1. Introduction
Cyber-Physical Systems (CPSs) represent a crucial technological advancement where physical processes are tightly integrated with computational and communication capabilities, bridging cyberspace with the physical world. CPSs combine sensing, actuation, and computing to facilitate real-time data exchange, enabling intelligent monitoring, precise control, and adaptive system behavior [
1]. These capabilities have become integral across various critical sectors, including power systems, healthcare, transportation, manufacturing, and defense, substantially enhancing operational efficiency, scalability, and adaptability [
2]. The successful operation of CPS heavily relies on robust communication infrastructures to manage and transmit data effectively between system components. The communication layer is particularly vital as it ensures the timely, reliable, and secure exchange of information, which is critical for maintaining synchronization between cyber and physical components. This real-time data exchange enables precise control actions, rapid decision-making, and effective coordination among distributed components, thereby ensuring the stability and resilience of the overall system [
3].
However, the increased reliance on communication networks introduces significant security vulnerabilities, exposing CPS to various cyber threats. These threats range from conventional cyberattacks, such as denial-of-service (DoS) and man-in-the-middle (MITM) attacks, to sophisticated cyber-physical attacks designed to disrupt physical processes by exploiting network vulnerabilities. For instance, the authors in [
4] introduced a dual-attention spatio-temporal detector that blends graph-attention over the grid topology with temporal convolution to capture spatial and temporal attack signatures, showing superior detection accuracy and robustness on standard IEEE test systems. Meanwhile, in [
5], the authors develop a data-driven framework for DC microgrids that first identifies an input–output model using subspace methods, and then applies adaptive residual generators with adaptive thresholds and dedicated localization observers to detect and pinpoint compromised sensors, validated on a meshed microgrid with four distributed generation units. Consequently, cyber-attacks on CPS can result in catastrophic outcomes, including operational disruptions, physical damage, financial loss, and even threats to human safety. Therefore, securing the communication layer has emerged as a primary concern in the design and deployment of CPS [
6].
Software-Defined Networking (SDN) has emerged as a promising technology that can address CPS’s unique security and operational challenges. By decoupling network control from the data plane, SDN provides centralized, programmable, and agile network management compared to traditional network architectures. This flexibility enables operators to dynamically configure, monitor, and secure network traffic in response to evolving operational requirements and real-time security threats. SDN enables deterministic communication paths, proactive threat detection, and immediate implementation of security policies across the network, significantly enhancing the cyber resilience of CPS. Moreover, SDN’s centralized control architecture supports rapid reconfiguration and fault recovery, which is crucial for maintaining continuous and secure operation amidst cyberattacks and network disturbances [
7].
A critical research gap remains regarding the experimental demonstration of SDN-based control in real-world physical systems, particularly at the data plane level, where hardware performance can be accurately observed and assessed. This paper addresses this gap by implementing an experimental cyber-physical system (CPS), in which the physical layer comprises interconnected DC multi-microgrids. The cyber layer utilizes SDN-enabled programmable switches coordinated by an SDN controller, as shown in
Figure 1. This practical integration provides crucial insights into real-time operational behavior, controller responsiveness, and overall system resilience under realistic dynamic conditions, marking a significant advancement in bridging theoretical SDN applications with practical implementation.
The key contribution is the end-to-end, experimental validation of SDN at the hardware data plane, demonstrating resilient, seamless control and protection while operating under highly dynamic disturbances, including fast-rise, pulsed-load events that stress both the electrical and communication layers, as well as a targeted denial-of-service (DoS) attack. The study reveals real-time operational behavior and controller responsiveness, while deny-by-default policies maintain deterministic control and protection channels amid disturbances. Quantitative metrics—end-to-end delay, jitter, and packet loss percentage from packet captures, together with synchronized electrical measurements—substantiate the robustness and seamless coordination across interconnected microgrids, bridging SDN’s theoretical promises with a practical, hardware-level implementation for reliable multi-microgrid operation.
The remainder of the paper is organized as follows:
Section 2 discusses the literature review, focusing on previous work related to SDN and studies that have incorporated SDN concepts in similar applications.
Section 3 presents the modeling of the physical layer, providing detailed mathematical and structural descriptions of the distributed generation units, energy storage systems, and various load types within the interconnected DC multi-microgrids.
Section 4 describes the cyber layer, emphasizing the implemented SDN and communication architecture designed for secure and deterministic data exchange.
