8 (QP4) of the articles selected in the systematic mapping, we identified some gaps in current research on the cybersecurity of smart meter data, such as the following:
Efficiency and scalability: Many cybersecurity techniques are computationally intensive, which can limit their applicability to large smart meter networks. It is necessary to develop more efficient and scalable methods to deal with the growing volume of data generated by these systems. In [21], the authors explore the efficiency and scalability of these approaches, crucial for dealing with the complexity and volume of data generated by smart grids. Furthermore, the article discusses the application of these techniques in real scenarios, highlighting their practical advantages and limitations [21]. Real-time detection: The ability to detect real-time anomalies and intrusions in meter data is crucial to mitigating damage to the electrical grid.
As seen in [22], this research highlights the relevance of critical security issues affecting modern electronic systems. A coordinated and adaptable approach is essential to safeguarding critical infrastructures against constantly evolving cyber threats. The study explores the use of technologies such as behavioral analysis and network monitoring, as well as the application of artificial intelligence, including neural networks and machine learning algorithms designed for anomaly detection. The system aims to identify suspicious patterns that may indicate a threat and implement measures to mitigate potential damage. As cyberattack techniques continue to advance, the need for effective prevention strategies becomes increasingly crucial.
The main focus is to develop effective methods of identifying corrective action schemes that can neutralize these attacks, allowing power systems to automatically implement corrective measures or alert operators for immediate human intervention.
These gaps indicate critical areas where additional research can significantly contribute to strengthening the cybersecurity of smart meters and ensuring the reliability of smart grids in the future.

6. Research Gaps and Proposals for Future Work

The analysis of the main cyber threats to smart meters highlighted several areas for attention, but also revealed significant gaps that still need to be addressed by the academic and industrial communities.
One of the most notable gaps is the lack of consensus on unified security standards for smart meters. Although there are several proposals for security protocols and cyberattack mitigation mechanisms, such as advanced encryption and anomaly detection [23,24], these mechanisms have not yet been widely and uniformly implemented in the industry. The development of internationally recognized security standards specifically aimed at protecting smart meters would be an important contribution to increasing the security of smart grids. Future work could explore the creation of such standards, collaborating with regulatory bodies and critical infrastructure industries.
Another gap identified is the lack of studies focused on the resilience of systems in large-scale attack scenarios. While the paper discusses the dangers of DDoS and malicious command injection attacks [34], there were few studies investigating system recovery after successful attacks. Future work could focus on developing and testing recovery strategies that allow smart metering systems to quickly restructure after a security breach, minimizing the impact on consumers.
In addition, the paper presents a number of known attacks and vulnerabilities [36], but does not delve deeply into emerging vulnerabilities associated with new technologies integrated into smart grids, such as edge computing and 5G. These new technologies offer benefits of reduced latency and increased connectivity, but they also introduce new attack vectors that need to be understood and mitigated. Future studies can examine how these technologies affect smart meters and propose solutions to protect networks that include these innovations.
Finally, it is important to note the lack of end-user-centric studies, especially with regard to awareness and education about the cyber risks associated with smart meters. While the main focus of the research is on the infrastructure and technical aspects of threat mitigation, future work could explore the impact of security awareness programs aimed at end users, helping them better understand how to protect their devices and data in smart grids. In summary, the following future work is suggested:
1.
Developing unified security standards for smart meters in collaboration with regulatory agencies;
2.
Studies on system resilience and recovery after large-scale cyberattacks;
3.
Investigating emerging vulnerabilities associated with technologies such as edge computing and 5G within the context of smart grids;
4.
Creating security awareness programs to educate end users on how to protect their data in smart meter networks.
These areas represent significant gaps in the field of smart meter cybersecurity, and by addressing them, future work could significantly contribute to the security and reliability of these networks.

7. Emerging Cyber Threats: AI-Based Attacks and Quantum Computing Risks

While this Systematic Mapping Review has identified the main cyber threats and vulnerabilities affecting smart meters based on existing literature, it is crucial to recognize the emergence of new and potentially disruptive threats that have not yet been fully captured in the current research landscape. Two prominent examples are the increasing sophistication of AI-based attacks [21] and the long-term risks posed by quantum computing [56].

