Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation
Abstract
:1. Introduction
- Application;
- Security;
- Communication;
- Control of Power;
- Power system.
- Interaction control framework security;
- Smart meter measurement security;
- Assessment of power system status security;
- Intelligent network communication convention security;
- Security analysis with SG simulation.
- A thorough discussion on changing paradigms in power systems is presented. Different levels of communication and information exchange are discussed so that readers can grasp why smart grid cybersecurity became important in recent times.
- Different communication standards used in power system communication are studied. Issues that are unique to each standard and the protocols it uses are presented. Benefits and drawbacks of using single or multiple standards in a system are presented.
- A thorough review of SG attacks is performed so that readers can understand the types of attacks and their impacts on the system. Among these attacks, FDI attacks have significant potential to disrupt power system operation or cause damages. For this reason, a survey is performed on techniques developed to detect FDI attacks.
- Based on the discussions and insights of this work, future research directions are provided.
2. Cybersecurity Vulnerabilities in Smart Grids and Mitigation Requirements
- Power grid vulnerabilities at the time of the cyber-attack;
- The facilitate of infraction to the control system;
- Describe the ease of earning control over the management system.
2.1. Cyber Security Requirements in SGs
- Examining the firewalls of communication systems and the vulnerabilities in the protocols;
- Based on attacks on energy transmission and distribution systems;
- Applied for remote control security of the devices connected to the system.
2.2. Security Standards of Communication Systems Mitigation
- The ISO 27,001 standard is vital in providing communication security. It defines the functions that must be performed within the scope of living information security. Information security management system (ISMS) standard defines the organizations’ needs to establish an ISMS. ISO/IEC 27,001 consists of twelve parts. These are risk operation, security of human resources, security policy, physical security, environmental security, communication and operation management, asset management, entry control, development and reparation, information security management, acquisition and business permanence management submission [33].
- The NIST standard started with the priorities determined by for SGs and added the subjects it determined. The eight priorities identified are: Meeting the demands and consumer energy adequacy, Large area application awareness, Energy storage, Electricity transport, Advanced measurement infrastructure, Distribution network management, Cybersecurity, and Network communication [41,42].
- The FERC SSEMP standard sets the standards that must be followed in communication networks connected to power systems [42].
- The Common Criteria (CC) that can be evaluated among the standards is internationally accepted SC evaluation criteria for information technology products. They were created as a result of the merger of The Information Technology Security Evaluation Criteria (ITSEC) in Europe, Trusted Computing Security Evaluation Criteria (TCSEC) in the USA, and Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) [44] in Canada, which are accepted as information security evaluation criteria. CC are defined in the ISO/IEC 15,408 standard. It also defines the Evaluation Assurance Level (EAL) levels [44,45].
- AGA Report No. 12 Part 3 includes protection of SCADA Communications Networked Systems. It is focused on high-speed communication systems, including the Internet [44,45]. It is notable that AGA series are voluntary standards and do not mandate any companies to install encryption technology as recommended in the standards.
- Virtual Private Networks (VPNs) and Internet Protocol Security (IPSec) technologies provide the security of wired grids. A VPN system can make on top of existing CP networks, providing a safe communications contraption for message and information transmitted among two addresses. The data exchange in the middle of the web browser and the VPN device is encrypted with the Secure Sockets Layer (SSL), Transport Layer Security (TLS), SSL/TLS [46] or Secure Shell (SSH), which are high layer security mechanisms, can also be used [46,47].
- ISO/IEC 62,351 standard covers communication security issues for energy systems management and information sharing. It deals with communication protocols and network and operating systems [48]. IEC Standards provide communication and information security, security for profiles containing TCP/IP, Quality of service (QoS), mobility, multi-homing, and other enhancements essential for SG applications to be efficiently secured and well-controlled if TCP/IP is to be adopted [36].
- IEC S63 report generally includes status and advisory standards for smart grid cybersecurity requirements. It covers industrial security standards, access controls, identity management, secure network, wired and wireless connection standards [48].
- IEC 61,850 structure provides digital fast communication and use Internet Protocol (IP) based addresses [52].
- Federal Information Processing Standard (FIPS) certifies the Advanced Encryption Standard (AES) [53].
- Triple Data Encryption Standard (3DES) [54] for robust security and high performance.
2.3. Security Standards of Generation, Distribution, and Transmission Systems Mitigation
- IEEE 2030-2011 Standard provides a guide for SGs electrical power systems, and energy technologies can be used together. It is the first combined application that includes IEEE 2030 standards in smart grids. Three additional standards complement in [62].
- IEEE P2030.1, Guidelines for Electrically Based Transport Infrastructures.
- IEEE P2030.2, Guidelines on the Interoperability of Energy Storage Systems Integrated in Electric Power Infrastructures.
- IEEE P2030.3, Guide to Test Practices for Electrical Energy Storage Equipment and Systems [62].
- NIST has proposed a 3-phase plan to fulfil the requirements of the Energy Independence and Security Treaty (EISA) and to set the standards initially required for the installation of smart grids [41]:
- To engage with stakeholders to identify applicable standards and requirements, gaps and priorities in existing standards in the open process;
- To create mutual usability of smart grids to ensure long-term operability;
- To develop and implement a framework for compliance testing and certification.
- NERC 1200 standard covers energy transmission and distribution units, and studies in NERC 1200 CIP 002-1 and CIP 009-2 series have been extended to include production facilities [42].
- Federal Energy Regulatory Commission (FERC) compliance with standards has become an obligation for the energy industry [42]. Electricity transportation and distribution network management, one of the leading departments of NIST FERC, establishes the necessary safety standards for energy transmission and distribution.
- In the IEEE 1402-2000 (R2008) standard, the security of electrical power generation and distribution stations is mostly subject to the physical level, and leakages from the electronic environment are also included [63].
- Another standard aimed at controlling data is NISTIR 7628, which includes the three following topics on risk assessment and security analysis [36,64]:
- The security architecture section: includes Cybersecurity strategy; Logical architecture, including high-level security requirements; Cryptography, and key management topics.
- Requirements section: includes privacy and smart grid issues.
- Supporting analysis and references section: concerning Vulnerability classification, Security in bottom-up smart networks analysis, Research and development on cybersecurity in smart networks, Overview of standard controls, Solutions used by switch power systems for security topics.
2.4. Security Standards of Control Systems Mitigation
- NIST SP 800-53, Standard titled security and privacy management for Federal Information Systems and Organizations (FISO), includes selecting a security control center, adapting the power lines to security control, recording control selection process, new methods and legal systems [36].
- ISA-SP99 production and control systems safety standard has been published in 2 technical report parts. The standard covers improving the accessibility, integrity and confidentiality of the elements and systems used in control. It aims to establish security control systems. It includes technical reports, specifically data to control systems, safety standards and publications [43].
- SA-99 contains advice and guidance on many security technology products for industrial automation and control systems. It deals with risk analysis, countermeasures, and cybersecurity management systems [48].
