Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions
Abstract
1. Introduction
1.1. Problem Formulation
1.2. Motivation and Contributions
- Maintaining Security Goals: Essential to maintain availability by not interrupting power supplies and disrupting the supply chain integrity. This can be achieved by maintaining secure communication networks and channels, as well as ensuring confidentiality by protecting users’ data and implementing privacy-preserving measures.
- Advanced Security Analysis: By presenting the most prominent security threats, vulnerabilities, attacks, and challenges, as well as the impact and risk of the occurrence of these attacks, especially against the smart grid’s critical infrastructure.
- Automated Security Measures: By presenting several types of reactive and preventive security measures and countermeasures and analyzing them to show how large and hybrid smart grid systems and devices are protected.
- Dynamic Study: By studying and analyzing both cryptography and non-cryptography solutions that maintain the security and resiliency properties of smart grid systems.
1.3. Related Work
1.4. Organization
2. Background and Preliminaries
2.1. Smart Grid Application in IoT
2.2. Advantages of Smart Grid Technology
2.3. Smart Grid Communications
2.4. Mapping IoT Technologies
Smart Grid Interoperability Layers
2.5. Smart-Grid-Based Cybersecurity Standards
Domain | Role | IoT Use Level | Protocol Examples | Use Cases | Key Characteristics | Advantages | Limitations | Drawbacks | Mitigation |
---|---|---|---|---|---|---|---|---|---|
DERs | Decentralized generation and storage; enhances resilience and flexibility | High | MQTT, CoAP, 6LoWPAN | Real-time DER monitoring and control; grid balancing | Decentralized, bidirectional, edge-driven | Enhances grid resilience and energy independence | Complex coordination and data management | High integration cost; intermittency issues | Use of edge AI and robust data standards |
Distributed Power Generation | Centralized electricity production for large-scale supply | Moderate | Modbus, DNP3 | Predictive maintenance, integration of renewables | Centralized, high-output, time-sensitive | Increases efficiency and integrates renewables | Legacy systems hinder modernization | Inflexibility; high maintenance needs | Gradual digital retrofitting, hybrid systems |
Distributed Power Transmission | High-voltage electricity transmission across regions | Low | IEC 61850, SNMP | Grid health monitoring, fault localization | High-voltage, wide-area, latency-sensitive | Improves reliability and real-time decision-making | Low IoT penetration and high security risk | Cyberattack vulnerability; signal delays | Implement secure protocols and redundant links |
Power Distribution | Medium/low-voltage electricity delivery to end-users | Moderate-High | DLMS/ COSEM, IEEE 802.15.4 [36] | Outage management; automated reconfiguration | Dynamic, distributed, consumer-near | Reduces outage durations and supports automation | Scalability and communication reliability issues | Infrastructure upgrade cost; fragmented standards | Mesh networking; standardized frameworks |
Customer Premises | End-user interaction, consumption monitoring, and demand response | Very High | ZigBee, Wi-Fi, LoRaWA | Smart metering; energy efficiency feedback | User-centric, high data granularity | Empowers consumers and reduces peak load | Privacy concerns and data overload | User resistance, variable connectivity | Data anonymization and user-centric designs |
Layer | Description | Role | IoT Use Level | Domain(s) | Examples | Use Cases | Key Characteristics | Advantages | Limitations | Drawbacks | Mitigation |
---|---|---|---|---|---|---|---|---|---|---|---|
Component | Represents the physical devices (sensors, actuators, smart meters, etc.) involved in the smart grid | Enables monitoring and control through data acquisition | High | All smart grid domains | Smart meters, sensors, actuators | Load monitoring, outage detection | Physical, hardware-centric, low latency | Enables real-time data collection and action | Device tampering, hardware faults | Requires secure deployment and maintenance | Use tamper-resistant designs, regular inspections |
Communication | Focuses on the data exchange mechanisms and communication technologies used between components | Ensures reliable, real-time communication across grid infrastructure | High | All smart grid domains | Zigbee, Wi-Fi, 5G, LoRaWAN | Demand response, meter reading | Real-time, scalable, heterogeneous | Facilitates low-latency, high-throughput communication | Susceptibility to cyberattacks, protocol mismatch | Requires strong encryption/ authentication schemes | Adopt end-to-end encryption, protocol harmonization |
Information | Deals with the semantics and formats of the data being exchanged between systems | Guarantees consistency and interoperability of exchanged data | Moderate | All smart grid domains | CIM (Common Information Model), XML, JSON | Data sharing between grid entities | Semantic consistency, interoperability | Supports efficient data integration and sharing | Semantic gaps, data format inconsistencies | High complexity in standard adoption | Standardize data formats, middleware solutions |
Function | Includes control logic, services, and functionalities that enable smart grid operations | Provides decision-making and automation in grid operations | Moderate | DER, Distribution | SCADA logic, distributed control systems | Voltage regulation, predictive maintenance | Rule-based, autonomous, service-oriented | Improves grid automation and responsiveness | Complexity in logic design and coordination | Difficult to update in distributed environments | Employ AI-based monitoring and self-healing systems |
Business | Encompasses market and policy aspects, business models, and regulatory requirements | Aligns business goals and strategies with technical operations | Low | Business Layer | Regulatory policies, pricing algorithms | Dynamic pricing, energy trading | Policy-driven, decision-supportive | Aligns technical and business goals | Slow adaptation to tech changes | Dependent on external policy evolution | Integrate flexible, modular policy management |
Standard | Purpose and Focus | Integration in Smart Grids | Security Domains | Advantages | Limitations | Key Challenges | Suggested Improvements |
---|---|---|---|---|---|---|---|
NERC CIP [37] | Cybersecurity enforcement for Bulk Electric Systems (BESs), central systems | Applied to centralized control systems, limited DER coverage | Policies, access control, system configuration, perimeter security | Regulatory mandate; detailed protection directives | Limited edge-device or DER support | Adapting to dynamic and distributed architectures | Expand scope to include DERs and demand-response systems |
IEEE 2030 [38] | Layered cybersecurity architecture, modular deployment, and interoperability | Supports microgrids, DERs, EVs, and energy storage systems | Cyber–physical coordination, multi-layer defense | Promotes standardization and modular security design | Complex for SMEs or small-scale deployments | Deployment complexity in fragmented environments | Simplify architecture models and promote open API frameworks |
NIST SP 800-82 [39] | Security guidelines for ICS, supports AI integration and resilience planning | Covers ICS/SCADA within smart grid infrastructure | Asset identification, risk modeling, defense-in-depth, anomaly detection | Adaptable to AI/ML integration, flexible implementation | Requires interpretation, not always plug-and-play | Operationalizing guidelines in legacy ICS settings | Develop plug-and-play security templates for ICS environments |
ISO/IEC 27001 [40] | ISMS framework bridging IT and OT security | Used for power generation, automation systems, and distributed field operations | Data classification, access control, information flow, incident handling | Globally recognized framework, cross-domain applicability | Generic and high-level, not tailored to energy sector | High implementation overhead and training requirements | Customise ISMS models for smart grid-specific scenarios |
IEC 62351 [41] | Secure communication protocols for power systems, particularly SCADA | Secures communication in SCADA and substations | Authentication, encryption, key management, RBAC, secure logging | Established protocols for SCADA and energy communication | Limited TLS/IPsec support, slow to update | Legacy system support and backward compatibility | Update encryption schemes, enable secure retrofitting options |
2.5.1. NERC CIP
2.5.2. IEEE 2030
2.5.3. NIST Special Publication 800-82
2.5.4. ISO/IEC 27001
2.5.5. IEC 62351
2.6. Beyond IoT Technologies
2.6.1. Edge Computing
2.6.2. Fog Computing
2.6.3. Software-Defined Networking
2.6.4. Network Function Virtualization
2.6.5. Digital Twins
3. Limitations and Challenges
3.1. Smart Grid Limitations
3.1.1. Security-Related Limitations
- Cyberattacks can compromise operational integrity by disrupting critical infrastructure, manipulating data flows, and potentially causing widespread service outages, highlighting the vulnerability of interconnected digital systems to malicious exploitation [68].
- Weak authentication allows unauthorized access to critical control systems and sensitive data, posing significant risks of malicious manipulation, unauthorized control over grid operations, and potential disruption of essential services. As a result, robust authentication protocols are critical in securing infrastructure [69].
- Weak cryptography exposes sensitive data and communications to unauthorized interception, manipulation, and exploitation by malicious actors, compromising the confidentiality, integrity, and availability of critical information and operational processes within the grid infrastructure. This requires strong encryption standards to mitigate these risks effectively [70].
- Data disruptions compromise real-time monitoring, decision-making, and system reliability. Breaches in data integrity can lead to incorrect operational decisions and system failures, while compromised privacy can expose consumer information, undermining trust and regulatory compliance. As a result, robust data protection measures and secure data handling practices are essential in smart grid operations [71].
- Insider threats include the misuse of credentials to manipulate data, disrupt operations, or steal sensitive information, posing significant risks to grid security and reliability. Effective monitoring, access controls, and employee training are essential to mitigate these insider threats and maintain the smart grid’s data integrity [72].
- Physical breaches lead to disruptions in power supply, equipment damage, and potential safety hazards for personnel and the public, emphasizing the importance of robust perimeter security, surveillance systems, access controls, and resilience planning in safeguarding critical infrastructure against physical threats [8].
3.1.2. Non-Security-Related Limitations
- Financial issues may prove to be a constant limitation, especially since the cost of implementing a smart grid system and maintaining its infrastructure can be high. Without proper funding and sponsorship, some facilities, utilities, plans, and projects may be delayed or canceled due to a lack of investment.
- Maintenance issues are another limitation since smart grid systems require regular maintenance and scheduled inspections to maintain their operational effectiveness. However, this proves to be a problem, especially in modernizing them due to aging equipment that causes constant equipment failure.
- A communication bottleneck may occur as smart grid systems heavily rely on communication networks to constantly transmit data and control electricity flow in real time. This already creates a burden that may affect network performance and cause a communication bottleneck. Also, any disruptions will surely cause a significant problem and result in the disruption and interruption of smart grid services.
- Integration issues due to the complex structure and heterogeneous nature of smart grid systems and IoT devices, which require different deployment and integration approaches, prove to be a significant limitation.
- Affected Manpower is another potential problem: with the rise of machinery and the reduction in human labor, stakeholders may be reluctant to adopt smart grid technologies due to concerns about job losses and salaries.
- Energy storage may prove to be a problem due to the cost and technical limitations that surround the energy storage capacities to manage intermittent renewable energy sources, especially in terms of safety, security, and performance. For example, Photovoltaic (PV) systems and EVs, while providing significant benefits in terms of sustainability and distributed energy production, are strongly reliant on efficient energy storage systems and seamless integration with grid infrastructure. The bi-directional energy flow resulting from PV energy injection and EV charging/discharging cycles can overburden local distribution networks. This results in voltage instability and produces asynchronous energy supply–demand dynamics if appropriate integration solutions are not employed. Furthermore, if legacy infrastructure is ill equipped to provide the necessary security services, these technologies create new attack surfaces and communication vulnerabilities when combined with IoT for real-time monitoring and control. Therefore, PV and EV technologies present important operational and cybersecurity concerns that need to be taken into consideration during system planning, design, and deployment, even though they are not in and of themselves restrictions.
- Cultural barriers may push some communities away from adopting smart grid technologies due to safety, security, and privacy concerns, especially without reassurance and education.
3.2. Smart Grid Challenges
- Security-based challenges: These cover risks and vulnerabilities associated with securing the smart grid infrastructure by using cyber–physical security means to protect and preserve data privacy [74] and prevent unauthorized access [75]. Other security measures include ongoing network, system, and device behavior monitoring, risk assessment using cryptography and non-cryptography solutions, and robust security controls [69,76].
- Safety-based challenges: These depend on demanding tasks to guarantee the secure management, upkeep, and operation of the smart grid system, which prove to be very challenging, especially with the deployment of advanced grid technologies and systems [77]. Other safety challenges include the following. The integration of DER introduces bidirectional power flows, which can challenge conventional protection systems that were designed for unidirectional current [78]. This may lead to unintended power circulation, difficulties in fault detection, and potential islanding during outages. To mitigate this, adaptive protection mechanisms, directional relays, and standards like IEEE 1547 [79] are essential to ensure safe DER–grid interaction. The likelihood of configuration mistakes, operator overload, and cascading failures during anomalous events also increases with the increased system complexity [80]. This requires sophisticated automation technologies, streamlined system designs, and intensive training for operational staff. Failures in communication networks are the result of communication between control centers, substations, and field devices being uninterrupted in real time for smart grid activities to function [81]. Whether intentional or unintentional, a breakdown in these communication channels could compromise grid stability, lead to inaccurate actuation, or delay decisions. Mitigation strategies include network redundancy, real-time monitoring, and fallback methods that allow autonomous local control during interruptions. Security breaches often occur when attackers modify control orders, sensor data, or protection logic in smart grids, leading to cybersecurity vulnerabilities that directly translate into safety hazards [17]. Such violations could result in equipment damage or power outages by disabling fail-safes or establishing hazardous operating conditions. Protecting safety functions requires enhancing security through the use of intrusion detection systems, encryption, authentication, and security-by-design procedures. Interoperability issues with protection systems occur when devices from various suppliers are frequently integrated into smart grid environments, even though they may not have the same operational logic or communication protocols [82]. Due to a lack of interoperability, protection responses may be delayed or fail to activate during hazardous situations. To guarantee dependable, coordinated protection across systems, standardized communication protocols such as IEC 61850 must be adopted, and extensive integration testing must be performed.
Category | Challenges | Description |
---|---|---|
Security-based | Advanced Persistent Threats (APT) | Remain the most dangerous challenge, especially with zero-day exploits and attacks. This makes it extremely difficult to detect and mitigate this threat, which can cause a significant interruption of the smart grid’s services. |
Insider Threat | Recruiting operators without proper background screening seems challenging since they can freely operate without monitoring or accountability while conducting malicious information gathering, sabotage, or espionage. However, what seems to be more challenging is finding the right security measures to mitigate this risk. | |
Security-based | Physical Security Challenges | This requires protecting smart grid devices, systems, transmission lines, and transformers, which is a challenging task, not only in terms of cost but also in terms of deploying proper security measures and intrusion detection alarms. |
Budget Issues | The cost to implement, deploy, and maintain a smart grid security program can be costly, which can cause financial problems for stakeholders with limited smart grid capabilities, which makes them abandon the plan and accept the occurrence of the risk as it will be cheaper. | |
Lack of Uniform Security Standards | This is frequently caused by the complexity of the various types of heterogeneous devices and systems in the smart grid, making it difficult to apply the same security practices and deploy uniform security measures. | |
Legal Challenges | This is mostly affiliated with cross-border challenges since securing the smart grid’s infrastructure requires coordination and jurisdictions among all the involved countries, which often creates challenging legal and regulatory requirements, especially regarding collaborative security and information sharing. | |
Resilience and Recovery Challenges | In case of a cyber–physical attack or natural disaster, the smart grid must have the ability to withstand disruption or interruption of services, with the ability to recover. This proves challenging due to the complex number of security and safety threats and the likelihood of their occurrence. | |
Safety-based | Public Health Challenges | The installation of certain renewable energy technologies close to residential areas negatively impacts human health and animals [85]. The challenge is based on the level of risk exposure to their emission and radiation and the safe distance needed to evade them. Finding a solution to reduce their emission and radiation remains a key challenge. |
Electromagnetic Radiation | If not well studied and regulated, it proves to be a challenge since smart-grid systems rely on wireless communications, which emit electromagnetic radiation that can potentially cause a health risk to humans and animals alike, especially if the exposure area is high and in the presence of individuals with certain medical conditions. | |
Electrical Hazards | This remains challenging since they can target workers/operators and the public. They are linked to fire, electric shock, electrocution, and arc flash, which can release hazardous materials and radiation. | |
Additional | Privacy Challenges | More particularly, data privacy, which is frequently compromised in smart grid applications, especially when transferred in real time. This often proves to be a safety and security challenge since the disclosure of information can expose operators and public personnel. |
Cyber–Physical Challenges | The cyber part is frequently linked to a cyberattack that interferes with the smart grid’s performance. As for the physical part, it is more prone to physical damage such as vandalism, theft, or terrorism. Securing them proves to be challenging since it requires a combined cyber–physical security effort to evade such malicious events. | |
System Interoperability Challenges | The presence of complex networks of interconnected systems and device types to ensure effective and safe communications proves to be challenging as it is a critical task to maintain the smart grid’s safety and reliability. If not well established, this may reduce its efficiency and effectiveness. | |
Additional | System Integration Challenges | This proves to be a challenge in terms of the safety and security of combining renewable energy sources, such as wind and solar energy, since it is difficult to maintain the smart grid’s stability and reliability, which comes at the cost of public health and safety. |
Infrastructure Maintenance Challenges | A certain budget is needed for the smart grid’s infrastructure updates and upkeep. This is due to the aging infrastructure, maintenance, and upgrades becoming more challenging in terms of budget and cost, as well as maintaining the operational, stable, and reliable safety of the infrastructure. | |
Incident Response Challenges | Incident response requires high emergency preparedness to effectively respond to malicious events (i.e., cyber–physical attacks) or natural disasters. This proves challenging since it requires a readiness for a set of planned scenarios that stakeholders are trained to implement to maintain public safety and reduce the likelihood of loss of human lives and injury. | |
Data Privacy Challenges | Collecting sensitive customer data, such as energy usage and power consumption, is easy. However, the challenge lurks in protecting the collected data and preserving its privacy, which is difficult due to advanced data breaches and sophisticated cyber attacks. | |
Environmental Challenges | Surely, the adoption of renewable energy technologies proves to help reduce gas emissions. However, their construction along their transmission lines and substations comes at the cost of a negative impact on wildlife habitats and ecosystems, and this is where the challenge is. |
4. Threats and Vulnerabilities
4.1. Smart Grid Threats
4.1.1. Security-Based Threats
4.1.2. Safety-Based Threats
4.2. Smart Grid Vulnerabilities
4.2.1. Security Vulnerabilities
4.2.2. Safety Vulnerabilities
4.2.3. Equipment Failure
4.2.4. Communication Failures
4.2.5. Natural Disasters
4.2.6. Legacy Devices
4.2.7. Human Element
5. Smart Grid Attacks
5.1. Types of Attack
5.2. Attack Source
- Combat Operations: CombatOps (CoOps) involve military showcasing of offensive cyber capabilities to conduct both defensive and offensive operations against smart grids, aiming to disrupt enemy infrastructure and hinder recovery processes. This illustrates targeted attacks on smart grids by compromising control systems and exploiting communication vulnerabilities to achieve strategic objectives, such as impacting morale, disrupting economies, gaining tactical control of infrastructure, masking military operations, and mobilizing forces. Strategic targets such as vital points like ports, oil refineries, power stations, ports, telecommunications, power stations, and bridges to hinder force mobilization, exemplified in conflicts such as Iraq [147,148], Lebanon [149,150], Gaza [151], and West Bank [152].
- Cyber Operations: CyberOps (CyOps) utilize hacking to attack the smart grid’s cyber–physical infrastructure [153] as a new cyber-warfare concept [154,155], which is similar to cyberattacks on Estonia in 2007, Georgia in 2008 [156], and Ukrainian electricity companies in 2015–2016 using BlackEnergy malware [157,158,159]. Specific incidents include the deployment of the Havex RAT by the Russian APT group “Energetic Bear or Dragonfly” for global cyber espionage targeting energy, defence, and pharmaceutical sectors in the US and Europe [160]. Notable attacks such as Stuxnet (2010), under “Operation Olympic Games”, targeted Iranian nuclear facilities by manipulating Siemens PLCs. NotPetya (2017) [161], followed by the BlackEnergy [162,163], caused widespread damage globally.
- Psychological Operations: PsyOps use cyber deception [164,165] in conjunction with psychological warfare [166], sabotage, and espionage operations to compromise a nation’s security and resilience [167,168]. One prominent instance is the succession of unexplained fires and explosions that occurred in Iran between 2020 and 2021 and targeted vital infrastructure [169], including events at Parchin military installations as well as other power stations and industrial locations all around the nation. Reminiscent of recent Ukrainian counteroffensive operations, especially on the Donetsk front, propaganda videos such as “Plans Love Silence” emphasized Operational Security (OpSec) [170]. These events demonstrate the merging of CoOps and CyOps into PsyOps [171,172].