7.1. AI-Based Attacks

Artificial intelligence (AI) has been increasingly exploited by cybercriminals to enhance cyberattacks against critical infrastructures, such as smart meter networks. One of the most concerning threats is the development of intelligent malware that uses machine learning to dynamically adapt to digital environments, modifying its signatures to evade detection by conventional security systems. This scenario becomes even more challenging in the context of smart grids, where the increased use of smart meters generates a massive amount of energy consumption data, as shown in [57]. The study in question proposes a hybrid energy theft detection technique based on machine learning, combining the Support Vector Machine (SVM) algorithm with Particle Swarm Optimization (PSO). This approach aims to identify abrupt changes in user consumption patterns, enabling the detection of fraudulent behavior with greater accuracy. The proposed method uses a real dataset from a smart grid network, achieving a detection rate of 98.9%. Additionally, the model was evaluated using metrics such as precision, recall, F1-score, and AUC, proving to be an effective tool against fraud in smart grid environments. AI integration not only enhances security but also offers a proactive approach to mitigate non-technical losses, such as energy theft, by anticipating fraudulent behaviors and optimizing the operation of power distribution networks.
Furthermore, AI systems can be used to enhance attacks such as ransomware, making the encryption of hijacked data even more resistant to recovery attempts and harder to detect by traditional security systems. This scenario poses a significant threat to critical infrastructures, including energy management systems in smart homes. In response to this challenge, in [58], a study proposed a Home Energy Management System (HEMS) based on Artificial Neural Networks (ANNs) as an effective solution. The model uses machine learning techniques to intelligently monitor and control the use of household appliances, considering consumption priorities and user preferences. This approach not only optimizes energy efficiency—reducing consumption by over 60% without compromising comfort—but also strengthens system security by anticipating anomalous behavior and proactively managing devices.
Another significant risk in the security of smart meter networks is the automated discovery of vulnerabilities. AI algorithms can be used to scan these networks, identifying weak points that hackers could exploit. This technique significantly reduces the time needed to detect security flaws, accelerating the development of highly effective exploits, as demonstrated in [59]. To mitigate these threats, the study proposes Q-Secure-P²-SMA, a quantum authentication protocol for smart meters focused on security and privacy. The protocol relies on the following three main technologies:
  • Semi-Quantum Key Distribution (SQKD): Reduces costs by allowing only one participant to have a complete quantum system;
  • Homomorphic Encryption: Enables encrypted data to be processed without the need for decryption, ensuring greater privacy;
  • Quantum-Resistant Digital Signatures: Protect against identity forgery using lattice-based cryptography.
The proposed solutions ensure secure authentication against attacks such as Man-in-the-Middle (MitM), Replay, and Spoofing, while also presenting low computational consumption, making them efficient for smart metering devices. Additionally, the protocol is scalable, allowing its implementation in large-scale smart grid networks.
Instead of relying on human hackers, who take time to analyze and test vulnerabilities, AI-driven attacks can operate autonomously, refining their techniques to avoid detection. This approach threatens the security of electrical grids, as an unpatched vulnerability could compromise multiple devices simultaneously [60].
AI also enhances social engineering attacks, making frauds such as phishing and spear-phishing even more convincing. Using deepfakes and advanced chatbots, criminals can create realistic interactions to deceive users and employees of utility companies. These attacks can trick victims into revealing sensitive credentials, installing malware, or conducting fraudulent transactions without realizing that they are being manipulated [61]. Unlike traditional attacks, which rely on human skill to deceive victims, automated approaches can scale these attacks to thousands of simultaneous targets, drastically increasing their impact.
Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks can also be enhanced by AI, making them even more dangerous. AI can monitor network traffic and identify the system’s most vulnerable points, launching attacks in a precise and coordinated manner. Moreover, intelligent algorithms can adapt to countermeasures applied by victims, dynamically changing attack patterns to avoid being blocked [62].
In a smart metering infrastructure, these attacks can cause service disruptions, affecting thousands of consumers. For this reason, implementing AI-based defense solutions against these threats is a priority for utility companies and cybersecurity managers.

7.2. Risks of Quantum Computing

Quantum computing represents an emerging threat to cybersecurity, particularly for systems that rely on classical cryptography to protect sensitive data. Although this technology is still in its early stages, advances in quantum computers could render traditional cryptographic methods vulnerable to sophisticated attacks. Shor’s algorithm, for instance, could break widely used cryptographic protocols such as RSA and ECC, allowing attackers to compromise the security of smart meter networks and gain unauthorized access to critical data [56].
Recent studies reinforce this threat. For example, the mutual authentication protocol proposed by Parameswarath et al. [63], based on Quantum Key Distribution (QKD) and Quantum Random Number Generators (QRNGs), presents a practical solution to strengthen communication security in smart meter networks, protecting against future quantum attacks.
The transition to quantum-resistant cryptography is complex and requires structural changes in the security of smart grids. This transition involves developing new cryptographic algorithms capable of withstanding quantum attacks and gradually implementing them in existing devices and systems. Since smart meters have a long life cycle, early adoption of these technologies is essential to ensure that energy networks remain protected in the future [56].
In this context, the Q-Secure-P²-SMA protocol proposed by Prateek et al. [59] is an innovation that uses a semi-quantum key distribution approach to safeguard the privacy and integrity of measurement data in smart grids, without requiring all devices to have quantum capabilities. This makes the protocol more practical for large-scale implementations and enhances privacy by ensuring the anonymization of energy consumption information.
Broader research has also explored the impact of quantum computing on digital infrastructure as a whole. Baseri et al. [63] conducted a detailed analysis of security risks across infrastructure layers, highlighting the need for proactive strategies to mitigate quantum threats in critical environments such as power grids and cloud services.
Beyond direct threats to cryptography, advances in quantum computing are also opening new possibilities for data prediction and analysis. An innovative study conducted by Balakrishnan et al. [64] explores the potential of Quantum Neural Networks (QNNs) for time-series forecasting, which could be particularly useful in smart power grids to predict energy consumption patterns and optimize resource allocation.
Another important approach is presented by Furutanpey et al. [65], who proposed an innovative architecture to integrate quantum computing within the Edge-Cloud Continuum. This integration would enable the distributed use of quantum resources in hybrid applications, offering more efficient and secure solutions for protecting sensitive data in smart grids.
In light of these threats and opportunities, collaboration between researchers, industries, and governments is essential to accelerate the development and adoption of security protocols compatible with the quantum computing era. The gradual migration to quantum-resistant algorithms should be planned in advance to ensure that smart grids are prepared for future challenges. Furthermore, conducting simulations and experimental testing with quantum cryptographic methods can help refine these technologies and create a secure and reliable environment for energy systems [63,64,65].

