Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (179)

Search Parameters:
Keywords = smart grid cybersecurity

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1071 KB  
Article
A Tiered Classification Framework for Detecting and Diagnosing Man-in-the-Middle Attacks in Smart Grid Protocols
by Hassan N. Noura, Zaid Allal, Ola Salman and Khaled Chahine
Future Internet 2026, 18(4), 220; https://doi.org/10.3390/fi18040220 - 21 Apr 2026
Abstract
The increasing reliance on smart grid communication systems has significantly raised the demand for robust cybersecurity measures to defend against advanced threats. This paper proposes a two-tier classification framework to enhance the detection and diagnosis of man-in-the-middle attacks within smart grid communication protocols. [...] Read more.
The increasing reliance on smart grid communication systems has significantly raised the demand for robust cybersecurity measures to defend against advanced threats. This paper proposes a two-tier classification framework to enhance the detection and diagnosis of man-in-the-middle attacks within smart grid communication protocols. Initially, the model detects the presence of an attack and then identifies the specific type of man-in-the-middle attack through subsequent inferences. To achieve this, the “Man-in-the-Middle Attacks Targeting Modbus TCP/IP and MMS Protocols in the Smart Grid” dataset was carefully preprocessed and analyzed to better understand the underlying hidden characteristics. This understanding, coupled with existing works on fault detection and diagnosis, facilitated the engineering of new features from the original dataset. Four classifiers were employed in each tier: Random Forest, XGBoost, LightGBM, and CatBoost. The first tier exhibited exceptional performance, with the CatBoost framework achieving 99.6% accuracy. The second tier also demonstrated strong results, with the same model achieving 99.1% accuracy. Systematic model explainability was conducted using SHapley Additive exPlanations for both tiers and revealed that the highest accuracy was achieved using five features for the first and six for the second. The average inference time was approximately 4.76 milliseconds. The proposed framework is accurate, fast, interpretable, lightweight, and well-optimized for direct implementation in smart grid systems to detect and diagnose man-in-the-middle attacks. Full article
(This article belongs to the Special Issue Artificial Intelligence in Smart Grids)
48 pages, 13773 KB  
Review
The Smart City from the Energy Perspective
by Florentin-Robert Drăgan, Lucian Toma and Irina-Ioana Picioroagă
Energies 2026, 19(8), 1993; https://doi.org/10.3390/en19081993 - 21 Apr 2026
Abstract
The accelerated development of Smart Cities globally, driven by rapid urbanization and urgent climate challenges, underscores the critical role of advanced energy infrastructures integrated with emerging digital technologies. This article explores the evolution of smart cities from an energy-centric viewpoint, emphasizing the interdependence [...] Read more.
The accelerated development of Smart Cities globally, driven by rapid urbanization and urgent climate challenges, underscores the critical role of advanced energy infrastructures integrated with emerging digital technologies. This article explores the evolution of smart cities from an energy-centric viewpoint, emphasizing the interdependence among energy systems, digitalization and cutting-edge communication technologies. Adopting a system-of-systems perspective, we examine how different urban subsystems, including energy grids, transportation networks and data management systems, interact to improve overall urban functionality and long-term viability. Through a structured analysis of recent literature, we highlight the transformative potential of renewable energy integration, intelligent energy management systems and the crucial transition from 5G to 6G communication infrastructures, which collectively promise significant enhancements in urban sustainability, efficiency and resilience. Additionally, we address key challenges such as cybersecurity vulnerabilities, fragmented standardization frameworks and the need for comprehensive data governance. Viewing smart cities as a complex system of systems, this article argues for a holistic and interdisciplinary approach, emphasizing enhanced interoperability, robust cybersecurity protocols and inclusive participatory governance frameworks. Full article
(This article belongs to the Special Issue Digital Engineering for Future Smart Cities)
Show Figures