Section 5 outlines the experimental setup and testing scenarios, and discusses the results, highlighting system resilience and performance across different operating conditions. Finally,
Section 6 concludes the paper by summarizing the main contributions, assessing the effectiveness of the SDN-based approach, and proposing directions for future research in secure and adaptive cyber-physical power systems.
2. State of the Art
Numerous studies have examined SDN’s potential to enhance network programmability, scalability, and security. Ref. [
8] presented a comprehensive overview of SDN, outlining its layered architecture, key protocols, and major use cases across communication and computing infrastructures. Their work emphasized how SDN’s control plane and programmable interfaces can simplify network management, improve scalability, and enable flexible traffic control and real-time resource optimization.
The work presented in [
9] reviewed the application of SDN concepts in the power sector, with a particular focus on smart grid communication architectures. Their survey discussed how SDN controllers could potentially improve grid reliability and enable intelligent routing for distributed renewable energy resources. They also emphasized the potential role of SDN in enhancing cybersecurity, offering valuable guidance for researchers aiming to leverage SDN for the advancement of smart grid infrastructures.
Authors in [
10] offered a detailed survey of SDN load-balancing mechanisms, categorizing approaches based on controller placement, algorithmic optimization, and machine-learning-assisted decision strategies. The review highlighted how adaptive and AI-based load-balancing methods can effectively balance control-plane workload, enhance resource utilization, and maintain network stability under varying loads.
Several studies have explored the potential of SDN through simulation-based architectures and frameworks. The authors in [
11] presented an SDN architecture based on a flat multi-controller network to achieve efficient load balancing. The architecture was developed using the Ryu SDN controller and tested within the Mininet environment, where OpenFlow switches and host computers were emulated to simulate network behavior. While the study demonstrates performance advantages, it remains limited to simulation with no experimental validation.
Building on similar simulation-based evaluations, ref. [
12] highlighted the advantages of migrating to SDN from traditional networks. Implementing two network scenarios in a virtual environment demonstrates improved performance and simplified network management under the SDN model. However, this work also lacks experimental validation.
The work presented in [
13] reinforces the benefits of SDN by addressing the complexity of managing traditional network devices. It emphasizes how optimized SDN architectures can improve transactional performance across network participants. Using the Mininet SDN emulator and AnyLogic simulation software, the study supports its findings in a virtual setting; however, it does not extend to real-world testing.
In [
14], the authors proposed a more sophisticated SDN architecture to enhance scalability and load balancing in power communication networks. It introduces a Prediction-based Switch Virtualization and Distribution (PSVD) algorithm alongside RabbitMQ and Storm technologies to enhance data platform management. The SDN security controller is distributed across four machines, supporting modularity and scalability. While the solution shows potential, the study identifies challenges such as delayed algorithm activation and computational overhead, highlighting the need for further development and experimental analysis.
Expanding SDN’s application into energy systems, the work in [
15] introduced a model for cooperative energy sharing in an Interconnected Multi-Microgrid (IMMG) framework. It proposes an Energy Sharing Factor (ESF) as a novel metric to ensure fair energy distribution while maintaining the autonomy of individual microgrids. Using a mesh topology, the model facilitates interaction between microgrids but remains confined to simulation, lacking practical validation.
In [
16], the authors presented a co-simulation framework designed to enhance the resilience and reliability of microgrids using SDN. It proposes a novel SDN-based control strategy to manage communication during power-sharing operations, reducing latency and improving system responsiveness. The framework effectively manages voltage and frequency deviations, referencing future cloud-based microgrid implementations. Despite its strengths, this work is also limited to simulation studies.
The work presented in [
17] proposes a Software-Defined Networking routing framework for data center networks that respects flow priority while reducing energy use and balancing traffic. The authors formulate a multi-objective mixed-integer optimization model to maximize admitted flows, minimize path energy, and minimize load variance. Because exact optimization is expensive, they design two controller-driven heuristics: one selects lower-energy paths with priority preserved, and another favors balanced paths with priority preserved. Simulations show higher admission ratios with lower energy and better balance than baselines. A key limitation is the largely static setting, which weakens performance under congestion or link failures, suggesting the need for real-time, adaptive strategies.