8. Conclusions

This systematic review of cybersecurity and the main cyber threats to smart meters revealed that although technological advances offer many benefits to smart grids, they also introduce a number of vulnerabilities that have yet to be fully addressed. The threats discussed, such as DDoS attacks, malicious command injection, and the exploitation of authentication and encryption flaws [34,36], demonstrate that smart meters remain an attractive target for cybercriminals, especially in critical infrastructures.
The implication of the findings is that although many solutions have been proposed in the literature, such as advanced search engines and advanced encryption techniques, their implementation still faces challenges. The lack of standardization and isolation of solutions across different vendors and geographies is a key issue to ensure consistent security of smart metering. Furthermore, these networks increasingly rely on new technologies such as 5G and edge computing, which add new challenges to the security balance [9,31]. Research should focus on the following areas:
1.
Standardization and regulation: Creating a unified set of security standards to protect smart meters is critical to ensuring compliance and security across all connected devices. Future work could include working with international regulators to create clear guidelines and connections around the security of smart solutions from manufacturing to operations.
2.
Resilience and post-attack recovery: The ability to recover quickly after a successful cyberattack remains an uncharted area. Future research could focus on developing recovery strategies and procedures that will enable smart countermeasures to return to work quickly and efficiently while also minimizing the impact on used assets.
3.
Security in emerging technologies: The use of 5G and edge computing is increasing, but these technologies also bring new challenges. Discovering the unique vulnerabilities of this technology and developing security solutions to prevent smart metering in high-connectivity, low-latency environments should be a priority note for future research.
4.
End user awareness and education: While technology security is important, end users play a significant role in protecting their devices. Future research could explore improving security awareness and education to help users understand how to protect their smart devices and personal data.
These areas of research are essential to strengthening the security of smart meters and the energy grid as a whole. By implementing more robust and standardized solutions, it will be possible to mitigate the risks associated with these cyber threats, ensuring the reliability and resilience of the smart metering infrastructure.