Figure 1

39 pages, 2670 KB  
Review
Renewable Energy Applications Across Engineering Disciplines: A Comprehensive Review
by Mustafa Sacid Endiz, Atıl Emre Coşgun, Hasan Demir, Mehmet Zahid Erel, İsmail Çalıkuşu, Elif Bahar Kılınç, Aslı Taş, Mualla Keten Gökkuş and Göksel Gökkuş
Appl. Sci. 2026, 16(8), 3949; https://doi.org/10.3390/app16083949 - 18 Apr 2026
Viewed by 143
Abstract
Renewable energy technologies are becoming more and more relevant in a variety of engineering fields as a result of the move toward low-carbon, sustainable energy systems. Although research has historically concentrated on power generation, it now covers a broad range of applications, including [...] Read more.
Renewable energy technologies are becoming more and more relevant in a variety of engineering fields as a result of the move toward low-carbon, sustainable energy systems. Although research has historically concentrated on power generation, it now covers a broad range of applications, including precision agriculture, smart grids, energy storage, healthcare devices, and sustainable buildings. However, existing review studies are often limited to single disciplines or specific technologies, lacking a unified cross-disciplinary perspective that captures the interconnected nature of modern renewable energy systems. This gap motivates the need for a comprehensive review that bridges multiple engineering domains. This review provides a comprehensive synthesis of literature on renewable energy applications in electrical and electronics, computer, environmental, biomedical, architectural, and agricultural engineering. In electrical and electronics engineering, the use of renewable energy sources is largely based on the efficient generation of electricity from natural resources such as solar, wind, and ocean energy. Computer engineering contributes through artificial intelligence (AI), Internet of Things (IoT) architectures, digital twins, and cybersecurity solutions, optimizing energy management. Environmental engineering emphasizes life cycle assessment, carbon footprint reduction, and circular economy strategies. In biomedical engineering, energy harvesting and self-powered devices illustrate micro-scale applications of renewable energy. Architectural engineering integrates renewable systems through building-integrated photovoltaics, net-zero energy designs, and smart building management, while agricultural engineering uses solar-powered irrigation, biomass utilization, agrivoltaic systems, and other sustainable practices. To support a low-carbon future with integrated and sustainable engineering solutions, this study not only highlights innovations within individual fields but also showcases how different disciplines can connect and work together. Overall, the review offers a novel cross-disciplinary framework that advances the understanding of renewable energy systems beyond isolated applications and provides direction for future integrative research. Full article
(This article belongs to the Section Electrical, Electronics and Communications Engineering)
24 pages, 806 KB  
Article
EGGA: An Error-Guided Generative Augmentation and Optimized ML-Based IDS for EV Charging Network Security
by Li Yang and G. Kirubavathi
Future Internet 2026, 18(4), 202; https://doi.org/10.3390/fi18040202 - 13 Apr 2026
Viewed by 242
Abstract
Electric Vehicle Charging Systems (EVCSs) are increasingly connected with the Internet of Things (IoT) and smart grid infrastructure, yet they face growing cyber risks due to expanded attack interfaces. These systems are vulnerable to various attacks that potentially impact both charging operations and [...] Read more.
Electric Vehicle Charging Systems (EVCSs) are increasingly connected with the Internet of Things (IoT) and smart grid infrastructure, yet they face growing cyber risks due to expanded attack interfaces. These systems are vulnerable to various attacks that potentially impact both charging operations and user privacy. Intrusion Detection Systems (IDSs) are essential for identifying suspicious activities and mitigating risks to protect EVCS networks, but conventional ML-based IDSs are often unable to achieve optimal performance due to imbalanced datasets, complex traffic distributions, and human design limitations. In practice, EVCS traffic is typically multi-class, imbalanced, and safety-critical, where both missed attacks and false alarms can lead to denial of charging, service interruption, unnecessary incident escalation, financial loss, and reduced user trust. Automated ML (AutoML) and Generative Artificial Intelligence (GAI) have emerged as promising solutions in cybersecurity. Existing GAI and augmentation methods are mostly class-frequency-driven, but this does not necessarily improve the error-prone regions where IDSs actually fail. In this paper, we propose a GAI and an AutoML-based IDS that incorporates a Conditional Generative Adversarial Network (cGAN) with the optimized XGBoost model to improve the effectiveness of intrusion detection in EVCS networks and IoT systems. The proposed framework involves two techniques: (1) a novel cGAN-based error-guided generative augmentation (EGGA) method that extracts misclassified samples and generates a more robust training set for IDS development, and (2) an optimized IDS model that automatically constructs an optimized XGBoost model based on Bayesian Optimization with Tree-structured Parzen Estimator (BO-TPE). The main algorithmic novelty lies in EGGA, which uses model errors to guide generative augmentation toward difficult decision regions, while the overall pipeline represents a practical system-level integration of EGGA, XGBoost, and BO-TPE. To the best of our knowledge, this is the first work that combines GAI and AutoML to specifically improve detection on hard samples, enabling more autonomous and reliable identification of diverse cyber attacks in EV charging networks and IoT systems. Experiments are conducted on two benchmark EVCS and cybersecurity datasets, CICEVSE2024 and CICIDS2017, demonstrating consistent and statistically meaningful improvements over state-of-the-art IDS models. This research highlights the importance of combining automation, generative balancing, and optimized learning to strengthen cybersecurity solutions for EV charging networks and IoT systems. Full article
Show Figures