- NIST 800-82 provides a direct security checklist and provides security requirements and solutions for risk assessment studies. The standard examines the hardware and software components used in the cybersecurity infrastructure, makes recommendations for more secure network and application services, and provides examples [62]. NIST 800-82 control systems security guideline is listed under the following four sub-headings [59]:
- An overview of the reasons for security needs as well as physical measures take in control systems;
- Differences between control and communication systems within the scope of openness, threats, and events;
- Suggestions for assembling security solutions into typical grid structures found in control systems, with decompression point on network distinction implementations;
- Summary of managerial, operational, and technical controls.
- NERC 1300 standards are developed for the identification and certification of procedures. The standards can be applied to entities performing the specified activities such as control regions and generation company owners [43]. It contains comprehensive information on critical issues under the following headings [69]:
- 1301 Security Management Issues;
- 1302 Critical Cyber Assets;
- 1303 Personnel Subjects and Training;
- 1304 Electronic Security;
- 1305 Physical Security;
- 1306 System Security Management;
- 1307 Incident Response Plans;
- 1308 Recovery Plans.
3. Classifications of Cyber-Attacks in SGs
- By stopping or delaying the flow of information between the control networks, the fulfilment of critical-time functions can be prevented;
- Threshold values that can damage or deactivate or turn off the hardware by unauthorized changes in instructions, commands, or alarm;
- It may create negative environmental consequences;
- Wrong information can be sent to system operators;
- Software or configuration settings can be changed;
- Operation of security systems that may endanger human life can be intervened.
- Disruption of control and monitoring operations as a result of blocking or delay of information carried on the network;
- Endangering the lives of the environment, employees, and other people as a result of the system components being shut down, disabled, or damaged by unauthorized modification of commands, instructions, and alarm thresholds;
- The adverse effects of situations that cause operators to send inappropriate commands by sending incorrect information to system operators or hiding unauthorized changes risk people’s lives by intervening in secure systems.
3.1. Denial of Service (Dos) Attacks
3.2. Distributed Denial of Service (DDos) Attacks
3.3. Packet Sniffing Attacks
3.4. Man in the Middle (MitM) Attacks
3.5. Ip Spoofing Attacks
3.6. SQL Injection Attacks
3.7. Command Manipulation Attacks
3.8. Chameleon Attacks
3.9. Keylogger Attacks
3.10. Back Door Attacks
3.11. Supply Chain Attacks
3.12. Spywares and Malware Attacks
3.13. Trojan Horses
- Trojans appear to be harmless software that do not interfere with the system. However, when a situation arises, they will come into play and exploit times for other malicious applications.
- Stuxnet is using spread USB devices and changing the Ladder logic code of PLCs [70]. This attack involves human factors as well as technology and process management.
3.14. Rogue Devices Attacks
3.15. False Data Injection Attacks (FDIA)
- Energy-request Deceiving Attack;
- The attacker compromises demand-nodes and injects a forged quantity of demanded energy;
- Energy-supply Deceiving Attack;
- The attacker compromises supply nodes and injects a forged quantity of energy that it could provide to the grid.
- The first is to access data by infiltrating the current energy system. This way, data in sandboxes can also be manipulated.
- Second, they control data without being detected [24,25,42,78,124,125]. A successful attack can reduce the actual flow of power to destabilize energy systems [126]. As a result, FDI Attacks pose major threats to both energy systems and communication and other physical systems and are difficult to detect in real-time [100,117,127,128].
4. False Data Injection Attacks Detection Modelling and Methods
4.1. Mathematical Modelling of False Data Injection Attacks Detection
4.2. Detection Methods of FDIA
- Dimension degradation using PCA;
- Mixed Gaussian model structure using a positively labelled set;
- Collection of classification thresholds using a mixed dataset;
- An unlabelled dataset was used for testing.
- The researchers had attempted various approaches. However, no attempts to use general SG-based learning approach have been undertaken up to now.
- A few works mentioned here used classifiers as individual methods for communication or power but none used any ensemble fields method.
- NIST and FERC standards’ discussions about IPv4 and IPv6 continue. When it is needed to install or change the equipment, usage of two protocols can cause more issues and require more complex infrastructure. Furthermore, against upper-layer protocols attacks such as SQL injection and FDIA, IPv4 or IPv6 stack can be used to communicate with the client. Organizations will need time to achieve solutions for IPv6, since they have been working on IPv4 over the years [41,42,193].
- FERC does not indicate the adoption of standards or how effective they are, but given the increasing use of communication and information technology in the field of electricity and energy and the evolving nature of cyber threats, it tries to offer solutions that will help reduce the risk posed by these threats on the electricity grid, which require constant attention [41,42].
- In the Information Security Management System (ISMS) with ISO/IEC 27,000 Series, following requirements can be used to provide access to facilitate organization’s data. When the ISMS allow to access the information security requirements of customers and other stakeholders, meet the data and manage information assets to facilitate improvement and adjustment to current organizational goals [193].
- ISO/IEC 62,351, IEC 60870-5 and DNP, IEC 563’s IP usage causes devices to be vulnerable to IP-based network attacks such as IP spoofing, DoS, and others. In the usage of TCP/IP, Adequate standardization has not been achieved for the implementation of consistent security solutions. Since the security level of different wireless protocols also changes, it becomes difficult to adjust the security level of IEEE 802.11.i and IEEE 802.16.e, IEEE 61,850 standards, and it can be concluded that IEEE standards working with different protocols are more vulnerable to MitM attacks [194,195].
- AES is confirmed from many organizations because of its strong security and high performance. However, encryption technologies’ choice depends on the criticality and risks of the communication system that needs to be protected [196].
5. Conclusions
- (1)
- Machine learning/AI integrated cybersecurity systems are required since hackers are getting smarter, and attacks are getting diverse.