5.3. Security Attacks
6. Smart Grid Risks
6.1. Risk Types
6.2. Risk Assessment and Evaluation
6.3. Risk Mitigation
6.4. Linking Risks to Security Solutions
7. Existing Security Solutions
7.1. Cryptography Solutions
7.1.1. Cryptographic Protocols
7.1.2. Blockchain Approaches
7.2. Non-Cryptography Solutions
7.2.1. Anomaly Detection
7.2.2. DDoS Detection
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2016 | [243] | Statistical | Real-time consumption anomaly detection using lambda detection system | Statistical model, real-time monitoring | Effective and scalable | Limited to statistical patterns | Might not adapt well to non-linear anomalies | Handling evolving data patterns | Integration with ML-based methods |
2016 | [244] | Unsupervised ML | k-Means clustering for anomaly detection in smart grid traffic | Unsupervised learning, clustering-based | High anomaly detection rate | Depends on clustering performance | Hard to interpret clusters | Real-time processing and adaptability | Hybrid approach with supervised methods |
2019 | [245] | Unsupervised ML | Statistical correlation-based scheme for anomaly detection | Correlation analysis, unsupervised | High accuracy and true-positive rate | Requires extensive historical data | Lower performance with noisy data | Differentiating between faults and attacks | Enhanced preprocessing and feature selection |
2019 | [246] | Fog computing | Fog-based anomaly detection at the edge in smart grid | Distributed detection, low latency | Reduces communication delay | Complex deployment and maintenance | Limited computational resources | Device synchronization and coordination | Edge-cloud collaboration models |
2019 | [247] | Cyber–physical sensor | IREST sensor to detect anomalies in ICS environments | Cyber–physical integration, scalable design | Scalable framework for ICS security | Needs comprehensive deployment | May miss application-specific threats | Calibration and tuning for various environments | Integration with threat intelligence |
2022 | [248] | FHE-based | FHE-based anomaly detection over encrypted smart meter data | Fully homomorphic encryption, secure computation | Preserves privacy while detecting falsified data | Computationally intensive | Execution time dependent on accuracy level | Efficient computation over encrypted data | Optimization of homomorphic operations |
2022 | [249] | Supervised ML-based ADS | Anomaly detection system for DER communication | High accuracy, low false-positive and false-negative rates | Effective in detecting stealthy IT/OT attacks | Relies on labeled data | Limited generalizability across domains | Data labeling, real-time adaptability | Enhance domain adaptability, reduce reliance on labeled data |
2022 | [250] | Deep Autoencoders and LSTM seq2seq | Captures complex time-series patterns in grid data | Layered structure, temporal sequence modeling | Improved detection and lower false alarms | High computational cost | Needs high-quality time-series data | Deployment on edge devices | Optimize for lightweight deployment |
2022 | [251] | Physics-informed hybrid deep learning | Detects false data injection using physics-based priors | Uses variational autoencoder and LSTM | High detection accuracy, physics-aware | Complex model integration | Scalability to large-scale systems | Computational efficiency | Improve scalability and real-time inference |
2022 | [252] | Federated semi-supervised class-rebalanced | Anomaly detection in fog-assisted grid with Fed-SCR | Semi-supervised, federated, privacy-preserving | Efficient and private | Class imbalance issues | Complex implementation | Model synchronization and imbalance | Refine rebalancing strategies |
2021 | [253] | Autoencoder-GAN based IDS | MENSA: anomaly detection and classification | GAN with autoencoder for smart grid | High accuracy, low FPR | Training complexity | Training stability of GANs | Deployment in real-time systems | Stabilize GAN training, adapt to grid dynamics |
2022 | [254] | Hybrid MLP SEQ-FFNN | Self-learning IDS with hyperparameter tuning | Multilayer, PCA, tanh/sigmoid activation | High detection accuracy | Overfitting risk | Performance drops on unseen patterns | Maintaining generalization | Incorporate regularisation and validation techniques |
2023 | [255] | Federated learning-based anomaly detection | Local training on smart meters, secure updates | FL, privacy-focused, efficient | Privacy-preserving, scalable | Communication overhead | Dependency on reliable connections | Resource constraints at edge | Reduce bandwidth needs, improve fault tolerance |
2023 | [256] | ML-based anomaly detection | Focused on Internet of Energy (IoE) devices using LSTM and SVM for intrusion detection | Multiple ML techniques, attention to feature engineering and preparation | Improved classification accuracy with more features | No mention of real-time testing, assumes sufficient computational resources | Scalability in real-world deployments, dependency on feature quality | Data heterogeneity and privacy in IoE environments | Increase the number of features analyzed for better accuracy |
2019 | [259] | Experimental Study | Unsupervised anomaly detection using statistical correlations and SDF | Reduced computational burden using symbolic dynamic filtering | High accuracy (99%) with low false positives | Focus limited to correlation-based attacks | Limited scope to certain types of anomalies | Model generalization to broader attacks | Integration with other detection layers |
2023 | [260] | Experimental Study | Semi-supervised hybrid DL anomaly detection for ICS traffic | Used unlabeled data for real-world intrusion detection | High F1-score (0.98) and effective with unlabeled data | Potential complexity in hybrid model tuning | Testing confined to ICS environments | Generalization to varied smart grid architectures | Adaptation to more diverse datasets |
2020 | [261] | Experimental Study | DSM engine for IoT-based smart grids with intrusion control | Focused on DSM and secure energy optimization | Reduced power use and improved intrusion resilience | Limited evaluation under diverse attack types | Does not explore detailed ML design | Real-time deployment and feedback integration | Broaden ML feature set and adaptive response mechanisms |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2022 | [263] | DDoS Detection | Anomaly detection using CNN, VFDTv2, SVM, and DWT to improve DDoS detection rate in smart grids | Hybrid DL/ML, signal processing-based features | Multi-technique detection, good accuracy (87.35%) | Moderate performance, may require complex preprocessing | Model generalizability and real-time deployment not assessed | Latency and scalability on smart grid nodes | Streamlined preprocessing and edge optimization |
2022 | [209] | Modeling | DDoS propagation model capturing interdependencies and grid network behavior | Dependency modeling, behavioral analytics | Network-level insight into attack spread | Requires extensive graph data | Abstract representation without live data validation | Integrating into operational grid infrastructure | Empirical validation and hybridization with graph-based detection |
2022 | [264] | DDoS Mitigation | iCAD architecture extended from iCAAP to mitigate DDoS while preserving QoS | Information-centric, layered defense | QoS-aware protection against DoS/DDoS | Simulation-based, requires validation | Scalability and real-world deployment untested | Compatibility with legacy grid protocols | Testbed deployment and integration into smart grid middleware |
2022 | [265] | Situational Awareness | IOC-based DDoS detection tool tested on real amplification DDoS datasets | IOC analysis, amplification attack profiling | Effective in real-data scenarios | Focus on specific DDoS types only | Does not detect non-amplification DDoS attacks | Broader coverage and automated IOC update | Extension to adaptive IOC engines and real-time correlation |
2023 | [210] | Hybrid DL (CNN-GRU) | Hybrid DL-based model for detecting smart grid DDoS with CNN-GRU | Temporal and spatial learning via CNN-GRU | High detection accuracy (99.7%) | Model complexity may hinder deployment | No deployment context or system resource test | Balancing performance with runtime cost | Model compression or quantization for edge deployment |
2023 | [266] | Review | Review of DoS attack impact, detection, and mitigation using reinforcement learning | Comprehensive overview, RL-driven defense | Wide coverage and forward-looking strategy | Mainly theoretical and survey based | Lack of tested implementation | Real-world applicability of RL in smart grid | Pilot RL deployments and benchmark comparisons |
7.2.3. Honeypot Solutions
7.3. Forensics Solutions
7.4. Ethical Hacking Solutions
7.5. GAN and LLM-Based Solutions
In-Depth Analysis of GAN and LLM-Based Solutions
8. Proposed Framework: Multi-Layer Threat-Defense Alignment Framework
8.1. Layered Smart Grid Architecture
- Perception Layer: Is made up of data-gathering actuators, smart meters, and Internet of Things sensors.
- Network Layer: Is made up of gateways, routing systems, and communication protocols.
- Control Layer: Includes Programmable Logical Controllers (PLCs), backend controllers, and Supervisory Control and Data Acquisition (SCADA) systems for automation and decision-making.
- Application Layer: Makes user-facing services like demand response, billing, and analytics on energy use possible.
- Management Layer: Provides governance, auditing, and general security and policy enforcement.
8.2. Threat and Defense Mapping
8.3. MLTDAF Contributions
- Cross-Layer Integration: This framework methodically matches threats with the smart grid’s architectural makeup in contrast to other taxonomies that concentrate on specific attack types.
- Strategic Risk Management: By connecting the threat landscape to vital system operations, strategic risk management enables the allocation of security resources in a prioritized manner.
- Scalability and Flexibility: These facilitate ongoing adaptation by allowing for modular upgrades that take into account new attack methods and defense strategies.
8.4. Applications of MLTDAF in Counter-Terrorism
8.4.1. Layered Defense Against Hybrid Terrorist Attacks
8.4.2. Enhancing Threat Detection and Early Warning
8.4.3. Supporting Incident Response and Recovery Planning
8.4.4. Enabling Policy-Level Counter-Terrorism Strategy
8.4.5. Theoretical Approach
8.4.6. Analytical Comparison
8.4.7. Ongoing and Future Work Statements
9. Lessons Learned, Suggestions, and Recommendations
9.1. Lessons Learned
- Risk Management: This is essential for smart grid systems to reduce both the occurrence and likelihood of that risk occurring. Hence, several key points are presented to mitigate it. Active Incident Response: This necessitates continuous observation of vital smart grid systems to identify possible security breaches and start an operational incident response plan to react immediately to a security issue or incident. Validation Testing: This is to identify and address the vulnerabilities surrounding the smart grid system components before exploitation. This can be done by relying on vulnerability scanning and penetration testing. Enhanced Risk Management Plans: These are based on constant risk assessments being regularly conducted to develop enhanced risk management plans to mitigate identified risks using cryptography and non-cryptography-based measures, as well as technical (i.e., monitoring and access control) and non-technical controls (i.e., policies, standards, and incident response).
- Cyber–Physical Threat Intelligence: CTI requires constant gathering, analysis, and sharing of information related to cyber threats with a potential impact to intentionally damage the infrastructure of the smart grid and interrupt its operations. This is frequently achieved by monitoring and evaluating threat intelligence data to identify and recognize new threats and weaknesses and then addressing them with proactive security measures. This move cannot be achieved without understanding the interdependencies between the smart grid’s cyber and physical aspects. Security and Safety Awareness Training: This is especially for users and operators to protect the smart grid systems to avoid risky behaviors, overcome phishing and social and reverse engineering, and raise situational awareness training, encouragement training, and accountability. This requires being aware of how to identify and report suspicious activity, protect sensitive data, and respond to a security incident. Enhanced Physical Security: Examples include tamper-resistant equipment, access control, surveillance, and secure storage to thwart theft, vandalism, and sabotage. Mitigating Insider Threats: Threats may be mitigated by, e.g., adopting security measures that limit access privileges, offering timed access control, training employees on security best practices, and monitoring smart grid systems, networks, and devices for any suspicious activities before initiating an incident response reaction. Securing Logistics and Supply Chains: This is to avoid exploiting hardware and software vulnerabilities, with smart grid systems being tampered with or compromised. This requires obtaining verified software components and equipment from trusted vendors before validating and testing them before integrating them into the smart grid system.
9.2. Suggestions and Recommendations
9.2.1. Cryptographic Suggestions
9.2.2. Network Segmentation for Smart Grids
9.2.3. Advanced Ethical Hacking and Digital Forensics
- (A)
- Employing Digital Forensics After Incident: To maintain the efficiency, security, and safety of smart grid systems, digital forensics tactics must be integrated. This is because they can make it possible to identify attack vectors and their source [305]. This is particularly important since, in addition to the vulnerabilities that currently exist in ML and DL, the system can be compromised at the client device, centralized server, or network levels [274,275]. Using digital forensics in the wake of a cyber incident involving smart grids requires carefully gathering and examining data from compromised systems to identify the attack vector, assess the size of the breach, and ascertain the techniques used by the attackers. This approach is essential to reconstructing the incident timeline, preserving evidence for use in court, and guiding future security measures aimed at averting recurrence and enhancing the overall resilience of the grid.
- (B)
- Employing Periodic Ethical Hacking: Since clients, servers, and network devices are vulnerable to various attacks, smart grid systems must periodically rely on ethical hacking techniques and tools [286] to identify potential vulnerabilities and suggest appropriate countermeasures to guarantee a higher level of security and privacy preservation. Since the selected client or server devices’ data samples are incorporated in the model training process, this technique can identify whether or not they are susceptible to attacks or can be compromised. As a result, intentional damage can also be achieved, aside from information leakage, while exposing the privacy of the training dataset. Therefore, to find and address any exploitable weakness or security gap, the security of every smart grid system component needs to be addressed and evaluated.
9.2.4. Implementing Strong Security Measures
- (A)
- Adopting the Security-by-Design Concept: This involves adding security to the smart grid system’s design while adopting a defense-in-depth strategy that deploys multiple security control layers to provide resiliency and robustness against potential cyber–physical attacks.
- (B)
- AI Solutions for Cybersecurity: Through constant analysis of enormous volumes of data, artificial intelligence (AI) technologies improve cybersecurity in smart grids by quickly identifying anomalies and possible threats. By adjusting to changing assault tactics, machine learning algorithms can increase the precision and speed of threat identification. AI also automates incident response, reducing risks quickly and effectively to preserve smart grid infrastructure security and resilience against sophisticated cyberattacks. Therefore, employing advanced machine learning and reinforcement learning safety and security measures in addition to federated learning [242] approaches to develop efficient solutions can quickly recognize, identify, and address abnormalities.
- (C)
- Enhanced Physical Security. This step is recommended for smart grid hardware components, including antennas, grids, substations, and other critical infrastructure. In other words, to safeguard vital infrastructure from both digital and physical threats, smart grids must integrate powerful encryption, firewalls, and intrusion detection systems with physical barriers, surveillance, and access controls. This all-encompassing security plan reduces risks and strengthens resilience against possible incidents while guaranteeing the grid’s availability, integrity, and confidentiality.
- (D)
- Dynamic Honeypots: To ensure a greater level of safeguarded deceptive technology that will be able to increase the detection level with a higher level of engagement, honeypots should be deployed at the client’s end or the centralized server with the dynamic variable selection of vulnerabilities. This makes it possible to gather and evaluate real-time information about the attacker more rapidly and precisely. To attract and identify malicious actors and their techniques and proactively strengthen the defensive mechanisms of the smart grid, honeypots are deliberately placed to mimic susceptible components. This strategy not only offers early-warning signals and real-time threat intelligence but also deters attackers from targeting important assets, enabling thorough forensic investigation and increased defense against cyber attacks.
9.2.5. Physical Security Measures for Smart Grids
9.2.6. Regular Vulnerability Assessment and Risk Monitoring
- (A)
- Enhancing Control Access and Accountability. This step is needed to enhance accountability methods through deterrence policies, and limiting access for various users (i.e., attribute control access schemes) is crucial to reducing internal threats and fostering a safe and trustworthy environment. It also requires motivating all entities, boosting confidence, and discouraging bad actors. It also promotes the accountability of users and the ability to disclose any suspicious behavior or illegal activity quickly.
- (B)
- Regulatory Compliance. Compliance is also needed to enhance the cyber–physical security and safety of the smart grid critical infrastructure, such as the Critical Infrastructure Protection (CIP) and North American Electric Reliability Corporation (NERC) standards, the IEC 62351 standards series [306,307], and the NIST Framework [17]. In other terms, strict authentication procedures and granular access controls must be implemented to guarantee that only authorized individuals can interact with vital systems to improve control access and accountability in smart grids. This strategy guarantees traceability and accountability in conjunction with thorough logging and monitoring of user actions. It lowers the possibility of illegal access and facilitates quick incident response and forensic investigations.
9.2.7. Universal Collaboration
10. Future Research Directions
10.1. Lightweight Cryptographic Solutions
10.1.1. Lightweight Cryptographic Algorithms
- Optimizing the hardware/software implementation of existing cryptographic algorithms, where a set of recent solutions follows this direction.
10.1.2. Lightweight Cryptographic Authentication Protocols
10.2. Lightweight and Robust ML/AI Solutions
10.2.1. Lightweight and Robust Anomaly Detection/Prevention Systems
10.2.2. RL for Cybersecurity
10.2.3. Adversarial Defense Mechanisms
10.2.4. Privacy-Preserving Techniques
10.2.5. Future Work for LLMs in Smart Grids
10.3. Ethical Hacking and Digital Forensics for Smart Grids
10.4. Other Possible Future Research Directions
10.4.1. Zero-Day Attacks
10.4.2. Zero-Trust Security
10.4.3. Investigating Potential Risks
10.4.4. Advanced Strategies
10.4.5. Enhancing Research Innovation and Differentiation Strategies
- Development of Novel Frameworks and Models: Future research should focus on proposing and validating novel security models, context-aware risk assessment frameworks, or resilience quantification metrics specifically applicable to hybrid CPSs within smart grids, rather than restating well-established security principles or enumerating known vulnerabilities.
- Empirical Assessments and Practical Case Studies: These present empirical insights that aim to enhance theoretical advances. Potential avenues for future investigation include real-time simulations that utilize real smart grid data from utilities and field tests or pilot installations in testbeds that combine IoT-enabled monitoring technologies with renewable energy. Adversarial learning is also employed in attack–defense games to model and respond to Advanced Persistent Threats (APTs) in dynamic environments.
- Cross-Domain Innovation: This includes multidisciplinary studies to provide novel insights. For example, modeling insider threat detection utilizes incentive structures and behavioral economics. Digital twins are also being used for virtual patch testing and proactive incident response planning. Investigating cryptographic techniques that are quantum-resilient is also designed especially for grid communication protocols.
- Quantitative Differentiation of Threat Landscapes: This includes a framework based on comparative metrics to assess the intensity and effects of different attack types (e.g., DoS vs. FDIA) on various smart grid components. It also includes the multilayer countermeasure methods’ scalability and efficiency with limited resources.
- Models of Security Governance Driven by Policy: Current recommendations focus on collaborative security practices but lack effective, policy-driven procedures. Future research aims to investigate frameworks for compliance automation that align with relevant regulations. Blockchain-powered auditability procedures for managing trust and data tracing. Architectures for exchanging global threat intelligence that are adapted to local technical and legal limitations.
- Enhanced Pilot Studies and Testbed Deployments: Here, pilot studies and testbed deployments should be given top priority in future research to confirm the effectiveness and scalability of suggested defense methods. Furthermore, regulatory agencies and utility operators need to work together to establish practical security guidelines that make it easier for these frameworks to be adopted, especially in settings with limited resources or outdated systems.
11. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Yaacoub, J.P.; Noura, H.; Azar, J.; Salman, O.; Chahine, K. Cybersecurity in Smart Renewable Energy Systems. In Proceedings of the 2024 International Wireless Communications and Mobile Computing (IWCMC), Ayia Napa, Cyprus, 27–31 May 2024; pp. 1534–1540. [Google Scholar]
- Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber threats to smart grids: Review, taxonomy, potential solutions, and future directions. Energies 2022, 15, 6799. [Google Scholar] [CrossRef]
- Sahani, N.; Zhu, R.; Cho, J.H.; Liu, C.C. Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey. Acm. Trans.-Cyber-Phys. Syst. 2023, 7, 1–31. [Google Scholar] [CrossRef]
- Mohassel, R.R.; Fung, A.S.; Mohammadi, F.; Raahemifar, K. A survey on advanced metering infrastructure and its application in smart grids. In Proceedings of the 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE), Toronto, ON, Canada, 4–7 May 2014; pp. 1–8. [Google Scholar]
- Lázaro, J.; Astarloa, A.; Rodríguez, M.; Bidarte, U.; Jiménez, J. A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid. Electronics 2021, 10, 1881. [Google Scholar] [CrossRef]
- Jokar, P.; Arianpoo, N.; Leung, V.C. A survey on security issues in smart grids. Secur. Commun. Netw. 2016, 9, 262–273. [Google Scholar] [CrossRef]
- Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A survey on cybersecurity challenges, detection, and mitigation techniques for the smart grid. Energies 2021, 14, 5894. [Google Scholar] [CrossRef]
- Nafees, M.N.; Saxena, N.; Cardenas, A.; Grijalva, S.; Burnap, P. Smart grid cyber-physical situational awareness of complex operational technology attacks: A review. ACM Comput. Surv. 2023, 55, 1–36. [Google Scholar] [CrossRef]
- Siozios, K.; Anagnostos, D.; Soudris, D.; Kosmatopoulos, E. IoT for Smart Grids; Springer: Cham, Switzerland, 2019. [Google Scholar]
- Dalipi, F.; Yayilgan, S.Y. Security and privacy considerations for iot application on smart grids: Survey and research challenges. In Proceedings of the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, Austria, 22–24 August 2016; pp. 63–68. [Google Scholar]
- Noura, H.N.; Yaacoub, J.P.A.; Salman, O.; Chehab, A. Advanced Machine Learning in Smart Grids: An Overview. Internet Things-Cyber-Phys. Syst. 2025, 5, 95–142. [Google Scholar] [CrossRef]
- Maddikunta, P.K.R.; Pham, Q.V.; Prabadevi, B.; Deepa, N.; Dev, K.; Gadekallu, T.R.; Ruby, R.; Liyanage, M. Industry 5.0: A survey on enabling technologies and potential applications. J. Ind. Inf. Integr. 2022, 26, 100257. [Google Scholar] [CrossRef]
- Leng, J.; Sha, W.; Wang, B.; Zheng, P.; Zhuang, C.; Liu, Q.; Wuest, T.; Mourtzis, D.; Wang, L. Industry 5.0: Prospect and retrospect. J. Manuf. Syst. 2022, 65, 279–295. [Google Scholar] [CrossRef]
- Fatima, Z.; Tanveer, M.H.; Waseemullah; Zardari, S.; Naz, L.F.; Khadim, H.; Ahmed, N.; Tahir, M. Production plant and warehouse automation with IoT and industry 5.0. Appl. Sci. 2022, 12, 2053. [Google Scholar] [CrossRef]
- Xu, X.; Lu, Y.; Vogel-Heuser, B.; Wang, L. Industry 4.0 and Industry 5.0—Inception, conception and perception. J. Manuf. Syst. 2021, 61, 530–535. [Google Scholar] [CrossRef]
- Qays, M.O.; Ahmad, I.; Abu-Siada, A.; Hossain, M.L.; Yasmin, F. Key communication technologies, applications, protocols and future guides for IoT-assisted smart grid systems: A review. Energy Rep. 2023, 9, 2440–2452. [Google Scholar] [CrossRef]
- Hasan, M.K.; Habib, A.A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on cyber-physical and cyber-security system in smart grid: Standards, protocols, constraints, and recommendations. J. Netw. Comput. Appl. 2023, 209, 103540. [Google Scholar] [CrossRef]
- Kuzlu, M.; Pipattanasomporn, M.; Rahman, S. Communication network requirements for major smart grid applications in HAN, NAN and WAN. Comput. Netw. 2014, 67, 74–88. [Google Scholar] [CrossRef]
- Usman, A.; Shami, S.H. Evolution of communication technologies for smart grid applications. Renew. Sustain. Energy Rev. 2013, 19, 191–199. [Google Scholar] [CrossRef]
- Baimel, D.; Tapuchi, S.; Baimel, N. Smart grid communication technologies-overview, research challenges and opportunities. In Proceedings of the 2016 International Symposium on Power Electronics, Electrical Drives, Automation and Motion (SPEEDAM), Capri, Italy, 22–24 June 2016; pp. 116–120. [Google Scholar]
- Faheem, M.; Shah, S.B.H.; Butt, R.A.; Raza, B.; Anwar, M.; Ashraf, M.W.; Ngadi, M.A.; Gungor, V.C. Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges. Comput. Sci. Rev. 2018, 30, 1–30. [Google Scholar] [CrossRef]
- Mahmood, A.; Javaid, N.; Razzaq, S. A review of wireless communications for smart grid. Renew. Sustain. Energy Rev. 2015, 41, 248–260. [Google Scholar] [CrossRef]
- Ho, Q.D.; Gao, Y.; Le-Ngoc, T. Challenges and research opportunities in wireless communication networks for smart grid. IEEE Wirel. Commun. 2013, 20, 89–95. [Google Scholar] [CrossRef]
- Wibisono, G.; Permata, S.G.; Awaludin, A.; Suhasfan, P. Development of advanced metering infrastructure based on LoRa WAN in PLN Bali toward Bali Eco smart grid. In Proceedings of the 2017 Saudi Arabia Smart Grid (SASG), Jeddah, Saudi Arabia, 12–14 December 2017; pp. 1–4. [Google Scholar]
- Gopinathan, N.; Shanmugam, P.K.; Singh, M. Smart Grid Architecture Model (SGAM) for resilience using Energy Internet of Things (EIoT). In Proceedings of the 2022 22nd National Power Systems Conference (NPSC), New Delhi, India, 17–19 December 2022; pp. 248–253. [Google Scholar]
- Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication technologies for smart grid: A comprehensive survey. Sensors 2021, 21, 8087. [Google Scholar] [CrossRef]
- Ghelani, D. Cyber Security in Smart Grids, Threats, and Possible Solutions. Authorea Prepr. 2022. [Google Scholar] [CrossRef]
- International Electrotechnical Commission. IEC 61850: Communication Networks and Systems for Power Utility Automation; IEC Standard Series: Geneva, Switzerland, 2021. [Google Scholar]
- Modbus Organization. Modbus Application Protocol Specification, Version 1.1b3; Modbus-IDA: North Grafton, MA, USA, 2012. [Google Scholar]
- IEEE Standards Association. IEEE Std 1815-2012: IEEE Standard for Electric Power Systems Communications—Distributed Network Protocol (DNP3); IEEE: New York, NY, USA, 2012. [Google Scholar]
- Cavalieri, S.; Cantali, G.; Susinna, A. Integration of iot technologies into the smart grid. Sensors 2022, 22, 2475. [Google Scholar] [CrossRef]
- Kim, Y.; Hakak, S.; Ghorbani, A. Smart grid security: Attacks and defence techniques. IET Smart Grid 2023, 6, 103–123. [Google Scholar] [CrossRef]
- Mehmood, M.Y.; Oad, A.; Abrar, M.; Munir, H.M.; Hasan, S.F.; Muqeet, H.A.U.; Golilarz, N.A. Edge computing for IoT-enabled smart grid. Secur. Commun. Netw. 2021, 2021, 5524025. [Google Scholar] [CrossRef]
- Gong, C.; Zhang, C.; Zhuang, Q.; Li, H.; Yang, H.; Chen, J.; Zang, Z. Stabilizing buried interface via synergistic effect of fluorine and sulfonyl functional groups toward efficient and stable perovskite solar cells. Nano-Micro Lett. 2023, 15, 17. [Google Scholar] [CrossRef] [PubMed]
- Kakkar, L.; Gupta, D.; Saxena, S.; Tanwar, S. IoT architectures and its security: A review. In Proceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI 2020, Jaipur, India, 24–25 July 2021; pp. 87–94. [Google Scholar]
- IEEE Standards Association. IEEE Std 802.15.4-2020: IEEE Standard for Low-Rate Wireless Networks; IEEE: New York, NY, USA, 2020. [Google Scholar]
- North American Electric Reliability Corporation. NERC CIP: Critical Infrastructure Protection Standards; NERC: Atlanta, GA, USA, 2023. [Google Scholar]
- IEEE Standards Association. IEEE Std 2030–2011: IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS), End-Use Applications, and Loads; IEEE: New York, NY, USA, 2011. [Google Scholar]
- National Institute of Standards and Technology. NIST Special Publication 800-82 Revision 2: Guide to Industrial Control Systems (ICS) Security; NIST: Gaithersburg, MD, USA, 2015. [Google Scholar]
- International Organization for Standardization and International Electrotechnical Commission. ISO/IEC 27001: Information Technology—Security Techniques—Information Security Management Systems—Requirements; ISO/IEC: Geneva, Switzerland, 2013. [Google Scholar]
- International Electrotechnical Commission. IEC 62351: Power Systems Management and Associated Information Exchange—Data and Communications Security, Parts 1–14 (2007–2018); IEC: Geneva, Switzerland, 2020. [Google Scholar]
- Francia, G.A., III; El-Sheikh, E. NERC CIP standards: Review, compliance, and training. Glob. Perspect. Inf. Secur. Regul. Compliance Control Assur. 2022, 48–71. [Google Scholar] [CrossRef]
- North American Electric Reliability Corporation. CIP-003-9: Cyber Security—Security Management Controls; NERC Reliability Standard: Atlanta, GA, USA, 2022. [Google Scholar]
- North American Electric Reliability Corporation. CIP-005-7: Cyber Security—Electronic Security Perimeter(s); NERC Reliability Standard: Atlanta, GA, USA, 2022. [Google Scholar]
- North American Electric Reliability Corporation. CIP-007-6: Cyber Security—System Security Management; NERC Reliability Standard: Atlanta, GA, USA, 2022. [Google Scholar]
- North American Electric Reliability Corporation. CIP-010-4: Cyber Security—Configuration Change Management and Vulnerability Assessments; NERC Reliability Standard: Atlanta, GA, USA, 2022. [Google Scholar]
- Chatterjee, S. The Importance of Penetration Testing in the Oil and Gas Industry: Mitigating Cyber Risks and Ensuring NERC CIP Compliance. IJSAT-Int. J. Sci. Technol. 2023, 14. Available online: https://www.ijsat.org/research-paper.php?id=1266 (accessed on 29 June 2025).
- Bouida, Z.; Fattahi, J.; Ahmed, A.; Ibnkahla, M.; Schriemer, H.; Abdullah, R. Smart Grid Communication Based on IEEE 2030 Standard. In Encyclopedia of Wireless Networks; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1311–1318. [Google Scholar]
- Alsafran, A. A Feasibility Study of Implementing IEEE 1547 and IEEE 2030 Standards for Microgrid in the Kingdom of Saudi Arabia. Energies 2023, 16, 1777. [Google Scholar] [CrossRef]
- Gabel, R.; Sames, C.; Martinez, H.; Miller, P.; Snyder, J.N.; John, A. Operating Procedures for Developing Security Control Sets for Intelligent Transportation Systems (ITS); Technical Report; United States Department of Transportation, Intelligent Transportation: Washington, DC, USA, 2023. [Google Scholar]
- Staves, A.; Maesschalck, S.; Derbyshire, R.; Green, B.; Hutchison, D. Learning to Walk: Towards Assessing the Maturity of OT Security Control Standards and Guidelines. In Proceedings of the 2023 IFIP Networking Conference (IFIP Networking), Barcelona, Spain, 12–15 June 2023; pp. 1–6. [Google Scholar]
- Malatji, M. Management of enterprise cyber security: A review of ISO/IEC 27001: 2022. In Proceedings of the 2023 International Conference on Cyber Management and Engineering (CyMaEn), Bangkok, Thailand, 26–27 January 2023; pp. 117–122. [Google Scholar]
- Kitsios, F.; Chatzidimitriou, E.; Kamariotou, M. The ISO/IEC 27001 information security management standard: How to extract value from data in the IT sector. Sustainability 2023, 15, 5828. [Google Scholar] [CrossRef]
- International Electrotechnical Commission. IEC 60870-5: Telecontrol Equipment and Systems—Part 5: Transmission Protocols; IEC Standard Series: Geneva, Switzerland, 2003–2017. [Google Scholar]
- Hussain, S.S.; Ustun, T.S.; Kalam, A. A review of IEC 62351 security mechanisms for IEC 61850 message exchanges. IEEE Trans. Ind. Inform. 2019, 16, 5643–5654. [Google Scholar] [CrossRef]
- Borgaonkar, R.; Tøndel, I.A.; Degefa, M.Z.; Jaatun, M.G. Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 2021, 33, e6466. [Google Scholar] [CrossRef]
- Minh, Q.N.; Nguyen, V.H.; Quy, V.K.; Ngoc, L.A.; Chehri, A.; Jeon, G. Edge Computing for IoT-Enabled Smart Grid: The Future of Energy. Energies 2022, 15, 6140. [Google Scholar] [CrossRef]
- Sonker, S.K.; Raina, V.K.; Sagar, B.B.; Bansal, R.C. Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid. Electr. Eng. 2024, 106, 1339–1355. [Google Scholar] [CrossRef]
- Shruti; Rani, S.; Shabaz, M.; Dutta, A.K.; Ahmed, E.A. Enhancing privacy and security in IoT-based smart grid system using encryption-based fog computing. Alex. Eng. J. 2024, 102, 66–74. [Google Scholar] [CrossRef]
- Agnew, D.; Boamah, S.; Bretas, A.; McNair, J. Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey. Smart Cities 2024, 7, 2131–2181. [Google Scholar] [CrossRef]
- Velasquez, W.; Moreira-Moreira, G.Z.; Alvarez-Alvarado, M.S. Smart Grids Empowered by Software-Defined Network: A Comprehensive Review of Advancements and Challenges. IEEE Access 2024, 12, 63400–63416. [Google Scholar] [CrossRef]
- Rahman, A.; Islam, J.; Kundu, D.; Karim, R.; Rahman, Z.; Band, S.S.; Sookhak, M.; Tiwari, P.; Kumar, N. Impacts of blockchain in software-defined Internet of Things ecosystem with Network Function Virtualization for smart applications: Present perspectives and future directions. Int. J. Commun. Syst. 2023, 38, e5429. [Google Scholar] [CrossRef]
- Cunha, J.; Ferreira, P.; Castro, E.M.; Oliveira, P.C.; Nicolau, M.J.; Núñez, I.; Sousa, X.R.; Serôdio, C. Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies. Future Internet 2024, 16, 226. [Google Scholar] [CrossRef]
- Jafari, M.; Kavousi-Fard, A.; Chen, T.; Karimi, M. A review on digital twin technology in smart grid, transportation system and smart city: Challenges and future. IEEE Access 2023, 11, 17471–17484. [Google Scholar] [CrossRef]
- Olivares-Rojas, J.C.; Reyes-Archundia, E.; Gutierrez-Gnecchi, J.A.; Molina-Moreno, I.; Cerda-Jacobo, J.; Méndez-Patiño, A. Towards cybersecurity of the smart grid using digital twins. IEEE Internet Comput. 2021, 26, 52–57. [Google Scholar] [CrossRef]
- Khalifa, T.; Abdrabou, A.; Shaban, K.; Gaouda, A.M. Heterogeneous wireless networks for smart grid distribution systems: Advantages and limitations. Sensors 2018, 18, 1517. [Google Scholar] [CrossRef] [PubMed]
- Kashem, S.B.A.; Chowdhury, M.E.; Khandakar, A.; Ahmed, J.; Ashraf, A.; Shabrin, N. Wind power integration with smart grid and storage system: Prospects and limitations. Int. J. Adv. Comput. Sci. Appl. 2020, 11. [Google Scholar] [CrossRef]
- Ghiasi, M.; Niknam, T.; Wang, Z.; Mehrandezh, M.; Dehghani, M.; Ghadimi, N. A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electr. Power Syst. Res. 2023, 215, 108975. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
- Agarkar, A.; Agrawal, H. A review and vision on authentication and privacy preservation schemes in smart grid network. Secur. Priv. 2019, 2, e62. [Google Scholar] [CrossRef]
- Cui, L.; Qu, Y.; Gao, L.; Xie, G.; Yu, S. Detecting false data attacks using machine learning techniques in smart grid: A survey. J. Netw. Comput. Appl. 2020, 170, 102808. [Google Scholar] [CrossRef]
- Kim, A.; Oh, J.; Ryu, J.; Lee, K. A review of insider threat detection approaches with IoT perspective. IEEE Access 2020, 8, 78847–78867. [Google Scholar] [CrossRef]
- Rafiei, M.; Khooban, M.H.; Igder, M.A.; Boudjadar, J. A novel approach to overcome the limitations of reliability centered maintenance implementation on the smart grid distance protection system. IEEE Trans. Circuits Syst. II Express Briefs 2019, 67, 320–324. [Google Scholar] [CrossRef]
- Kimani, K.; Oduol, V.; Langat, K. Cyber security challenges for IoT-based smart grid networks. Int. J. Crit. Infrastruct. Prot. 2019, 25, 36–49. [Google Scholar] [CrossRef]
- Fursov, I.; Yamkovyi, K.; Shmatko, O. Smart Grid and wind generators: An overview of cyber threats and vulnerabilities of power supply networks. Radioelectron. Comput. Syst. 2022, 50–63. [Google Scholar] [CrossRef]
- Fan, D.; Ren, Y.; Feng, Q.; Liu, Y.; Wang, Z.; Lin, J. Restoration of smart grids: Current status, challenges, and opportunities. Renew. Sustain. Energy Rev. 2021, 143, 110909. [Google Scholar] [CrossRef]
- Ourahou, M.; Ayrir, W.; Hassouni, B.E.; Haddi, A. Review on smart grid control and reliability in presence of renewable energies: Challenges and prospects. Math. Comput. Simul. 2020, 167, 19–31. [Google Scholar] [CrossRef]
- Abdukhakimov, A.; Bhardwaj, S.; Gashema, G.; Kim, D.S. Reliability analysis in smart grid networks considering distributed energy resources and storage devices. Int. J. Electr. Electron. Eng. Telecommun. 2019, 8, 233–237. [Google Scholar] [CrossRef]
- IEEE Standards Association. IEEE Std 1547-2018: IEEE Standard for Interconnection and Interoperability of Distributed Energy Resources with Associated Electric Power Systems Interfaces; IEEE: New York, NY, USA, 2018. [Google Scholar]
- Karatzas, S.; Chassiakos, A. System-theoretic process analysis (stpa) for hazard analysis in complex systems: The case of “Demand-Side Management in a Smart Grid”. Systems 2020, 8, 33. [Google Scholar] [CrossRef]
- Zhu, W.; Han, M.; Milanović, J.V.; Crossley, P. Methodology for reliability assessment of smart grid considering risk of failure of communication architecture. IEEE Trans. Smart Grid 2020, 11, 4358–4365. [Google Scholar] [CrossRef]
- Gündüz, M.Z.; Daş, R. Smart grid: Interoperability and cyber security. In Cyber Security Solutions for Protecting and Building the Future Smart Grid; Elsevier: Amsterdam, The Netherlands, 2025; pp. 299–320. [Google Scholar]
- Jha, A.V.; Appasani, B.; Ghazali, A.N.; Pattanayak, P.; Gurjar, D.S.; Kabalci, E.; Mohanta, D. Smart grid cyber-physical systems: Communication technologies, standards and challenges. Wirel. Netw. 2021, 27, 2595–2613. [Google Scholar] [CrossRef]
- Kirmani, S.; Mazid, A.; Khan, I.A.; Abid, M. A Survey on IoT-Enabled Smart Grids: Technologies, Architectures, Applications, and Challenges. Sustainability 2023, 15, 717. [Google Scholar] [CrossRef]
- Aman, M.; Solangi, K.; Hossain, M.; Badarudin, A.; Jasmon, G.; Mokhlis, H.; Bakar, A.; Kazi, S.N. A review of Safety, Health and Environmental (SHE) issues of solar energy system. Renew. Sustain. Energy Rev. 2015, 41, 1190–1204. [Google Scholar] [CrossRef]
- Aloul, F.; Al-Ali, A.; Al-Dalky, R.; Al-Mardini, M.; El-Hajj, W. Smart grid security: Threats, vulnerabilities and solutions. Int. J. Smart Grid Clean Energy 2012, 1, 1–6. [Google Scholar] [CrossRef]
- Faquir, D.; Chouliaras, N.; Sofia, V.; Olga, K.; Maglaras, L. Cybersecurity in smart grids, challenges and solutions. AIMS Electron. Electr. Eng. 2021, 5, 24–37. [Google Scholar]
- Sanjab, A.; Saad, W.; Guvenc, I.; Sarwat, A.; Biswas, S. Smart grid security: Threats, challenges, and solutions. arXiv 2016. [Google Scholar] [CrossRef]
- Anand, P.; Singh, Y.; Selwal, A.; Singh, P.K.; Felseghi, R.A.; Raboaca, M.S. Iovt: Internet of vulnerable things? threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart grids. Energies 2020, 13, 4813. [Google Scholar] [CrossRef]
- Goel, S.; Hong, Y.; Papakonstantinou, V.; Kloza, D.; Goel, S.; Hong, Y. Security challenges in smart grid implementation. In Smart Grid Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1–39. [Google Scholar]
- Anwar, A.; Mahmood, A.N. Cyber security of smart grid infrastructure. arXiv 2014, arXiv:1401.3936. [Google Scholar] [CrossRef]
- Pandey, R.K.; Misra, M. Cyber security threats—Smart grid infrastructure. In Proceedings of the 2016 National Power Systems Conference (NPSC), Bhubaneswar, India, 19–21 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–6. [Google Scholar]
- Unsal, D.B.; Ustun, T.S.; Hussain, S.S.; Onen, A. Enhancing cybersecurity in smart grids: False data injection and its mitigation. Energies 2021, 14, 2657. [Google Scholar] [CrossRef]
- Soltani, M.; Ousat, B.; Siavoshani, M.J.; Jahangir, A.H. An adaptable deep learning-based intrusion detection system to zero-day attacks. J. Inf. Secur. Appl. 2023, 76, 103516. [Google Scholar] [CrossRef]
- Che Mat, N.I.; Jamil, N.; Yusoff, Y.; Mat Kiah, M.L. A systematic literature review on advanced persistent threat behaviors and its detection strategy. J. Cybersecur. 2024, 10, tyad023. [Google Scholar] [CrossRef]
- Tang, D.; Fang, Y.P.; Zio, E. Vulnerability analysis of demand-response with renewable energy integration in smart grids to cyber attacks and online detection methods. Reliab. Eng. Syst. Saf. 2023, 235, 109212. [Google Scholar] [CrossRef]
- Chen, J.; Mohamed, M.A.; Dampage, U.; Rezaei, M.; Salmen, S.H.; Obaid, S.A.; Annuk, A. A multi-layer security scheme for mitigating smart grid vulnerability against faults and cyber-attacks. Appl. Sci. 2021, 11, 9972. [Google Scholar] [CrossRef]
- Hatch, M.; Ron, E.; Bouville, A.; Zablotska, L.; Howe, G. The Chernobyl disaster: Cancer following the accident at the Chernobyl nuclear power plant. Epidemiol. Rev. 2005, 27, 56–66. [Google Scholar] [CrossRef]
- Kim, Y.; Kim, M.; Kim, W. Effect of the Fukushima nuclear disaster on global public acceptance of nuclear energy. Energy Policy 2013, 61, 822–828. [Google Scholar] [CrossRef]
- Mueller, P.; Yadegari, B. The Stuxnet Worm. University of Arizona, Tucson. 2012. Available online: https://www2.cs.arizona.edu/~collberg/Teaching/466-566/2013/Resources/presentations/2012/topic9-final/report.pdf (accessed on 4 April 2025).
- Khan, R.; Maynard, P.; McLaughlin, K.; Laverty, D.; Sezer, S. Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid. In Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research, Belfast, UK, 23–25 August 2016; pp. 53–63. [Google Scholar]
- Maiti, S.; Balabhaskara, A.; Adhikary, S.; Koley, I.; Dey, S. Targeted Attack Synthesis for Smart Grid Vulnerability Analysis. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023; pp. 2576–2590. [Google Scholar]
- Parshivlyuk, S.; Panchenko, K. Cyber Threats and Resilience in Power Grid Infrastructures: Assessing Vulnerabilities and Countermeasures. Eduzone: Int. Peer Rev. Multidiscip. J. 2024, 13, 22–31. [Google Scholar]
- Ezeigweneme, C.A.; Nwasike, C.N.; Adefemi, A.; Adegbite, A.O.; Gidiagba, J.O. Smart grids in industrial paradigms: A review of progress, benefits, and maintenance implications: Analyzing the role of smart grids in predictive maintenance and the integration of renewable energy sources, along with their overall impact on the industri. Eng. Sci. Technol. J. 2024, 5, 1–20. [Google Scholar] [CrossRef]
- Lekunze, G.T.; Kenfack, P.; Dandoussou, A. Reliability Optimization of Smart Grid Based on Optimal Failure Rate Using Distributed Generation 2024. Available online: https://assets-eu.researchsquare.com/files/rs-4289832/v1_covered_f049648e-a3bc-4b80-bcdf-6946483886fe.pdf (accessed on 29 June 2025).