Figure 1

52 pages, 3234 KB  
Perspective
Edge-Intelligent and Cyber-Resilient Coordination of Electric Vehicles and Distributed Energy Resources in Modern Distribution Grids
by Mahmoud Ghofrani
Energies 2026, 19(8), 1867; https://doi.org/10.3390/en19081867 - 10 Apr 2026
Viewed by 431
Abstract
The rapid electrification of transportation and proliferation of distributed energy resources (DERs) are transforming distribution grids into highly dynamic, data-intensive, and cyber-physical systems. While reinforcement learning (RL), multi-agent coordination, and edge computing offer powerful tools for adaptive control, their deployment in safety-critical utility [...] Read more.
The rapid electrification of transportation and proliferation of distributed energy resources (DERs) are transforming distribution grids into highly dynamic, data-intensive, and cyber-physical systems. While reinforcement learning (RL), multi-agent coordination, and edge computing offer powerful tools for adaptive control, their deployment in safety-critical utility environments raises concerns regarding stability, certification compatibility, cyber-resilience, and regulatory acceptance. This paper presents an architecture-centric framework for edge-intelligent and cyber-resilient coordination of electric vehicles (EVs) and DERs that reconciles adaptive learning with deterministic safety guarantees. The proposed hierarchical edge–cloud architecture integrates multi-agent system (MAS) coordination, constraint-invariant reinforcement learning, and embedded cybersecurity mechanisms within a structured control hierarchy. Learning-enabled edge agents operate exclusively within standards-compliant safety envelopes enforced through supervisory constraint projection, control barrier functions, and Lyapunov-consistent stability safeguards. Protection-critical functions remain deterministic and isolated from adaptive layers, preserving compatibility with IEEE 1547 and existing utility protection schemes. The framework further incorporates anomaly triggered policy freezing, fail-safe fallback modes, and communication-aware resilience mechanisms to prevent unsafe transient behavior in non-stationary, distributed environments. Unlike simulation-only learning approaches, the architecture embeds progressive validation through software-in-the-loop (SIL), hardware-in-the-loop (HIL), and power hardware-in-the-loop (PHIL) testing to empirically verify transient stability, constraint compliance, and cyber-resilience under realistic timing and disturbance conditions. Beyond technical performance, the paper situates edge intelligence within standards evolution, governance structures, workforce transformation, techno-economic assessment, and equitable deployment pathways. By framing adaptive control as a bounded, auditable augmentation layer rather than a disruptive replacement for certified infrastructure, the proposed architecture provides a pragmatic roadmap for evolutionary modernization of distribution systems. Full article
(This article belongs to the Section E: Electric Vehicles)
Show Figures