From a cybersecurity perspective, ref. [
18] proposed a machine-learning–based framework for detecting low-rate Distributed Denial-of-Service (LDDoS) attacks in Software-Defined Networks (SDNs). The core of their approach is an ensemble classifier (ENC) that combines multiple learning models to accurately identify subtle, low-rate attack patterns while maintaining a low detection time. The method is specifically designed to achieve a very low false-alarm rate so that legitimate traffic is not incorrectly flagged as malicious, thereby preserving the efficiency and reliability of the SDN environment. The authors continued studying the same idea in [
19], developing the ML technique, with a proposed approach that combines ensemble learning models with principal component analysis (PCA) for feature selection.
In a subsequent work, the same authors introduced a hybrid Support Vector Machine–Random Forest (SVM–RF) model for DDoS detection and mitigation in SDNs [
20]. Their dual-plane architecture utilized data from both control and data planes to identify anomalies more accurately. This work highlighted how intelligent machine learning integration can strengthen SDN’s inherent security model. The work was validated using Mininet with a RYU controller and Open vSwitch (OVS) configured as a multilayer virtual switch, thus remaining limited to virtual environments.
Moreover, the authors in [
21] propose a cross-domain SDN scheme that integrates reinforcement-learning-assisted path selection with coordinated gain scheduling to strengthen microgrid resilience against denial-of-service attacks. The authors build a cyber-resilience validation platform and demonstrate it on an IEEE 34-bus physical model with an emulated cyber stack using Cisco Modeling Labs, Mininet, and Ryu. Results show substantial latency reductions during attacks and improved frequency stability with clear reward convergence. The contribution is chiefly methodological and platform-oriented, as the evaluation relies on hardware-in-the-loop and emulation rather than power hardware. Overall, the work offers credible pre-deployment evidence and would benefit from validation on a real microgrid testbed.
Finally, ref. [
22] surveys and proposes SDN-based defenses for DDoS, emphasizing centralized control, dynamic traffic engineering, segmentation/isolation, and real-time monitoring with Machine learning-assisted detection. It motivates SDN as a flexible alternative to static firewalls and IDS, enabling dynamic path steering and scrubbing redirection. The core contribution is a conceptual model and workflow for controller-driven detection, flow diversion, and traffic classification, with qualitative results. Technically, it details traffic engineering policies, null routing, and fine-grained segmentation to contain attacks. Overall, the work is methodological; future iterations need reproducible, quantitative evaluations and validation on hardware-in-the-loop or real testbeds.
While previous studies have collectively demonstrated the potential of SDN in network management, power systems, and microgrid coordination, their validation primarily relies on simulations lacking hardware implementation.
3. Physical System Modeling
In the evolving landscape of modern power systems, interconnected multi-microgrids have emerged as a resilient and decentralized solution to meet growing energy demands while integrating renewable energy sources. These microgrids are composed of multiple distributed generation (DG) units—such as photovoltaic (PV) arrays and wind turbines—alongside energy storage systems (ESSs) like batteries or supercapacitors. By linking these components into a cohesive network, interconnected microgrids offer enhanced reliability, improved energy efficiency, and the flexibility to operate in grid-connected and islanded modes. The synergy between DG and ESS enables the real-time balancing of supply and demand, enhancing the system’s ability to respond to disturbances. As the penetration of renewable energy increases, interconnected microgrids play a crucial role in enabling localized energy autonomy, reducing transmission losses, and fostering a more sustainable and adaptive power infrastructure. This section presents the modeling of the physical system components, including DG units, battery storage units, and electrical loads. The proposed system architecture is then provided to represent the complete microgrid configuration under study.
3.1. Distributed Generation Units
3.1.1. Photovoltaic Unit Modeling and Integration
PV systems are central to DC microgrids by providing modular and efficient energy generation. Their integration typically includes connecting PV arrays to a shared DC bus alongside DC-DC converters, ESS, and local loads. Compared to AC microgrids, DC configurations avoid issues related to reactive power and minimize energy losses from conversions, making them especially well-suited for PV deployment. Nevertheless, challenges such as variable output, voltage instability, and shading effects require sophisticated control methods to ensure consistent performance and optimal energy utilization [
23]. Hierarchical control schemes are commonly employed to address these issues [
24].