- (2)
- More holistic cybersecurity designs are required instead of solutions that only focus on 1 aspect of security such as access control or encryption.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Nomenclature | |
3DES | Triple Data Encryption Standard |
AEP | Advanced Encryption Standard |
ALM | Augmented Lagrange Multiplier |
ALM | Augmented Lagrange Multipliers |
AMI | Advanced Metering Infrastructures |
ANN | Artificial Neural Network |
ANN | Artificial Neural Network |
ARP | Address Resolution Protocol |
ARP | Address Resolution |
BAS | Building Automation Systems |
BDDA | Bad Data Injection Attacks |
BF | Bayesian Framework |
BMCS | Building Management Control Systems |
BPLC | Broadband PLC Technology |
BRP | Bilateral random projections |
CA | Contingency analysis |
CC | Common Criteria |
CCTV | Closed-Circuit Television Surveillance Systems |
CDBN | Conditional Deep Belief Network |
CP | Cyber-Physical |
CS | Control Systems |
CSD | Computer Security Division |
CSRC | Computer Security Resource Center |
CTCPEC | Canadian Trusted Computer Product Evaluation Criteria |
DCC | Distributed control centre |
DDos | Distributed Denial of Service Attacks |
D-FACTS | Distributed Flexible AC Transmission System |
DKF | Distributed Kalman Filter |
DNDP-ALM | Double-Noise-Dual-Problem Augmented Lagrange Multipliers |
DNP | Distributed Network Protocol Security for IEC 60870-5 |
DNP3 | Distributed Network Protocol 3 |
DoS | Denial Of Service Attacks |
DRE | Density Ratio Estimation |
DRF | Distributed Random Forests |
DSS | Digital Signage Systems |
DSVM | Distributed Support Vector Machine |
DT | Decision Tree |
DVMS | Digital Video Management Systems |
EAL | Evaluation Assurance Level |
EISA | Energy Independence and Security Treaty |
EKF | Extended Kalman filter |
EMMS | Emergency Management Systems |
EMS | Energy Management Systems |
ERT | Extremely Randomized Trees |
ESS | Electronic Security Systems |
EV | Electric Vehicle |
FDIA | False Data Injection Attacks |
FERC | Federal Energy Regulatory Commission |
FERC | Federal Energy Regulatory Commission |
FFNN | A Feed-Forward Neural Network |
FIPS | Federal Information Processing Standard |
FISO | Federal Information Systems And Organizations |
GBM | Gradient Boosting Machines |
GLM | Generalized Linear Models |
GoDec | Go Decomposition |
GOOSE | Generic Object Oriented Substations Events |
HMI | Human Machine Interfaces |
IDS | Intrusion Detection Systems |
IED | Intelligent Electronic Devices |
IEEE | Institute of Electrical and Electronics Engineers |
IoT | Internet of Things |
IP | Internet Protocol |
IPSEC | Internet Protocol Security |
ISA | International Society of Automation |
ISMS | Information security management system |
ISO/IEC | Organization for Standardization/International Electrotechnical Commission |
ISOF | Isolation forest |
IT | Information Technology |
ITSEC | The Information Technology Security Evaluation Criteria |
KF | Kalman Filter |
k-NN | Kernels Nearest Neighbors |
KPCA | Kernel Principal Component Analysis |
LMaFit | Low Rank Matrix Factorization |
LMP | Locational Market Price |
LOF | Local Outlier Factor |
LRC | Logistic Regression Classifier |
LSTM | Long Short-Term Memory |
M2M | Machine-to-Machine |
MAC | Media access control |
MINLP | Mixed-Integer Non-Linear Programming-Based |
MitM | Man in The Middle |
ML | Machine Learning |
MMS | Manufacturing Messaging Specifications |
MSA | Margin-Setting Algorithm |
MTD | Moving Target Defenses |
NARX | Nonlinear Autoregressive Exogenous |
NB | Naive Bayes |
NBPLC | Narrowband PLC Technology |
NERC | The North American Electric Reliability Corporation |
NIHS | National Institute for Hometown Security |
NIPP/CISA | National Infrastructure Protection Plan |
NIST | National Institute of Standards and Technology |
NSA | American National Security Agency |
PACS | Physical Access Control Systems |
PCA | Principal Component Analysis |
PMUs | Phasor Measurement Units |
POMDP | Partially Observable Markov Decision Process |
PSO | Particle Swarm Optimization |
PVS | Renewable Energy Photovoltaic Systems |
QoS | Quality of service |
RA | Replay Attacks |
RC | Robust Covariance |
RCPA | Robust Principal Component Analysis |
REGS | Renewable Energy Geothermal Systems |
RF | Random Forests |
RNN | Recurrent Neural Network |
RT | Real-Time |
RTU | Remote Terminal Unit |
S3VM | Semi-supervised Support Vector Machine |
SAE | Stacked Auto-Encoder |
SCED | Security-Constrained Economic |
SG | Smart Grid |
SLR | Sparse Logistic Regression |
SQL | Structured Query Language |
SSH | Secure Shell |
SSL | Secure Sockets Layer |
SVM | Support Vector Machine |
TCSEC | Trusted Computing Security Evaluation Criteria |
TLS | Transport Layer Security |
UIO | Unknown input observation |
VPN | Virtual Private Network |
ZDA | Zero Dynamics Attacks |
References
- Aleem, S.A.; Hussain, S.M.S.; Ustun, T.S. A review of strategies to increase PV penetration level in smart grids. Energies 2020, 13, 636. [Google Scholar] [CrossRef] [Green Version]
- Ustun, T.S.; Ayyubi, S. Automated network topology extraction based on graph theory for distributed microgrid protection in dynamic power systems. Electronics 2019, 8, 655. [Google Scholar] [CrossRef] [Green Version]
- Ustun, T.S.; Farooq, S.M.; Hussain, S.M.S. Implementing Secure Routable GOOSE and SV Messages Based on IEC 61850-90-5. IEEE Access 2020, 8, 26162–26171. [Google Scholar] [CrossRef]
- Fan, Z.; Kulkarni, P.; Gormus, S.; Efthymiou, C.; Kalogridis, G.; Sooriyabandara, M.; Zhu, Z.; Lambotharan, S.; Chin, W.H. Smart grid communications: Overview of research challenges, solutions, and standardization activities. IEEE Commun. Surv. Tutor. 2013, 15, 21–38. [Google Scholar] [CrossRef] [Green Version]
- Amin, S.M.; Wollenberg, B. Toward a smart grid: Power delivery for the 21st century. IEEE Power Energy Mag. 2005, 3, 34–41. [Google Scholar] [CrossRef]
- Wang, W.; Xu, Y.; Khanna, M. A survey on the communication architectures in smart grid. Comput. Netw. 2011, 55, 3604–3629. [Google Scholar] [CrossRef]
- Metke, A.R.; Ekl, R.L. Security technology for smart grid networks. IEEE Trans. Smart Grid 2010, 1, 99–107. [Google Scholar] [CrossRef]
- Unsal, D.B.; Koc, A.H.; Yalcinoz, T.; Onaran, I. Medium Voltage and Low Voltage applications of new power line communication model for smart grids. In Proceedings of the 2016 IEEE International Energy Conference, Leuven, Belgium, 4–8 April 2016. [Google Scholar] [CrossRef]
- Fan, J.; Borlase, S. The evolution of distribution. IEEE Power Energy Mag. 2009, 7, 63–68. [Google Scholar] [CrossRef]
- Clements, S.; Kirkham, H. Cyber-security considerations for the smart grid. In Proceedings of the 2008 IEEE Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24 July 2008. [Google Scholar] [CrossRef]
- Fang, X.; Misra, S.; Xue, G.; Yang, D. Smart grid—The new and improved power grid: A survey. IEEE Commun. Surv. Tutor. 2012, 14, 944–980. [Google Scholar] [CrossRef]
- Ustun, T.S.; Ozansoy, C.; Zayegh, A. Recent developments in microgrids and example cases around the world—A review. Renew. Sustain. Energy Rev. 2011, 15, 4030–4041. [Google Scholar] [CrossRef]
- Ustun, T.S.; Hussain, S.M.S. A Review of Cybersecurity Issues in Smartgrid Communication Networks. In Proceedings of the 2019 International Conference on Power Electronics, Control and Automation (ICPECA), New Delhi, India, 16–17 November 2019; Volume 2019. [Google Scholar] [CrossRef]
- Ustun, T.S.; Farooq, S.M.; Hussain, S.M.S. A novel approach for mitigation of replay and masquerade attacks in smart grids using IEC 61850 Standard. IEEE Access 2019, 7, 156044–156053. [Google Scholar] [CrossRef]
- Hussain, S.M.S.; Aftab, M.A.; Nadeem, F.; Ali, I.; Ustun, T.S. Optimal Energy Routing in Microgrids with IEC 61850 Based Energy Routers. IEEE Trans. Ind. Electron. 2020, 67, 5161–5169. [Google Scholar] [CrossRef]
- Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 161–171. [Google Scholar] [CrossRef]
- Camana Acosta, M.R.; Ahmed, S.; Garcia, C.E.; Koo, I. Extremely randomized trees-based scheme for stealthy cyber-attack detection in smart grid networks. IEEE Access 2020, 8, 19921–19933. [Google Scholar] [CrossRef]
- Congressional Research Service. Cybersecurity for Energy Delivery Systems: DOE Programs. Available online: https://crsreports.congress.gov (accessed on 10 October 2020).