Figure 1

41 pages, 3582 KB  
Review
Vehicle-to-Grid Integration in Smart Energy Systems: An Overview of Enabling Technologies, System-Level Impacts, and Open Issues
by Haozheng Yu, Congying Wu and Yu Liu
Machines 2026, 14(4), 418; https://doi.org/10.3390/machines14040418 - 9 Apr 2026
Viewed by 430
Abstract
Vehicle-to-grid (V2G) technology has emerged as a key enabler for coupling large-scale electric vehicle (EV) deployment with the operation of smart energy systems. By allowing bidirectional power and information exchange between EVs and the grid, V2G transforms EVs from passive loads into distributed [...] Read more.
Vehicle-to-grid (V2G) technology has emerged as a key enabler for coupling large-scale electric vehicle (EV) deployment with the operation of smart energy systems. By allowing bidirectional power and information exchange between EVs and the grid, V2G transforms EVs from passive loads into distributed energy resources capable of supporting grid flexibility, reliability, and renewable energy integration. However, the practical realization of V2G remains challenged by technical complexity, system coordination, user participation, and regulatory constraints. This paper presents a comprehensive review of V2G integration from a system-level perspective. Rather than focusing solely on individual technologies, the review examines how V2G is embedded within smart energy systems, emphasizing the interactions among EVs, aggregators, grid operators, energy markets, and end users. Key enabling technologies, including bidirectional charging, aggregation mechanisms, communication frameworks, and data-driven control strategies, are discussed in relation to their system-level roles and limitations. The impacts of V2G on grid operation, energy management, and market participation are analyzed, with particular attention to reliability, battery lifetime, and user trust. Furthermore, this review identifies critical open issues that hinder large-scale deployment, spanning infrastructure readiness, standardization, economic incentives, and cybersecurity. Emerging application scenarios, such as building-integrated V2G, fleet-based services, and artificial intelligence (AI) supported coordination, are also discussed to illustrate potential evolution pathways. By synthesizing technological developments with system-level impacts and unresolved challenges, this paper aims to provide a structured reference for researchers, system planners, and policymakers seeking to advance the integration of V2G into future smart energy systems. Full article
Show Figures

Figure 1

20 pages, 1504 KB  
Article
Decision-Support Framework for Cybersecurity Risk Assessment in EV Charging Infrastructure
by Roberts Grants, Nadezhda Kunicina, Rasa Brūzgienė, Šarūnas Grigaliūnas and Andrejs Romanovs
Energies 2026, 19(8), 1814; https://doi.org/10.3390/en19081814 - 8 Apr 2026
Viewed by 300
Abstract
Rapid expansion of electric vehicle adoption has led to increased dependence on a charging infrastructure that is tightly integrated with energy distribution systems and digital communication networks. As electric vehicle charging stations evolve into complex cyber–physical systems, cybersecurity risks pose a growing threat [...] Read more.
Rapid expansion of electric vehicle adoption has led to increased dependence on a charging infrastructure that is tightly integrated with energy distribution systems and digital communication networks. As electric vehicle charging stations evolve into complex cyber–physical systems, cybersecurity risks pose a growing threat to grid reliability and user trust. This paper presents a hybrid decision-support framework for cybersecurity risk assessment in EV charging infrastructure that advances beyond prior multi-criteria decision-making approaches by combining interpretability with data-driven validation. Specifically, the framework integrates the Analytic Hierarchy Process (AHP) for expert-driven weighting of cybersecurity attributes with PROMETHEE for flexible threat prioritization, enabling transparent and auditable risk rankings. The framework categorizes cybersecurity criteria across four infrastructure layers—transmission, distribution, consumer, and electric vehicle charging stations—and assigns relative weights through expert-driven pairwise comparisons. PROMETHEE is then applied to rank potential cyber threats based on these weights, allowing for flexible prioritization of cybersecurity interventions. The methodology is validated using the real-world WUSTL-IIoT-2018 SCADA dataset, which includes simulated reconnaissance (network scanning), device identification, and exploitation attacks. While this dataset does not natively include OCPP 2.0 or ISO 15118 protocols, the experimental results demonstrate strong discrimination power (AUC = 0.99, recall = 95%) and provide a basis for extension to modern EVSE communication standards. The results identify critical metrics such as anomalous source packet behavior and encryption reliability as key vulnerability markers, aligning with documented EV charging attack scenarios. By bridging expert judgment with empirical traffic data, the proposed framework offers both technical robustness and explainability, supporting grid operators, SOC teams, and infrastructure planners in systematically assessing risks, allocating resources, and enhancing the resilience of EV charging ecosystems against evolving cyber threats. Full article
Show Figures