Author Contributions

Conceptualization, J.M.N., O.d.S.M.G. and R.C.S.M.; Methodology, J.M.N.; Software, J.M.N.; Validation, J.M.N., O.d.S.M.G., A.D.d.S. and R.C.S.M.; Formal analysis, J.M.N.; Investigation, J.M.N. and R.C.S.M.; Resources, O.d.S.M.G. and R.C.S.M.; Data curation, J.M.N.; Writing—original draft preparation, J.M.N.; Writing—review and editing, O.d.S.M.G., A.D.d.S. and R.C.S.M.; Visualization, J.M.N.; Supervision, O.d.S.M.G.; Project administration, O.d.S.M.G.; Funding acquisition, A.D.d.S. and R.C.S.M. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by the following Brazilian research agency: FINEP/ Clavis PlatCiber. Additionally, this work was partially supported by FADCOM (Communications Development Support Fund), under presidential decree no. 264/10, dated 26 November 2010, and by CNPq (National Council for Scientific and Technological Development), grant number 131033/2024-7.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Raphael Carlos Santos Machado is employed by Clavis Information Security. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. UK Government Publishing Service. Smart Meter Statistics in Great Britain: Quarterly Report to End December 2023. Available online: https://www.google.com.br/url?sa=t&source=web&rct=j&opi=89978449&url=https://consult.ofgem.gov.uk/energy-supply/energy-price-cap-operating-cost-allowances-review/supporting_documents/ofgemenergypricecapoperatingcostallowancesreviewconsultation.pdf&ved=2ahUKEwi40NOb98CLAxUmX0EAHTAlOacQFnoECBgQAQ&usg=AOvVaw02vjZLgn21eXNRJlv4z2QT (accessed on 12 February 2025).
  2. IoT Analytics. Smart Meter Adoption. Available online: https://iot-analytics.com/smart-meter-adoption/ (accessed on 12 February 2025).
  3. Asghar, M.R.; Dán, G.; Miorandi, D.; Chlamtac, I. Smart Meter Data Privacy: A Survey. IEEE Commun. Surv. Tutorials 2017, 19, 2820–2835. [Google Scholar] [CrossRef]
  4. Alahakoon, D.; Yu, X. Smart Electricity Meter Data Intelligence for Future Energy Systems: A Survey. IEEE Trans. Ind. Inform. 2016, 12, 425–436. [Google Scholar] [CrossRef]
  5. Kumar, K.D.; Jawale, M.A.; Sujith, M.; Pardeshi, D. Cybersecurity Threats, Detection Methods, and Prevention Strategies in Smart Grid: Review. In Proceedings of the 2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2–4 February 2023; pp. 1609–1614. [Google Scholar] [CrossRef]
  6. Saeed, S.; Suayyid, S.A.; Al-Ghamdi, M.S.; Al-Muhaisen, H.; Almuhaideb, A.M. A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. Sensors 2023, 23, 7273. [Google Scholar] [CrossRef] [PubMed]
  7. Bedi, A.; Ramprabhakar, J.; Anand, R.; Kumaran, U.; Meena, V.; Hameed, I.A. A Novel Blockchain Supported Hybrid Authentication and Handshake Algorithm for Smart Grid. IEEE Access 2024, 12, 177589–177608. [Google Scholar] [CrossRef]
  8. Alomari, M.A.; Al-Andoli, M.N.; Ghaleb, M.; Thabit, R.; Alkawsi, G.; Alsayaydeh, J.A.J.; Gaid, A.S.A. Security of Smart Grid: Cybersecurity Issues, Potential Cyberattacks, Major Incidents, and Future Directions. Energies 2025, 18, 141. [Google Scholar] [CrossRef]
  9. Singhal, D.; Ahuja, L.; Seth, A. Anomaly Detection in Smart Meters: Analytical Study. In Proceedings of the 2022 2nd International Conference on Power Electronics & IoT Applications in Renewable Energy and Its Control (PARC), Mathura, India, 21–22 January 2022; pp. 1–5. [Google Scholar] [CrossRef]
  10. dos Santos Costa, R.; Aranda, J.A.S.; de Vargas, V.W.; da Silva Pereira, P.R.; Barbosa, J.L.V.; Vianna, M.P. Data Analysis Techniques Applied to Distribution Systems: A Systematic Mapping Study. Electr. Power Compon. Syst. 2023, 51, 452–467. [Google Scholar] [CrossRef]
  11. Ashok, K.; Reno, M.J.; Blakely, L.; Divan, D. Systematic Study of Data Requirements and AMI Capabilities for Smart Meter Analytics. In Proceedings of the IEEE 7th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 12–14 August 2019; pp. 53–58. [Google Scholar] [CrossRef]
  12. Paul, B.; Sarker, A.; Abhi, S.H.; Das, S.K.; Ali, M.F.; Islam, M.M.; Islam, M.R.; Moyeen, S.I.; Rahman Badal, M.F.; Ahamed, M.H.; et al. Potential Smart Grid Vulnerabilities to Cyber Attacks: Current Threats and Existing Mitigation Strategies. Heliyon 2024, 10, e37980. [Google Scholar] [CrossRef]
  13. Ismail, M.; Shaaban, M.F.; Naidu, M.; Serpedin, E. Deep Learning Detection of Electricity Theft Cyber-Attacks in Renewable Distributed Generation. IEEE Trans. Smart Grid 2020, 11, 3428–3437. [Google Scholar] [CrossRef]
  14. Haji Mirzaee, P.; Shojafar, M.; Cruickshank, H.; Tafazolli, R. Smart Grid Security and Privacy: From Conventional to Machine Learning Issues (Threats and Countermeasures). IEEE Access 2022, 10, 52922–52954. [Google Scholar] [CrossRef]