- NIST. Guidelines for Smart Grid Cybersecurity; NIST: Gaithersburg, MD, USA, 2014. [CrossRef]
- Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE Trans. Ind. Inform. 2019, 16, 5643–5654. [Google Scholar] [CrossRef]
- Godfrey, T.; Mullen, S.; Griffith, D.W.; Golmie, N.; Dugan, R.C.; Rodine, C. Modeling Smart Grid Applications with Co-Simulation. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 291–296. [Google Scholar] [CrossRef]
- Kundur, D.; Feng, X.; Liu, S.; Zourntos, T.; Butler-Purry, K.L. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 244–249. [Google Scholar] [CrossRef]
- Lu, G.; De, D.; Song, W.-Z. SmartGridLab: A Laboratory-Based Smart Grid Testbed. In Proceedings of the 2010 First IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 143–148. [Google Scholar] [CrossRef]
- Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE Trans. Smart Grid 2020, 11, 2218–2234. [Google Scholar] [CrossRef]
- Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M.; Srivastava, G. Security aspects of Internet of Things aided smart grids: A bibliometric survey. Internet Things 2019, 100111. [Google Scholar] [CrossRef]
- Ustun, T.S. Cybersecurity Vulnerabilities of Smart Inverters and Their Impacts on Power System Operation. In Proceedings of the 2019 International Conference on Power Electronics, Control and Automation (ICPECA), New Delhi, India, 16–17 November 2019; Volume 2019. [Google Scholar] [CrossRef]
- Cleveland, F. Cyber security issues for Advanced Metering Infrastructure (AMI). In Proceedings of the 2008 IEEE Power and Energy Society General Meeting—Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24 July 2008. [Google Scholar] [CrossRef]
- Farooq, S.M.; Hussain, S.M.S.; Ustun, T.S.; Iqbal, A. Using ID-based Authentication and Key Agreement Mechanism for Securing Communication in Advanced Metering Infrastructure. IEEE Access 2020, 8, 210503–210512. [Google Scholar] [CrossRef]
- Wen, M.H.; Leung, K.-C.; Li, V.O.; He, X.; Kuo, C.-C.J. A survey on smart grid communication system. APSIPA Trans. Signal Inf. Process. 2015, 4, 1–20. [Google Scholar] [CrossRef] [Green Version]
- Norbert Wiener. Cybernetics or Control and Communication in the Animal and the Machine; MIT Press: Cambridge, MA, USA, 1965; Volume 25, pp. 210–252. [Google Scholar]
- Yohanandhan, R.V.; Elavarasan, R.M.; Manoharan, P.; Mihet-Popa, L. Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis with Cyber Security Applications. IEEE Access 2020, 8, 151019–151064. [Google Scholar] [CrossRef]
- Don Von Dellon. Report to NIST on the Smart Grid Interoperability Standards Roadmap, EPRI, (SB1341-09-CN-0031). January 2009. Available online: http://www.nist.gov/smartgrid/ (accessed on 19 October 2020).
- Guerrero, J.M.; Vasquez, J.C.; Teodorescu, R. Hierarchical control of droop-controlled DC and AC microgrids—A general approach towards standardization. In Proceedings of the 2009 35th Annual Conference of IEEE Industrial Electronics, Porto, Portugal, 3–5 November 2009; pp. 4305–4310. [Google Scholar] [CrossRef] [Green Version]
- Cichonski, P.; Millar, T.; Grance, T.; Scarfone, K. Computer Security Incident Handling Guide; National Institute of Standards and Technology Special Publication 800-61 Revision 2; U.S. Department of Commerce: Washington, DC, USA, 2012. [CrossRef]
- The Smart Grid Interoperability Panel—Smart Grid Cybersecurity Committee. Guidelines for Smart Grid Cyber Security, Guidelines for Smart Grid Cybersecurity Volume 1—Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements; National Institute of Standards and Technology Publication, Computer Security Division, Information Technology Laboratory 100 Bureau Drive (Mail Stop 8930); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2014. [CrossRef]
- Kiuchi, M.; Serizawa, Y. Security technologies, usage and guidelines in SCADA system networks. In Proceedings of the 2009 ICCAS-SICE, Fukuoka, Japan, 18–21 August 2009; pp. 4607–4612. [Google Scholar]
- Rohjans, S.; Uslar, M.; Bleiker, R.; Gonzalez, J.; Specht, M.; Suding, T.; Weidelt, T. Survey of Smart Grid Standardization Studies and Recommendations. In Proceedings of the 2010 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, MD, USA, 4–6 October 2010; pp. 583–588. [Google Scholar] [CrossRef]
- Hauser, C.; Bakken, D.; Bose, A. A failure to communicate: Next generation communication requirements, technologies, and architecture for the electric power grid. IEEE Power Energy Mag. 2005, 3, 47–55. [Google Scholar] [CrossRef]
- Shawkat Ali, A.B.M. Smart Grids: Opportunities, Developments, and Trends; Springer: London, UK, 2013. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-physical system security for the electric power grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Cárdenas, A. Securing Cyber-Physical Systems (NISTIR 7916); NIST Special Publication: Gaithersburg, MD, USA, 2012.
- Gallagher, P.; Locke, G. Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0; NIST Special Publication: Gaithersburg, MD, USA, 2010. Available online: https://www.nist.gov/system/files/documents/public_affairs/releases/smartgrid_interoperability_final.pdf (accessed on 23 October 2020).
- Goel, S.; Hong, Y. Security Challenges in Smart Grid Implementation; Springer: London, UK, 2015; pp. 1–39. [Google Scholar]
- Cisswg, N. A Summary of Control System Security Standards Activities in the Energy Sector Enhancing Control Systems Security in the Energy Sector NSTB; U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Publishing: USA, 2005. Available online: https://www.energy.gov/sites/prod/files/Summary%20of%20CS%20Standards%20Activities%20in%20the%20Energy%20Sector.pdf (accessed on 23 October 2020).
- Security Architecture and Design/Security Product Evaluation Methods and Criteria. Available online: https://en.wikibooks.org/wiki/Security_Architecture_and_Design/Security_Product_Evaluation_Methods_and_Criteria (accessed on 20 October 2020).