Figure 1

20 pages, 1442 KB  
Article
FedTheftDetect: Optimizing Anomaly Detection in Smart Grid Metering Systems Using Federated Learning
by Samar M. Nour, Ahmed Rady, Mohammed S. Hussien, Sameh A. Salem and Samar A. Said
Computers 2026, 15(4), 202; https://doi.org/10.3390/computers15040202 - 25 Mar 2026
Viewed by 453
Abstract
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection [...] Read more.
The detection of anomaly energy consumption patterns in smart grid metering systems remains a critical issue. This is due to data imbalance, privacy constraints, and the dynamic nature of consumption patterns. To address these concerns, we present a privacy-preserving and scalable anomaly detection framework named as FedTheftDetect framework. The proposed framework integrates deep learning algorithms into a federated learning (FL) architecture through the incorporation of advanced ensemble classifiers to detect behavioral anomalies in daily consumption patterns. A real-world smart meter dataset with significant class imbalance is used to assess the suggested framework. The dataset had significant preprocessing to identify consumption-related anomalies in behavior. Experimental results demonstrate that the suggested framework outperforms the competitive centralized and distributed models. It achieves significant improvements in Accuracy, Precision, Recall, and F1-score, all of which are close to 0.95, which indicates a great predictive capability and reliability. Full article
(This article belongs to the Section ICT Infrastructures for Cybersecurity)
Show Figures

Figure 1

33 pages, 2907 KB  
Article
Reimagining Bitcoin Mining as a Virtual Energy Storage Mechanism in Grid Modernization: Enhancing Security, Sustainability, and Resilience of Smart Cities Against False Data Injection Cyberattacks
by Ehsan Naderi
Electronics 2026, 15(7), 1359; https://doi.org/10.3390/electronics15071359 - 25 Mar 2026
Viewed by 634
Abstract
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and [...] Read more.
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and controllable load capable of delivering large-scale demand response services, positioning it as a competitive alternative to traditional energy storage systems, including electrical, mechanical, thermal, chemical, and electrochemical storage solutions. By strategically aligning mining activities with grid conditions, Bitcoin mining can absorb excess electricity during periods of oversupply, converting it into digital assets, and reduce operations during times of scarcity, effectively emulating the behavior of conventional energy storage systems without the associated capital expenditures and material requirements. Beyond its operational flexibility, this paper explores the cyber–physical benefits of integrating Bitcoin mining into the power transmission systems as a defensive mechanism against false data injection (FDI) cyberattacks in smart city infrastructure. To achieve this goal, a decentralized and adaptive control strategy is proposed, in which mining loads dynamically adjust based on authenticated grid-state information, thereby improving system observability and hindering adversarial efforts to disrupt state estimation. In addition, to handle the proposed approach, this paper introduces a high-performance algorithm, a combination of quantum-augmented particle swarm optimization and wavelet-oriented whale optimization (QAPSO-WOWO). Simulation results confirm that strategic deployment of mining loads improves grid sustainability by utilizing curtailed renewables, enhances resilience by mitigating load-generation imbalances, and bolsters cybersecurity by reducing the impacts of FDI attacks. This work lays the foundation for a transdisciplinary paradigm shift, positioning Bitcoin mining not as a passive energy consumer but as an active participant in securing and stabilizing the future power grid in smart cities. Full article
Show Figures