- Lopes, Y.; Fernandes, N.C.; de Castro, T.B.; dos Santos Farias, V.; Noce, J.D.; Marques, J.P.; Muchaluat-Saade, D.C. Vulnerabilities and threats in smart grid communication networks. In Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government; IGI Global: Hershey, PA, USA, 2021; pp. 1508–1535. [Google Scholar]
- Reda, H.T.; Ray, B.; Peidaee, P.; Anwar, A.; Mahmood, A.; Kalam, A.; Islam, N. Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid. Sensors 2021, 21, 1554. [Google Scholar] [CrossRef]
- Ruj, S.; Pal, A. Cascading Failures in Smart Grids under Random, Targeted, and Adaptive Attacks. In A Practical Guide on Security and Privacy in Cyber-Physical Systems: Foundations, Applications and Limitations; World Scientific: Singapore, 2024; pp. 173–211. [Google Scholar]
- Elnashai, A.S.; Gencturk, B.; Kwon, O.S.; Al-Qadi, I.L.; Hashash, Y.; Roesler, J.R.; Kim, S.J.; Jeong, S.H.; Dukes, J.; Valdivia, A. The Maule (Chile) Earthquake of February 27, 2010: Consequence Assessment and Case Studies; MAE Center Report No. 10-04; Illinois Library: Springfield, IL, USA, 2010. [Google Scholar]
- Naddaf, M. Turkey-Syria earthquake: What scientists know. Nature 2023, 614, 398–399. [Google Scholar] [CrossRef]
- United States; Congress; House; Select Bipartisan Committee to Investigate the Preparation for, and Response to Hurricane Katrina. A Failure of Initiative: Final Report of the Select Bipartisan Committee to Investigate the Preparation for and Response to Hurricane Katrina; Government Printing Office: Washington, DC, USA, 2006; Volume 109. [Google Scholar]
- Kishore, N.; Marqués, D.; Mahmud, A.; Kiang, M.V.; Rodriguez, I.; Fuller, A.; Ebner, P.; Sorensen, C.; Racy, F.; Lemery, J.; et al. Mortality in puerto rico after hurricane maria. N. Engl. J. Med. 2018, 379, 162–170. [Google Scholar] [CrossRef] [PubMed]
- Sharp, D.W.; Cristaldi, A.J.; Spratt, S.M.; Hagemeyer, B.C. Multifaceted General Overview of the East Central Florida Tornado Outbreak of 22–23 February 1998. Preprints, 19th Conference on Severe Local Storms, Minneapolis, MN, USA, 14–18 September 1998; The American Meteor Society: Geneseo, NY, USA, 1998; pp. 140–143. [Google Scholar]
- Chaney, P.L.; Weaver, G.S. The vulnerability of mobile home residents in tornado disasters: The 2008 Super Tuesday tornado in Macon County, Tennessee. Weather. Clim. Soc. 2010, 2, 190–199. [Google Scholar] [CrossRef]
- Chernokulsky, A.; Shikhov, A.; Bykov, A.; Azhigov, I. Satellite-based study and numerical forecasting of two tornado outbreaks in the Ural Region in June 2017. Atmosphere 2020, 11, 1146. [Google Scholar] [CrossRef]
- Lay, T.; Ammon, C.J.; Kanamori, H.; Rivera, L.; Koper, K.D.; Hutko, A.R. The 2009 Samoa–Tonga great earthquake triggered doublet. Nature 2010, 466, 964–968. [Google Scholar] [CrossRef]
- Telford, J.; Cosgrave, J. The international humanitarian system and the 2004 Indian Ocean earthquake and tsunamis. Disasters 2007, 31, 1–28. [Google Scholar] [CrossRef]
- Goto, K.; Chagué-Goff, C.; Fujino, S.; Goff, J.; Jaffe, B.; Nishimura, Y.; Richmond, B.; Sugawara, D.; Szczuciński, W.; Tappin, D.R.; et al. New insights of tsunami hazard from the 2011 Tohoku-oki event. Mar. Geol. 2011, 290, 46–50. [Google Scholar] [CrossRef]
- Kalantari, Z.; Ferreira, C.S.S.; Keesstra, S.; Destouni, G. Nature-based solutions for flood-drought risk mitigation in vulnerable urbanizing parts of East-Africa. Curr. Opin. Environ. Sci. Health 2018, 5, 73–78. [Google Scholar] [CrossRef]
- Okamoto, K.; Yamakawa, S.; Kawashima, H. Estimation of flood damage to rice production in North Korea in 1995. Int. J. Remote Sens. 1998, 19, 365–371. [Google Scholar] [CrossRef]
- Krishna, R.N.; Ronan, K.; Spencer, C.; Alisic, E. The lived experience of disadvantaged communities affected by the 2015 South Indian floods: Implications for disaster risk reduction dialogue. Int. J. Disaster Risk Reduct. 2021, 54, 102046. [Google Scholar] [CrossRef]
- Kamoshita, A.; Ouk, M. Field level damage of deepwater rice by the 2011 Southeast Asian Flood in a flood plain of Tonle Sap Lake, Northwest Cambodia. Paddy Water Environ. 2015, 13, 455–463. [Google Scholar] [CrossRef]
- Du, S.; Cheng, X.; Huang, Q.; Chen, R.; Ward, P.J.; Aerts, J.C. Brief communication: Rethinking the 1998 China floods to prepare for a nonstationary future. Nat. Hazards Earth Syst. Sci. 2019, 19, 715–719. [Google Scholar] [CrossRef]
- Bryant, R.A.; Waters, E.; Gibbs, L.; Gallagher, H.C.; Pattison, P.; Lusher, D.; MacDougall, C.; Harms, L.; Block, K.; Snowdon, E.; et al. Psychological outcomes following the Victorian Black Saturday bushfires. Aust. N. Z. J. Psychiatry 2014, 48, 634–643. [Google Scholar] [CrossRef]
- Lagouvardos, K.; Kotroni, V.; Giannaros, T.M.; Dafis, S. Meteorological conditions conducive to the rapid spread of the deadly wildfire in eastern Attica, Greece. Bull. Am. Meteorol. Soc. 2019, 100, 2137–2145. [Google Scholar] [CrossRef]
- Hashmi, M.H.; Ullah, Z.; Asghar, R.; Shaker, B.; Tariq, M.; Saleem, H. An Overview of the current challenges and Issues in Smart Grid Technologies. In Proceedings of the 2023 International Conference on Emerging Power Technologies (ICEPT), Topi, Pakistan, 6–7 May 2023; pp. 1–6. [Google Scholar]
- Mohammed, A.; George, G. Vulnerabilities and strategies of cybersecurity in smart grid-evaluation and review. In Proceedings of the 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), Doha, Qatar, 20–22 March 2022; pp. 1–6. [Google Scholar]
- Szekeres, A.; Snekkenes, E. Representing decision-makers in SGAM-H: The smart grid architecture model extended with the human layer. In Proceedings of the Graphical Models for Security: 7th International Workshop, GraMSec 2020, Boston, MA, USA, 22 June 2020; Revised Selected Papers 7. Springer: Berlin/Heidelberg, Germany, 2020; pp. 87–110. [Google Scholar]
- Bouramdane, A.A. Cyberattacks in smart grids: Challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process. J. Cybersecur. Priv. 2023, 3, 662–705. [Google Scholar] [CrossRef]
- Nguyen, T.N.; Liu, B.H.; Nguyen, N.P.; Chou, J.T. Cyber security of smart grid: Attacks and defenses. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Virtually, 7–11 June 2020; pp. 1–6. [Google Scholar]
- Inayat, U.; Zia, M.F.; Mahmood, S.; Berghout, T.; Benbouzid, M. Cybersecurity Enhancement of Smart Grid: Attacks, Methods, and Prospects. Electronics 2022, 11, 3854. [Google Scholar] [CrossRef]
- Otuoze, A.O.; Mustafa, M.W.; Larik, R.M. Smart grids security challenges: Classification by sources of threats. J. Electr. Syst. Inf. Technol. 2018, 5, 468–483. [Google Scholar] [CrossRef]
- Sielicki, P.W.; Stewart, M.G.; Gajewski, T.; Malendowski, M.; Peksa, P.; Al-Rifaie, H.; Studziński, R.; Sumelka, W. Field test and probabilistic analysis of irregular steel debris casualty risks from a person-borne improvised explosive device. Def. Technol. 2021, 17, 1852–1863. [Google Scholar] [CrossRef]
- Knopf, K.S. Fully Autonomous Vehicle-Borne Improvised Explosive Devices-Mitigating Strategies; Technical Report; Naval Postgraduate School Monterey United States: Monterey, CA, USA, 2019. [Google Scholar]
- Maňas, P.; Kroupa, L.; Urban, R.; Coufal, D. Blast threat to critical and military infrastructure. Secur. Def. Q. 2013, 1, 32–53. [Google Scholar] [CrossRef]
- O’Day, A. Northern Ireland, Terrorism, and the British State. In Terrorism: Theory and Practice; Routledge: London, UK, 2019; pp. 121–135. [Google Scholar]
- White, S.P. Understanding Cyberwarfare: Lessons from the Russia-Georgia War; Modern War Institute at West Point: West Point, NY, USA, 2018. [Google Scholar]
- Button, M. Industrial Espionage and Information Security. In Private Policing; Routledge: London, UK, 2019. [Google Scholar] [CrossRef]
- Akondi, V.M.; Cho, D.; Park, J.; Kim, S.H.; Kim, T.H. A review on smart grid cyber-physical system security threats and countermeasures. Int. J. Control Autom. 2015, 8, 257–270. [Google Scholar]
- Subramanian, K.; Huang, Q. Cyber Physical Systems for Smart Grids; CRC Press: Boca Raton, FL, USA, 2019. [Google Scholar]
- Wang, W.; Lu, Z. Cyber security in the smart grid: Survey and challenges. Comput. Netw. 2013, 57, 1344–1371. [Google Scholar] [CrossRef]
- Hong, J.; Liu, C.C.; Govindarasu, M. Integrated anomaly detection for cyber security of the substations. IEEE Trans. Smart Grid 2014, 5, 1643–1653. [Google Scholar] [CrossRef]
- Abir, S.A.A.; Anwar, A.; Choi, J.; Kayes, A. Iot-enabled smart energy grid: Applications and challenges. IEEE Access 2021, 9, 50961–50981. [Google Scholar] [CrossRef]
- Nakashima, E. US Target of Massive Cyber-Espionage Campaign. Washington Post, 10 February 2013. [Google Scholar]
- Krekel, B.; Adams, P.; Bakos, G. Occupying the information high ground: Chinese capabilities for computer network operations and cyber espionage. Int. J. Comput. Res. 2014, 21, 333. [Google Scholar]
- Applegate, S.D. Cybermilitias and political hackers: Use of irregular forces in cyberwarfare. IEEE Secur. Priv. 2011, 9, 16–22. [Google Scholar] [CrossRef]
- Caraccilo, D.J.; Rohling, A.M. Targeting in Postconflict Operations in Iraq. Mil. Rev. 2004, 84, 11. [Google Scholar]
- Knights, M. Infrastructure Targeting and Postwar Iraq. Policy Watch, 14 March 2003. [Google Scholar]
- Özlem, T. The Lebanese war of 2006: Reasons and consequences. Perceptions J. Int. Aff. 2007, 12, 109–122. [Google Scholar]
- Kreps, S.E. The 2006 Lebanon war: Lessons learned. Parameters 2007, 37, 72. [Google Scholar] [CrossRef]
- Amer, M. Critical discourse analysis of war reporting in the international press: The case of the Gaza war of 2008–2009. Palgrave Commun. 2017, 3, 1–11. [Google Scholar] [CrossRef]
- Weinthal, E.; Sowers, J. Targeting infrastructure and livelihoods in the West Bank and Gaza. Int. Aff. 2019, 95, 319–340. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Salman, O.; Noura, H.N.; Kaaniche, N.; Chehab, A.; Malli, M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 2020, 77, 103201. [Google Scholar] [CrossRef] [PubMed]
- Burton, J.; Soare, S.; Soare, S.R.; Burton, J. Smart Cities, Cyber Warfare and Social Disorder. In Cyber Threats and NATO 2030: Horizon Scanning and Analysis; CCDCOE: Tallinn, Estonia, 2020. [Google Scholar]
- Taplin, R. Cyber Risk, Intellectual Property Theft and Cyberwarfare: Asia, Europe and the USA; Routledge: London, UK, 2020. [Google Scholar]
- Donovan, G.T., Jr. Russian Operational Art in the Russo-Georgian War of 2008; Technical Report; Army War Coll Carlisle Barracks: Carlisle, PA, USA, 2009. [Google Scholar]
- Roberto, M. BlackEnergy Malware Threats and Comparative Study 2017. Available online: https://d1wqtxts1xzle7.cloudfront.net/55251880/BlackEnergy-libre.pdf?1512912965=&response-content-disposition=inline%3B+filename%3DBlackEnergy_Malware_Threats_and_Comparat.pdf&Expires=1752485367&Signature=Nayvuxnr4P8NwBB6lwn~PjDjQnYdWLeQzGEzOlPFhZ7A5~YddZ8dRRgK4xcmCD~taSvUJ6YdyOsUxY7Zpiiy9a1vnKD-Zhk6lWEEvuVNMlReYEiDG22KbVFqeeFWGyZZlpih-~LsxEQOvDMgg3Bm2lg9-zWFxpgxrF8qY4fcluAteJPS2zFGnYI9vPRWmnRYM76rYCshMsc7lF1RpG0pmUMf~Fkz-UbaY23lJsvOacyMP-PBguAOiO-n-EZ1BmJbnafLKfT7~REc1hxidTxmwLoczU0JoifmdqvACPlC2MmNWcs53cxaYXWzntxACeEcxntu1rwnwnHr2kJMvfkF9Q__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA (accessed on 29 June 2025).
- Sullivan, J.E.; Kamensky, D. How cyber-attacks in Ukraine show the vulnerability of the US power grid. Electr. J. 2017, 30, 30–35. [Google Scholar] [CrossRef]
- Geiger, M.; Bauer, J.; Masuch, M.; Franke, J. An analysis of black energy 3, Crashoverride, and Trisis, three malware approaches targeting operational technology systems. In Proceedings of the 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria, 8–11 September 2020; Volume 1, pp. 1537–1543. [Google Scholar]
- Assante, M.J.; Lee, R.M. The industrial control system cyber kill chain. SANS Inst. InfoSec Read. Room 2015, 1, 24. [Google Scholar]
- Greenberg, A. The untold story of NotPetya, the most devastating cyberattack in history. Wired August 2018, 22. [Google Scholar]
- Shehod, A. Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the US. Cybersecur. Interdiscip. Syst. Lab. MIT 2016, 22, 2016–2022. [Google Scholar]
- Case, D.U. Analysis of the cyber attack on the Ukrainian power grid. Electr. Inf. Shar. Anal. Cent. (E-ISAC) 2016, 388, 1–29. [Google Scholar]
- Neilsen, R. “Honey, I’m Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives; New York University: New York, NY, USA, 2023; Available online: https://coilink.org/20.500.12592/9f4wtb (accessed on 29 June 2025).
- McMahon, D. NOTE FOR NATIONAL DEFENCE: CYBER DECEPTION-The Art of Camouflage, Stealth and Misdirection; Clairvoyance Cyber Corp: 2021. Available online: https://www.concordia.ca/content/dam/ginacody/research/spnet/Documents/BriefingNotes/AI/BN-83-The-role-of-AI-Aug2021.pdf (accessed on 29 June 2025).
