Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review
Abstract
:1. Introduction
2. An Overview of Smart Grid Security Challenges
- (1)
- Impersonation: A hacker can act as a legitimate user in an unauthorized way, spoofing the identity of someone and making him pay for energy consumption.
- (2)
- Data Manipulation: Data transmitted over a public network can be modified by an attacker, such as dynamic prices, and load readings.
- (3)
- Cyber-Physical Attack: IoT-based SG is the largest cyber-physical system, with physical components of Circuit Breakers (CB), transformers, and relays along with ICT components of sensors, and microcontrollers; it is more vulnerable to DoS attacks as compared to a traditional grid system, which is generally only physical and very difficult to reach. Any attack against the availability of service is called DoS [8]. These attacks directly impact the physical layer of the system, jamming the channel and causing immense loss. Opacity is an increasing concern in a cyber-physical system. Most of the estimation algorithms allow sharing of explicit state information with neighboring nodes, resulting in the disclosure of the state of the cyber-physical system [9,10].
- (4)
- Privacy and Confidentiality: The security of data is an important aspect and challenge for SG. Power system monitoring can cause privacy concerns at the user end by divulging information about their routine, habits, traveling, etc. Thus, the flow of information between customers and various entities must be protected for the user to develop confidence in the power network. Eavesdropping is also an intrusion into the privacy of the network. The attacker may obtain useful information by continuously monitoring the network and eventually entering the system to obtain important information.
- (5)
- Phishing: Phishing can be the first step in putting the customer at risk. If a customer does not discard a receipt or bill and the information is passed on to the hacker, he can manipulate the information easier to create fake messages, and emails, or obtain crucial information about the organization.
3. Techniques to Overcome Security Challenges
3.1. Pre Attack
3.2. Under Attack
- Intrusion Detection System (IDS): An intrusion detection technique scans the system continuously for any malicious activity and reports any anomaly detected. This way, once a malicious device or network is detected, it is isolated from the system and reported either to a centralized security system or to an administrator. The intrusion detection techniques are classified into the following five types also described in [22,23].
- Network Intrusion Detection System is employed at certain planned points in the system from where most of the data passes to monitor the flowing traffic in all directions. It hits the alarm to the administrator once an anomaly matches the behavior or certain virus
- Host Intrusion Detection System only monitors incoming and outgoing data packets and checks for any suspicious activity. It takes snapshots of data and keeps on comparing them to previous data packets to check for abnormalities.
- The other techniques include protocol-based, application-based, and hybrid intrusion detection techniques. Authors in [24] proposed cyber security solutions for the fog-based smart grid SCADA system. It proposed a multilayer approach and categorizes the solution into four categories of intrusion detection, authentication, key management, and privacy-preserving approaches. However, IDS has several limitations, such as a high rate of false positives. In [25], IDS based on data mining algorithms is suggested, which can overcome this problem. For the SCADA system, security is enhanced through recent machine learning models based on preprocessing, clustering, feature selection, and classification. A recent study in [26], used by Markov, a Chain Clustering model is used, followed by Rapid Probabilistic Correlated Optimization for feature selection, ending with the Block Correlated Neural Network technique for classification. Similarly, the authors of [27,28], have recommended clustering and fused optimization-based classification methodologies for SCADA security.
- Data Loss Prevention (DLP): DLP techniques are used and designed to prevent the unauthorized use and transmission of confidential information without the loss of important data or obtaining data affected by the virus. This means this technique fights malicious activity to cause any harm to data and any prevention technique to act on data. DLPs generally perform periodic audits to verify the security criterion is being met. Network DLP and Host-based DLP are common strategies used, as discussed in detail in [29]. After the detection of an attack, it is countered with pushback and configuration methods. In this technique, the router is configured to push back all unauthorized IPs. In configuration techniques, the network topology is changed. This results in isolating the attacker from the system and stops the attack at an early stage as discussed in detail in [30,31].
3.3. Post Attack
4. Recent Development in Technology
4.1. Blockchain Technology
4.1.1. Advanced Metering Infrastructure:
4.1.2. Monitor, Measure, Control, and Protect
4.1.3. Use of Blockchain in Microgrid
4.1.4. Blockchain in Decentralized Energy Trading
4.1.5. Challenges of Blockchain Technology
- One of the main challenges faced by smart grid is theoretical throughput, which means the number of transactions per minute. According to [61], the number of transactions performed by blockchain is five per second. The small number will limit blockchain applications in e-commerce as it requires quicker and large transactions every second. This will increase the cost of the communication network.
- Another important issue of blockchain technology is high latency, which is time to process the transaction and more time to provide security for the double transaction. To overcome the issue, the authors of [62] propose a bitcoin protocol that reduces latency greatly by increasing the number of nodes and decoupling the bitcoin network by two planes.
- As the application of blockchain continues to grow, the size and bandwidth have been a rising concern. As new data is added, new blocks keep on accumulating, and broadcasting all the dates will keep increasing the cost. A probable solution is to keep on deleting old data blocks as proposed by the authors in [63].