The single-diode model is widely adopted for PV modeling because it balances accuracy and computational efficiency. Its output current-voltage relationship is governed by [
25]:
where
I is the module current,
Iph represents photocurrent,
Io is the diode saturation current, and
Rs and
Rsh model resistive losses. The thermal voltage
, where
k is the Boltzmann’s constant equal to 1.38 × 10
−23 J/K;
q is the electron charge equal to 1.602 × 10
−19 C; and A is the diode ideality constant.
Here, the photocurrent
Iph and the diode saturation current
Io depend on irradiance
G and temperature
T, as defined by:
These equations enable the real-time simulation of PV behavior, which is crucial for Maximum Power Point Tracking (MPPT) algorithms, such as Perturb-and-Observe (P & O) or Model Predictive Control (MPC). For instance, adaptive MPC can leverage the model’s I-V curve to predict optimal operating points under partial shading, minimizing power oscillations.
3.1.2. Wind DG Unit Modeling and Integration
Wind energy systems are increasingly adopted in DC microgrids due to their scalability and efficient integration with DC infrastructures, which avoids frequency synchronization and minimizes conversion losses. Typically, modern wind turbines use permanent magnet synchronous generators (PMSGs) combined with power electronic converters, such as active rectifiers or back-to-back voltage source converters (VSCs) to connect to the DC bus. Given the variable nature of wind, effective control strategies are crucial for performing maximum power point tracking (MPPT), regulating DC bus voltage, and coordinating with other distributed energy resources, such as PV and storage systems. Hierarchical and decentralized control approaches are key in maintaining stability and balancing supply and demand in these dynamic environments [
26].
The equation governs the mechanical power extracted by a wind turbine:
where
ρ is the air density,
A is the rotor swept area,
Cp is the power coefficient, which is a function of the tip-speed ratio
λ and blade pitch angle
β, and
is the wind speed.
The tip-speed ratio is defined as:
where
is the angular speed, and
R is the radius. To maximize energy capture, MPPT algorithms dynamically adjust
to maintain
λ at its optimal value, ensuring
Cp remains near its peak [
27].
3.2. Battery Storage Unit Modeling
Energy storage units play a vital role in microgrids by maintaining power balance and enhancing system reliability. They store excess electrical energy during periods of low demand and discharge it during peak load times or when generation from renewable sources is insufficient, thereby helping to mitigate supply fluctuations and support stable microgrid operation. This capability is critical when managing variable energy inputs from PV and wind systems. Batteries, one of the most common storage technologies, store energy through electrochemical processes and are well-suited for applications requiring moderate power over extended durations, such as load leveling and peak shaving. For example, when generation from PV and wind sources exceeds demand, the surplus energy is stored in the battery until it reaches a predefined state of charge (SoC). When generation falls below the load requirement, the battery discharges to supplement the power supply and maintain continuity [
28]. A representative battery voltage model can be written as [
25]:
where
E0 is the constant open-circuit voltage,
k is the polarization voltage (V),
Q is the nominal capacity (Ah),
A is the exponential zone amplitude,
B is the inverse time constant of the exponential zone, and
i(t) is the charging (negative) or discharging (positive) current.
3.3. Loads
In DC microgrids, loads are often modeled as purely resistive to simplify analysis, as there is no requirement to manage reactive power or maintain phase synchronization. Given the direct linear relationship between current and voltage in DC systems, this assumption enables more straightforward calculation of power flow and voltage regulation. It also simplifies the design and simulation of control strategies, particularly in islanded or off-grid scenarios. In real-world applications, loads may be either constantly drawing a fixed amount of power over time or variable, fluctuating due to user activity or external factors, such as industrial pulse loads or rapidly changing electronic devices. Regardless of the load type, the microgrid control system must continuously adapt to changes in demand to stabilize voltage, manage energy storage behavior, and allocate resources efficiently.
Pulsed power loads (PPLs) are characterized by a load demand that alternates between a minimum value (
) and a maximum value (
) over a period
T, operating with a duty cycle
D. Depending on how the duty cycle is set during operation, the PPL can behave as either a constant or a variable load. The instantaneous power demand for
N pulses can be described by [
29]:
where
represents the unit step function for
t = 0.
3.4. Proposed System Architecture
The proposed experimental setup’s physical layer infrastructure, as shown in
Figure 2, comprises three interconnected DC multi-microgrids, each equipped with key electronic and renewable components to support dynamic energy exchange and system resilience. Each microgrid includes a photovoltaic (PV) source, a Lithium-ion battery for energy storage, and a bidirectional DC-DC converter to enable seamless power flow in both directions.