- Goel, S. Anonymity vs. security: The right balance for the smart grid. Commun. Assoc. Inf. Syst. 2015, 36, 2. [Google Scholar] [CrossRef]
- Wagner, M.; Kuba, M.; Oeder, A. Smart grid cyber security: A German perspective. In Proceedings of the 2012 International Conference on Smart Grid Technology, Economics and Policies (SG-TEP), Nuremberg, Germany, 3–4 December 2012; pp. 1–4. [Google Scholar]
- Chernenko, E.; Demidov, O.; Lukyanov, F. Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms; Council on Foreign Relations: New York, NY, USA, 2018. [Google Scholar]
- Miller, T.; Staves, A.; Maesschalck, S.; Sturdee, M.; Green, B. Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems. Int. J. Crit. Infrastruct. Prot. 2021, 35, 100464. [Google Scholar] [CrossRef]
- Analytica, O. Ukraine cannot afford its counter-offensive failing. Emerald Expert Briefings, 27 February 2023. [Google Scholar]
- Cities, M.; Coalition, A.I.; Militias, I.P. Iraq Situation Report: July 22–28, 2020; ISW Press: Washington, DC, USA, 2020. [Google Scholar]
- Adebajo, M.T. Aggression and Self-Defense in Cyberwarfare: The Relevance of International Law. Tradit. J. Law Soc. Sci. 2023, 2, 1–15. [Google Scholar]
- Zhang, Y.; Wang, J.; Chen, B. Detecting false data injection attacks in smart grids: A semi-supervised deep learning approach. IEEE Trans. Smart Grid 2020, 12, 623–634. [Google Scholar] [CrossRef]
- Dayananda, P.; Srikantaswamy, M.; Nagaraju, S.; Velluri, R.; Doddananjedevaru, M.K. Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter. Int. J. Power Electron. Drive Syst. 2022, 13, 2086. [Google Scholar] [CrossRef]
- Wang, K.; Du, M.; Maharjan, S.; Sun, Y. Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid 2017, 8, 2474–2482. [Google Scholar] [CrossRef]
- Huang, R.; Li, Y.; Wang, X. Attention-aware deep reinforcement learning for detecting false data injection attacks in smart grids. Int. J. Electr. Power Energy Syst. 2023, 147, 108815. [Google Scholar] [CrossRef]
- Pei, C.; Xiao, Y.; Liang, W.; Han, X. PMU placement protection against coordinated false data injection attacks in smart grid. IEEE Trans. Ind. Appl. 2020, 56, 4381–4393. [Google Scholar] [CrossRef]
- Hasan, M.N.; Toma, R.N.; Nahid, A.A.; Islam, M.M.; Kim, J.M. Electricity theft detection in smart grid systems: A CNN-LSTM based approach. Energies 2019, 12, 3310. [Google Scholar] [CrossRef]
- Takiddin, A.; Ismail, M.; Serpedin, E. Robust Data-Driven Detection of Electricity Theft Adversarial Evasion Attacks in Smart Grids. IEEE Trans. Smart Grid 2022, 14, 663–676. [Google Scholar] [CrossRef]
- Pal, A.; Jolfaei, A.; Kant, K. A fast prekeying-based integrity protection for smart grid communications. IEEE Trans. Ind. Inform. 2020, 17, 5751–5758. [Google Scholar] [CrossRef]
- Ebrahimabadi, M.; Younis, M.; Karimi, N. Hardware assisted smart grid authentication. In Proceedings of the ICC 2021—IEEE International Conference on Communications, Montreal, QC, Canada, 14–18 June 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar]
- Taylor, C.; Johnson, T. Strong authentication countermeasures using dynamic keying for sinkhole and distance spoofing attacks in smart grid networks. In Proceedings of the 2015 IEEE Wireless Communications and Networking Conference (WCNC), New Orleans, LA, USA, 9–12 March 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1835–1840. [Google Scholar]
- Fan, Y.; Zhang, Z.; Trinkle, M.; Dimitrovski, A.D.; Song, J.B.; Li, H. A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids. IEEE Trans. Smart Grid 2014, 6, 2659–2668. [Google Scholar] [CrossRef]
- Agilandeeswari, L.; Paliwal, S.; Chandrakar, A.; Prabukumar, M. A new lightweight conditional privacy preserving authentication and key–agreement protocol in social internet of things for vehicle to smart grid networks. Multimed. Tools Appl. 2022, 81, 27683–27710. [Google Scholar] [CrossRef]
- Chaudhry, S.A.; Alhakami, H.; Baz, A.; Al-Turjman, F. Securing demand response management: A certificate-based access control in smart grid edge computing infrastructure. IEEE Access 2020, 8, 101235–101243. [Google Scholar] [CrossRef]
- Irshad, A.; Chaudhry, S.A.; Alazab, M.; Kanwal, A.; Zia, M.S.; Zikria, Y.B. A secure demand response management authentication scheme for smart grid. Sustain. Energy Technol. Assess. 2021, 48, 101571. [Google Scholar] [CrossRef]
- Bang, A.O.; Rao, U.P. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: A focus on smart home use case. J. Supercomput. 2021, 77, 13703–13738. [Google Scholar] [CrossRef]
- Sriranjani, R.; Hemavathi, N.; Parvathy, A.; Salini, B.; Nandhini, L. Received Signal Strength and Optimized Support Vector Machine based Sybil Attack Detection Scheme in Smart Grid. In Proceedings of the 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 19–20 January 2023; pp. 1–5. [Google Scholar]
- Nyangaresi, V.O.; Alsamhi, S.H. Towards secure traffic signaling in smart grids. In Proceedings of the 2021 3rd Global Power, Energy and Communication Conference (GPECOM), Antalya, Turkey, 5–8 October 2021; pp. 196–201. [Google Scholar]
- Jafarigiv, D.; Sheshyekani, K.; Kassouf, M.; Seyedi, Y.; Karimi, H.; Mahseredjian, J. Countering FDI attacks on DERs coordinated control system using FMI-compatible cosimulation. IEEE Trans. Smart Grid 2020, 12, 1640–1650. [Google Scholar] [CrossRef]
- Kumar, B.S.; Gowda, K.K. Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System. In Proceedings of the 2022 IEEE International Conference on Data Science and Information System (ICDSIS), Hassan, India, 29–30 July 2022; pp. 1–6. [Google Scholar]
- Das, T.; Hamdan, O.A.; Sengupta, S.; Arslan, E. Flood Control: TCP-SYN Flood Detection for Software-Defined Networks using OpenFlow Port Statistics. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Virtually, 27–29 July 2022; pp. 1–8. [Google Scholar]
- Mahrach, S.; Haqiq, A. DDoS flooding attack mitigation in software defined networks. Int. J. Adv. Comput. Sci. Appl. 2020, 11, 693–700. [Google Scholar] [CrossRef]
- Zhang, T.; Ji, X.; Zhuang, Z.; Xu, W. JamCatcher: A mobile jammer localization scheme for advanced metering infrastructure in smart grid. Sensors 2019, 19, 909. [Google Scholar] [CrossRef]
- Pirayesh, H.; Zeng, H. Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE Commun. Surv. Tutor. 2022, 24, 767–809. [Google Scholar] [CrossRef]
- Singh, N.K.; Mahajan, V.; Aniket, A.; Pandya, S.; Panchal, R.; Mudgal, U.; Bhatt, M. Identification and prevention of cyber attack in smart grid communication network. In Proceedings of the 2019 International Conference on Information and Communications Technology (ICOIACT), Yogyakarta, Indonesia, 24–25 July 2019; pp. 5–10. [Google Scholar]
- Mahmood, H.; Mahmood, D.; Shaheen, Q.; Akhtar, R.; Changda, W. S-DPs: An SDN-based DDoS protection system for smart grids. Secur. Commun. Netw. 2021, 2021, 6629098. [Google Scholar] [CrossRef]
- El Makhtoum, H.; Bentaleb, Y. Review and evaluation of OTP-Based authentication schemes in the metering systems of smart grids. In Proceedings of the 2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), Hammamet, Tunisia, 28–30 May 2022; pp. 232–237. [Google Scholar]
- Chaudhry, S.A.; Nebhan, J.; Yahya, K.; Al-Turjman, F. A privacy enhanced authentication scheme for securing smart grid infrastructure. IEEE Trans. Ind. Inform. 2021, 18, 5000–5006. [Google Scholar] [CrossRef]
- Dhunna, G.S.; Al-Anbagi, I. A low power WSNs attack detection and isolation mechanism for critical smart grid applications. IEEE Sens. J. 2019, 19, 5315–5324. [Google Scholar] [CrossRef]
- Patsakis, C.; Casino, F. Exploiting statistical and structural features for the detection of Domain Generation Algorithms. J. Inf. Secur. Appl. 2021, 58, 102725. [Google Scholar] [CrossRef]
- Bodziony, N.; Jemioło, P.; Kluza, K.; Ogiela, M.R. Blockchain-based address alias system. J. Theor. Appl. Electron. Commer. Res. 2021, 16, 1280–1296. [Google Scholar] [CrossRef]
- Mishra, S. Blockchain-based security in smart grid network. Int. J. Commun. Netw. Distrib. Syst. 2022, 28, 365–388. [Google Scholar] [CrossRef]
- Kautish, S.; Juneja, S.; Mohiuddin, K.; Karim, F.K.; Elmannai, H.; Ghorashi, S.; Hamid, Y. Enhanced Cloud Storage Encryption Standard for Security in Distributed Environments. Electronics 2023, 12, 714. [Google Scholar] [CrossRef]
- Yan, Z.; Wen, H. Performance Analysis of Electricity Theft Detection for the Smart Grid: An Overview. IEEE Trans. Instrum. Meas. 2022, 71, 2502928. [Google Scholar] [CrossRef]
- Gujjula, D.; Reddy, G.V.K.; Reddy, P.B. Firmware Security: Challenges, Vulnerabilities, and Mitigation Strategies. In Disruptive Technologies in Computing and Communication Systems, 1st ed.; Mohan Babu, V., Suresh, B., Eds.; CRC Press: London, UK, 2024. [Google Scholar] [CrossRef]
- Albogamy, F.R.; Paracha, M.Y.I.; Hafeez, G.; Khan, I.; Murawwat, S.; Rukh, G.; Khan, S.; Khan, M.U.A. Real-Time Scheduling for Optimal Energy Optimization in Smart Grid Integrated with Renewable Energy Sources. IEEE Access 2022, 10, 35498–35520. [Google Scholar] [CrossRef]
- Ndife, A.N.; Mensin, Y.; Rakwichian, W.; Muneesawang, P. Cyber-Security Audit for Smart Grid Networks: An Optimized Detection Technique Based on Bayesian Deep Learning. J. Internet Serv. Inf. Secur. 2022, 12, 95–114. [Google Scholar]
- Acarali, D.; Rao, K.R.; Rajarajan, M.; Chema, D.; Ginzburg, M. Modelling smart grid IT-OT dependencies for DDoS impact propagation. Comput. Secur. 2022, 112, 102528. [Google Scholar] [CrossRef]
- Diaba, S.Y.; Elmusrati, M. Proposed algorithm for smart grid DDoS detection based on deep learning. Neural Netw. 2023, 159, 175–184. [Google Scholar] [CrossRef]
- Yılmaz, Y.; Uludag, S. Timely detection and mitigation of IoT-based cyberattacks in the smart grid. J. Frankl. Inst. 2021, 358, 172–192. [Google Scholar] [CrossRef]
- Maziku, H.; Shetty, S.; Nicol, D.M. Security risk assessment for SDN-enabled smart grids. Comput. Commun. 2019, 133, 1–11. [Google Scholar] [CrossRef]
- Haggi, H.; Roofegari nejad, R.; Song, M.; Sun, W. A review of smart grid restoration to enhance cyber-physical system resilience. In Proceedings of the 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), Chengdu, China, 21–24 May 2019; pp. 4008–4013. [Google Scholar]
- Rice, E.B.; AlMajali, A. Mitigating the risk of cyber attack on smart grid systems. Procedia Comput. Sci. 2014, 28, 575–582. [Google Scholar] [CrossRef]
- Zhang, Z.; Huang, S.; Chen, Y.; Li, B.; Mei, S. Cyber-physical coordinated risk mitigation in smart grids based on attack-defense game. IEEE Trans. Power Syst. 2021, 37, 530–542. [Google Scholar] [CrossRef]
- Lyu, X.; Ding, Y.; Yang, S.H. Safety and security risk assessment in cyber-physical systems. IET Cyber-Phys. Syst. Theory Appl. 2019, 4, 221–232. [Google Scholar] [CrossRef]
- Shrestha, M.; Johansen, C.; Noll, J.; Roverso, D. A methodology for security classification applied to smart grid infrastructures. Int. J. Crit. Infrastruct. Prot. 2020, 28, 100342. [Google Scholar] [CrossRef]
- Mir, A.W.; Ketti Ramachandran, R. Security gaps assessment of smart grid based SCADA systems. Inf. Comput. Secur. 2019, 27, 434–452. [Google Scholar] [CrossRef]
- Langer, L.; Smith, P.; Hutle, M. Smart grid cybersecurity risk assessment. In Proceedings of the 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST); IEEE: Piscataway, NJ, USA, 2015; pp. 475–482. [Google Scholar]
- Sun, Q.; Zhang, Y.; Han, D.; Yan, Z.; Zhao, J. Multi-elements and multi-dimensions risk evaluation of smart grid. In Proceedings of the IEEE PES Innovative Smart Grid Technologies, Washington, DC, USA, 16–20 January 2012; pp. 1–6. [Google Scholar]
- Sun, D.; Wang, H.; Lall, U.; Huang, J.; Liu, G. Subway travel risk evaluation during flood events based on smart card data. Geomat. Nat. Hazards Risk 2022, 13, 2796–2818. [Google Scholar] [CrossRef]
- Lamba, V.; Šimková, N.; Rossi, B. Recommendations for smart grid security risk management. Cyber-Phys. Syst. 2019, 5, 92–118. [Google Scholar] [CrossRef]
- Rangel-Martinez, D.; Nigam, K.; Ricardez-Sandoval, L.A. Machine learning on sustainable energy: A review and outlook on renewable energy systems, catalysis, smart grid and energy storage. Chem. Eng. Res. Des. 2021, 174, 414–441. [Google Scholar] [CrossRef]
- Bomfim, T.S. Evolution of machine learning in smart grids. In Proceedings of the 2020 IEEE 8th International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, Canada, 12–14 August 2020; pp. 82–87. [Google Scholar]
- Azad, S.; Sabrina, F.; Wasimi, S. Transformation of smart grid using machine learning. In Proceedings of the 2019 29th Australasian Universities Power Engineering Conference (AUPEC), Nadi, Fiji, 26–29 November 2019; pp. 1–6. [Google Scholar]
- Mahmood, K.; Chaudhry, S.A.; Naqvi, H.; Kumari, S.; Li, X.; Sangaiah, A.K. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Future Gener. Comput. Syst. 2018, 81, 557–565. [Google Scholar] [CrossRef]
- Sadhukhan, D.; Ray, S.; Obaidat, M.S.; Dasgupta, M. A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography. J. Syst. Archit. 2021, 114, 101938. [Google Scholar] [CrossRef]
- Kumar, A.; Vishnoi, P.; Shimi, S. Smart grid security with cryptographic chip integration. EAI Endorsed Trans. Energy Web 2019, 6, e6. [Google Scholar] [CrossRef]
- Kumar, N.; Mishra, V.M.; Kumar, A. Smart grid and nuclear power plant security by integrating cryptographic hardware chip. Nucl. Eng. Technol. 2021, 53, 3327–3334. [Google Scholar] [CrossRef]
- Kumar, A.; Abhishek, K.; Shah, K.; Namasudra, S.; Kadry, S. A novel elliptic curve cryptography-based system for smart grid communication. Int. J. Web Grid Serv. 2021, 17, 321–342. [Google Scholar] [CrossRef]
- Kumar, N.; Mishra, V.M.; Kumar, A. Smart Grid Security by Embedding S-Box Advanced Encryption Standard. Intell. Autom. Soft Comput. 2022, 34, 623. [Google Scholar] [CrossRef]
- Kumar, N.; Mishra, V.M.; Kumar, A. Smart Grid Security by Embedding Cryptography Hardware Chip. In Proceedings of the 2023 International Conference on Power, Instrumentation, Energy and Control (PIECON), Aligarh, India, 10–12 February 2023; pp. 1–6. [Google Scholar]
- Mishra, D.; Rana, S.; Goyal, C.; Singh, G. FOESG: Anonymous session key agreement protocol for fog assisted smart grid communication. Int. J. Ad Hoc Ubiquitous Comput. 2023, 42, 137–147. [Google Scholar] [CrossRef]
- Tanveer, M.; Alasmary, H. LACP-SG: Lightweight Authentication Protocol for Smart Grids. Sensors 2023, 23, 2309. [Google Scholar] [CrossRef]
- Park, S.; Li, X.; Liu, Y. Trust-Based Communities for Smart Grid Security and Privacy. In Proceedings of the Wireless Internet: 15th EAI International Conference, WiCON 2022, Virtual Event, 17 November 2022; Proceedings. Springer: Berlin/Heidelberg, Germany, 2023; pp. 28–43. [Google Scholar]
- Badar, H.M.S.; Mahmood, K.; Akram, W.; Ghaffar, Z.; Umar, M.; Das, A.K. Secure authentication protocol for home area network in smart grid-based smart cities. Comput. Electr. Eng. 2023, 108, 108721. [Google Scholar] [CrossRef]
- Wang, W.; Huang, H.; Zhang, L.; Su, C. Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer- Netw. Appl. 2021, 14, 2681–2693. [Google Scholar] [CrossRef]
- Liu, S.; Liu, Y.; Liu, W.; Zhang, Y. A certificateless multi-dimensional data aggregation scheme for smart grid. J. Syst. Archit. 2023, 140, 102890. [Google Scholar] [CrossRef]
- Sani, A.S.; Yuan, D.; Dong, Z.Y. SDAG: Blockchain-enabled model for secure data awareness in smart grids. In Proceedings of the 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 16–19 January 2023; pp. 1–5. [Google Scholar]
- Oberko, P.S.K.; Yao, T.; Xiong, H.; Kumari, S.; Kumar, S. Blockchain-Oriented Data Exchange Protocol With Traceability and Revocation for Smart Grid. J. Internet Technol. 2023, 24, 497–506. [Google Scholar]
- Bitirgen, K.; Filik, Ü.B. A hybrid deep learning model for discrimination of physical disturbance and cyber-attack detection in smart grid. Int. J. Crit. Infrastruct. Prot. 2023, 40, 100582. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O. Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions. Internet Things -Cyber-Phys. Syst. 2023, 3, 155–179. [Google Scholar] [CrossRef]
- Liu, X.; Nielsen, P.S. Regression-based online anomaly detection for smart grid data. arXiv 2016, arXiv:1606.05781. [Google Scholar] [CrossRef]
- Menon, D.M.; Radhika, N. Anomaly detection in smart grid traffic data for home area network. In Proceedings of the 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 18–19 March 2016; pp. 1–4. [Google Scholar]
- Karimipour, H.; Geris, S.; Dehghantanha, A.; Leung, H. Intelligent anomaly detection for large-scale smart grids. In Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada, 5–8 May 2019; pp. 1–4. [Google Scholar]
- El-Awadi, R.; Fernández-Vilas, A.; Redondo, R.P.D. Fog computing solution for distributed anomaly detection in smart grids. In Proceedings of the 2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Barcelona, Spain, 21–23 October 2019; pp. 348–353. [Google Scholar]
- Marino, D.L.; Wickramasinghe, C.S.; Amarasinghe, K.; Challa, H.; Richardson, P.; Jillepalli, A.A.; Johnson, B.K.; Rieger, C.; Manic, M. Cyber and physical anomaly detection in smart-grids. In Proceedings of the 2019 Resilience Week (RWS), San Antonio, TX, USA, 4–7 November 2019; Volume 1, pp. 187–193. [Google Scholar]
- Li, R.; Bhattacharjee, S.; Das, S.K.; Yamana, H. Look-Up Table based FHE System for Privacy Preserving Anomaly Detection in Smart Grids. In Proceedings of the 2022 IEEE International Conference on Smart Computing (SMARTCOMP), Helsinki, Finland, 20–24 June 2022; pp. 108–115. [Google Scholar]
- Abdelkhalek, M.; Ravikumar, G.; Govindarasu, M. Ml-based anomaly detection system for der communication in smart grid. In Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–28 April 2022; pp. 1–5. [Google Scholar]
- Takiddin, A.; Ismail, M.; Zafar, U.; Serpedin, E. Deep autoencoder-based anomaly detection of electricity theft cyberattacks in smart grids. IEEE Syst. J. 2022, 16, 4106–4117. [Google Scholar] [CrossRef]
- Nafees, M.N.; Saxena, N.; Burnap, P. Poster: Physics-Informed Augmentation for Contextual Anomaly Detection in Smart Grid. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 12 November 2022; pp. 3427–3429. [Google Scholar]
- Abdel-Basset, M.; Moustafa, N.; Hawash, H. Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semisupervised Approach. IEEE Trans. Ind. Inform. 2022, 19, 995–1005. [Google Scholar] [CrossRef]
- Siniosoglou, I.; Radoglou-Grammatikis, P.; Efstathopoulos, G.; Fouliras, P.; Sarigiannidis, P. A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1137–1151. [Google Scholar] [CrossRef]
- Aribisala, A.; Khan, M.S.; Husari, G. Feed-Forward Intrusion Detection and Classification on a Smart Grid Network. In Proceedings of the 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 26–29 January 2022; pp. 0099–0105. [Google Scholar]
- Jithish, J.; Alangot, B.; Mahalingam, N.; Yeo, K.S. Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach. IEEE Access 2023, 11, 7157–7179. [Google Scholar] [CrossRef]
- Stryczek, S.; Natkaniec, M. Internet Threat Detection in Smart Grids Based on Network Traffic Analysis Using LSTM, IF, and SVM. Energies 2023, 16, 329. [Google Scholar] [CrossRef]
- Laroussi, I.; Huan, L.; Xiusheng, Z. How will the internet of energy (IoE) revolutionize the electricity sector? A techno-economic review. Mater. Today Proc. 2023, 72, 3297–3311. [Google Scholar] [CrossRef]
- Ghiasi, M.; Wang, Z.; Mehrandezh, M.; Jalilian, S.; Ghadimi, N. Evolution of smart grids towards the Internet of energy: Concept and essential components for deep decarbonisation. IET Smart Grid 2023, 6, 86–102. [Google Scholar] [CrossRef]
- Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R.; Leung, H. A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids. IEEE Access 2019, 7, 80778–80788. [Google Scholar] [CrossRef]
- Dairi, A.; Harrou, F.; Bouyeddou, B.; Senouci, S.M.; Sun, Y. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids. In Power Systems Cybersecurity: Methods, Concepts, and Best Practices; Springer: Berlin/Heidelberg, Germany, 2023; pp. 265–295. [Google Scholar]
- Babar, M.; Tariq, M.U.; Jan, M.A. Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid. Sustain. Cities Soc. 2020, 62, 102370. [Google Scholar] [CrossRef]
- Narayanan, L.K.; Subbiah, P.; Muralidharan, R.R.A.; Baskaran, A.P.; Srinivasan, V.; Baskaran, A.P.; Victor, P.; Ramachandran, H. A survey on AI-and ML-based demand forecast analysis of power using IoT-based SCADA. In Smart Energy and Electric Power Systems; Elsevier: Amsterdam, The Netherlands, 2023; pp. 65–78. [Google Scholar]
- Ghanbari, M.; Kinsner, W. Detecting DDoS attacks using polyscale analysis and deep learning. In Research Anthology on Smart Grid and Microgrid Development; IGI Global: Hershey, PA, USA, 2022; pp. 1078–1096. [Google Scholar]
- Torres, G.; Shrestha, S.; Misra, S. iCAD: Information-Centric network Architecture for DDoS Protection in the Smart Grid. In Proceedings of the 2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Singapore, 25–28 October 2022; pp. 154–159. [Google Scholar]
- Merlino, J.C.; Asiri, M.; Saxena, N. Ddos cyber-incident detection in smart grids. Sustainability 2022, 14, 2730. [Google Scholar] [CrossRef]
- Ortega-Fernandez, I.; Liberati, F. A Review of Denial of Service Attack and Mitigation in the Smart Grid Using Reinforcement Learning. Energies 2023, 16, 635. [Google Scholar] [CrossRef]
- Albaseer, A.; Abdallah, M. Fine-tuned LSTM-Based Model for Efficient Honeypot-Based Network Intrusion Detection System in Smart Grid Networks. In Proceedings of the 2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Cairo, Egypt, 27–29 December 2022; pp. 1–6. [Google Scholar]
- Izzuddin, A.B.; Lim, C. Mapping Threats in Smart Grid System Using the MITRE ATT&CK ICS Framework. In Proceedings of the 2022 IEEE International Conference on Aerospace Electronics and Remote Sensing Technology (ICARES), Yogyakarta, Indonesia, 24–25 November 2022; pp. 1–7. [Google Scholar]
- Rashid, S.Z.U.; Haq, A.; Hasan, S.T.; Furhad, M.H.; Ahmed, M.; Ullah, A.B. Faking smart industry: Exploring cyber-threat landscape deploying cloud-based honeypot. Wirel. Netw. 2022, 30, 4527–4541. [Google Scholar] [CrossRef]
- Lygerou, I.; Srinivasa, S.; Vasilomanolakis, E.; Stergiopoulos, G.; Gritzalis, D. A decentralized honeypot for IoT Protocols based on Android devices. Int. J. Inf. Secur. 2022, 21, 1211–1222. [Google Scholar] [CrossRef]
- Albaseer, A.; Abdallah, M. Privacy-Preserving Honeypot-Based detector in smart grid networks: A new design for Quality-Assurance and fair incentives federated learning framework. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023; pp. 722–727. [Google Scholar]
- Auti, A.; Pagar, S.; Mishra, V.; Makwana, J.; Borade, S. HoneyTrack: An improved honeypot. In Proceedings of the 2023 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 18–19 February 2023; pp. 1–6. [Google Scholar]
- Abdulqadder, I.H.; Zou, D.; Aziz, I.T. The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G. Future Gener. Comput. Syst. 2023, 141, 339–354. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations. arXiv 2021, arXiv:2103.17028. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations. Internet Things 2022, 10, 100544. [Google Scholar] [CrossRef]
- Abdullah, H.I.M.; Mustaffa, M.Z.; Rahim, F.A.; Ibrahim, Z.A.; Yusoff, Y.; Yussof, S.; Bakar, A.A.; Ismail, R.; Ramli, R. Smart grid digital forensics investigation framework. In Proceedings of the 2020 8th International Conference on Information Technology and Multimedia (ICIMU), Selangor, Malaysia, 24–25 August 2020; pp. 200–205. [Google Scholar]
- Mohamed, N.; Al-Jaroodi, J.; Jawhar, I. Cyber–physical systems forensics: Today and tomorrow. J. Sens. Actuator Netw. 2020, 9, 37. [Google Scholar] [CrossRef]
- Bhattacharjee, S.; Thakur, A.; Silvestri, S.; Das, S.K. Statistical security incident forensics against data falsification in smart grid advanced metering infrastructure. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA, 22–24 March 2017; pp. 35–45. [Google Scholar]
- Parra, G.D.L.T.; Rad, P.; Choo, K.K.R. Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities. J. Netw. Comput. Appl. 2019, 135, 32–46. [Google Scholar] [CrossRef]
- International Organization for Standardization and International Electrotechnical Commission. ISO/IEC 27043:2015—Information Technology—Security Techniques—Incident Investigation Principles and Processes; ISO/IEC: Geneva, Switzerland, 2015. [Google Scholar]