Figure 1

23 pages, 6306 KB  
Article
Trustless Federated Reinforcement Learning for VPP Dispatch
by Xin Zhang and Fan Liang
Electronics 2026, 15(6), 1303; https://doi.org/10.3390/electronics15061303 - 20 Mar 2026
Viewed by 295
Abstract
Large-scale Virtual Power Plants (VPPs) are increasingly essential as Distributed Energy Resources (DERs) assume ancillary service duties once supplied by conventional generation, yet scaling a VPP exposes a persistent trilemma among economic efficiency, data privacy, and operational security. Centralized coordination can approach optimal [...] Read more.
Large-scale Virtual Power Plants (VPPs) are increasingly essential as Distributed Energy Resources (DERs) assume ancillary service duties once supplied by conventional generation, yet scaling a VPP exposes a persistent trilemma among economic efficiency, data privacy, and operational security. Centralized coordination can approach optimal revenue but requires collecting fine-grained DER operational data and creates a single point of compromise. Federated Learning (FL) mitigates raw data centralization by keeping measurements and experience local, but it introduces a fragile trust assumption that the aggregator will correctly and fairly combine model updates. This trust gap is acute in reinforcement learning-based VPP control because aggregation deviations, including selectively dropping updates, manipulating weights, replaying stale models, or injecting a replacement model, can silently bias the learned policy and degrade both profit and compliance. We propose a zero-knowledge federated reinforcement learning framework for trustless VPP coordination in which each DER trains a local deep reinforcement learning agent to solve a multi-objective dispatch problem that balances ancillary service revenue against battery degradation under operational and grid constraints, while the global aggregation step is made externally verifiable. In each round, participants bind membership via signed receipts and commit to their updates, and the aggregator produces a zk-SNARK, proving that the published global parameters equal the agreed aggregation rule applied to the receipt-bound set of committed updates under a fixed-point encoding with range constraints. Verification is lightweight and can be performed independently by each DER, removing the need to trust the aggregator for aggregation integrity without centralizing raw DER operational data or trajectories. The proposed design does not aim to hide model updates from the aggregator. Instead, it provides external verifiability of the aggregation computation while keeping raw measurements and local experience. We formalize the threat model and verifiable security properties for aggregation correctness and update inclusion, present a circuit construction with proof complexity characterized by model dimension and fleet size, and evaluate the approach in power and cyber co-simulation on the IEEE 33 bus feeder with ancillary service signals. Results show near-centralized economic performance under benign conditions and improved robustness to aggregator side deviations compared to standard federated reinforcement learning. Full article
Show Figures

Figure 1

37 pages, 2922 KB  
Review
AI-Enabled Integration of Smart Grids and Green Hydrogen: A System-Level Review of Flexibility, Control, and Cyber-Physical Energy Systems
by Mariem Bibih, Karim Choukri, Mohamed El Khaili and Houssam Eddine Chakir
Appl. Sci. 2026, 16(5), 2504; https://doi.org/10.3390/app16052504 - 5 Mar 2026
Viewed by 807
Abstract
The rapid digitalization of power systems and the growing penetration of variable renewable energy sources have intensified the need for flexible and resilient smart-grid architectures capable of coordinating cross-sector energy flows. This review aims to provide a system-level synthesis of the artificial-intelligence-enabled integration [...] Read more.
The rapid digitalization of power systems and the growing penetration of variable renewable energy sources have intensified the need for flexible and resilient smart-grid architectures capable of coordinating cross-sector energy flows. This review aims to provide a system-level synthesis of the artificial-intelligence-enabled integration of smart grids and green hydrogen, explicitly addressing coordination across physical infrastructure, digital control layers, market mechanisms, and environmental constraints. Following the PRISMA 2020 framework, 142 high-relevance studies published between 2010 and 2025 were systematically screened and classified into five interdependent thematic pillars: demand-side flexibility, ICT and IoT infrastructures, cybersecurity and resilience, communication and control performance, and AI-based optimization and decision-making. The synthesis reveals three principal findings. First, while core technologies such as photovoltaics, battery storage, and proton exchange membrane electrolyzers exhibit high component-level maturity, system-integration readiness remains limited by interoperability, communication latency, cybersecurity compliance, and market eligibility constraints. Second, electrolyzers can technically provide fast-response and multi-timescale flexibility services, yet their economic viability depends strongly on market product granularity, settlement intervals, and regulatory frameworks. Third, environmental and resource constraints, including water availability and material criticality, are emerging as binding factors that must be embedded directly into planning and optimization models. Overall, the review positions artificial intelligence as a cross-layer coordination mechanism that links operational control, digital observability, market participation, and sustainability boundaries, providing an integrated architecture to guide scalable and resilient smart grid–hydrogen deployment. Full article
(This article belongs to the Special Issue AI Technologies Applied to Energy Systems and Smart Grids)
Show Figures