- Bačić, E.M. The Canadian trusted computer product evaluation criteria. In Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, USA, 3–7 December 2002; pp. 188–196. [Google Scholar] [CrossRef]
- Harmening, J.T. Chapter 58—Virtual Private Networks. In Computer and Information Security Handbook, 3rd ed.; Morgan Kaufmann Publishing (an Imprint of Elsevier Inc.): Burlington, MA, USA, 2017; pp. 843–856. ISBN 978-0-12-803843-7. [Google Scholar]
- Bendahmane, A.; Essaaidi, M.; El Moussaoui, A.; Younes, A. Grid computing security mechanisms: State-of-the-art. In Proceedings of the 2009 International Conference on Multimedia Computing and Systems, Ouarzazate, Morocco, 2–4 April 2009; pp. 535–540. [Google Scholar] [CrossRef]
- Falk, R.; Fries, S. Smart Grid Cyber Security—An Overview of Selected Scenarios and Their Security Implications. PIK-Prax. Inf. Kommun. 2011, 34, 168–175. [Google Scholar] [CrossRef]
- Sørensen, J.T.; Jaatun, M.G. An analysis of the manufacturing messaging specification protocol. In Lecture Notes in Computer Science (Including Subse-Ries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer Publishing 5061; Springer: Oslo, Norway, 2008; Volume 5061 LNCS, pp. 602–615. [Google Scholar] [CrossRef] [Green Version]
- East, S.; Butts, J.; Papa, M.; Shenoi, S. A taxonomy of attacks on the DNP3 protocol. In Critical Infrastructure Protection III, IFIP Advances in Information and Communication Technology; International Federation for Information Processing Publishing: Laxenburg, Austria, 2009; Volume 311, pp. 67–81. [Google Scholar] [CrossRef] [Green Version]
- IEEE. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corri [Online]. Available online: https://standards.ieee.org/standard/802_11-2016.html (accessed on 19 October 2020).
- Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to Industrial Control Systems (ICS) Security Supervisory Control and Data Acquisition. NIST Special Publication 800-82; NIST: Gaithersburg, MD, USA, 2015. [CrossRef]
- Wang, X.; Yi, P. Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2011, 2, 809–818. [Google Scholar] [CrossRef]
- Shaw, R.S.; Chen, C.C.; Harris, A.L.; Huang, H.J. The impact of information richness on information security awareness training effectiveness. Comput. Educ. 2009, 52, 92–100. [Google Scholar] [CrossRef]
- Deng, R.; Chen, J.; Cao, X.; Zhang, Y.; Maharjan, S.; Gjessing, S. Sensing-performance tradeoff in cognitive radio enabled smart grid. IEEE Trans. Smart Grid 2013, 4, 302–310. [Google Scholar] [CrossRef]
- Deep, U.D.; Petersen, B.R.; Meng, J. A smart microcontroller-based iridium satellite-communication architecture for a remote renewable energy source. IEEE Trans. Power Deliv. 2009, 24, 1869–1875. [Google Scholar] [CrossRef]
- McGranaghan, M.; Goodman, F. Technical and system requirements for advanced distribution automation. In Proceedings of the 18th International Conference and Exhibition on Electricity Distribution (CIRED 2005), Turin, Italy, 6–9 June 2005; Volume 5, pp. 477–481. [Google Scholar] [CrossRef] [Green Version]
- Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to Industrial Control Systems (ICS) Security NIST Special Publication 800-82 Revision 2; NIST Special Publication 800-82 rev 2; NIST: Gaithersburg, MD, USA, 2015; pp. 1–157. Available online: http://industryconsulting.org/pdfFiles/NISTDraft-SP800-82.pdf (accessed on 23 August 2020).
- Barmada, S.; Musolino, A.; Raugi, M.; Rizzo, R.; Tucci, M. A wavelet based method for the analysis of impulsive noise due to switch commutations in Power Line Communication (PLC) systems. IEEE Trans. Smart Grid 2011, 2, 92–101. [Google Scholar] [CrossRef]
- Hasirci, Z.; Cavdar, I.H.; Ozturk, M. Modeling and link performance analysis of busbar distribution systems for narrowband PLC. Radioengineering 2017, 26, 611–620. [Google Scholar] [CrossRef]
- Thomas Basso, R.D. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint, 2012. Available online: https://www.researchgate.net/publication/254994410_IEEE_Smart_Grid_Series_of_Standards_IEEE_2030_Interoperability_and_IEEE_1547_Interconnection_Status_Preprint (accessed on 20 October 2020).
- IEEE. 1402–2000—IEEE Guide for Electric Power Substation Physical and Electronic Security—IEEE Standard, 2008 [Online]. Available online: https://ieeexplore.ieee.org/document/836296 (accessed on 21 October 2020).
- Chan, A.C.F.; Zhou, J. On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628. IEEE Commun. Mag. 2013, 51, 58–65. [Google Scholar] [CrossRef]
- Almalawi, A.; Yu, X.; Tari, Z.; Fahad, A.; Khalil, I. An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. ACM Comput. Surv. 2014, 53, 2. [Google Scholar] [CrossRef]
- Patel, S.; Yu, Y. Analysis of SCADA Security Models. Int. Manag. Rev. 2017, 3, 68. Available online: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.4461&rep=rep1&type=pdf (accessed on 21 October 2020).
- Pires, P.S.M.; Oliveira, L.A.H.G. Security aspects of SCADA and corporate network interconnection: An overview. In Proceedings of the International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2006, Szklarska Poreba, Poland, 25–27 May 2006; pp. 127–134. [Google Scholar] [CrossRef]
- United States Government Accountability Office. Federal facility cybersecurity DHS and GSA Should Address Cyber Risk to Building and Access Control Systems Report to Congressional Requesters United States Government Accountability Office. 2014. Available online: https://www.gao.gov/products/GAO-15-6 (accessed on 21 October 2020).
- North America Electric Reliability Council. NERC Standard 1300—Cyber Security. 2004. Available online: https://www.nerc.com/pa/Stand/Pages/Cyber-Security-Permanent.aspx (accessed on 20 October 2020).
- Assante, M.J.; Lee, R.M. The Industrial Control Systems Cyber Kill Chain. In ICS Cybersecurity: Models for Success; SANS Technology Institute Publishing: Swansea, UK, 2015. [Google Scholar]
- Xue, Y.; Yu, X. Beyond Smart Grid—Cyber-Physical-Social System in Energy Future. Proc. IEEE 2017, 105, 2290–2292. [Google Scholar] [CrossRef]
- Bahati, R.; Gill, H. Cyber-Physical Systems. The Impact of Control Technology. Open J. Soc. Sci. Sci. Res. Publ. 2011, 5, 161–166. Available online: https://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?ReferenceID=2154098 (accessed on 29 October 2020).