- Sadineni, L.; Pilli, E.; Battula, R.B. A holistic forensic model for the internet of things. In Proceedings of the Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, 28–29 January 2019; Revised Selected Papers 15. Springer: Berlin/Heidelberg, Germany, 2019; pp. 3–18. [Google Scholar]
- Kotsiuba, I.; Skarga-Bandurova, I.; Giannakoulias, A.; Bulda, O. Basic forensic procedures for cyber crime investigation in smart grid networks. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4255–4264. [Google Scholar]
- Grammatikis, P.R.; Sarigiannidis, P.; Iturbe, E.; Rios, E.; Sarigiannidis, A.; Nikolis, O.; Ioannidis, D.; Machamint, V.; Tzifas, M.; Giannakoulias, A.; et al. Secure and private smart grid: The spear architecture. In Proceedings of the 2020 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020; pp. 450–456. [Google Scholar]
- Le, T.V.; Hsu, C.L.; Chen, W.X. A Hybrid Blockchain-Based Log Management Scheme With Nonrepudiation for Smart Grids. IEEE Trans. Ind. Inform. 2021, 18, 5771–5782. [Google Scholar] [CrossRef]
- Abdullah, H.I.M.; Ibrahim, Z.A.; Rahim, F.A.; Fadzil, H.S.; Nizam, S.A.S.; Mustaffa, M.Z. Digital Forensics Investigation Procedures of Smart Grid Environment. Int. J. Comput. Digit. Syst. 2021, 11, 1071–1082. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. A Survey on Ethical Hacking: Issues and Challenges. arXiv 2021, arXiv:2103.15072. [Google Scholar] [CrossRef]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Ethical hacking for IoT: Security issues, challenges, solutions and recommendations. Internet Things-Cyber-Phys. Syst. 2023, 3, 280–308. [Google Scholar] [CrossRef]
- Yardley, T.; Berthier, R.; Nicol, D.; Sanders, W.H. Smart grid protocol testing through cyber-physical testbeds. In Proceedings of the 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 15–17 April 2013; pp. 1–6. [Google Scholar]
- Weerathunga, P.E.; Cioraca, A. The importance of testing Smart Grid IEDs against security vulnerabilities. In Proceedings of the 2016 69th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 4–7 April 2016; pp. 1–21. [Google Scholar]
- Oyewumi, I.A.; Jillepalli, A.A.; Richardson, P.; Ashrafuzzaman, M.; Johnson, B.K.; Chakhchoukh, Y.; Haney, M.A.; Sheldon, F.T.; de Leon, D.C. Isaac: The idaho cps smart grid cybersecurity testbed. In Proceedings of the 2019 IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA, 7–8 February 2019; pp. 1–6. [Google Scholar]
- Konstantinou, C.; Maniatakos, M. Hardware-layer intelligence collection for smart grid embedded systems. J. Hardw. Syst. Secur. 2019, 3, 132–146. [Google Scholar] [CrossRef]
- Hashimoto, J.; Ustun, T.S.; Suzuki, M.; Sugahara, S.; Hasegawa, M.; Otani, K. Advanced grid integration test platform for increased distributed renewable energy penetration in smart grids. IEEE Access 2021, 9, 34040–34053. [Google Scholar] [CrossRef]
- Heiding, F.; Süren, E.; Olegård, J.; Lagerström, R. Penetration testing of connected households. Comput. Secur. 2023, 126, 103067. [Google Scholar] [CrossRef]
- Zhang, C.; Kuppannagari, S.R.; Kannan, R.; Prasanna, V.K. Generative adversarial network for synthetic time series data generation in smart grids. In Proceedings of the 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Aalborg, Denmark, 29–31 October 2018; pp. 1–6. [Google Scholar]
- Desai, S.; Sabar, N.; Alhadad, R.; Mahmood, A.; Chilamkurti, N. Mitigating consumer privacy breach in smart grid using obfuscation-based generative adversarial network. Math. Biosci. Eng. 2022, 19, 3350–3368. [Google Scholar] [CrossRef]
- Himthani, V.; Prakash, V. Generative adversarial network-based deep learning technique for smart grid data security. In Artificial Intelligence and Machine Learning in Smart City Planning; Elsevier: Amsterdam, The Netherlands, 2023; pp. 303–315. [Google Scholar]
- Ezgi, A. Generative AI in Electricity Distribution: A Qualitative Exploration. Press. Procedia 2023, 17, 208–211. [Google Scholar]
- Munir, M.S.; Proddatoori, S.; Muralidhara, M.; Saad, W.; Han, Z.; Shetty, S. A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid. arXiv 2024, arXiv:2403.06388. [Google Scholar] [CrossRef]
- Shahzad, K.; Iqbal, S.; Fraz, M.M. Automated Solution Development for Smart Grids: Tapping the Power of Large Language Models. In Proceedings of the 2023 17th International Conference on Engineering of Modern Electric Systems (EMES), Oradea, Romania, 9–10 June 2023; pp. 1–4. [Google Scholar]
- Zaboli, A.; Choi, S.L.; Song, T.J.; Hong, J. ChatGPT and other Large Language Models for Cybersecurity of Smart Grid Applications. arXiv 2023, arXiv:2311.05462. [Google Scholar]
- King, E.; Yu, H.; Lee, S.; Julien, C. Sasha: Creative goal-oriented reasoning in smart homes with large language models. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2024, 8, 1–38. [Google Scholar] [CrossRef]
- Dong, L.; Majumder, S.; Doudi, F.; Cai, Y.; Tian, C.; Kalathi, D.; Ding, K.; Thatte, A.A.; Xie, L. Exploring the Capabilities and Limitations of Large Language Models in the Electric Energy Sector. arXiv 2024, arXiv:2403.09125. [Google Scholar] [CrossRef]
- Ruan, J.; Liang, G.; Zhao, H.; Liu, G.; Sun, X.; Qiu, J.; Xu, Z.; Wen, F.; Dong, Z.Y. Applying Large Language Models to Power Systems: Potential Security Threats. IEEE Trans. Smart Grid 2024, 15, 3333–3336. [Google Scholar] [CrossRef]
- Yoon, Y.H. Safety Analysis of Smart Grid Lines According to DC Arc Generation. J. Electr. Eng. Technol. 2023, 18, 697–703. [Google Scholar] [CrossRef]
- MacDermott, A.; Baker, T.; Shi, Q. Iot forensics: Challenges for the ioa era. In Proceedings of the 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018; pp. 1–5. [Google Scholar]
- Heluany, J.B.; Galvão, R. IEC 62443 Standard for Hydro Power Plants. Energies 2023, 16, 1452. [Google Scholar] [CrossRef]
- Vahidi, S.; Ghafouri, M.; Au, M.; Kassouf, M.; Mohammadi, A.; Debbabi, M. Security of Wide-Area Monitoring, Protection, and Control (WAMPAC) Systems of the Smart Grid: A Survey on Challenges and Opportunities. IEEE Commun. Surv. Tutor. 2023. [Google Scholar] [CrossRef]
- Noura, H.; Salman, O.; Couturier, R.; Chehab, A. LESCA: LightwEight Stream Cipher Algorithm for emerging systems. Ad Hoc Netw. 2023, 138, 102999. [Google Scholar] [CrossRef]
- Noura, H.N.; Salman, O.; Couturier, R.; Chehab, A. A Single-Pass and One-Round Message Authentication Encryption for Limited IoT Devices. IEEE Internet Things J. 2022, 9, 17885–17900. [Google Scholar] [CrossRef]
- Noura, H.N.; Salman, O.; Couturier, R.; Chehab, A. LoRCA: Lightweight round block and stream cipher algorithms for IoV systems. Veh. Commun. 2022, 34, 100416. [Google Scholar] [CrossRef]
- Noura, H.N.; Melki, R.; Chehab, A. Secure and lightweight mutual multi-factor authentication for IoT communication systems. In Proceedings of the 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), Honolulu, HI, USA, 22–25 September 2019; pp. 1–7. [Google Scholar]
- Melki, R.; Noura, H.N.; Chehab, A. Lightweight multi-factor mutual authentication protocol for IoT devices. Int. J. Inf. Secur. 2020, 19, 679–694. [Google Scholar] [CrossRef]
Aspect | Integration of IoT | Impact |
---|---|---|
Smart Meters | Real-time measurement of electricity usage | Detailed consumption data, better energy management, and billing accuracy |
Sensors and Actuators | Monitoring voltage, current, and temperature | Real-time grid monitoring and control, enhanced reliability, and prevention of failures |
AMI | Two-way communication between utilities and consumers | Facilitates demand response, dynamic pricing, and improved data management |
Grid Automation | Controlling switches, transformers, and other equipment | Improved fault detection, isolation, restoration, minimized downtime, and enhanced grid resilience |
DERs Management | Integration and management of solar panels, wind turbines, and batteries | Better coordination and optimization of renewable energy sources and reduced reliance on fossil fuels |
Predictive Maintenance | Collecting data on grid component conditions | Reduced maintenance costs, prevention of unexpected failures, and ensured continuous power supply |
Efficiency | Real-time monitoring and control | More efficient energy distribution and consumption, optimized grid operations, and reduced energy losses |
Reliability and Resilience | Quick detection and response to faults | Improved grid reliability and reduced outage duration and impact |
Renewable Integration | Management of renewable energy variability | Seamless integration of renewable sources and stable grid operations |
Cost Savings | Optimization of energy use and predictive maintenance | Reduced operational costs for utilities and lower energy bills for consumers |
Consumer Engagement | Access to detailed usage data and participation in demand response | Informed consumer decisions and contribution to grid stability |
Sustainability | Support for green energy sources and promotion of energy efficiency | Reduced greenhouse gas emissions and a more sustainable energy future |
Enhancement | Description |
---|---|
Effective Energy Management (EEM) | Achieves more effective energy supply and demand, smart grid energy storage systems, and more efficient grid management by gathering and evaluating vast amounts of data on energy use and grid performance. Utilizes DERs, Demand Response (DR) technologies, such as Smart Meters (SM), and Energy Management Systems (EMSs) to optimize energy usage and minimize waste. Expected to be replaced by Intelligent Energy Management (IEM) using machine learning and data analytics. |
Enhanced Asset Management | Efficiently manages and monitors grid assets to lower maintenance and repair costs while enabling users to track their energy use in real time and make intelligent decisions about energy consumption. Controls energy demand response to minimize grid burden and reduce operational costs. |
Enhanced Reliability | Utilizes modern monitoring and control systems to accurately detect and respond to disruptions, effectively identifying and isolating faults with minimal delays. |
More Energy Efficiency | Enhances energy distribution management through real-time monitoring and analysis of energy consumption, enabling demand response programs and integration of renewable energy sources. |
Efficient Renewable Energy Integration | Monitors and manages energy resource distribution to avoid waste and adopt an eco-friendly approach, enhancing renewable energy forecasting and improving energy supply and demand management. |
Improved Grid Planning | Utilizes advanced sensors and data analysis tools to optimize grid planning and maintenance, enhancing resiliency, flexibility, and efficiency at a reduced cost. |
Enhanced Safety and Security | Strengthens resilience against cyber and physical attacks, enabling rapid power restoration and improved grid resilience through self-healing and fault detection capabilities. |
Enhanced EV Integration | Integrates EVs and provides charging infrastructure and smart charging management. |
Modernized Technologies | Upgrades smart grid infrastructure with new capacitors, programmable logical controllers, transformers, transmission lines, substations, and equipment, improving planning, implementation, and design. |
Real-Time Detection and Isolation | Monitors grid conditions, faults, and outages in real time, quickly isolating them to enable fast power restoration. Relies on IoT devices and sensors for data collection. |
Improved Network Performance | Monitors network traffic in real time to detect and mitigate cyber–physical threats, optimizing network operations and performance securely. |
Improved Energy Distribution | Relies on micro-grids and virtual power plants to provide a reliable energy supply independently of the primary grid, utilizing DERs to act as a single, coordinated energy source. |
Communication | Type/Technology | Description |
---|---|---|
Types | Home Area Network (HAN) | Uses wired (Ethernet) or wireless (Bluetooth, Zigbee, 802.11) technologies to link household appliances to smart meters to detect energy usage and transmit the data to the server [22]. |
Neighborhood Area Network (NAN) | Links Intelligent Electronic Devices (IEDs), smart meters, and other distribution automation devices to WAN gateways, collectors, and field devices to gather user data and facilitate WAN-premise communication area [22]. | |
Wide Area Network (WAN) | Employs fiber optics, 3G, LTE, WiMAX, or GSM to facilitate communication via HAN [23] between a smart meter, suppliers, and the utility server. | |
LoRaWAN | A low-power, long-range wireless platform that supports energy management, smart grid infrastructure efficiency, and disaster prevention [24]. | |
Technologies | Power Line Communication (PLC) | Uses existing power distribution infrastructure to transmit data signals over the power lines. |
Wireless Communication | Used for data transmission in smart grids without physical connections. | |
Fiber Optic Communication | FO cables provide high-speed data transmission for long-distance communication in smart grids, with high bandwidth, resilience to electromagnetic interference, and low latency. | |
Radio Frequency Communication (RFC) | Uses radio waves for data transmissions using short-range communication between devices within a localized area. | |
Broadband over Power Line (BPL) | Offers high-speed data communication over existing power lines, improving communication between systems and smart grid devices. | |
Mesh Networking | Allows efficient and reliable communication within a localized area, forming a self-configuring and resilient network. | |
Satellite Communication (SatComs) | Provides connectivity for data transmission, allowing smart grid devices in remote areas to communicate with the central grid management system. | |
Ethernet Communication | Used in Local Area Networks (LANs) to provide high-speed and reliable data transmission over wired connections. | |
Narrowband Communication | Uses narrow frequency bands for data transmission using low-power, low-data-rate applications. |
Type | Description | Characteristics | Link to Smart Grid | Use Cases | Advantages | Limitations | Challenges | Mitigation |
---|---|---|---|---|---|---|---|---|
Edge Computing | Local data processing at or near smart grid endpoints | Low latency, decentralized, real-time response | Enhances local anomaly detection, reduces reliance on central systems | Fault isolation at substations, real-time load balancing | Reduced latency, bandwidth savings, improved resilience | Limited processing power, distributed complexity | Data synchronization, firmware attacks | Secure boot, local authentication, OTA updates |
Fog Computing | Intermediate data processing between edge and cloud | Distributed, regional aggregation, near-real-time | Supports collaborative detection and coordinated regional responses | Regional anomaly aggregation, predictive load analytics | Balances speed and computation, scalable architecture | Latency higher than edge, still dependent on network health | Resource allocation, trust management | Encrypted channels, role-based access controls |
SDN | Programmable network control separated from hardware | Centralized control, dynamic configuration, flexible routing | Quick re-routing in case of attacks, centralized monitoring | DDoS containment, segmented network zones | Fine-grained control, better visibility | Single point of failure risk | Controller security, interoperation with legacy systems | Redundant controllers, secure APIs |
NFV | Virtualization of network services like firewalls or IDS | Hardware decoupled, scalable, cloud-native | On-demand deployment of security services | Dynamic firewall placement, remote IDS deployment | Cost-effective, flexible security functions | Performance can vary under load | Resource contention, function chaining complexity | Quality of Service (QoS) policies, function isolation |
Digital Twin | Real-time virtual model of physical grid components | Real-time mirroring, predictive simulation | Allows testing of attack scenarios and impact analysis | Predictive maintenance, training simulations | Insightful monitoring, fault prediction | Requires continuous data flow, high setup complexity | Model accuracy, synchronization | Regular validation, AI-assisted modeling |
Limitation | Description |
---|---|
Financial Issues | May prove to be a constant limitation, especially since the cost of implementing a smart grid system and maintaining its infrastructure can be high, and without the proper funding and sponsorship, some facilities, utilities, plans, and projects may be delayed or canceled due to lack of investments. |
Maintenance Issues | Smart grid systems require constant maintenance and scheduled inspection to maintain the effectiveness of their operations. However, this proves to be a problem, especially in modernizing them due to aging equipment that causes constant equipment failure. |
Communication Bottleneck | Given how much smart grid technologies depend on communication networks to constantly transmit data and control electricity flow in a real-time manner, this already creates a burden that may affect the network performance and cause a communication bottleneck. Also, any disruptions will indeed cause a significant problem and result in the disruption and interruption of smart grid services. |
Integration Issues | Due to the varied, complicated structure of smart grid systems and IoT devices, which rely on different requirements to deploy and integrate them, this is a challenging limitation. |
Manpower | With the rise of machinery and reduced human labor, stakeholders may hesitate to adopt smart grid technologies due to concerns about job losses and salaries. |
Energy Storage | May prove to be a problem due to the cost and technical limitations surrounding the energy storage capacities to manage intermittent renewable energy sources. |
Cultural Barriers | May cause some communities not to adopt smart grid technologies due to safety, security, and privacy concerns, especially without reassurance and education. |
Complexity of System and Data Management | Managing and maintaining a smart grid system with numerous interconnected components can be complex and resource-intensive. In addition, the smart grid generates vast amounts of data that require efficient storage, processing, and analysis, posing challenges in data management and analytics. |
Reliability of Communication Networks | The performance of the smart grid heavily relies on the reliability of communication networks, which can be susceptible to failures and disruptions. |
Security Concerns | Smart grids are susceptible to cyberattacks, data breaches, and other security threats, necessitating robust security measures to protect the grid infrastructure. |
Threat Type | Description |
---|---|
Cyber Threat | Unauthorized digital access, such as malware and DDoS attacks |
Insider Threats | Misuse of legitimate access by internal personnel |
Physical Threats | Destruction or tampering of physical infrastructure |
Privacy Threats | Data exposure through surveillance or data leakage |
Infrastructure Hazards | Equipment or environmental risks causing operational failure |
Human Errors | Mistakes due to poor training or fatigue. |
Threat Classification | Type | Description | Enhancements |
---|---|---|---|
Security-based | Cyber Threats | Targets the communication networks, data storage, and control systems often used to manage the grid, often resulting in power outages and blackouts | Secure communication, encryption, or privacy-preserving |
Physical Threats | Damages, alters, or destroys the infrastructure of smart grids including sensors, smart meters, communication equipment | Tamper-resistant devices with access control and security guidelines | |
Malware Threat | Forms many virus types, including Trojans and worms that infect smart grid devices and lead them to malfunction | Anti-malware and anti-virus | |
Insider Threat | Exploits these privileges or non-malicious users accidentally/mistakenly use them | Accountability, access control, and limited privileges | |
Privacy Threats | Leads sensitive information about electricity consumption patterns to be possibly leaked or intercepted | Privacy-preserving, anonymity, and encryption | |
DoS Threat | Overwhelms the smart grid network with traffic or requests, causing the system to crash | DDoS detection, intrusion detection systems, firewalls, and honeypots | |
Security-based | Advanced Persistent Threats | Has sophisticated zero-day nature that would disrupt critical systems | Updating systems/operating systems software batches and security measures up to date |
Supply Chain Threats | Compromises its components where a malicious code can be injected into the smart grid network, halting its operational service | Incident response training, incident response planning | |
Social Engineering Threats | The objective is to manipulate employees to divulge sensitive information or exploit their access privileges to compromise the smart grid’s security | Non-disclosure agreements, accountability and training, contracts and agreements, secure communications | |
Safety-based | Power Outages | Affects the smart grid’s critical infrastructure that relies on electricity as a functioning source | Backup plans/devices and incident response groups |
Infrastructure Hazards | Negatively impacts public safety and health | Adoption of international safety guidelines | |
Cyberattacks | Causes a safety threat as the operations of smart grids can be halted and disrupted, resulting in power outages | Cryptography, intrusion detection, anti-malware, firewalls, and honeypots | |
Human Mistakes | Impacts the safety of the smart grid, such as fatigue, dissatisfaction, lack of experience, and training | Awareness training, constant user training and education, Standard Operating Procedures | |
Machine Error(s) | Occurs due to technical malfunctions, software bugs, glitches, hardware failures, sensor or measurement errors, equipment failures, or communication issues | User-friendly interfaces, safety by design, and regular system maintenance |
Vulnerability Classification | Type | Description | Enhancements |
---|---|---|---|
Security-based | Weak Authentication and Access Controls | Weak or outdated mechanisms for access control and authentication, leaving them prone to various attacks | Access controls, biometric measures, and multi-factor authentication |
Weak Encryption | Poor encryption or no encryption at all, leaving communication channels and networks open, exposing data | Advanced symmetric encryption techniques enforced by machine learning algorithms | |
Software Vulnerabilities | Attackers can exploit security gaps and gain unauthorized access, exploit misconfiguration, execute malicious code, and inject malicious data | Constant updates and ethical hacking (pen testing) | |
Supply Chain Vulnerabilities | Can disrupt the flow of data and services, which can affect the power outage and result in a blackout | Regulatory compliance, secure communication, cyber–physical security measures, and risk assessment | |
Equipment and System Vulnerabilities | Flaws in the technological infrastructure, software, or hardware/device components to compromise the smart grid | Response strategies, regulatory compliance, and security awareness training | |
Security-based | Physical Security Vulnerabilities | Weaknesses with the physical infrastructure and assets, including non-secure and weakly surveyed substations, leading to them being breached | Fences, gates, surveillance cameras, intrusion detection systems, security facilities, and equipment protection |
DER Vulnerabilities | Lack of communication standardization can result in several exploitable protocols and standards, making them vulnerable to virus attacks | Strong authentication and encryption protocols, regular security checking and risk assessments | |
Operators’ Vulnerabilities | Can occur intentionally as a result of an insider threat to cause sabotage or espionage acts or unintentionally | Background checks, regular employee training, monitoring users, and enforcing accountability | |