  15. Hseiki, H.A.; El-Hajj, A.M.; Ajra, Y.O.; Hija, F.A.; Haidar, A.M. A Secure and Resilient Smart Energy Meter. IEEE Access 2024, 12, 3114–3125. [Google Scholar] [CrossRef]
  16. Petersen, K.; Feldt, R.; Mujtaba, S.; Mattsson, M. Systematic Software Testing: A Study on the Effectiveness of Test-Driven Development. Empir. Softw. Eng. 2008, 13, 101–124. Available online: https://www.researchgate.net/publication/228350426_Systematic_Mapping_Studies_in_Software_Engineering (accessed on 5 January 2025).
  17. Petersen, K.; Vakkalanka, S.; Kuzniarz, L. Guidelines for Conducting Systematic Mapping Studies in Software Engineering: An Update. Inf. Softw. Technol. 2015, 64, 1–18. [Google Scholar] [CrossRef]
  18. Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
  19. Carrera-Rivera, A.; Ochoa, W.; Larrinaga, F.; Lasa, G. How-to Conduct a Systematic Literature Review: A Quick Guide for Computer Science Research. MethodsX 2022, 9, 101895. Available online: https://www.researchgate.net/publication/365136495_How-to_conduct_a_systematic_literature_review_A_quick_guide_for_computer_science_research (accessed on 5 January 2025). [CrossRef] [PubMed]
  20. Al-Ghaili, A.M.; Ibrahim, Z.-A.; Hairi, S.A.S.; Rahim, F.A.; Baskaran, H.; Ariffin, N.A.M.; Kasim, H. A Review of Anomaly Detection Techniques in Advanced Metering Infrastructure. Bull. Electr. Eng. Inform. 2021, 10, 266–273. [Google Scholar] [CrossRef]
  21. Burgos, M.F.; Morato, J.; Vizcaino Imacaña, F.P. A Review of Smart Grid Anomaly Detection Approaches Pertaining to Artificial Intelligence. Appl. Sci. 2024, 14, 1194. [Google Scholar] [CrossRef]
  22. Tatipatri, N.; Arun, S.L. A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security. IEEE Access 2024, 12, 18147–18167. [Google Scholar] [CrossRef]
  23. Naderi, E.; Asrari, A. A Deep Learning Framework to Identify Remedial Action Schemes Against False Data Injection Cyberattacks Targeting Smart Power Systems. IEEE Trans. Ind. Inform. 2024, 20, 1208–1219. [Google Scholar] [CrossRef]
  24. Tripathy, M.; Niyogi, R.; Kumar, P.S.; Kumbhar, G.B.; Singh, R.; Thakur, V. A Novel Approach for Detection of Cyber Attacks in Microgrid SCADA System. In Proceedings of the 2023 IEEE 3rd International Conference on Sustainable Energy and Future Electric Transportation (SEFET), Bhubaneswar, India, 9–12 August 2023; pp. 1–6. [Google Scholar] [CrossRef]
  25. Hong, S.; Zhang, X.; Kou, J.; Sun, Y. A Novel False Data Injection Method Targeting on Time-Series Analysis in Smart Grid. In Proceedings of the 2023 International Conference on Smart Electrical Grid and Renewable Energy (SEGRE), Changsha, China, 16–19 June 2023; pp. 50–55. [Google Scholar] [CrossRef]
  26. Mohammadi, F.; Saif, M.; Ahmadi, M.; Shafai, B. A Review of Cyber–Resilient Smart Grid. In Proceedings of the 2022 World Automation Congress (WAC), San Antonio, TX, USA, 11–15 October 2022; pp. 28–35. [Google Scholar] [CrossRef]
  27. Yongjie, Z.; Zidong, W.; Jingxia, L.; Zhongming, F.; Ling, J.; Kai, C. A Review of Features, Vulnerabilities, Cyber-Attacks and Protective Actions in Smart Grid Systems. In Proceedings of the 2023 IEEE 6th International Electrical and Energy Conference (CIEEC), Hefei, China, 12–14 May 2023; pp. 171–176. [Google Scholar] [CrossRef]
  28. Saad, M.; Bukhari, S.B.A.; Kim, C.H. A Review of Various Modern Strategies for Mitigation of Cyber Attacks in Smart Grids. In Proceedings of the 2019 IEEE Transportation Electrification Conference and Expo, Asia-Pacific (ITEC Asia-Pacific), Seogwipo, Republic of Korea, 8–10 May 2019; pp. 1–7. [Google Scholar] [CrossRef]
  29. Pour, M.M.; Anzalchi, A.; Sarwat, A. A Review on Cyber Security Issues and Mitigation Methods in Smart Grid Systems. In Proceedings of the SoutheastCon 2017, Concord, NC, USA, 30 March–2 April 2017; pp. 1–4. [Google Scholar] [CrossRef]
  30. Mahmud, R.; Vallakati, R.; Mukherjee, A.; Ranganathan, P.; Nejadpak, A. A Survey on Smart Grid Metering Infrastructures: Threats and Solutions. In Proceedings of the 2015 IEEE International Conference on Electro/Information Technology (EIT), Dekalb, IL, USA, 21–23 May 2015; pp. 386–391. [Google Scholar] [CrossRef]
  31. Blom, R.; Korman, M.; Lagerström, R.; Ekstedt, M. Analyzing Attack Resilience of an Advanced Meter Infrastructure Reference Model. In Proceedings of the 2016 Joint Workshop on Cyber-Physical Security and Resilience in Smart Grids (CPSR-SG), Vienna, Austria, 12 April 2016; pp. 1–6. [Google Scholar] [CrossRef]
  32. Abdullah, M.D.H.; Zurina, M.H.; Zukarnain, Z.A.; Mohamed, M.A. Attacks, Vulnerabilities and Security Requirements in Smart Metering Networks. KSII Trans. Internet Inf. Syst. 2015, 9, 1493–1515. [Google Scholar] [CrossRef]
  33. Zaraket, C.; Papageorgas, P.; Aillerie, M.; Agavanakis, K. Cyber Security Vulnerabilities of Smart Metering Based on LPWAN Wireless Communication Technologies. AIP Conf. Proc. 2020, 2307, 020050. [Google Scholar] [CrossRef]