- Identity threat is a main risk of blockchain. Identity in the blockchain is the combination of public and private keys. The overall security of blockchain lies behind the private keys. In [64], the authors provide a solution for password-protecting the private key. In this way even if the key is stolen, the funds will remain protected
4.2. 5G Technology
- (1)
- Massive links of flexible loads: A prominent feature of 5G technology is its ability to simultaneously connect with several communication devices through controllers that can be built-in or present at the terminal end of any device using its massive machine-type communication (mMTC) feature.
- (2)
- Fast transfer speed and low communication latency for remote control: The communication method based on 5G has reliable and low latency communication (uRLLC) features. Faster communication and low latency time are key parameters for communication and in 5G technology, the response time can be as low as 1 ms, which is negligible for frequency regulation services [69]. Therefore, the 5G network helps to reduce instability in the communication network and better performance in frequency regulation parameters for countering oscillations.
- (3)
- Rigorous Security and Improved User Privacy: Network based on 5G architecture can enhance privacy, provide a secure data transfer, and support diversified services via the end-to-end service level agreement (SLA) assurance [76]. Network function virtualization (NFV) and software-defined networking (SDN) methods lay the foundation of physical 5G for customized need-based services of network topologies, referred to as network slices. SDN works on the principle of separating the control plane which decides where data needs to be trafficked from the data plane, which pushes the packets of data toward the destination. NFV works on accelerating service by allowing network operators to route traffic through various functions.
- (4)
- High reliability and low power consumption: Demand response is an important feature to calculate system efficiency and reliability. For SM, a system may have to face sudden failures, causing delayed smart responses, reducing the effectiveness of the system, and inefficiency of the system to fulfill the requirements [77]. Based on the test of factory automation in [78], the uRLLC feature of 5G networks can guarantee as low as a few sub-milliseconds radio transmissions, which is reliable enough to support DR in power systems. Then, 5G can transfer data at a much higher speed, estimated to be 100 times greater than that of 4G.
4.3. Artificial Intelligence and Machine Learning
4.3.1. Artificial Intelligence
- (a)
- Expert System: It is a program based on Boolean logic that tries to apply human expertise in a certain domain. The knowledge base is organized in the form of IF-THEN rules. The statement is connected by a logical operator (AND, OR, NOT) [87].
- (b)
- Fuzzy Logic: Fuzzy Logic in a multivalued system in which variables are represented as fuzzy sets.
- (c)
- Artificial Neural Network (ANN): It is the most complex and generic form of AI in which the program tries to emulate the human biological nervous system and formulates behavioral responses based on the non-linear inputoutput behavior of the nature of the brain.
4.3.2. Machine Learning
5. Discussion
- Utilization of a dedicated domestic communication network for power IoT to send and receive energy-related data on a dedicated network to provide more privacy to consumers
- Effect of environmental factors on a smart grid’s performance and robustness. Due to climate change, and other environmental factors, if any link in the chain of smart grid technology is affected, the smart grid will have loose ends. In this regard, it is researched how this technology can be entirely shifted to wireless technology.
- Integrating smart grid technology with traditional power systems. This can enroute revolutionize the power system gradually but effectively and through the gradual economic burden. The research will be useful for developing and underdeveloped countries.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
Abbreviation | Description |
MG | Microgrid |
SG | Smart Grid |
IoT | Internet of Things |
DER | Distribution Energy Resource |
DR | Demand Response |
EV | Electrical Vehicle |
AMI | Advanced Metering Infrastructure |
RFID | Radio Frequency Infrastructure |
PV | Photo Voltaic |
RES | Renewable Energy Resources |
FAN | Field Area Network |
FDI | False Data Injection |
PMU | Power Management Units |
DDoS | Distributed Denial of Service |
ICS | Wireless Sensor Network |
PKI | Public Key Infrastructure |
EI | Energy Internet |
CB | Circuit Breaker |
DoS | Denial of Service |
DLP | Data Loss Prevention |
IDS | Intrusion Detection System |
TES | Transactive Energy System |
DL | Deep Learning |
ML | Machine Learning |
AI | Artificial Intelligence |
References
- Babar, M.; Tariq, M.U.; Jan, M.A. Secure and resilient demand side management engine using machine learning for IoT-enabled smart grid. Sustain. Cities Soc. 2020, 62, 102370. [Google Scholar] [CrossRef]
- Khatua, P.K.; Ramachandaramurthy, V.K.; Kasinathan, P.; Yong, J.Y.; Pasupuleti, J.; Rajagopalan, A. Application and assessment of internet of things toward the sustainability of energy systems: Challenges and issues. Sustain. Cities Soc. 2020, 53, 101957. [Google Scholar] [CrossRef]
- Amin, A.A.; Mahmood-ul-Hasan, K. Unified Fault-Tolerant Control for Air-Fuel Ratio Control of Internal Combustion Engines with Advanced Analytical and Hardware Redundancies. J. Electr. Eng. Technol. 2021, 17, 1947–1959. [Google Scholar] [CrossRef]
- Amin, A.A.; Hasan, K.M. A review of Fault Tolerant Control Systems: Advancements and applications. Measurement 2019, 143, 58–68. [Google Scholar] [CrossRef]
- Wilamowski, B.M.; Irwin, J.D. Power Electronics and Motor Drives. Available online: https://www.routledge.com/Power-Electronics-and-Motor-Drives/Wilamowski-Irwin/p/book/9781138077478 (accessed on 19 September 2022).