Cloud-based Vulnerabilities | Raises data privacy and security concerns since it includes customer information, energy consumption patterns, grid operation data | Encryption, access controls, and secure communication protocols | |
Safety-based | Equipment Failure | Equipment breakdown or degradation of operations and services often caused by the malfunction of different smart grid parts | Proactive measures such as redundancy and backup systems, condition-monitoring techniques, regular and scheduled inspections, maintenance, and equipment testing |
Communication Failures | Communication disruption or interruption of smart grid’s communication channels and protocols for data transmission and receiving | Strong encryption and authentication (multi-factor) protocols, redundant communication paths, fault-tolerant systems, and backup or alternative communication channels | |
Natural Disasters | Often related to severe weather conditions as a result of severe weather conditions such as extreme temperatures, heatwaves, ice storms, sand/desert storms, and high winds, or catastrophic events | Enhanced monitoring and early-warning systems, advanced equipment design and construction, proactive maintenance and vegetation management |
Category | Attack Type | Description |
---|---|---|
Visibility | Covert, Overt | Attacks that are either stealthy or openly visible |
Activity | Passive, Active | Passive (e.g., eavesdropping) or active (e.g., data injection) |
Coordination | Simultaneous, Separate | Coordinated multi-vector or isolated events |
Sophistication | Advanced Persistent Threat, Zero-day | Highly advanced attacks exploiting unknown vulnerabilities |
Category | Attack Type | Description | Characteristics | Threats | Vulnerability | Impact Area | Countermeasures | Origin (Act of) |
---|---|---|---|---|---|---|---|---|
Visibility | Covert | Hidden, stealthy intrusion aimed at unauthorized data access or manipulation | Stealthy, persistent | Espionage, APT | Weak monitoring, unlogged access | Data privacy, integrity | Anomaly detection, behavioral analytics | Espionage, sabotage |
Overt | Openly launched attacks like DDoS or defacement | Obvious, aggressive | DoS, cybercrime | Public-facing systems | Availability, visibility | Firewalls, rate limiting, DoS filtering | Cybercriminal activity, protest (hacktivism) | |
Activity | Passive | Eavesdropping without modifying data or systems | Non-disruptive | Surveillance, sniffing | Unencrypted channels | Privacy, confidentiality | Encryption, secure protocols | Espionage |
Active | Direct data alteration or disruption | Intrusive, malicious | Tampering, spoofing | Insecure authentication | Integrity, availability | IDS/IPS, access control | Sabotage, cybercrime | |
Coordination | Simultaneous | Coordinated multi-vector attacks on multiple targets | High-impact, synchronized | Cyberwarfare, terrorism | System interdependence | Multiple critical services | Segmentation, redundancy, early-warning systems | Terrorism, military operations |
Separate | Isolated and independent attack events | Localized, targeted | Opportunistic attacks | Isolated endpoints | Specific devices/subsystems | Endpoint hardening, device-specific monitoring | Cybercriminal or insider threat | |
Sophistication | Zero-Day | Exploits unknown vulnerabilities to evade detection | Undetected, rapid | Zero-day malware | Software/firmware flaws | Control systems, data layer | Threat intelligence, patch management | Espionage, military-grade hacking |
APT | Long-term, targeted attacks via multiple vectors | Persistent, stealthy, complex | Espionage, data theft, sabotage | Weak access control, poor segmentation | Strategic infrastructure | Multi-layered defense, threat hunting, incident response | Espionage, state-sponsored military operations |
Category | Attack Type | Description | Countermeasures |
---|---|---|---|
Integrity | False Data Injection Attacks (FDIA) | Alter the packet content to disrupt services by injecting false data. | Data-driven learning-based algorithm with reconfigurable Euclidean detectors [173]; mathematical model framing the original sinusoidal signal from the evaluator state variable [174]; strategic honeypot game model with reconfigurable Euclidean detectors [175]; machine-learning-based solutions including attention-aware deep reinforcement learning [176], pre-deployment PMU greedy algorithm [177] |
Meter Manipulation and Theft Attacks | Illegal tampering of smart meter hardware/software to retrieve data or steal electricity. | CNN-LSTM model for data classification [178]; robust data-driven detection of electricity theft adversarial evasion attacks [179] | |
Time Synchronization Attacks (TSA) | Tampering with time offsets to desynchronize work schedules. | Fast pre-keying-based integrity protection for smart grid communications [180]; novel hardware-assisted authentication scheme [181] | |
Authentication | Spoofing Attacks | Eavesdropping and falsifying data to impersonate trusted senders. | Use of Routing Protocol for Low Power and Lossy (RPL) Networks [182]; cross-layer detection mechanism with GPS carrier-to-noise ratio (C/No)-based spoofing detection [183] |
Session Key Exposure Attacks | Interception of session key generation to find authentic key values. | Lightweight conditional privacy-preserving authentication and key-agreement protocol [184]; certificate-based access control in smart grid edge computing infrastructure [185]; secure demand response management authentication scheme [186] | |
Sybil Attacks | Use of multiple fake identities to gain control in peer-to-peer networks. | Decentralized countermeasure against Sybil attack in RPL-based IoT networks [187]; Sybil attack detection scheme with optimized support vector machines and received signal strength [188] | |
Availability | (Distributed) Denial of Service (DoS/DDoS) Attacks | Overload of network traffic causing service disruptions. | Privacy-preserving traffic signaling protocol [189]; Functional Mock-up Interface (FMI)-compatible co-simulation platform [190] |
TCP-SYN Flooding Attacks | Flooding the system with SYN requests, leaving communication ports half-open. | Protocol-dependent detection and classification system [191]; machine-learning-enabled TCP-SYN flood detection framework using Openflow port statistics [192]; lightweight and practical mitigation mechanism for Software-Defined Networking (SDN) architecture [193] | |
Jamming Attacks | Flooding wireless protocols with noise to disrupt communication. | Mobile jammer localization technique “JamCatcher” [194]; Channel hopping, MIMO-based jamming mitigation techniques, MAC layer strategies like rate adaptation and power control mechanisms, and channel coding techniques like FHSS and DSSS [195] | |
Amplification Attacks | Use of UDP protocols and spoofed IPs to overwhelm networks or exhaust resources. | MD5-hash-algorithm-based socket program for encryption and decryption of vital smart grid data [196]; Software-Defined Networking (SDN) environment and lightweight Tsallis-entropy-based protection methods [197] | |
Privacy | Sniffing Attacks | Intercepting communication lines to retrieve valuable data. | One-Time Password (OTP) and OTP-based authentication approaches [198] |
Eavesdropping Attacks | Passive interception to discover sensitive information. | Privacy-enhanced authentication technique for smart grid infrastructure [199]; low-power Wireless Sensor Network (WSN) attack detection and isolation approach [200] | |
Homograph Attacks | Use of visually similar characters to deceive users into accessing malicious domains. | Domain fluxing using Domain Generation Algorithms (DGAs) [201]; cryptocurrency wallet with comprehensive on-chain solution for aliasing accounts and tokens [202]; blockchain-based methodology for threat detection [203]; enhanced cloud storage encryption standard [204] |
Attack | Target | Security Goals | Security Measures | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Type | Class | Hardware | Software | Confidentiality | Integrity | Availability | Authentication | Authorization | Privacy | Detection | Prevention |
False Data Injection | Modification | Yes | Yes | √ | √ | √ | X | X | √ | Data-driven learning-based algorithm [173], reconfigurable Euclidean detectors [174], strategic honeypot game model [175] | Attention-aware deep reinforcement learning [176], pre-deployment Phase Measurement Units (PMUs) [177] |
Spoofing | Interception | Yes | Yes | √ | √ | √ | X | √ | X | Cross-layer detection mechanism [183] | Routing Protocol for Low Power and Lossy (RPL) Networks [182] |
Sniffing | Interception | No | Yes | √ | √ | √ | √ | X | √ | Intrusion Detection | Access Control, One-Time Password (OTP) [198] |
Meter Manipulation and Theft | Tampering | Yes | Yes | √ | √ | √ | √ | √ | √ | Robust data-driven detection [179] | CNN-based LSTM model [178] for detection and hardware-based tamper detection [205], secure firmware and boot mechanisms [206], real-time consumption monitoring [207], and audit trails and logging [208] for mitigation |
Session Key Exposure | Interception/ Manipulation | No | Yes | √ | √ | X | √ | √ | √ | Access Control, Intrusion Detection | Lightweight conditional privacy-preserving authentication and the key-agreement protocol [184], certificate-based access control [185], secure demand response management authentication scheme [186] |
Time Synchronization | Tampering | Yes | Yes | √ | √ | √ | √ | √ | √ | Intrusion Detection, Time Stamps | Fast prekeying-based integrity protection [180], novel hardware-assisted authentication scheme [181] |
DDoS | Overloading | No | Yes | X | X | √ | X | X | X | Anomaly Detection, compromise propagation model [209], hybrid deep learning algorithm [210] | Privacy-preserving traffic signaling protocol [189], Functional Mock-up Interface (FMI)-compatible co-simulation platform [190] |
TCP-SYN Flooding | Flooding | No | Yes | X | X | √ | X | X | X | Protocol-dependent detection and classification system [191], machine learning (ML)-enabled TCP-SYN flood detection framework [192] | Lightweight and practical mitigation mechanism [193] |
Jamming | Interruption | Yes | Yes | X | X | √ | X | X | X | “JamCatcher” [194] | MIMO-based techniques, rate adaptation and power control mechanisms, FHSS, DSSS [195] |
Eavesdropping | Impersonation | Yes | Yes | √ | X | X | X | X | √ | Low-power Wireless Sensor Network (WSN) attack detection and isolation mechanism [200] | Privacy-enhanced authentication scheme [199] |
Homograph | Deception | No | Yes | √ | √ | X | √ | √ | √ | Blockchain-based methodology for threat detection [203] | Domain Generation Algorithms (DGAs) [201], enhanced cloud storage encryption standard [204] |
Amplification | Disruption | No | Yes | X | X | √ | √ | X | X | Software-Defined-Networking-based DDoS Protection System [197] | MIAMI-DIL [211], anomaly detection algorithm [211] |
Sybil | Disruption | No | Yes | X | X | √ | √ | X | X | Sybil attack detection scheme [188] | RPL-based IoT networks [187] |
Category | Risk Type | Description |
---|---|---|
Safety-based | Data Exposure | Exposure of collected and analyzed data without proper privacy and security measures, revealing sensitive information about energy consumption patterns, user behaviors, and unauthorized access. |
Information Transmission | Disruption, delay, or denial of data transmission between sensors, smart meters, and control systems, causing potential health and safety hazards. | |
Communication Emission Levels | Concerns about electromagnetic radiation emitted by smart grid communication, requiring further testing to comply with safety standards. | |
System Downtime | Prolonged downtime causing significant inconvenience, impacting critical infrastructure such as hospitals and emergency services. | |
Infrastructure Damage | Physical damage to substations, transformers, control centers, transmission lines, and electric grids due to natural disasters, aging equipment, or terror attacks. | |
QoS | Issues like voltage fluctuations, harmonic distortions, or voltage sags causing equipment damage or safety hazards. | |
Legal and Regulatory Issues | Differing regulations between countries, with gaps in safety standards, data privacy, and accountability. | |
Energy Theft and Fraud | Exploitation of data collection and billing mechanisms for energy theft and fraudulent activities, requiring robust security measures. | |
Grid Congestion and Overload | Increased energy load causing operational inefficiencies and potential equipment failures. | |
Security-based | Smart Grid Technologies | Involvement of supply chains in development, deployment, and maintenance introduces risks like hardware tampering, software exploits, and service disruptions. |
Malware Hacks | Vulnerability to malware attacks (e.g., Stuxnet, BlackEnergy) disrupting smart grid operations as part of espionage or sabotage acts. | |
Insiders | Insider threats exploiting privileged access to sensitive information and systems, leading to abuse, exploitation, and data extraction. | |
Lack of Security Standards | Introduction of security vulnerabilities in the infrastructure, making risk assessment and mitigation difficult. | |
Remote and Unauthorized Access | Cyberattacks gaining unauthorized access through social engineering and phishing, leading to data manipulation and theft. | |
Authentication and Authorization Risks | Inadequate enforcement compromising communication networks and devices, allowing unauthorized access to the grid and sensitive information. | |
Lack of Security Updates and Patch Management | Failure to apply updates and patches in a timely manner, leading to software exploitation, data breaches, and unauthorized access. |
Risk Management Activity | Description |
---|---|
Asset Identification | Involves identifying and keeping track of important assets interconnected to the smart grid infrastructure, including power generation facilities, transmission lines, substations, control systems, and communication networks. |
Threat Identification | Involves locating and evaluating possible risks and dangers that could affect the smart grid, including cyber–physical attacks, natural disasters, equipment malfunctions, or human errors. |
Vulnerability Assessment | Assesses vulnerabilities, weaknesses, and security gaps within the smart grid infrastructure, such as communication networks, access controls, software, and hardware components. |
Risk Analysis | Involves identifying and analyzing threats and vulnerabilities to evaluate the risk level, considering the likelihood of an event and its potential impact on smart grid operations, availability, security, safety, and reliability. |
Risk Evaluation | Prioritizes identified risks based on severity, likelihood, and impact to identify the most critical risks for mitigation with available resources. |
Risk Mitigation | Involves deploying security and safety strategies to mitigate identified risks, applying technical controls, operational practices, and organizational measures such as cyber–physical security measures, contingency plans, incident response, training, policies, and procedures. |
Constant Risk Monitoring | Monitors and reviews the effectiveness of risk mitigation measures to maintain risk levels within acceptable margins, identifies future potential risks, and recommends new mitigation plans involving utility operators, cybersecurity experts, and engineers for proper assessment and monitoring. |
Risk Evaluation Step | Description |
---|---|
Risks Identification | Compilation of identified risks from the risk assessment process, including cyber–physical threats, accidents (human errors, equipment failure), and natural disasters. |
Likelihood Assessment | Evaluation of the probability of each risk’s occurrence based on historical data analysis, expert judgment (pen testing), and (cyber) threat intelligence. Qualitative or quantitative risk assessments are assigned accordingly. |
Impact Assessment | Analysis of potential consequences following the risk’s impact on smart grid infrastructure, including operations, communications, availability, safety, security, privacy, reputation, customer feedback, and financial losses. Qualitative or quantitative ratings are assigned accordingly. |
Risk Calculation and Prioritization | Calculation of the severity level of each risk by combining its likelihood and impact to determine its significance. Prioritization is based on quantitative mathematical formulas or qualitative information analysis. |
Decision-Making | Adoption of risk treatment strategies based on prioritization, determining if each risk should be accepted, avoided, or mitigated using appropriate security and safety measures in a cost-effective, robust, and feasible manner. |
Risk Documentation | Documentation of results, including risks’ severity, occurrences, impacts, and risk treatment decisions based on lessons learned. |
Risk Mitigation Measure | Description |
---|---|
Security Measures | Involving both physical and cyber-security measures, such as access control systems, firewalls, intrusion detection/prevention systems, advanced encryption, honeypots, multi-factor authentication, anti-virus software, tamper-resistant devices, backup servers, advanced surveillance, and access privileges to safeguard vital smart grid infrastructure against physical and cyberattacks and to monitor for unusual or suspicious activity in system operations and network traffic. |
Constant Updates | Regularly updating batch and patch software and firmware to address known and newly discovered vulnerabilities. This can be done by relying on ethical hacking and penetration testing to identify vulnerabilities and discover exploitable security gaps. |
Securing Critical Components | Including substations, control centers, and data centers with physical barriers, barbed (electrical) fences/wires, intrusion detection and alarm systems, movement detection sensors, surveillance systems, access control mechanisms, and security personnel. This includes simulation scenarios to maintain ongoing regular inspection and maintenance of physical infrastructure to identify and address newly discovered vulnerabilities. |
Advising Contingency Plans | As part of emergency and incident response plans, based on well defined and integrated procedures to address sudden and abrupt disruptions and interruptions of services. This includes constant testing and defining new methods and maps to follow and adopt to maintain a high level of readiness. |
Regular Personnel Training | Educating staff on the best security practices depending on their working domain within the smart grid, including security personnel, engineers, stakeholders, and operators. This includes incident response and awareness of potential risks. |
Security and Safety By Design | Designing robust and redundant fail-safe smart-grid mechanisms to reduce the likelihood and impact of equipment failures. This is achieved by implementing advanced grid management technologies to maintain real-time monitoring and control to promptly detect and respond to incidents, enhance system resilience, and mitigate the impact of power outages. |
Maintaining Constant Collaboration | Between industry peers, government agencies, intelligence agencies, military (i.e., UN and NATO), and cybersecurity organizations for information sharing and (cyber) threat intelligence sharing on new dangers, threats, weaknesses, and obstacles, as well as identifying the best security/safety practices, frameworks, and guidelines to enforce regulatory compliance. |
Constant Evaluation and Assessment | Of risk mitigation measures to adapt to evolving threats to maintain effective mitigation strategies and best practices, including continuous monitoring, incident response planning, and proactive threat intelligence analysis to maintain robust smart grid security and safety. |
Attack | Risk | Target | Mitigation | ||||||
---|---|---|---|---|---|---|---|---|---|
Type | Classification | Safety | Security | Privacy | User | Software | Hardware | Communication | Security Measures |
Social Engineering | Exploit | Moderate/High | Moderate | Moderate | √ | X | X | X | Awareness training, non-disclosure agreement, accountability |
Phishing | Malware | Low | High | Moderate | √ | √ | X | √ | Awareness training, email security, anti-virus |
Trojan/Worm | Malware | High | High | High | X | X | √ | √ | Anti-malware, anomaly detection, firewalls, constant updates |
Botnet | Malware | Moderate | High | High | X | √ | √ | √ | Anti-malware, intrusion detection, network monitoring, constant updates |
False Data Injection | Interception | Low | Moderate/High | High | X | X | X | √ | ML-based detection, encryption, secure channels |
Spoofing | Interception | Low | High | High | X | √ | X | √ | ML-based multi-layer detection, encryption, secure channels |
Sniffing | Interception | Low | Moderate | High | X | X | X | √ | Access control, OTP, multi-factor authentication |
Meter Manipulation and Theft | Forensics | Moderate/High | High | Moderate/High | X | √ | √ | X | ML-based detection, anti-tampering, intrusion-detection, access controls |
Session Key Exposure | Interception | Low | High | Moderate/High | X | √ | X | √ | Certification-based access controls, privacy-preserving, key agreement, multi-factor authentication |
Time Synchronization | Insertion | Low | Moderate/High | Moderate | X | X | √ | √ | Fast prekey-based integrity protection, hardware-assisted authentication |
DDoS | Disruption | Moderate/High | Very High | Moderate | X | √ | X | √ | Privacy-preserving traffic signaling protocol, DDoS detection, anonymity, forward key secrecy |
TCP-SYN Flooding | Disruption | Low/Moderate | High | Low | X | X | X | √ | Protocol-dependent detection and classification, ML-based detection, lightweight encryption/authentication |
Jamming | Disruption | Moderate/High | High/Very High | Low | X | X | √ | √ | MIMO, channel coding, FHSS, DSSS |
Eavesdropping | Low | High | High | X | X | X | √ | WSN detection and isolation, privacy-enhanced authentication | |
Homograph | Deception | Moderate | High | High | √ | X | √ | √ | DGA, access control, awareness training, cloud storage encryption |
Amplification | Disruption | Low/Moderate | High | Moderate/High | √ | X | X | √ | Anomaly detection, DDoS detection, lightweight encryption |
Sybil | Disruption | Moderate/High | High | Low | X | X | X | √ | ML-based solutions, DDoS detection, Sybil attack detection |
Risk/Vulnerability | Impact Area | Suggested Security Solution |
---|---|---|
False Data Injection (FDI) | Data integrity, system reliability | Machine-learning-based anomaly detection, cryptographic message authentication, PMU redundancy |
Insider Threats | Authentication, access control | Role-based access control (RBAC), behavior-based monitoring, forensic auditing |
Communication Failures | Availability, service continuity | Redundant communication channels, mesh networking, fault-tolerant protocols |
Zero-Day Vulnerabilities | Entire infrastructure | Threat intelligence feeds, regular patching, AI/LLM-based zero-day detection |
Weak Authentication | Access control, data exposure | Multi-factor authentication, certificate-based identity verification |
Physical Security Breaches | Hardware integrity, public safety | Perimeter intrusion detection, surveillance systems, tamper-evident hardware |
Equipment Failures | Grid stability, public safety | Predictive maintenance using ML, hardware redundancy, safety compliance protocols |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2018 | [226] | ECC-based Authentication | Lightweight ECC-based authentication scheme between substations and control center | Provides mutual authentication, low computational/communication costs | Defends against known attacks, suitable for resource-limited environments | Not blockchain-enabled, lacks post-quantum security | Not tested in dynamic environments or large-scale systems | Handling latency in real-time updates | Could benefit from integration with fog/blockchain layers |
2021 | [227] | ECC Mutual Authentication | ECC-based mutual authentication for robust smart grid security in delay-sensitive communication | Lightweight, scalable, ECC-based | Robust against known attacks, energy efficient | ECC still computational for ultra-constrained devices | Lack of privacy-preserving features | Ensuring low-latency in complex networks | Could incorporate privacy-preserving techniques like FHE |