  34. Mohammadpourfard, M.; Ghanaatpishe, F.; Weng, Y.; Genc, I.; Sandıkkaya, M.T. Real-Time Detection of Cyber-Attacks in Modern Power Grids with Uncertainty Using Deep Learning. In Proceedings of the 2022 International Conference on Smart Energy Systems and Technologies (SEST), Eindhoven, The Netherlands, 5–7 September 2022; pp. 1–6. [Google Scholar] [CrossRef]
  35. Wang, Y.; Chen, Q.; Hong, T.; Kang, C. Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges. IEEE Trans. Smart Grid 2019, 10, 3125–3148. [Google Scholar] [CrossRef]
  36. Díaz Redondo, R.P.; Fernández-Vilas, A.; Fernández dos Reis, G. Security Aspects in Smart Meters: Analysis and Prevention. Sensors 2020, 20, 3977. [Google Scholar] [CrossRef] [PubMed]
  37. Kumar, K.; Singh, R.R. Smart Meter Vulnerability Assessment Under Cyberattack Events—An Attempt to Safeguard. Intell. Soft Comput. Syst. Green Energy 2023, 79, 79–95. [Google Scholar] [CrossRef]
  38. Khattak, A.M.; Khanji, S.I.; Khan, W.A. Smart Meter Security: Vulnerabilities, Threat Impacts, and Countermeasures. In Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM); Springer: Cham, Switzerland, 2019. [Google Scholar] [CrossRef]
  39. Wadsworth, R.; Hodgins, Z.; Ellis, M.; Troshka, L. Using Smart Meter Data to Predict and Identify Consumer Vulnerability. In Proceedings of the 27th International Conference on Electricity Distribution (CIRED), Rome, Italy, 12–15 June 2023; pp. 786–790. [Google Scholar] [CrossRef]
  40. Alonso, M.; Turanzas, J.; Amaris, H.; Ledo, A.T. Cyber-Physical Vulnerability Assessment in Smart Grids Based on Multilayer Complex Networks. Sensors 2021, 21, 5826. [Google Scholar] [CrossRef] [PubMed]
  41. Alfassa, S.M.; Nagasundari, S.; Honnavalli, P.B. Invasion Analysis of Smart Meter in AMI System. In Proceedings of the 2021 IEEE Mysore Sub Section International Conference (MysuruCon), Hassan, India, 24–25 October 2021; pp. 831–836. [Google Scholar] [CrossRef]
  42. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
  43. Gupta, P.C.R.; Ramesh, A.; Satvik, D.; Nagasundari, S.; Honnavalli, P.B. Simulation of SCADA System for Advanced Metering Infrastructure in Smart Grid. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 1071–1077. [Google Scholar] [CrossRef]
  44. Sharma, A.; Saini, V.K.; Kumar, R.; Al-Sumaiti, A.S.; Heydarian-Forushani, E. Intrusion Detection Tool for Residential Consumers Equipped with Smart Meters. In Proceedings of the 2023 IEEE International Conference on Energy Technologies for Future Grids (ETFG), Wollongong, Australia, 3–6 December 2023; pp. 1–6. [Google Scholar] [CrossRef]
  45. Parida, D.; Bhanja, U. Smart Meters: Cyber Security Issues and Their Solutions. In Proceedings of the 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), Vellore, India, 5–6 May 2023; pp. 1–6. [Google Scholar] [CrossRef]
  46. Pinto, S.J.; Siano, P.; Parente, M. Review of Cybersecurity Analysis in Smart Distribution Systems and Future Directions for Using Unsupervised Learning Methods for Cyber Detection. Energies 2023, 16, 1651. [Google Scholar] [CrossRef]
  47. Sun, C.-C.; Cardenas, D.J.S.; Hahn, A.; Liu, C.-C. Intrusion Detection for Cybersecurity of Smart Meters. IEEE Trans. Smart Grid 2021, 12, 612–622. [Google Scholar] [CrossRef]
  48. Sharma, R.; Joshi, A.M.; Sahu, C.; Sharma, G.; Akindeji, K.T.; Sharma, S. Semi Supervised Cyber Attack Detection System for Smart Grid. In Proceedings of the 2022 30th Southern African Universities Power Engineering Conference (SAUPEC), Durban, South Africa, 25–27 January 2022; pp. 1–5. [Google Scholar] [CrossRef]
  49. Win, L.L.; Tonyalı, S. Security and Privacy Challenges, Solutions, and Open Issues in Smart Metering: A Review. In Proceedings of the 2021 6th International Conference on Computer Science and Engineering (UBMK), Ankara, Turkey, 15–17 September 2021; pp. 800–805. [Google Scholar] [CrossRef]
  50. Qureshi, M.S.; Ullah Khan, I.; Kim, K. Securing the Smart Grid: A Comprehensive Analysis of Recent Cyber Attacks. In Proceedings of the 2023 5th International Conference on Electrical, Control and Instrumentation Engineering (ICECIE), Kuala Lumpur, Malaysia, 22–24 December 2023; pp. 1–6. [Google Scholar] [CrossRef]
  51. Sulaiman, S.M.; Jeyanthy, P.A.; Devaraj, D.; Mohammed, S.S.; Shihabudheen, K.V. Smart Meter Data Analytics for Load Prediction using Extreme Learning Machines and Artificial Neural Networks. In Proceedings of the 2019 IEEE International Conference on Clean Energy and Energy Efficient Electronics Circuit for Sustainable Development (INCCES), Krishnankoil, India, 18–20 December 2019; pp. 1–4. [Google Scholar] [CrossRef]