- A 5G Cellular Technology for Distributed Monitoring and Control in Smart Grid. Available online: https://www.researchgate.net/publication/318019902_A_5G_Cellular_Technology_for_Distributed_Monitoring_and_Control_in_Smart_Grid (accessed on 10 September 2022).
- Almasarani, A.; Majid, M.A. 5G-Wireless sensor networks for smart grid-accelerating technology’s progress and innovation in the kingdom of Saudi arabia. Procedia Comput. Sci. 2021, 182, 46–55. [Google Scholar]
- Rajendran, G.; Sathyabalu, H.V.; Sachi, M.; Devarajan, V. Cyber Security in Smart Grid: Challenges and Solutions. In Proceedings of the 2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC), Chennai, India, 21–23 August 2019; pp. 546–551. [Google Scholar] [CrossRef]
- Yin, X.; Zamani, M.; Liu, S. On Approximate Opacity of Cyber-Physical Systems. IEEE Trans. Autom. Control 2021, 66, 1630–1645. [Google Scholar] [CrossRef]
- Zeng, W.; Koutny, M. Quantitative Analysis of Opacity in Cloud Computing Systems. IEEE Trans. Cloud Comput. 2021, 9, 1210–1219. [Google Scholar] [CrossRef]
- Moongilan, D. 5G wireless communications (60 GHz band) for smart grid? An EMC perspective. In Proceedings of the IEEE International Symposium on Electromagnetic Compatibility (EMC), Ottawa, ON, Canada, 25–29 July 2016; pp. 689–694. [Google Scholar] [CrossRef]
- Brar, H.; Kumar, G. Cybercrimes: A Proposed Taxonomy and Challenges. J. Comput. Netw. Commun. 2018, 2018, 1798659. [Google Scholar] [CrossRef] [Green Version]
- Bose, B.K. Artificial Intelligence Techniques in Smart Grid and Renewable Energy Systems—Some Example Applications. Proc. IEEE 2017, 105, 2262–2273. [Google Scholar] [CrossRef]
- Khodayar, M.; Wu, H. Demand Forecasting in the Smart Grid Paradigm: Features and Challenges. Electr. J. 2015, 28, 51–62. [Google Scholar] [CrossRef]
- Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
- Nozari, E.; Tallapragada, P.; Cortés, J. Differentially private distributed convex optimization via objective perturbation. In Proceedings of the 2016 American Control Conference (ACC), Boston, MA, USA, 6–8 July 2016; pp. 2061–2066. [Google Scholar] [CrossRef]
- Lai, C.S.; Lai, L.L. Application of Big Data in Smart Grid. In Proceedings of the 2015 IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, China, 9–12 October 2015; pp. 665–670. [Google Scholar] [CrossRef]
- Mohammadpourfard, M.; Weng, Y.; Pechenizkiy, M.; Tajdinian, M.; Mohammadi-Ivatloo, B. Ensuring cybersecurity of smart grid against data integrity attacks under concept drift. Int. J. Electr. Power Energy Syst. 2020, 119, 105947. [Google Scholar] [CrossRef]
- LAKAF: Lightweight Authentication and Key Agreement Framework for Smart Grid Network—ScienceDirect. Available online: https://www.sciencedirect.com/science/article/abs/pii/S1383762121000461 (accessed on 10 September 2022).
- Mo, Y.; Kim, T.H.-J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–Physical Security of a Smart Grid Infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar] [CrossRef]
- Hussain, S.; Ullah, I.; Khattak, H.; Adnan, M.; Kumari, S.; Ullah, S.S.; Khan, M.; Khattak, S. A Lightweight and Formally Secure Certificate Based Signcryption With Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid. IEEE Access 2020, 8, 93230–93248. [Google Scholar] [CrossRef]
- LeMay, M.; Gross, G.; Gunter, C.; Garg, S. Unified Architecture for Large-Scale Attested Metering. In Proceedings of the IEEE Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 3–6 January 2007; p. 115. [Google Scholar] [CrossRef]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October 2006; pp. 89–98. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Babaghayou, M.; Yazıcı, M.A. Cyber security for fog-based smart grid SCADA systems: Solutions and challenges. J. Inf. Secur. Appl. 2020, 52, 102500. [Google Scholar] [CrossRef]
- Waters, B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. Available online: https://eprint.iacr.org/undefined/undefined (accessed on 19 September 2022).