- Friedberg, I.; McLaughlin, K.; Smith, P.; Laverty, D.; Sezer, S. STPA-SafeSec: Safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl. 2017, 34, 183–196. [Google Scholar] [CrossRef] [Green Version]
- Adamiak, M.G.; Apostolov, A.; Begovic, M.; Henville, C.; Martin, K.; Michel, G.; Phadke, A.; Thorp, J. Wide area protection—Technology and infrastructures. IEEE Trans. Power Deliv. 2006, 21, 601–609. [Google Scholar] [CrossRef]
- Hashemi-Dezaki, H.; Askarian-Abyaneh, H.; Haeri-Khiavi, H. Impacts of direct cyber-power interdependencies on smart grid reliability under various penetration levels of microturbine/wind/solar distributed generations. IET Gener. Transm. Distrib. 2016, 10, 928–937. [Google Scholar] [CrossRef]
- Jahromi, A.A.; Kemmeugne, A.; Kundur, D.; Haddadi, A. Cyber-Physical Attacks Targeting Communication-Assisted Protection Schemes. IEEE Trans. Power Syst. 2020, 35, 440–450. [Google Scholar] [CrossRef]
- Greer, C.; Wollman, D.A.; Prochaska, D.E.; Boynton, P.A.; Mazer, J.A.; Nguyen, C.T.; Fitzpatrick, G.J.; Nelson, T.L.; Koepke, G.H.; Hefner, A.R., Jr.; et al. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0; NIST Special Publication: Gaithersburg, MD, USA, 2014. [CrossRef]
- Otuoze, A.O.; Mustafa, M.W.; Larik, R.M. Smart grids security challenges: Classification by sources of threats. J. Electr. Syst. Inf. Technol. 2018, 5, 468–483. [Google Scholar] [CrossRef]
- Cárdenas, A.A.; Amin, S.; Sastry, S. Secure control: Towards survivable cyber-physical systems. In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 495–500. [Google Scholar] [CrossRef] [Green Version]
- Anderson, R. Security Engineering—A Guide to Building Dependable Distributed Systems, 3rd ed.; Wiley: New York, NY, USA, 2008; Volume 2. [Google Scholar]
- Tsegay, T. Cybersecurity Solutions for Active Power Distribution Networks. Doctorate Thesis, Lausanne Polytechnic University, Lausanne, Switzerland, 2017. [Google Scholar]
- Ayad, A.; Farag, H.; Youssef, A.; El-Saadany, E. Cyber-physical attacks on power distribution systems. IET Cyber-Phys. Syst. Theory Appl. 2020, 5, 218–225. [Google Scholar] [CrossRef]
- Arefifar, S.A.; Mohamed, Y.A.R.I.; El-Fouly, T. Optimized multiple microgrid-based clustering of active distribution systems considering communication and control requirements. IEEE Trans. Ind. Electron. 2015, 62, 711–723. [Google Scholar] [CrossRef]
- Corbett, J.; Wardle, K.; Chen, C. Toward a Sustainable Modern Electricity Grid: The Effects of Smart Metering and Program Investments on Demand-Side Management Performance in the US Electricity Sector 2009–2012. IEEE Trans. Eng. Manag. 2018, 65, 252–263. [Google Scholar] [CrossRef]
- Xu, J.; Wei, L.; Wu, W.; Wang, A.; Zhang, Y.; Zhou, F. Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber–physical system. Future Gener. Comput. Syst. 2020, 108, 1287–1296. [Google Scholar] [CrossRef]
- Tsiatsikas, Z.; Kambourakis, G.; Geneiatakis, D.; Wang, H. The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems. IEEE Access 2019, 7, 2401–2417. [Google Scholar] [CrossRef]
- Li, S.; Yilmaz, Y.; Wang, X. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids. IEEE Trans. Smart Grid 2015, 6, 2725–2735. [Google Scholar] [CrossRef]
- Hu, Z.; Wang, Y.; Tian, X.; Yang, X.; Meng, D.; Fan, R. False data injection attacks identification for smart grids. In Proceedings of the 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), Beirut, Lebanon, 29 April–1 May 2015; pp. 139–143. [Google Scholar] [CrossRef]
- Wang, D.; Guan, X.; Liu, T.; Gu, Y.; Shen, C.; Xu, Z. Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids. Energies 2014, 7, 1517–1538. [Google Scholar] [CrossRef] [Green Version]
- Bou-Harb, E.; Fachkha, C.; Pourzandi, M.; Debbabi, M.; Assi, C. Communication security for smart grid distribution networks. IEEE Commun. Mag. 2013, 51, 42–49. [Google Scholar] [CrossRef]
- Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on cyber security for smart grid communications. IEEE Commun. Surv. Tutor. 2012, 14, 998–1010. [Google Scholar] [CrossRef] [Green Version]
- Kim, J.; Tong, L. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE J. Sel. Areas Commun. 2013, 31, 1294–1305. [Google Scholar] [CrossRef]
- Huang, Y.L.; Cárdenas, A.A.; Amin, S.; Lin, Z.S.; Tsai, H.Y.; Sastry, S. Understanding the physical and economic consequences of attacks on control systems. Int. J. Crit. Infrastruct. Prot. 2019, 2, 73–83. [Google Scholar] [CrossRef]
- Ustun, T.S.; Hussain, S.M.S. An Improved Security Scheme for IEC 61850 MMS Messages in Intelligent Substation Communication Networks. J. Mod. Power Syst. Clean Energy 2020, 8, 591–595. [Google Scholar] [CrossRef]
- Geneiatakis, D.; Kambourakis, G.; Lambrinoudakis, C.; Dagiuklas, T.; Gritzalis, S. A framework for protecting a SIP-based infrastructure against malformed message attacks. Comput. Netw. 2007, 51, 2580–2593. [Google Scholar] [CrossRef]
- Xiong, Y.; Yang, Z.; Wang, B.; Xun, P.; Deng, T. False sequential command attack of large-scale cyber-physical systems. Electronics 2018, 7, 176. [Google Scholar] [CrossRef] [Green Version]
- Elyashar, A.; Uziel, S.; Paradise, A.; Puzis, R. The Chameleon Attack: Manipulating Content Display in Online Social Media. Available online: http://arxiv.org/abs/2001.05668 (accessed on 29 October 2020).
- Sagiroglu, S.; Canbek, G. Keyloggers: Increasing threats to computer security and privacy. IEEE Technol. Soc. Mag. 2009, 28, 10–17. [Google Scholar] [CrossRef]
- Gao, Y.; Doan, B.G.; Zhang, Z.; Ma, S.; Zhang, J.; Fu, A.; Nepal, S.; Kim, H. Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review. Available online: https://github.com/ (accessed on 29 October 2020).