Some microgrids also integrate additional elements such as wind turbine emulators, ultracapacitor banks, and electric vehicle loads to enhance system flexibility and dynamic response under varying conditions. A local controller—implemented using a dSPACE-1104 real-time control platform—manages each microgrid’s operation, ensuring voltage regulation and power balance at the local level. These controllers communicate with a centralized Multi-Microgrid Control Center (MMCC), hosted on an external computing platform, which aggregates real-time measurements and coordinates multi-microgrid power-sharing decisions. The architecture enables hierarchical control, where local autonomy is maintained while facilitating global coordination, making the physical layer modular and scalable, and suitable for validating advanced control algorithms and real-time energy management strategies in networked microgrid environments.
4. SDN-Based Cyber Layer
This section focuses on the cyber layer of multi-microgrids, specifically the implementation of SDN for communication and control. The first subsection introduces the concept of SDN, highlighting its key differences from traditional networking architectures, particularly its separation of control and data planes, centralized decision-making, and programmability. These features make SDN well-suited for dynamic, distributed energy systems, such as microgrids. The second subsection presents the integration of SDN within the proposed multi-microgrid system, detailing how communication between DG units, ESS, and loads is managed through an SDN controller. This setup enables real-time monitoring, flexible reconfiguration, and coordinated control actions, enhancing the system’s responsiveness and resilience.
4.1. SDN Layer Architecture
Software-Defined Networking (SDN) is an advanced networking framework that decouples the control plane from the data plane, enabling centralized control and enhanced programmability of network resources [
30,
31]. In contrast to conventional IP-based networks—which often suffer from rigid architectures and tightly coupled control and forwarding mechanisms—SDN simplifies network management by introducing a centralized software controller, a network operating system [
32,
33]. While SDN has been widely deployed in IT domains such as cloud computing and data centers, the proposed work focuses on its application in operational technology (OT) networks for the power industry, where it can enable more adaptive routing, efficient resource allocation, and streamlined configuration in critical infrastructure systems.
In a typical SDN architecture, as depicted in
Figure 3, the infrastructure layer or data plane comprises forwarding devices like switches, which handle packet processing based on instructions received from a centralized controller via a southbound interface [
34]. OpenFlow is the most widely used protocol for this interface, allowing the controller to define flow entries that determine how packets should be managed—such as forwarding, dropping, or modifying—based on match criteria, including packet headers. This centralized control ensures consistent, optimized behavior across the network. However, a centralized SDN controller can be a single point of failure or a DoS target. Importantly, controller presence is only required for installing or reconfiguring flows; if the system is static, switches continue to forward with existing rules during the controller timeout. Adding standby or clustered controllers reduces risk but introduces orchestration complexity and the risk of split-brain hazards.
The control layer houses the SDN controller, which collects network-wide information from the data plane and makes traffic management decisions accordingly. It translates policies such as routing, quality of service, and security into specific forwarding rules. This enables quick responses to congestion or link failure, maintaining efficient and reliable network operation. Above this, the application layer comprises software services that interact with the controller via a northbound interface. While not as standardized as the southbound interface, it provides APIs or abstracted network views for implementing higher-level functions like firewalls, load balancers, or intrusion detection systems [
35].
One of SDN’s key advantages is its strong security model. Centralized programmability not only simplifies management but also enables robust traffic control. A critical security feature is the “deny-by-default” policy. In this model, any traffic from a device not explicitly authorized by the controller is automatically blocked. If a device’s IP address (i.e., or other identifier, such as MAC) is not preconfigured in the SDN controller, no flow rules will be assigned, and the switch will drop all packets from that device. This creates a built-in protection layer, significantly reducing the risk of unauthorized or malicious access.
In summary, SDN reshapes conventional networking by decoupling control from data forwarding and enabling programmable, centralized management through defined interfaces. With its “deny-by-default” mechanism and centralized control, SDN enhances flexibility and visibility, while strengthening the network’s defense against unauthorized activity.
4.2. SDN Integration with Multi-Microgrids
In the proposed SDN-integrated multi-microgrid architecture as depicted in
Figure 4, every physical component, whether a DG unit, ESS device, load controller, or microcontroller unit (MCU), is wired directly to the SDN switches via dedicated Ethernet cables and assigned a unique IPv4 address with a corresponding subnet mask. These switches form the data plane and treat each piece of equipment as an IP-enabled endpoint, providing fine-grained visibility into status and performance metrics. MCUs are further subdivided by function: some execute low-level control loops for generation setpoints, while others manage load dispatch and demand response.
Regarding scalability and adaptability, the proposed SDN approach can support growth without redesign by onboarding additional DERs, sensors, and controllers via role templates, keeping flow tables manageable (role-based whitelists, VLANs, group tables) and aggregating telemetry at site controllers. Adaptation can be event-driven: the controller monitors link/device health, as well as grid events, and then applies predefined routes and queue policies. Precomputed backup paths enable immediate failover. A deny-by-default whitelist enables secure plug-and-play for known roles.
Once the physical topology and IP provisioning are complete, the SDN controller, residing in the control plane, orchestrates traffic flows between endpoints. Over a TCP/IP and ARP-based southbound interface, the controller programs flow entries into each switch, specifying match criteria (i.e., source/destination IP, TCP/UDP port, VLAN tag) and corresponding actions (forward, drop, modify) based on real-time network and power-system conditions. ARP request/reply flows are explicitly managed to populate the controller’s IP-to-MAC mappings and prevent broadcast storms. The SDN controller enforces performance isolation and security policies by tailoring these flow rules to distinct communication patterns (i.e., generation control traffic, load-shedding commands, SCADA polling). This centralized approach allows dynamic adaptation to operational changes, such as islanding events or load transients, without requiring manual reconfiguration of individual switches.
This clear separation between the data plane, modeled as SDN switches forwarding traffic, and the control plane, the SDN controller issuing flow entries, ensures that the microgrid can adapt packet routes on the fly without requiring manual reconfiguration of individual switches.
Figure 5 illustrates the practical topology of the SDN-integrated multi-microgrid system, as captured from the Flow Controller interface. At the top of the configuration is the centralized SDN controller, which provides centralized management and programming of four SDN switches. These switches interconnect all system components, enabling structured and efficient communication. The microgrid architecture comprises three microgrids (MG1, MG2, and MG3), with each microgrid’s load managed by dedicated microcontroller units (MCU1, MCU2, and MCU3, respectively). This enables centralized oversight and dynamic reconfiguration through standard network utilities.
A fourth microcontroller (MCU4) controls the load at the point of common coupling (PCC). Additionally, the system incorporates a host device, enabling remote access and configuration of the MCUs through a user-friendly web interface. Furthermore, a Wireshark network analyzer is integrated into the network, monitoring packet flow, latency, and packet loss between components.
Communication across all these system components is governed by HTTP, TCP/IP, and ARP protocols, which are explicitly programmed into the SDN controller to construct accurate and secure flow tables. These protocols ensure robust, efficient, and secure data exchanges, enhancing reliability and responsiveness throughout the interconnected microgrid system.
6. Conclusions
In conclusion, this paper has presented and experimentally validated a cyber-physical architecture that integrates SDN with interconnected DC microgrids. The proposed SDN-enabled framework enhanced efficiency and resilience through traffic isolation, deterministic routing for protection and control, and prioritized handling of high-rate sensor data under fast-rise pulsed-load disturbances. Performance was evaluated using packet captures, which included end-to-end delay, jitter, and packet-loss percentage, as well as synchronized electrical measurements, confirming accurate power sharing and stable operation. The system remained resilient under a deliberate denial-of-service attack, as default-denial policies effectively blocked unauthorized traffic while maintaining essential control and protection flows. These results verify the practical effectiveness of SDN-based security mechanisms and provide a foundation for more advanced network-security testing. Although the experiments used a specific hardware platform, the proposed architecture is universal and scalable: its core idea—centralized control, dynamic flow orchestration, and default-denial security—can be migrated to other SDN devices and real-time control platforms that comply with the OpenFlow standard. Centralized control also streamlined network management and enabled rapid configuration adjustments, establishing a robust basis for secure, efficient, and adaptive multi-microgrid deployments.
Future work will include more comprehensive testing under link failure conditions and the evaluation of additional types of cyberattacks, such as Man-in-the-Middle (MITM) and False Data Injection (FDI) attacks, as well as other advanced attack strategies. These enhancements will allow us to further validate the robustness and security of the proposed architecture.