- Shitharth; Kantipudi, M.P.; Sangeetha, K.; Kshirsagar, P.; Thanikanti, S.B.; Haes Alhelou, H. An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access 2021, 9, 156297–156312. [Google Scholar] [CrossRef]
- Khadidos, A.O.; Manoharan, H.; Selvarajan, S.; Khadidos, A.O.; Alyoubi, K.H.; Yafoz, A. A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security. Energies 2022, 15, 3624. [Google Scholar] [CrossRef]
- Shitharth, S.; Satheesh, N.; Kumar, B.P.; Sangeetha, K. IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network. In Architectural Wireless Networks Solutions and Security Issues; Springer: Singapore, 2021; pp. 247–265. [Google Scholar] [CrossRef]
- Li, Q.; Xiong, H.; Zhang, F.; Zeng, S. An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext. Int. J. Netw. Secur. 2013, 15, 161–170. [Google Scholar]
- Lai, J.; Deng, R.H.; Li, Y.; Weng, J. Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, 6 June 2014; pp. 239–248. [Google Scholar] [CrossRef]
- Tajer, A. False Data Injection Attacks in Electricity Markets by Limited Adversaries: Stochastic Robustness. IEEE Trans. Smart Grid 2019, 10, 128–138. [Google Scholar] [CrossRef]
- Chauhan, S.; Agarwal, N.; Kar, A. Addressing Big Data Challenges in Smart Cities: A Systematic Literature Review. Info 2016, 18, 73–90. [Google Scholar] [CrossRef] [Green Version]
- Khan, F.; Asif, M.; Ahmad, A.; Alharbi, M.; Aljuaid, H. Blockchain Technology, Improvement Suggestions, Security Challenges on Smart Grid and Its Application in Healthcare for Sustainable Development. Sustain. Cities Soc. 2020, 55, 102018. [Google Scholar] [CrossRef]
- Saha, M.S.; Li, R.; Sun, X. High loading and monodispersed Pt nanoparticles on multiwalled carbon nanotubes for high performance proton exchange membrane fuel cells. J. Power Sources 2008, 177, 314–322. [Google Scholar] [CrossRef]
- Musleh, A.S.; Yao, G.; Muyeen, S.M. Blockchain Applications in Smart Grid–Review and Frameworks. IEEE Access 2019, 7, 86746–86757. [Google Scholar] [CrossRef]
- Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.-Y.; Zhang, X.; Ghias, A.M.Y.M.; Koh, L.H.; Yang, L. Blockchain for Future Smart Grid: A Comprehensive Survey. IEEE Internet Things J. 2021, 8, 18–43. [Google Scholar] [CrossRef]
- Mylrea, M.; Gourisetti, S.N.G. Blockchain for smart grid resilience: Exchanging distributed energy at speed, scale and security. In Proceedings of the 2017 Resilience Week (RWS), Wilmington, DE, USA, 18–22 September 2017; pp. 18–23. [Google Scholar] [CrossRef]
- Campagna, N.; Caruso, M.; Castiglia, V.; Miceli, R.; Viola, F. Energy management concepts for the evolution of smart grids. In Proceedings of the 2020 8th International Conference on Smart Grid (icSmartGrid), Paris, France, 17–19 June 2020. [Google Scholar]
- Gai, K.; Wu, Y.; Zhu, L.; Xu, L.; Zhang, Y. Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks. IEEE Internet Things J. 2019, 6, 7992–8004. [Google Scholar] [CrossRef]
- Antal, C.; Cioara, T.; Antal, M.; Anghel, I.; Salomie, I.; Bertoncini, M. Blockchain Based Decentralized Management of Demand Response Programs in Smart Energy Grids. Sensors 2018, 18, 162. [Google Scholar] [CrossRef] [Green Version]
- Joseph, A.; Balachandra, P. Smart grid to energy internet: A systematic review of transitioning electricity systems. IEEE Access 2020, 8, 215787–215805. [Google Scholar] [CrossRef]
- Butt, A.; Huda, N.; Amin, A.A. Design of fault-tolerant contr ol system for distributed energy resources based power network using Phasor Measurement Units. Meas. Control 2022. [Google Scholar] [CrossRef]
- Tan, S.; Wang, X.; Jiang, C. Privacy-Preserving Energy Scheduling for ESCOs Based on Energy Blockchain Network. Energies 2019, 12, 1530. [Google Scholar] [CrossRef] [Green Version]
- Maw, A.; Adepu, S.; Mathur, A. ICS-BlockOpS: Blockchain for operational data security in industrial control system. Pervasive Mob. Comput. 2019, 59, 101048. [Google Scholar] [CrossRef]
- Guerrero, J.; Vasquez, J.C.; Alcala, J.; Vicuna, L.; Castilla, M. Hierarchical Control of Droop-Controlled AC and DC Microgrids—A General Approach Toward Standardization. Ind. Electron. IEEE Trans. 2011, 58, 158–172. [Google Scholar] [CrossRef]
- Gao, J.; Asamoah, K.; Sifah, E.; Smahi, A.; Xia, Q. GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access 2018, 6, 9917–9925. [Google Scholar] [CrossRef]