- Mo, Y.; Kim, T.H.-J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber-physical security of a smart grid infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar] [CrossRef]
- Fuloria, S.; Anderson, R. Towards a security architecture for substations. In Proceedings of the 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Manchester, UK, 5–7 December 2011. [Google Scholar] [CrossRef] [Green Version]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14. [Google Scholar] [CrossRef]
- Rahman, M.A.; Mohsenian-Rad, H. False data injection attacks with incomplete information against smart power grids. In Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012; pp. 3153–3158. [Google Scholar] [CrossRef]
- Sou, K.C.; Sandberg, H.; Johansson, K.H. Electric Power Network Security Analysis via Minimum Cut Relaxation. In Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), Orlando, FL, USA, 12–15 December 2011; pp. 4054–4059. [Google Scholar]
- Lun, Y.Z.; D’Innocenzo, A.; Smarra, F.; Malavolta, I.; di Benedetto, M.D. State of the art of cyber-physical systems security: An automatic control perspective. J. Syst. Softw. 2019, 149, 174–216. [Google Scholar] [CrossRef] [Green Version]
- Cui, L.; Qu, Y.; Gao, L.; Xie, G.; Yu, S. Detecting false data attacks using machine learning techniques in smart grid: A survey. J. Netw. Comput. Appl. 2020, 170, 102808. [Google Scholar] [CrossRef]
- Wang, D.; Guan, X.; Liu, T.; Gu, Y.; Sun, Y.; Liu, Y. A survey on bad data injection attack in smart grid. In Proceedings of the 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), Hong Kong, China, 8–11 December 2013. [Google Scholar] [CrossRef]
- Guan, Z.; Sun, N.; Xu, Y.; Yang, T. A comprehensive survey of false data injection in smart grid. Int. J. Wirel. Mob. Comput. 2015, 8, 27–33. [Google Scholar] [CrossRef]
- Deng, R.; Zhuang, P.; Liang, H. False Data Injection Attacks Against State Estimation in Power Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 2871–2881. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z. False data attack models, impact analyses and defense strategies in the electricity grid. Electr. J. 2017, 30, 35–42. [Google Scholar] [CrossRef]
- Ashrafuzzaman, M.; Chakhchoukh, Y.; Jillepalli, A.A.; Tosic, P.T.; De Leon, D.C.; Sheldon, F.T.; Johnson, B.K. Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning. In Proceedings of the 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), Limassol, Cyprus, 25–29 June 2018; pp. 219–225. [Google Scholar] [CrossRef]
- Zhu, J. Optimization of Power System Operation, 2nd ed.; Wiley-IEEE Press: Piscataway, NJ, USA, 2015; Print ISBN: 9781118854150, Online ISBN: 9781118887004. [Google Scholar] [CrossRef]
- Peng, D.; Dong, J.; Jian, J.; Peng, Q.; Zeng, B.; Mao, Z.H. Economic-driven FDI attack in electricity market. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Blue Eyes Intelligence Engineering and Sciences Publication: Bhopal, India, 2018; Volume 11287 LNCS, pp. 216–224. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z. Trilevel Modeling of Cyber Attacks on Transmission Lines. IEEE Trans. Smart Grid 2017, 8, 720–729. [Google Scholar] [CrossRef]
- Kang, J.W.; Joo, I.Y.; Choi, D.H. False Data Injection Attacks on Contingency Analysis: Attack Strategies and Impact Assessment. IEEE Access 2018, 6, 8841–8851. [Google Scholar] [CrossRef]
- Yu, W. False Data Injection Attacks in Smart Grid: Challenges and Solutions, NIST Cyber Security for CPS Workshop, 23–24 April 2012, 8000 York Rd, Towson, MD 21252, USA. Available online: http://www.towson.edu/~wyu (accessed on 5 January 2021).
- Aoufi, S.; Derhab, A.; Guerroumi, M. Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. J. Inf. Secur. Appl. 2020, 54. [Google Scholar] [CrossRef]
- Ericsson, G.N. Cyber security and power system communication essential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 2010, 25, 1501–1507. [Google Scholar] [CrossRef]
- Liang, G.; Weller, S.R.; Luo, F.; Zhao, J.; Dong, Z.Y. Generalized FDIA-Based Cyber Topology Attack with Application to the Australian Electricity Market Trading Mechanism. IEEE Trans. Smart Grid 2018, 9, 3820–3829. [Google Scholar] [CrossRef]
- Sridhar, S.; Govindarasu, M. Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart Grid 2014, 5, 580–591. [Google Scholar] [CrossRef]
- Teixeira, A.; Shames, I.; Sandberg, H.; Johansson, K.H. Revealing stealthy attacks in control systems. In Proceedings of the 2012 50th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2012, Monticello, IL, USA, 1–5 October 2012; pp. 1806–1813. [Google Scholar] [CrossRef] [Green Version]
- Pasqualetti, F.; Dorfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Automat. Contr. 2013, 58, 2715–2729. [Google Scholar] [CrossRef] [Green Version]
- Yu, X.; Xue, Y. Smart Grids: A Cyber–Physical Systems Perspective. Available online: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7433937 (accessed on 3 November 2020).
- Savin, V.D.; Serban, C. Cybersecurity Vulnerabilities and Threats of Scada Systems in Critical Infrastructures. In Proceedings of the IMC, Amsterdam, The Netherlands, 1–3 October 2019; Volume 13, pp. 234–237. Available online: https://ideas.repec.org/a/rom/mancon/v13y2019i1p234-237.html (accessed on 29 October 2020).
- Esmalifalak, M.; Member, S.; Liu, L.; Member, S. Machine Learning in Smart Grid. IEEE Syst. J. 2014, 11, 1644–1652. [Google Scholar] [CrossRef]
- Lan, T.; Wang, W.; Huang, G.M. False data injection attack in smart grid topology control: Vulnerability and countermeasure. In Proceedings of the IEEE Power and Energy Society General Meeting, Chicago, IL, USA, 16–20 July 2017; Volume 2018-January, pp. 1–5. [Google Scholar] [CrossRef]
- Musleh, A.S.; Debouza, M.; Khalid, H.M.; Al-Durra, A. Detection of False Data Injection Attacks in Smart Grids: A Real-Time Principle Component Analysis. In Proceedings of the IECON 2019—45th Annual Conference of the IEEE Industrial Electronics Society, Lisbon, Portugal, 14–17 October 2019; Volume 2019-October, pp. 2958–2963. [Google Scholar] [CrossRef]
- Zhang, M.; Shen, C.; He, N.; Han, S.; Li, Q.; Wang, Q.; Guan, X. False Data Injection Attacks Against Smart Grid State Estimation: Construction, Detection and Defense; China Technological Sciences; Springer Nature Switzerland AG, Springer: Cham, Switzerland, 2019; Volume 62, pp. 2077–2087. [Google Scholar] [CrossRef]
- Yuan, Y.; Li, Z.; Ren, K. Modeling load redistribution attacks in power systems. IEEE Trans. Smart Grid 2011, 2, 382–390. [Google Scholar] [CrossRef]
- Musleh, A.S.; Khalid, H.M.; Muyeen, S.M.; Al-Durra, A. A prediction algorithm to enhance grid resilience toward cyber attacks in WAMCS applications. IEEE Syst. J. 2019, 13, 710–719. [Google Scholar] [CrossRef]