Figure 1

36 pages, 721 KB  
Article
A Survey on IoT-Based Smart Electrical Systems: An Analysis of Standards, Security, and Applications
by Chiara Matta, Sara Pinna, Samoel Ortu, Francesco Parodo, Daniele Giusto and Matteo Anedda
Energies 2026, 19(4), 965; https://doi.org/10.3390/en19040965 - 12 Feb 2026
Viewed by 841
Abstract
The rapid integration of Internet of Things (IoT) technologies is transforming electrical power systems into intelligent, interconnected, and data-driven infrastructures, enabling advanced monitoring, control, and optimization across the entire energy value chain. IoT-based smart electrical systems enable advanced monitoring, control, and optimization of [...] Read more.
The rapid integration of Internet of Things (IoT) technologies is transforming electrical power systems into intelligent, interconnected, and data-driven infrastructures, enabling advanced monitoring, control, and optimization across the entire energy value chain. IoT-based smart electrical systems enable advanced monitoring, control, and optimization of energy generation, distribution, and consumption, while also introducing new challenges related to interoperability, security, scalability, and data management. Despite the growing body of literature, existing surveys typically address these challenges in isolation, focusing on individual technological or operational aspects and thus failing to capture their strong cross-dependencies in real-world deployments. This paper delivers a comprehensive survey that systematically analyzes and interrelates nine key dimensions that prior literature largely examines in separate silos: architectural models, communication protocols, reference standards, cybersecurity and privacy mechanisms, data processing paradigms (edge, fog, and cloud), interoperability solutions, energy management strategies, application scenarios, and future research directions. Unlike conventional reviews confined to single-layer or domain-specific perspectives, this survey adopts a holistic, cross-layer approach, explicitly linking architectural choices, protocol stacks, interoperability frameworks, and security mechanisms with application and energy management requirements. Full article
(This article belongs to the Section F5: Artificial Intelligence and Smart Energy)
Show Figures

Figure 1

39 pages, 1831 KB  
Review
Enhancing EV Charging Resilience: A Review of Blockchain and Cybersecurity Applications
by Gonesh Chandra Saha, Ahmed Afif Monrat and Karl Andersson
J. Cybersecur. Priv. 2026, 6(1), 33; https://doi.org/10.3390/jcp6010033 - 12 Feb 2026
Viewed by 864
Abstract
The rapid expansion of electric vehicles (EVs) has added complexity to the resilience and security challenges to the EV charging systems, especially owing to the exposure to the cyber–physical threats and the reliance on centrally coordinated systems. Although the previous literature has discussed [...] Read more.
The rapid expansion of electric vehicles (EVs) has added complexity to the resilience and security challenges to the EV charging systems, especially owing to the exposure to the cyber–physical threats and the reliance on centrally coordinated systems. Although the previous literature has discussed the use of blockchain in the context of smart grids and mobility services; its implementation to improve the resilience of EV charging, particularly when integrated with cybersecurity systems, is still insufficiently synthesized. Despite these issues, critical gaps persist in terms of scalability, interoperability, and cybersecurity enforcement. This study presents an exploratory literature review that examines the intersection of blockchain and cybersecurity enabled applications and introduces a comparative framework evaluating the conventional security controls with blockchain based cybersecurity solutions to improve the resilience of EV charging infrastructure. The authors analyzed 70 studies published between 2018 and 2025 to determine the security weaknesses and map them to decentralized solutions. Reported threats, security mechanisms, architectural decisions, and levels of validation were grouped and reviewed critically in the patterns of limitations with respect to scalability, interoperability, and deployment maturity. Through the synthesis of fragmented results in cross disciplinary research, the paper finds the main gaps in research and comparative research results that could be used as a comprehensive reference in future studies and system design in resilient EV charging infrastructures. Full article
(This article belongs to the Special Issue Building Community of Good Practice in Cybersecurity)
Show Figures

Graphical abstract

30 pages, 10659 KB  
Review
Smart Charging and Vehicle-to-Grid Integration of Electric Vehicles: Technical Insights, Cybersecurity Risks, and Mobility-OrientedControl Strategies
by Hamid Naseem, Pratik Goswami, Kwonhue Choi, Adeel Iqbal and Hadi Hakami
Appl. Sci. 2026, 16(4), 1748; https://doi.org/10.3390/app16041748 - 10 Feb 2026
Viewed by 1686
Abstract
Vehicle-to-Grid (V2G) technology enables controlled bidirectional energy exchange between electric vehicles (EVs) and the power grid, allowing EVs to operate as flexible storage resources that support renewable-energy integration, peak-load reduction, and ancillary services. As EV adoption grows, deploying V2G at scale requires a [...] Read more.
Vehicle-to-Grid (V2G) technology enables controlled bidirectional energy exchange between electric vehicles (EVs) and the power grid, allowing EVs to operate as flexible storage resources that support renewable-energy integration, peak-load reduction, and ancillary services. As EV adoption grows, deploying V2G at scale requires a comprehensive understanding of the electrochemical, power-electronic, communication, and mobility foundations that determine system performance. This review presents an integrated assessment of the essential components of V2G and broader Vehicle Grid Integration (VGI). First, the technical foundations are examined, including traction batteries, battery management systems, bidirectional converter topologies, charger architectures, connector standards, and grid-code compliance. Battery degradation mechanisms under V2G cycling are analyzed, with emphasis on depth of discharge, cycling frequency, and thermal conditions. Second, charging-infrastructure architectures and grid-integration considerations are evaluated across AC, DC, on-board, and off-board charging systems. Third, communication and interoperability frameworks, including ISO 15118, OCPP, OCPI, and cybersecurity requirements, are reviewed to assess the security and scalability of V2G operations. Finally, grid-aware mobility applications are discussed, covering coordinated charging, energy-aware routing, shared and autonomous mobility services, and dynamic pricing within coupled power and transport networks. The review concludes by identifying key technical and operational insights that support the development of robust V2G and VGI ecosystems. Full article
Show Figures

Figure 1

22 pages, 861 KB  
Article
STD: Sensor-Oriented Temporal Detector Against Multi-Type Load Redistribution Attacks in Smart Grid
by Yunhao Yu, Boda Zhang, Mengxiang Liu and Xuguo Jiao
Electronics 2026, 15(4), 746; https://doi.org/10.3390/electronics15040746 - 10 Feb 2026
Viewed by 304
Abstract
The modern smart grid integrates information and communication technology (ICT) with electronic devices, but this integration introduces cybersecurity risks. Load measurements, crucial for grid operation, are vulnerable to attacks, particularly Load Redistribution Attacks (LRAs). LRAs maliciously alter load readings to mislead control systems [...] Read more.
The modern smart grid integrates information and communication technology (ICT) with electronic devices, but this integration introduces cybersecurity risks. Load measurements, crucial for grid operation, are vulnerable to attacks, particularly Load Redistribution Attacks (LRAs). LRAs maliciously alter load readings to mislead control systems without being detected by conventional methods. This paper first introduces two advanced LRA variants: a stealthy-enhanced LRA designed to bypass sophisticated data-driven detectors, and an impact-enhanced LRA engineered to cause significant operational disruptions, such as increased generation costs. To address these evolving threats, we propose a novel Sensor-oriented Temporal Detector (STD). Unlike existing methods that often rely on aggregate data or labeled attack examples, our STD focuses on the unique temporal patterns of individual sensor measurements. It achieves this by combining principal subspace projection to identify normal data subspaces with sequential change extraction to detect subtle deviations over time. This approach allows the STD to identify various LRA types effectively, even without prior knowledge of attack signatures. Extensive simulations validate the destructive impact of our proposed LRA variants and demonstrate the superior detection performance of the STD against these sophisticated attacks. Full article
Show Figures

Figure 1

Back to TopTop