- Munsing, E.; Mather, J.; Moura, S. Blockchains for decentralized optimization of energy resources in microgrid networks. In Proceedings of the 2017 IEEE Conference on Control Technology and Applications (CCTA), Maui, HI, USA, 27–30 August 2017; pp. 2164–2171. [Google Scholar] [CrossRef]
- Danzi, P.; Angjelichinoski, M.; Stefanović, Č.; Popovski, P. Distributed proportional-fairness control in microgrids via blockchain smart contracts. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 23–27 October 2017; pp. 45–51. [Google Scholar] [CrossRef] [Green Version]
- Dang, C.; Zhang, J.; Kwong, C.P.; Li, L. Demand Side Load Management for Big Industrial Energy Users Under Blockchain-Based Peer-to-Peer Electricity Market. IEEE Trans. Smart Grid 2019, 10, 6426–6435. [Google Scholar] [CrossRef]
- Li, Y.; Yang, W.; He, P.; Chen, C.; Wang, X. Design and management of a distributed hybrid energy system through smart contract and blockchain. Appl. Energy 2019, 248, 390–405. [Google Scholar] [CrossRef]
- Noor, S.; Yang, W.; Guo, M.; Dam, K.; Wang, X. Energy Demand Side Management within micro-grid networks enhanced by blockchain. Appl. Energy 2018, 228, 1385–1398. [Google Scholar] [CrossRef]
- Bergquist, J.; Laszka, A.; Sturm, M.; Dubey, A. On the design of communication and transaction anonymity in blockchain-based transactive microgrids. In Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, Las Vegas, NV, USA, 11–15 December 2017; pp. 1–6. [Google Scholar] [CrossRef] [Green Version]
- Casado-Vara, R.; Prieto, J.; Corchado, J.M. How Blockchain Could Improve Fraud Detection in Power Distribution Grid. In Proceedings of the International Joint Conference SOCO’18-CISIS’18-ICEUTE’18, Cham, Switzerland, 6–8 June 2019; pp. 67–76. [Google Scholar] [CrossRef]
- DeCusatis, C.; Lotay, K. Secure, Decentralized Energy Resource Management Using the Ethereum Blockchain. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, NY, USA, 1–3 August 2018; pp. 1907–1913. [Google Scholar] [CrossRef]
- Sestrem Ochôa, I.; Augusto Silva, L.; de Mello, G.; Garcia, N.M.; de Paz Santana, J.F.; Quietinho Leithardt, V.R. A cost analysis of implementing a blockchain architecture in a smart grid scenario using sidechains. Sensors 2020, 20, 843. [Google Scholar] [CrossRef] [Green Version]
- Wang, S.; Taha, A.; Wang, J.; Kvaternik, K.; Hahn, A. Energy Crowdsourcing and Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1612–1623. [Google Scholar] [CrossRef] [Green Version]
- Aitzhan, N.; Svetinovic, D. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secure Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
- Kounelis, I.; Steri, G.; Giuliani, R.; Geneiatakis, D.; Neisse, R.; Nai Fovino, I. Fostering consumers’ energy market through smart contracts. In Proceedings of the 2017 International Conference in Energy and Sustainability in Small Developing Economies (ES2DE), Funchal, Portugal, 10–12 July 2017. [Google Scholar] [CrossRef]
- (PDF) Blockchain Based Transactive Energy Systems for Voltage Regulation in Active Distribution Networks. Available online: https://www.researchgate.net/publication/340916228_Blockchain_Based_Transactive_Energy_Systems_for_Voltage_Regulation_in_Active_Distribution_Networks (accessed on 19 September 2022).
- Hassan, M.U.; Rehmani, M.H.; Chen, J. Optimizing blockchain based smart grid auctions: A green revolution. IEEE Trans. Green Commun. Netw. 2021, 6, 462–471. [Google Scholar] [CrossRef]
- Xu, X.; Pautasso, C.; Zhu, L.; Gramoli, V.; Ponomarev, A.; Tran, A.B.; Chen, S. The Blockchain as a Software Connector. In Proceedings of the 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), Venice, Italy, 5–8 April 2016; pp. 182–191. [Google Scholar] [CrossRef]
- Eyal, I.; Gencer, A.E.; Sirer, E.; Van Renesse, R. Bitcoin-NG: A Scalable Blockchain Protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, 16–18 March 2015. [Google Scholar]
- Kim, N.; Kang, S.M.; Hong, C.S. Mobile charger billing system using lightweight Blockchain. In Proceedings of the 2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul, Korea, 27–29 September 2017; pp. 374–377. [Google Scholar] [CrossRef]
- Sohaib, O.; Naderpour, M.; Hussain, W.; Martinez, L. Cloud Computing Model Selection for E-commerce Enterprises Using a New 2-tuple Fuzzy Linguistic Decision-Making Method. Comput. Ind. Eng. 2019, 132, 47–58. [Google Scholar] [CrossRef]