  52. Rao, P.U.; Sodhi, B.; Sodhi, R. Cyber Security Enhancement of Smart Grids Via Machine Learning—A Review. In Proceedings of the 2020 21st National Power Systems Conference (NPSC), Gandhinagar, India, 17–19 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  53. Hossain, M.D.; Ochiai, H.; Khan, L.; Kadobayashi, Y. Smart Meter Modbus RS-485 Intrusion Detection by Federated Learning Approach. In Proceedings of the 2023 15th International Conference on Computer and Automation Engineering (ICCAE), Sydney, Australia, 3–5 March 2023; pp. 559–564. [Google Scholar] [CrossRef]
  54. Iliaee, N.; Liu, S.; Shi, W. Non-Intrusive Load Monitoring Based Demand Prediction for Smart Meter Attack Detection. IEEE Int. Conf. Control Autom. Inf. Sci. 2021, 2021, 370–374. [Google Scholar] [CrossRef]
  55. Li, X.; Liang, X.; Lu, R.; Shen, X.; Lin, X.; Zhu, H. Securing Smart Grid: Cyber Attacks, Countermeasures, and Challenges. IEEE Commun. Mag. 2012, 50, 38–45. [Google Scholar] [CrossRef]
  56. Baseri, Y.; Chouhan, V.; Ghorbani, A. Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure. arXiv 2024, arXiv:2404.10659. [Google Scholar] [CrossRef]
  57. Mbey, C.; Bikai, J.; Souhe, F.G.Y.; Kakeu, V.J.F.; Boum, A. Electricity Theft Detection in a Smart Grid Using Hybrid Deep Learning-Based Data Analysis Technique. J. Electr. Comput. Eng. 2024, 2024, 6225510. [Google Scholar] [CrossRef]
  58. Ijala, A.; Idowu-Bismark, O.; Olugbeji, J.; Obadiah, A.; Oyeleke, O. Artificial Neural Network-Based Home Energy Management System for Smart Homes. Comput. Telecommun. Eng. 2024, 2, 2372. [Google Scholar] [CrossRef]
  59. Prateek, K.; Das, M.; Surve, S.; Maity, S.; Amin, R. Q-Secure-P²-SMA: Quantum-Secure Privacy-Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid. IEEE Trans. Netw. Serv. Manag. 2024, 21, 5149–5163. [Google Scholar] [CrossRef]
  60. Sindiramutty, S.R. Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence. arXiv 2023, arXiv:2401.00286. [Google Scholar] [CrossRef]
  61. Patel, A.; Shrivastava, S.; Sujatha, G. Implementation of Power Meter System Security in Smart Grids with QRNG Method. IEEE Int. Conf. Comput. Power Commun. Technol. 2024, 5, 445–449. [Google Scholar] [CrossRef]
  62. Anwar, M.; Kothiyal, A.; Nandankar, P.V.; Barve, A.; Patil, H.; Maranan, R. Smart Processing of Exceptional Values in Electrical Networks Using Neuro-Fuzzy Algorithms. IEEE Int. Stud. Conf. Electr. Electron. Comput. Sci. 2024, 2024, 10482044. [Google Scholar] [CrossRef]
  63. Parameswarath, R.P.; Wang, C.; Sikdar, B. A Quantum Safe Mutual Authentication Protocol for Smart Meter Communications with Experimental Evaluation. IEEE Trans. Netw. Sci. Eng. 2024, 11, 5058–5072. [Google Scholar] [CrossRef]
  64. Balakrishnan, D.; Reddy, P.K.; Mariappan, U.; Dinesh, R.L.N.; Raghavendra, P.G.M.; Jabiulla, S.B. Quantum Neural Network for Time Series Forecasting: Harnessing Quantum Computing’s Potential in Predictive Modeling. In Proceedings of the 2nd International Conference on Futuristic Technologies (INCOFT), Karnataka, India, 24–26 November 2023. [Google Scholar] [CrossRef]
  65. Furutanpey, A.; Barzen, J.; Bechtold, M.; Dustdar, S.; Leymann, F.; Raith, P.; Truger, F. Architectural Vision for Quantum Computing in the Edge-Cloud Continuum. IEEE Int. Conf. Quantum Softw. 2023, 2023, 88–103. [Google Scholar] [CrossRef]
Figure 1. PRISMA 2020 flowchart for systematic mapping, adapted from [18].
Figure 1. PRISMA 2020 flowchart for systematic mapping, adapted from [18].
Energies 18 01445 g001
Figure 2. Most frequent threats in articles.
Figure 2. Most frequent threats in articles.
Energies 18 01445 g002
Figure 3. Most frequent vulnerabilities in articles.
Figure 3. Most frequent vulnerabilities in articles.
Energies 18 01445 g003
Table 1. Repositories and search string.
Table 1. Repositories and search string.
RepositoriesSearch String
ScopusTITLE-ABS-KEY ((“smart meters” AND cybersecurity) OR (“smart meters” AND “cyber threats”) OR (“smart grids” AND cybersecurity) OR (“smart meters” AND vulnerabilities )) AND PUBYEAR > 2013
Web of Science(“smart meters” AND cybersecurity) OR (“smart meters” AND “cyber threats”) OR (“smart grids” AND cybersecurity) OR (“smart meters” AND vulnerabilities)
IEEE Xplore(“smart meters” AND cybersecurity) OR (“smart meters” AND “cyber threats”) OR (“smart grids” AND cybersecurity) OR (“smart meters” AND vulnerabilities)
Table 2. Set of inclusion criteria.
Table 2. Set of inclusion criteria.
CriteriaDescription
CI-01Articles focused on the cybersecurity aspects of smart meter data
CI-02Articles addressing cybersecurity in smart grids
CI-03Studies published in peer-reviewed journals or conferences
CI-04Research discussing threats, vulnerabilities, and mitigation strategies
CI-05Publications from the last 10 years to ensure relevance