2019 | [228] | TACIT Encryption | Message encryption using TACIT hardware chip in grid distribution | Time-authenticated cryptographic identity chip | Hardware-embedded, efficient for real-time use | Focused on message encryption only | Limited to hardware-level, not flexible for software update | Integration across legacy systems | Expand to support multiple encryption schemes |
2021 | [229] | TACIT and FPGA Security | Enhanced TACIT using embedded systems and FPGA for nuclear/grid data | High-speed, embedded, FPGA-integrated | End-to-end encryption, real-time processing | Hardware dependence | Limited scalability for non-FPGA systems | Firmware patching and compatibility | Hybrid software–hardware models for adaptability |
2021 | [230] | ECC Validation | ECC-based validation and data protection using ProVerif and BAN logic | Formal verification, ECC, lightweight | Strong formal proofs, efficient communication | Limited quantum resistance | Limited to validation without encryption layer | Addressing insider threats | Combine with secure key distribution systems |
2022 | [231] | AES S-box for SCADA | AES-based S-box to secure SCADA in smart grids | Lightweight chip-based AES | Efficient chip integration, SCADA protection | Focused on substitution layer only | Not holistic security coverage | Ensuring chip integrity in long-term use | Multi-layer security integration with IDS |
2023 | [232] | AES Chip | AES cryptographic chip simulated on Xilinx for grid data | Hardware-optimized AES | Efficient encryption/decryption, real-time performance | Chip-only implementation | Does not cover key management or authentication | Secure firmware lifecycle | Integrate key rotation protocols |
2023 | [233] | Fog-based Session Key Protocol | Anonymous session key agreement via fog computing | Specialized middle layer, dynamic session keys | Improved security and anonymity | Privacy trade-offs with session linkability | Scalability in ultra-dense deployments | Dynamic node handling | Merge with FL and blockchain for flexibility |
2023 | [234] | Lightweight Authentication Protocol | Lightweight Authentication using Esch256 and authenticated encryption | Hash-based, energy efficient, fast | Low-resource usage, high protection | Dependent on hash function strength | Needs full evaluation in wide networks | Resistance to side-channel attacks | Expand to hybrid crypto-auth models |
2023 | [235] | Secure Data Aggregation | Efficient data aggregation system to distinguish benign vs. malicious users | Privacy-aware, optimized crypto-overhead | Smart classification, efficient aggregation | Sensitive to data poisoning | Dependence on pre-learned thresholds | Adapting to evolving attacker behavior | Reinforcement-learning-enhanced detection models |
2023 | [236] | Lightweight Mutual Authentication | Mutual authentication for smart meters | Lightweight, surveillance-focused | Secure against known threats | May lack resilience to future attacks | No mention of integration with external APIs | Scaling to massive smart meter deployments | Integration with FL and anomaly detection models |
Year | Authors | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2021 | Wang et al. [237] | Authentication Protocol and Blockchain | Combines ECC, Join-and-Exit mechanism, batch verification with blockchain to secure real-time power transmissions | Real-time security, blockchain-based, cryptographic protocol | Enhanced performance and security against DDoS | Complex integration of multiple cryptographic tools | Scalability concerns with large-scale smart grid environments | Ensuring low-latency in real-time applications | Combine lightweight cryptography for constrained devices |
2023 | Liu et al. [238] | Aggregation Scheme | Certificate-less public key cryptography for multi-dimensional data aggregation using Paillier encryption within fog computing | Paillier homomorphic encryption, fog-based architecture | Reduces computational load on smart meters, improves data privacy | Complex implementation, dependency on fog infrastructure | Certificate-less schemes may still require PKG trust assumptions | Secure key management and aggregation in dynamic environments | Introduce adaptive trust models for user key exchange |
2023 | Sani et al. [239] | Blockchain Model | SDAG model providing energy node visibility without involving energy operators using registration and data-aware protocols | Cryptographic identity assignment, session key-based awareness | Improves visibility, supports decentralized control | Protocol overhead may increase with node numbers | Limited real-world deployment validation | Balancing privacy with operational transparency | Leverage lightweight encryption for constrained nodes |
2023 | Oberko et al. [240] | Access Control Design | Ethereum-based design ensuring traceability and revocability, secured by Decisional Bilinear Diffie–Hellman theory | Smart contracts, public key generation, secure decryption | High security, traceability, reduced overhead | Requires Ethereum infrastructure and understanding of smart contracts | Energy-intensive operations on Ethereum blockchain | Maintaining performance in high-throughput scenarios | Optimize contract execution costs |
2023 | Bitirgen et al. [241] | Attack Detection Mode | CNN-LSTM model optimized with PSO to detect false data injection attacks in smart grids | Hybrid deep learning, particle swarm optimization | High accuracy, effective against FDI attacks | May require high training time and compute resources | Model generalizability across varying grid architectures | Adaptation to different smart grid configurations | Integrate online learning for real-time adaptation |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2022 | [267] | DL/Anomaly Detection | LSTM RNN-based model for log-based anomaly detection using partial feature contribution | Deep learning, weak label support, LSTM architecture | High accuracy (99.8%) with only 25% features used | Requires tuning and training effort | Model generalizability across domains not proven | Device resource limitations | Lighter architectures or edge deployment optimization |
2022 | [268] | Honeypot | GridPot honeypot deployed and threat data mapped to MITRE ATTACK for ICS | ICS-based honeypot, threat mapping | Grounded real-world attack behavior analysis | Honeypot visibility may limit attack variety | Limited coverage without large-scale deployment | Keeping mapping updated with latest tactics | Distributed deployment with diverse device profiles |
2022 | [269] | Honeypot | Low-interaction honeypots deployed in AWS to observe ICS compromise trends | Cloud-based honeypot with regional diversity | Scalable deployment, multi-region observations | Low interaction may miss advanced attacker behavior | Limited protocol emulation | Balancing fidelity and cost | Hybrid honeypots with partial interaction |
2022 | [270] | Honeypot | Decentralized honeypot using Android over cellular networks for IoT protocol emulation | Mobile-based, decentralized, IoT focus | Covers IoT-specific threats in mobile environments | Device-level attack emulation only | Realism depends on network fidelity | Scalability in public attack monitoring | Federated attack analysis sharing |
2023 | [271] | FL/Honeypot | Privacy-preserving FL with honeypot log sharing incentives and two-step verification | Federated learning, incentive mechanism | Secure model training and log verification | Complex coordination and reward validation | Depends on supplier participation | Scalability and verification trust | Dynamic reward schemes and lightweight models |
2023 | [272] | Honeypot | HoneyTrack lightweight honeypot deployed in Azure cloud for tracking attack origin | Lightweight, quick deployment | Fast setup and actionable output | Focus on initial attack phases | Limited scope without deeper inspection tools | Maintaining consistent monitoring | Integration with SIEM or XDR tools |
2023 | [273] | DAG/Blockchain | DAG blockchain for IoT authentication in 5G networks using Access Points | Quality of Service enhancement, decentralized trust | Improved performance and security metrics | Requires AP coordination | Depends on DAG protocol maturity | Integration with legacy networks | Backward-compatible protocol extensions |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2020 | [276] | Forensics | Smart Grid Digital Forensics Investigation Framework supporting incidents like Stuxnet | Incident-based, forensic phase modeling | Tailored for smart grid cyber incidents | Scenario-based, may not generalize broadly | Complexity in full framework deployment | Adapting phases to dynamic attack surfaces | Automation and modular integration |
2020 | [277] | Forensics | Overview of CPS forensics and its approaches | High-level survey and conceptual frameworks | Lays foundation for CPS-specific investigations | Lacks implementation depth | Primarily theoretical | Bridging theory and practical deployment | Prototype development and testbeds |
2017 | [278] | Forensics | Statistical trust model for AMI data falsification detection | Trust modeling, probabilistic detection | High detection accuracy; modeled taxonomy | Requires statistical tuning | AMI-focused, less generalizable | Expanding to full grid monitoring | Broader smart grid adaptation |
2019 | [279] | Forensics | SDN-based forensic monitoring with NBA, DL, and DPI integration | Network-level defense, layered intelligence | Multi-modal security with forensic capabilities | Conceptual, lacks deployment results | Theory to practice gap | Real-world testbed and validation | End-to-end implementation |
2019 | [281] | Forensics | ISO/IEC 27043-based holistic framework with proactive, incident, and reactive phases | Standards-based, application-agnostic | Eliminates fragmented ad hoc approaches | May require customization for different domains | Initial setup complexity | Wide-scale smart grid adaptation | Domain-specific extensions |
2019 | [282] | Forensics | Logging framework ensuring forensic data legality using OSCAR and UK NCSC guidance | Legality-focused, structured logging | Supports court-admissible evidence | Log-centric, limited on real-time detection | Dependent on compliance tools | Ensuring traceability and integrity | Real-time log analysis integration |
2020 | [283] | Forensics | SPEAR framework enhancing awareness, attack detection, and evidence collection | Comprehensive situational awareness, privacy | Tailored for smart grid, enables secure sharing | System-wide coordination required | Early development stage | Full lifecycle validation | Operational deployment feedback loops |
2021 | [284] | Forensics | Hybrid blockchain-based forensic logging with access control and tamper resistance | Blockchain logs, encrypted access policies | Non-repudiation and log immutability | Blockchain maintenance overhead | Scalability in high-frequency logs | Balancing privacy and auditability | Adaptive block validation rates |
2021 | [285] | Forensics | Procedure for forensic investigation of DDoS and FDI attacks, ensuring legal admissibility | Legal compliance, integrity preservation | Court-admissible process workflow | Attack-specific scope | Reactive by design | Generalizing across threat models | Integrate real-time detection triggers |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2021 | [286] | Ethical Hacking | Framework with tools and scenarios for ethical hacking, including IoT use cases and red/blue team methodology | Penetration testing, role simulation, authorization emphasis | Realistic simulation of attacks and defenses; skill development | Requires high ethical and legal oversight | Not widely adopted in utility sectors | Formalizing and legalizing red/blue testing in smart grid contexts | Policy-driven frameworks and certification schemes |
2013 | [288] | Ethical Hacking | Security quantification and formal methods for AMI protocol with tool creation and testing | Formal verification, protocol analysis, tool design | Structured methodology for protocol testing | Protocol-specific adaptation | Focused only on AMI | Broader applicability to varied smart grid components | Extension to additional grid subsystems |
2016 | [289] | Ethical Hacking | Firmware and SCADA security testing for early vulnerability detection in IEDs | Stack-level analysis, proactive diagnostics | Early detection of firmware-level vulnerabilities | Limited to IEDs and SCADA | Firmware diversity hampers scalability | Maintaining up-to-date threat models | Integration with continuous firmware monitoring |
2019 | [290] | Ethical Hacking | Design of ISAAC testbed for smart grid cybersecurity with ML-based components | Testbed-based, CPS-oriented, machine learning ready | Comprehensive functional testbed for smart grid | High cost and complexity | Limited real-world deployment | Scalability and real-time simulation | Cloud-based testbed replication |
2019 | [291] | Ethical Hacking | Hardware intelligence gathering and hacking on grid equipment with hardening strategies | Hardware-level threat assessment and defense | Improves resilience at the physical layer | Requires physical access | Focused on specific hardware | Remote detection of hardware tampering | Remote attestation techniques |
2021 | [292] | Ethical Hacking | Integrated smart inverter testing platform to increase test efficiency and reduce manual errors | Platform-based automation, inverter-centric | Boosts test coverage and accuracy | Inverter-specific utility | Niche scope within grid testing | Platform extensibility for wider use | Modular plug-in design |
2023 | [293] | Ethical Hacking | Penetration testing on 22 connected home devices with discovery of multiple CVEs | Systematic vulnerability analysis, CVE disclosure | Comprehensive vulnerability identification | Home-focused, not grid-specific | Relevance to utility-grade devices | Translation of home findings to grid domain | Smart grid-specific device testing protocols |
Aspect | Challenge Description | Impact in OT/Smart Grid | Mitigation Strategy |
---|---|---|---|
Legacy Device Integration | Many legacy systems lack support for modern cryptographic techniques or remote update capabilities | Increased vulnerability due to inability to patch or apply modern security standards | Use of protocol wrappers, secure gateways, and segmentation of legacy devices from critical systems |
Human Element | Human error, lack of training, and social engineering attacks remain a common attack vector | Misconfigurations, phishing, or physical access compromises leading to potential system failures | Implement ongoing cybersecurity training, role-based access control, and insider threat monitoring programs |
Penetration Testing Risks | Traditional penetration testing can cause system crashes in fragile OT systems | Unexpected service disruptions, equipment failures, and operational/financial losses | Perform security assessments in testbeds, use digital twins or simulations instead of live system testing |
System Resilience | OT systems are not built for resilience against aggressive scans or tests | Even minor testing can lead to outages or degraded performance | Adopt non-intrusive monitoring tools, anomaly detection, and passive scanning |
Operational Sensitivity | Downtime in OT systems, even brief, can lead to cascading failures or significant financial loss | Grid instability, energy distribution disruption, or failure to meet SLA requirements | Plan maintenance windows, leverage redundancy, and test recovery processes during simulations |
Year | Ref. | Type | Description | Characteristics | Advantages | Drawbacks | Limitations | Challenges | Improvements |
---|---|---|---|---|---|---|---|---|---|
2018 | [294] | GAN | Synthetic dataset generation using deep GANs based on real conditional probability distributions | Data-driven learning, conditional sampling | Boosts small dataset size, indistinguishable from real data in task performance | May replicate data biases | Dependent on quality/diversity of original dataset | Preventing misuse for adversarial attacks | Bias filtering and adversarial misuse prevention layers |
2022 | [295] | GAN | Synthetic data generation, energy-conserving, fine-grained control | Synthetic data generation, energy-conserving, fine-grained control | Preserves privacy in smart meter data without major data loss | Potential loss of minor data details | Limited to time series data scenarios | Maintaining realism in generated data | Improved calibration to match real-world power fluctuation profiles |
2023 | [296] | GAN | Encrypted data embedded into images using GAN to enhance confidentiality | Encryption and steganography using GANs | Dual-layer security (encryption and hiding) | Higher computational complexity | Image-based cover requirement | Balancing data fidelity and concealment | Lightweight encryption algorithms to reduce overhead |
2023 | [297] | GAN | Explores GANs for load forecasting, outage prediction, and preventive maintenance | Supports proactive grid operations | Predictive modeling using generative learning | Needs large historical datasets | Dependent on data variety and quality | Training stability and convergence | Hybrid GAN models with statistical smoothing |
2024 | [298] | GAN/Zero-Trust | Zero-trust PGSC framework using GANs with tail-risk metrics to detect GenAI-driven attacks | GenAI attack simulation and detection, tail-risk scoring | 95.7% detection accuracy, 99% defence confidence | May be overfitted to specific attack types | Requires continuous model updates | Maintaining adaptability to new threats | Online learning enhancements and dynamic model retraining |
2023 | [299] | LLM | AI and analytics framework for automating software development in smart grids | AI-generated solutions, business integration | Faster development, monetization potential | Reliance on pretrained general-purpose models | Software code generality and domain fit | Domain-specific language understanding | Custom fine-tuning on smart grid datasets |
2023 | [300] | LLM | Cybersecurity anomaly detection in substations using LLMs and HITL training | IEC 61850, HITL, HIL testbed | Robust detection via LLM-HITL synergy | High setup complexity and training cost | Dependent on annotated datasets | Real-time inference speed | Edge-optimized LLM variants |
2024 | [301] | LLM | Introduces Sasha: LLM-based smart home automation assistant for user-driven routines | Conversational automation, user intent parsing | Flexible and intuitive control | Ambiguity in loosely defined commands | Context retention and behaviour prediction | Natural language variability | Context-aware memory models |
2024 | [302] | LLM | Explores LLMs’ role in energy sector ops and research directions | Evaluation of capabilities and safety-critical use cases | Insightful operational recommendations | High compute resource requirements | Generalization to energy-specific queries | System integration and trust | Power-domain tool embedding |
2024 | [303] | LLM | Analyzes potential LLM security risks in power systems | Threat assessment and countermeasure proposals | Proactive defense framework | Preemptive focus may miss emerging attacks | Uncertainty in threat modeling | Rapid evolution of LLM-based exploits | Real-time red-teaming and adaptive defences |
Aspect | Advantages | Limitations |
---|---|---|
Threat Detection and Analysis |
|
|
Incident Response |
| |
Vulnerability Management |
| |
Security Automation |
| |
User Training and Awareness |
| |
Data Privacy and Compliance |
|
Aspect | GANs (Generative Adversarial Networks) | LLMs |
---|---|---|
Primary Use Cases | Synthetic attack data generation, anomaly simulation, and data augmentation for IDS | Threat log analysis, automated incident response, and policy summarization and retrieval |
Advantages | Helps train models with limited real attack data, reveals blind spots via adversarial testing | Learns from diverse, unstructured data, enables real-time, context-aware decision support |
Model Input | Numerical/time-series telemetry, and network traffic data | Text-based logs, configuration files, and incident documentation |
Challenges | Requires stable training, risk of generating unrealistic or biased samples, and needs task-specific adaptation (e.g., TimeGAN) | High inference cost, risk of hallucinations, and needs domain adaptation and prompt tuning |
Deployment Consideration Tables | Typically used offline for training IDS or simulators | Needs lightweight variants for edge/real-time use (e.g., quantized or distilled models) |
Potential Integration | Enhancing IDS through adversarial robustness testing | Assisting operators in decision-making and reporting tasks |
Smart Grid Layer | Primary Threats | Defensive Mechanisms |
---|---|---|
Perception | Physical tampering, sensor spoofing, FDIAs | Tamper-resistant hardware, ML-based anomaly detection, hardware encryption |
Network | DoS/DDoS, eavesdropping, jamming | SDN-based intrusion detection, traffic shaping, redundant topologies |
Control | Malware, command injection, timing attacks | Patch management, real-time behavioral analysis, integrity monitoring |
Application | Data breaches, unauthorized access, phishing | Role-based access control (RBAC), Two-Factor Authentication (2FA), LLM-based anomaly detection |
Management | Insider threats, misconfigurations, policy bypass | Zero-trust architecture, continuous auditing, behavioral biometrics |
Objective | MLTDAF Benefit |
---|---|
Prevent terrorist access | Layered defense, strong authentication |
Detect covert operations | Behavioral monitoring, ML-driven detection |
Protect against hybrid attacks | Combined physical–cyber safeguards |
Enhance response to attacks | Layer-specific contingency and incident plans |
Guide strategic infrastructure policy | Prioritization of critical components and investments |
Feature | Proposed MLTDAF Framework | Traditional SIEM |
---|---|---|
Scope | Unified IT–OT–DER coverage, suitable for smart grid environments | Primarily IT-focused, limited OT visibility |
Detection Approach | ML-based dynamic anomaly detection with adaptive learning | Signature-based or rule-driven, less adaptive |
Real-Time Response | Yes, by including automated alert classification and tiered prioritization | Often delayed, depends on manual analyst triage |
Mapping to SGAM | Designed to align across all layers: Component, Communication, Information, Function, and Business | Usually focused on Information and Function layers only |
Scalability | Architected to scale across distributed grid nodes and edge devices | Centralized processing may bottleneck in large-scale grid setups |
Domain Coverage | High: Includes DERs, legacy systems, IoT edge, smart meters | Low to moderate; lacks embedded support for DERs or grid-specific assets |
Privacy-Awareness | Supports pseudonymization and local anomaly processing before cloud transfer | Rarely considers privacy, centralized logging risks data exposure |
Latency Tolerance | Low latency design with support for edge and fog computing nodes | Higher latency due to batch processing and central correlation |
Human-In-The-Loop | SOC operators, OT engineers, and AI co-pilots in loop with adjustable oversight | Analysts play a reactive role; no domain-specific operational feedback loop |
Resilience to Legacy Devices | Incorporates wrappers and proxies for devices lacking native security support | Legacy device integration rarely addressed |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chahine, K. Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions. Future Internet 2025, 17, 318. https://doi.org/10.3390/fi17070318
Yaacoub JPA, Noura HN, Salman O, Chahine K. Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions. Future Internet. 2025; 17(7):318. https://doi.org/10.3390/fi17070318
Chicago/Turabian StyleYaacoub, Jean Paul A., Hassan N. Noura, Ola Salman, and Khaled Chahine. 2025. "Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions" Future Internet 17, no. 7: 318. https://doi.org/10.3390/fi17070318
APA StyleYaacoub, J. P. A., Noura, H. N., Salman, O., & Chahine, K. (2025). Toward Secure Smart Grid Systems: Risks, Threats, Challenges, and Future Directions. Future Internet, 17(7), 318. https://doi.org/10.3390/fi17070318