- Agiwal, M.; Roy, A.; Saxena, N. Next Generation 5G Wireless Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2016, 18, 1617–1655. [Google Scholar] [CrossRef]
- Elkashlan, M.; Duong, T.; Chen, H.-H. Millimeter-wave communications for 5G: Fundamentals: Part I (Guest Editorial). Commun. Mag. IEEE 2014, 52, 52–54. [Google Scholar] [CrossRef]
- Garau, M.; Anedda, M.; Desogus, C.; Ghiani, E.; Murroni, M.; Celli, G. A 5G Cellular Technology for Distributed Monitoring and Control in Smart Grid. In Proceedings of the 2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Cagliari, Italy, 7–9 June 2017. [Google Scholar] [CrossRef]
- Wei, M.; Wang, W. Toward distributed intelligent: A case study of peer to peer communication in smart grid. In Proceedings of the 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 2210–2216. [Google Scholar] [CrossRef]
- Hui, H.; Ding, Y.; Shi, Q.; Li, F.; Song, Y.; Yan, J. 5G network-based Internet of Things for demand response in smart grid: A survey on application potential. Appl. Energy 2020, 257, 113972. [Google Scholar] [CrossRef]
- Shahinzadeh, H.; Mirhedayati, A.-S.; Shaneh, M.; Nafisi, H.; Gharehpetian, G.B.; Moradi, J. Role of joint 5G-IoT framework for smart grid interoperability enhancement. In Proceedings of the 2020 15th International Conference on Protection and Automation of Power Systems (IPAPS), Shiraz, Iran, 30–31 December 2020. [Google Scholar]
- Tao, M.; Ota, K.; Dong, M. Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks. IEEE Netw. 2017, 31, 8–13. [Google Scholar] [CrossRef] [Green Version]
- De Dutta, S.; Prasad, R. Security for Smart Grid in 5G and Beyond Networks. Wirel. Pers. Commun. 2019, 106, 261–273. [Google Scholar] [CrossRef]
- Borgaonkar, R.; Anne Tøndel, I.; Zenebe Degefa, M.; Gilje Jaatun, M. Improving smart grid security through 5G enabled IoT and edge computing. Concurr. Comput. Pract. Exp. 2021, 33, e6466. [Google Scholar] [CrossRef]
- Zhang, Y.; Li, J.; Zheng, D.; Li, P.; Tian, Y. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J. Netw. Comput. Appl. 2018, 122, 50–60. [Google Scholar] [CrossRef]
- Zhang, Y.; Zhao, J.; Zheng, D. Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks. Mob. Inf. Syst. 2017, 2017, 3680671. [Google Scholar] [CrossRef] [Green Version]
- Huawei Joins Forces with China Telecom and China’s State Grid to Develop 5G Slicing Solution for Power Industry—Huawei Press Center. Available online: https://www.huawei.com/en/news/2017/9/ChinaTelecom-StateGrid-Joint-Innovation-Project (accessed on 19 September 2022).
- IET Digital Library: Challenges and opportunities of 5G in power grids. Available online: https://digital-library.theiet.org/content/journals/10.1049/oap-cired.2017.0374 (accessed on 10 September 2022).
- Helen, L.; Zahariadis, T.; Sarakis, L.; Tsampasis, E.; Voulkidis, A.; Velivasaki, T. Smart Grid: A demanding use case for 5G technologies. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Athens, Greece, 19–23 March 2018; pp. 215–220. [Google Scholar] [CrossRef] [Green Version]
- 5g_nework_architecture_whitepaper_en.pdf. Available online: https://carrier.huawei.com/~/media/CNBG/Downloads/Program/5g_nework_architecture_whitepaper_en.pdf (accessed on 10 September 2022).
- Zhou, Z.; Tan, L.; Gu, B.; Zhang, Y.; Wu, J. Bandwidth Slicing in Software-Defined 5G: A Stackelberg Game Approach. IEEE Veh. Technol. Mag. 2018, 13, 102–109. [Google Scholar] [CrossRef]
- Shahzad, K.; Amin, A.A. Optimal Planning of Distributed Energy Storage Systems in Active Distribution Networks using Advanced Heuristic Optimization Techniques. J. Electr. Eng. Technol. 2021, 16, 2447–2462. [Google Scholar] [CrossRef]
- Ahmadzadeh, S.; Parr, G.; Zhao, W. A Review on Communication Aspects of Demand Response Management for Future 5G IoT- Based Smart Grids. IEEE Access 2021, 9, 77555–77571. [Google Scholar] [CrossRef]
- Jia, H.; Ding, Y.; Song, Y.; Singh, C.; Li, M. Operating Reliability Evaluation of Power Systems Considering Flexible Reserve Provider in Demand Side. IEEE Trans. Smart Grid 2018, 10, 3452–3464. [Google Scholar] [CrossRef]
- Yilmaz, O.; Wang, Y.-P.; Johansson, N.; Nadia, B.; Ashraf, S.; Sachs, J. Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 1190–1195. [Google Scholar] [CrossRef]