Table 3. Set of exclusion criteria.
Table 3. Set of exclusion criteria.
CriteriaDescription
CE-01Duplicate articles
CE-02Articles not specifically focused on smart meters
CE-03Articles not related to cybersecurity of smart meter data
CE-04Articles not focusing on smart grid cybersecurity
CE-05Publications older than 10 years
Table 4. Summary of the article selection process.
Table 4. Summary of the article selection process.
AcceptedRejectedDuplicateSelected
2911219140041
Table 6. Cyber threats.
Table 6. Cyber threats.
ThreatsReferences
Data tampering/manipulation[20,23,26,33,40,42]
Unauthorized access[9,20,30,33,40]
Privacy breaches[20,24,31,33]
Denial-of-service (DoS)/distributed DoS (DDoS)[9,29,39,45]
Malware[21,34,39]
Phishing[39]
Insider threats[34,41]
Advanced persistent threats (APTs)[22,41]
Cyber espionage[3,28]
Ransomware[3,28]
Intrusion attacks[33,36,42]
False data injection[9,23,42]
Eavesdropping[21,43]
Replay attacks[21,43]
Energy theft[24,44]
Data spoofing[44]
Machine learning model attacks[34,46]
Data poisoning[34,46]
Cyber-physical attacks[22,29]
SCADA attacks[24,28,32]
Table 7. Vulnerabilities in advanced metering infrastructure.
Table 7. Vulnerabilities in advanced metering infrastructure.
VulnerabilitiesReferences
Weak encryption[20,21,33,43]
Poor authentication mechanisms[20,24,33]
Insecure communication protocols[21,39,42]
Outdated software[21,39]
Insufficient data protection[20,29,40]
Lack of access control[20,34,40,44]
Insider access[22,41]
Lack of anomaly detection[23,36,41,44]
Unpatched systems[3,22]
Weak network security[3,21]
Insecure Modbus protocol[42]
Lack of intrusion detection systems (IDSs)[36,42]
Insufficient monitoring[42]
Insecure network architecture[22,45]
Lack of redundancy[45]
Model bias[46]
Insufficient model robustness[46]
Table 8. Mitigation techniques used in different articles.
Table 8. Mitigation techniques used in different articles.
Mitigation TechniquesArticles
Encryption[20,26,27,31,33,39,43]
Authentication mechanisms[20,24,27,29,30,32,35,46]
Secure communication protocols[21,26,32,35,39,42]
Software updates[3,21,34,39,46]
Data protection[20,24,28,29,33,36]
Access control[20,28,30,33,34,44]
Anomaly detection[23,26,36,41,44,45,50]
Patching systems[3,9,22]
Network security[3,21,31,35,46]
Intrusion detection systems (IDSs)[23,30,36,42,45]
Monitoring systems[33,39,43,50]
Network architecture[22,29,35,45]
Redundancy[9,26,45]
Model robustness[33,36,46]
Bias mitigation in models[33,36,46]
Table 9. Effective deep learning and machine learning techniques for detecting anomalies and intrusions in smart networks.
Table 9. Effective deep learning and machine learning techniques for detecting anomalies and intrusions in smart networks.
TechniquesDescriptionArticles
Deep Learning (DL)Algorithms that learn hierarchical data representations, capable of identifying complex patterns and anomalies.[20,23,31,38]
Machine Learning (ML)An algorithm that can learn from data and make predictions or decisions independently.[28,30,38,53]
Convolutional Neural Networks (CNNs)CNNs and neural networks that excel at processing image and time-series data, identifying patterns across space and time.[36,42,47,48]
AutoencodersAutoencoders and neural networks used in unsupervised learning are adept at compressing data and detecting anomalies.[20,26,33]
Support Vector Machines (SVMs)Classification algorithms that identify the best hyperplane to separate different classes in a dataset.[3,29,33,45]
Random ForestAn ensemble of decision trees that work together for classification and regression, being resistant to overfitting and efficient with large datasets.[24,27,32,41]
Recurrent Neural Networks (RNNs)Neural networks designed to process sequential data, used to detect patterns in time series.[9,22,35,39]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nambundo, J.M.; de Souza Martins Gomes, O.; de Souza, A.D.; Machado, R.C.S. Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review. Energies 2025, 18, 1445. https://doi.org/10.3390/en18061445

AMA Style

Nambundo JM, de Souza Martins Gomes O, de Souza AD, Machado RCS. Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review. Energies. 2025; 18(6):1445. https://doi.org/10.3390/en18061445

Chicago/Turabian Style

Nambundo, Jones Márcio, Otávio de Souza Martins Gomes, Adler Diniz de Souza, and Raphael Carlos Santos Machado. 2025. "Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review" Energies 18, no. 6: 1445. https://doi.org/10.3390/en18061445

APA Style

Nambundo, J. M., de Souza Martins Gomes, O., de Souza, A. D., & Machado, R. C. S. (2025). Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review. Energies, 18(6), 1445. https://doi.org/10.3390/en18061445

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop