Security of Smart Grid: From Cryptography to Artificial Intelligence

A special issue of Journal of Cybersecurity and Privacy (ISSN 2624-800X). This special issue belongs to the section "Security Engineering & Applications".

Deadline for manuscript submissions: 30 June 2026 | Viewed by 757

Special Issue Editor

Special Issue Information

Dear Colleagues,

The reliable and secure operation of smart grids depends on authentication and secure communication between nodes at all hierarchical levels of the smart grid, that is, between the central control station (SCADA) and substations, between the distributed energy resource (DER) controller and SCADA, between phasor measurement units (PMUs) and phasor data concentrators (PDCs), between DERs and the substation, and between smart meters and the utility provider. The existing standards for data communication between smart grid nodes either do not specify cybersecurity specifications for inter-node communication or permit security vulnerabilities. This Special Issue targets novel approaches for authentication, symmetric key establishment, and encryption between smart grid nodes at all hierarchical levels. Furthermore, this Special Issue targets artificial intelligence (AI)-based approaches for attack detection and mitigation at all hierarchical levels of smart grids, including the DER primary controller. These AI-based approaches aim to minimize the impact of a potential security breach and trigger post-attack control schemes for resiliency enhancement.

Dr. Arslan Munir
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 250 words) can be sent to the Editorial Office for assessment.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Journal of Cybersecurity and Privacy is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography for smart grids
  • post-quantum cryptography for smart grids
  • AI for smart grid security
  • deep learning for smart grid security
  • distributed energy resource (DER) security
  • transformer security
  • large language models (LLMs) for smart grid security
  • intrusion detection and anomaly detection in smart grid networks
  • secure communication protocols for smart grids (SCADA, IEC 61850, DNP3, etc.)
  • blockchain and distributed ledger technologies for smart grid security
  • zero-trust architectures for smart grid infrastructures
  • lightweight cryptography for constrained smart grid devices
  • hybrid classical–post-quantum cryptographic protocols in grid communications
  • hardware security modules (HSMs) and secure key management in smart grid environments
  • federated learning for smart grid security and privacy preservation
  • adversarial machine learning and robustness in smart grid AI models
  • reinforcement learning for attack detection and response in grid operations
  • graph neural networks (GNNs) for power grid anomaly detection
  • security of demand response management and advanced metering infrastructure (AMI)
  • edge and fog computing security for distributed smart grid applications
  • cloud and data center security in smart grid ecosystems
  • cyber–physical attack detection, modeling, and mitigation in smart grid systems
  • quantum machine learning for smart grid intrusion detection and forecasting
  • digital twins and simulation frameworks for testing smart grid cyber resilience
  • privacy-preserving data analytics for energy consumption data
  • regulatory and compliance frameworks for smart grid cybersecurity
  • NIST/ISO/IEC standardization and adoption for smart grid systems
  • risk assessment, threat modeling, and incident response in smart grids
  • economic and societal impacts of cyber attacks on smart grids

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Review

21 pages, 1428 KB  
Review
Encryption for Industrial Control Systems: A Survey of Application-Level and Network-Level Approaches in Smart Grids
by Mahesh Narayanan, Muhammad Asfand Hafeez and Arslan Munir
J. Cybersecur. Priv. 2026, 6(1), 11; https://doi.org/10.3390/jcp6010011 - 4 Jan 2026
Viewed by 506
Abstract
Industrial Control Systems (ICS) are fundamental to the operation, monitoring, and automation of critical infrastructure in sectors such as energy, water utilities, manufacturing, transportation, and oil and gas. According to the Purdue Model, ICS encompasses tightly coupled OT and IT layers, becoming increasingly [...] Read more.
Industrial Control Systems (ICS) are fundamental to the operation, monitoring, and automation of critical infrastructure in sectors such as energy, water utilities, manufacturing, transportation, and oil and gas. According to the Purdue Model, ICS encompasses tightly coupled OT and IT layers, becoming increasingly interconnected. Smart grids represent a critical class of ICS; thus, this survey examines encryption and relevant protocols in smart grid communications, with findings extendable to other ICS. Encryption techniques implemented at both the protocol and network layers are among the most effective cybersecurity strategies for protecting communications in increasingly interconnected ICS environments. This paper provides a comprehensive survey of encryption practices within the smart grid as the primary ICS application domain, focusing on protocol-level solutions (e.g., DNP3, IEC 60870-5-104, IEC 61850, ICCP/TASE.2, Modbus, OPC UA, and MQTT) and network-level mechanisms (e.g., VPNs, IPsec, and MACsec). We evaluate these technologies in terms of security, performance, and deployability in legacy and heterogeneous systems that include renewable energy resources. Key implementation challenges are explored, including real-time operational constraints, cryptographic key management, interoperability across platforms, and alignment with NERC CIP, IEC 62351, and IEC 62443. The survey highlights emerging trends such as lightweight Transport Layer Security (TLS) for constrained devices, post-quantum cryptography, and Zero Trust architectures. Our goal is to provide a practical resource for building resilient smart grid security frameworks, with takeaways that generalize to other ICS. Full article
(This article belongs to the Special Issue Security of Smart Grid: From Cryptography to Artificial Intelligence)
Show Figures

Figure 1

Back to TopTop