- Shafik, W.; Matinkhah, M. Smart Grid Empowered By 5G Technology. In Proceedings of the 2019 Smart Grid Conference (SGC), Tehran, Iran, 18–19 December 2019. [Google Scholar] [CrossRef]
- Riaz, U.; Amin, A.A.; Tayyeb, M. Design of active fault-tolerant control system for Air-fuel ratio control of internal combustion engines using fuzzy logic controller. Sci. Prog. 2022, 105, 368504221094723. [Google Scholar] [CrossRef] [PubMed]
- Shahbaz, M.H.; Amin, A.A. Design of Active Fault Tolerant Control System for Air Fuel Ratio Control of Internal Combustion Engines Using Artificial Neural Networks. IEEE Access 2021, 9, 46022–46032. [Google Scholar] [CrossRef]
- Ullah, Z.; Al-Turjman, F.; Mostarda, L.; Gagliardi, R. Applications of Artificial Intelligence and Machine learning in smart cities. Comput. Commun. 2020, 154, 313–323. [Google Scholar] [CrossRef]
- Taghavinejad, S.; Taghavinejad, M.; Shahmiri, L.; Zavvar, M.; Zavvar, M. Intrusion Detection in IoT-Based Smart Grid Using Hybrid Decision Tree. In Proceedings of the 2020 6th International Conference on Web Research (ICWR), Tehran, Iran, 22–23 April 2020; pp. 152–156. [Google Scholar] [CrossRef]
- Zor, K.; Timur, O.; Teke, A. A state-of-the-art review of artificial intelligence techniques for short-term electric load forecasting. In Proceedings of the 2017 6th International Youth Conference on Energy (IYCE), Budapest, Hungary, 21–24 June 2017; pp. 1–7. [Google Scholar] [CrossRef]
- Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. Available online: https://www.researchgate.net/publication/331543051_Unsupervised_Machine_Learning-Based_Detection_of_Covert_Data_Integrity_Assault_in_Smart_Grid_Networks_Utilizing_Isolation_Forest (accessed on 19 September 2022).
- Abu-Mostafa, Y.S.; Magdon-Ismail, M.; Lin, H.-T. Learning from Data; AMLBook: New York, NY, USA, 2012. [Google Scholar]
- Safavian, S.R.; Landgrebe, D. A survey of decision tree classifier methodology. IEEE Trans. Syst. Man Cybern. 1991, 21, 660–674. [Google Scholar] [CrossRef] [Green Version]
- Jordan, M.I.; Mitchell, T.M. Machine learning: Trends, perspectives, and prospects. Science 2015, 349, 255–260. [Google Scholar] [CrossRef] [PubMed]
- Saranya, S.; Princy, M. Routing Techniques in Sensor Network–A Survey. Procedia Eng. 2012, 38, 2739–2747. [Google Scholar] [CrossRef]
- Routing Techniques in Wireless Sensor Networks: A Survey. Available online: https://ieeexplore.ieee.org/document/1368893 (accessed on 10 September 2022).
- Abu Alsheikh, M.; Lin, S.; Niyato, D.; Tan, H.P. Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications. IEEE Commun. Surv. Tutor. 2014, 16, 1996–2018. [Google Scholar] [CrossRef] [Green Version]
- Karimipour, H.; Dehghantanha, A.; Parizi, R.; Choo, K.-K.R.; Leung, H. A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids. IEEE Access 2019, 7, 80778. [Google Scholar] [CrossRef]
- Shahbaz, M.H.; Arslan, A.A. A Review of Classical and Modern Control Techniques Utilized in Modern Microgrids. Recent Adv. Electr. Electron. Eng. 2021, 14, 459–472. [Google Scholar] [CrossRef]
- Ahmed, W.; Ansari, H.; Khan, B.; Ullah, Z.; Ali, S.M.; Mehmood, C.A.A.; Qureshi, M.B.; Hussain, I.; Jawad, M.; Khan, M.U.S.; et al. Machine Learning Based Energy Management Model for Smart Grid and Renewable Energy Districts. IEEE Access 2020, 8, 185059–185078. [Google Scholar] [CrossRef]
- Das, L.; Garg, D.; Srinivasan, B. NeuralCompression: A machine learning approach to compress high frequency measurements in smart grid. Appl. Energy 2020, 257, 113966. [Google Scholar] [CrossRef]
- Winter, J.; Xu, Y.; Lee, W.C. Energy Efficient Processing of K Nearest Neighbor Queries in Location-aware Sensor Networks. In Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, USA, 17–21 July 2005; pp. 281–292. [Google Scholar] [CrossRef]
- Jayaraman, P.P.; Zaslavsky, A.; Delsing, J. Intelligent Processing of K-Nearest Neighbors Queries Using Mobile Data Collectors in a Location Aware 3D Wireless Sensor Network. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6098, pp. 260–270. [Google Scholar] [CrossRef]
- Beyer, K.; Goldstein, J.; Ramakrishnan, R.; Shaft, U. When Is “Nearest Neighbor” Meaningful? In Database Theory—ICDT’99; Springer: Berlin/Heidelberg, Germany, 1999; pp. 217–235. [Google Scholar] [CrossRef] [Green Version]
- A Survey of Decision Tree Classifier Methodology. Available online: https://ieeexplore.ieee.org/document/97458 (accessed on 10 September 2022).
- Lippmann, R. An introduction to computing with neural nets. IEEE ASSP Mag. 1987, 4, 4–22. [Google Scholar] [CrossRef]
- Steinwart, I.; Christmann, A. Support Vector Machines for Classification. In Support Vector Machines; Springer: New York, NY, USA, 2008; pp. 285–329. [Google Scholar] [CrossRef]
- Box, G.E.P.; Tiao, G.C. Bayesian Assessment of Assumptions 2 Comparison of Variances. In Bayesian Inference in Statistical Analysis; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 1992; pp. 203–243. [Google Scholar] [CrossRef]
- Kanungo, T.; Mount, D.M.; Netanyahu, N.S.; Piatko, C.D.; Silverman, R.; Wu, A.Y. An efficient k-means clustering algorithm: Analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 2002, 24, 881–892. [Google Scholar] [CrossRef]
- Jolliffe, I.T. (Ed.) Principal Component Analysis and Factor Analysis. In Principal Component Analysis; Springer: New York, NY, USA, 2002; pp. 150–166. [Google Scholar] [CrossRef]
- Handbook of Big Data Privacy. Available online: https://link.springer.com/book/10.1007/978-3-030-38557-6 (accessed on 10 September 2022).
Technology | Spectrum | Data Rate | Coverage Range | Applications | Limitations |
---|---|---|---|---|---|
GSM | 900–1800 MHz | Up to 14.4Kbps | 1–10 km | AMI, Demand Response, HAN | Data rates are low |
GPRS | 900–1800 MHz | Up to 17 kbps | 1–10 km | AMI, Demand Response, HAN | Data rates are low |
3G | 1.92–1.8 GHz 2.11–2.17 GHz | 384 Kbps–2Mbps | 1–10 km | AMI, Demand Response, WAN, NAN | High communication and computational cost |
WiMAX | 25 GHz, 3.5 GHz, 5.8 GHz | Up to 75 Mbps | 10–50 km (LOS) 1–5 km (NLOS) | AMI, Fraud Detection, WAN | Not as widespread as other methodologies, still under research |
PLC | 1–30 MHz | 2–3 Mbps | 1–3 km | AMI, Fraud Detection | Prone to noise with power network. |
ZigBee | 2.4 GHz, 868–915 MHz | 250 Kps | 30–50 m | AMI, HAN | Very short data range, and low performance inside the building. |
Application of Blockchain | Reference |
---|---|
Power flow | [52,53] |
Demand Response | [46,54,55] |
Security and Privacy | [56,57,58,59] |
Grid Characteristics | 5G Technology | |||||||
---|---|---|---|---|---|---|---|---|
Availability | Coverage | Energy Usage Reduction | Battery Life Devices | Increased Connectivity | Bandwidth Per Unit Area | Latency | Data Rate Improvement | |
Accommodation in all generation, storage Options [80] | Yes | No | No | No | Yes | No | Yes | Yes |
Enable New Product Service and Market [81] | Yes | No | Yes | Yes | Yes | Yes | Yes | No |
Provide the power quality for the range of needs [82] | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Optimization of utilization and operating efficiency [83] | Yes | Yes | Yes | No | Yes | No | Yes | Yes |
Provides resiliency to disturbances [84] | Yes | Yes | Yes | No | No | Yes | No | Yes |
Attacks and Natural Disasters | Yes | Yes | Yes | No | No | No | Yes | Yes |
Enable User’s Participation [85] | Yes | Yes | Yes | Yes | Yes | Yes | No | Yes |
AI Technique | Advantages | Disadvantages |
---|---|---|
ANN |
|
|
SVM |
|
|
ANFIS |
|
|
Approaches | Machine Learning Algorithm | Complexity | Characteristics |
---|---|---|---|
System Dependability | NNs | High | Estimate the dependability metric |
Fault Detection | Moderate | Dynamic fault detection model | |
Metric Map | DT | Low | Link Quality Estimation |
Assessing accuracy and reliability metrics | GP | Moderate | Information Processing Tasks |
A QoS schedular | RL | Low | QoS task scheduler for adaptive multimedia sensor networks |
Uncertainty and coverage factors | Moderate | Investigate coverage problems | |
QoS-aware power management | Low | QoS-aware power management in energy harvesting sensor nodes | |
QoS provisioning | Low | A structure modeling toll for QoS provisioning |
Approach | Latency | Interoperability | Cost | Complexity | Carbon Emission | Security | Data Handling |
---|---|---|---|---|---|---|---|
Blockchain and Edge Computing | Medium | High | Low | Low | Low | Medium | Medium |
5G technology | Low | Medium | High | Medium | High | High | High |
Artificial Intelligenece | Low | Medium | High | High | Medium | High | High |
Machine Learning | Low | Medium | High | High | Low | Hugh | High |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alsuwian, T.; Shahid Butt, A.; Amin, A.A. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability 2022, 14, 14226. https://doi.org/10.3390/su142114226
Alsuwian T, Shahid Butt A, Amin AA. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability. 2022; 14(21):14226. https://doi.org/10.3390/su142114226
Chicago/Turabian StyleAlsuwian, Turki, Aiman Shahid Butt, and Arslan Ahmed Amin. 2022. "Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review" Sustainability 14, no. 21: 14226. https://doi.org/10.3390/su142114226