- He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
- Yang, Q.; Yang, J.; Yu, W.; An, D.; Zhang, N.; Zhao, W. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures Bad Data Injection in Smart Grid—Attack and Defense Mechanisms. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1–11. [Google Scholar]
- Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious data attacks on the smart grid. IEEE Trans. Smart Grid 2011, 2, 645–658. [Google Scholar] [CrossRef] [Green Version]
- Hendrickx, J.M.; Johansson, K.H.; Jungers, R.M.; Sandberg, H.; Sou, K.C. Efficient computations of a security index for false data attacks in power networks. IEEE Trans. Automat. Contr. 2014, 59, 3194–3208. [Google Scholar] [CrossRef]
- Wallace, S.; Zhao, X.; Nguyen, D.; Lu, K.T. Big Data Analytics on a Smart Grid: Mining PMU Data for Event and Anomaly Detection. In Big Data: Principles and Paradigms; Elsevier Inc.: San Leandro, CA, USA, 2016; pp. 417–429. [Google Scholar]
- Pan, S.J.; Yang, Q. A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 2010, 22, 1345–1359. [Google Scholar] [CrossRef]
- Ozay, M.; Esnaola, I.; Vural, F.T.Y.; Kulkarni, S.R.; Poor, H.V. Machine Learning Methods for Attack Detection in the Smart Grid. IEEE Trans. Neural Networks Learn. Syst. 2016, 27, 1773–1786. [Google Scholar] [CrossRef] [Green Version]
- Buzau, M.M.; Tejedor-Aguilera, J.; Cruz-Romero, P.; Gomez-Exposito, A. Detection of non-technical losses using smart meter data and supervised learning. IEEE Trans. Smart Grid 2019, 10, 2661–2670. [Google Scholar] [CrossRef]
- Hink, B.; Beaver, J.M.; Buckner, M.A.; Morris, T.; Adhikari, U.; Pan, S. Machine learning for power system disturbance and cyber-attack discrimination. In Proceedings of the 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, USA, 19–21 August 2014. [Google Scholar] [CrossRef]
- Pan, S.; Morris, T.; Adhikari, U. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems. IEEE Trans. Smart Grid 2015, 6, 3104–3113. [Google Scholar] [CrossRef]
- Kurt, M.N.; Yilmaz, Y.; Wang, X. Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2018, 14, 498–513. [Google Scholar] [CrossRef] [Green Version]
- Khalaf, M.; Youssef, A.; El-Saadany, E. Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems. IEEE Trans. Smart Grid 2018. [Google Scholar] [CrossRef]
- Karimipour, H.; Dinavahi, V. Robust Massively Parallel Dynamic State Estimation of Power Systems Against Cyber-Attack. IEEE Access 2017, 6, 2984–2995. [Google Scholar] [CrossRef]
- Khalid, H.M.; Peng, J.C.H. Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction. IEEE Trans. Smart Grid 2017, 8, 697–707. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 2017, 11, 1644–1652. [Google Scholar] [CrossRef]
- Wang, X.; Luo, X.; Zhang, M.; Guan, X. Distributed detection and isolation of false data injection attacks in smart grids via nonlinear unknown input observers. Int. J. Electr. Power Energy Syst. 2019, 110, 208–222. [Google Scholar] [CrossRef]
- Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid. IEEE Trans. Ind. Inform. 2016, 12, 1005–1016. [Google Scholar] [CrossRef]
- Wang, Y.; Amin, M.M.; Fu, J.; Moussa, H.B. A novel data analytical approach for false data injection cyber-physical attack mitigation in smart grids. IEEE Access 2017, 5, 26022–26033. [Google Scholar] [CrossRef]
- Jokar, P.; Arianpoo, N.; Leung, V.C.M. Electricity theft detection in AMI using customers’ consumption patterns. IEEE Trans. Smart Grid 2016, 7, 216–226. [Google Scholar] [CrossRef]
- Messinis, G.M.; Rigas, A.E.; Hatziargyriou, N.D. A Hybrid Method for Non-Technical Loss Detection in Smart Distribution Grids. IEEE Trans. Smart Grid 2019, 10, 6080–6091. [Google Scholar] [CrossRef]
- Costa, B.C.; Alberto, B.L.A.; Portela, A.M.; Maduro, W.; Eler, E.O. Fraud Detection in Electric Power Distribution Networks using an Ann-Based Knowledge-Discovery Process. Int. J. Artif. Intell. Appl. 2013, 4, 17–23. [Google Scholar] [CrossRef]
- Liu, X.; Nielsen, P.S. Regression-based Online Anomaly Detection for Smart Grid Data. January 2016. Available online: http://arxiv.org/abs/1606.05781 (accessed on 9 November 2020).
- de Nadai, M.; van Someren, M. Short-term anomaly detection in gas consumption through ARIMA and Artificial Neural Network forecast. In Proceedings of the 2015 IEEE Workshop on Environmental, Energy, and Structural Monitoring Systems (EESMS) Proceedings, Trento, Italy, 9–10 July 2015; pp. 250–255. [Google Scholar] [CrossRef]
- Punmiya, R.; Choe, S. Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing. IEEE Trans. Smart Grid 2019, 10, 2326–2329. [Google Scholar] [CrossRef]
- Ayad, A.; Farag, H.E.Z.; Youssef, A.; El-Saadany, E.F. Detection of false data injection attacks in smart grids using Recurrent Neural Networks. In Proceedings of the 2018 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 19–22 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Yao, D.; Wen, M.; Liang, X.; Fu, Z.; Zhang, K.; Yang, B. Energy Theft Detection with Energy Privacy Preservation in the Smart Grid. IEEE Internet Things J. 2019, 6, 7659–7669. [Google Scholar] [CrossRef]
- Hu, T.; Guo, Q.; Shen, X.; Sun, H.; Wu, R.; Xi, H. Utilizing Unlabeled Data to Detect Electricity Fraud in AMI: A Semisupervised Deep Learning Approach. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 3287–3299. [Google Scholar] [CrossRef]
- Yang, C.; Wang, Y.; Zhou, Y.; Ruan, J.; Liu, W. False Data Injection Attacks Detection in Power System Using Machine Learning Method. J. Comput. Commun. 2018, 06, 276–286. [Google Scholar] [CrossRef] [Green Version]
- Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC State Estimation. IEEE Trans. Smart Grid 2015, 6, 2476–2483. [Google Scholar] [CrossRef]
- Kurt, M.N.; Ogundijo, O.; Li, C.; Wang, X. Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach. IEEE Trans. Smart Grid 2018, 10, 5174–5185. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, S.; Lee, Y.; Hyun, S.H.; Koo, I. Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. IEEE Trans. Forensics Secur. 2019, 14, 2765–2777. [Google Scholar] [CrossRef]
- Wang, J.; Shi, D.; Li, Y.; Chen, J.; Ding, H.; Duan, X. Distributed Framework for Detecting PMU Data Manipulation Attacks with Deep Autoencoders. IEEE Trans. Smart Grid 2019, 10, 4401–4410. [Google Scholar] [CrossRef]
- Li, W.; Logenthiran, T.; Phan, V.T.; Woo, W.L. A novel smart energy theft system (SETS) for IoT-based smart home. IEEE Internet Things J. 2019, 6, 5531–5539. [Google Scholar] [CrossRef]
- Niu, X.; Li, J.; Sun, J.; Tomsovic, K. Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning. In Proceedings of the 2019 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 18–21 February 2019. [Google Scholar] [CrossRef] [Green Version]
- Liang, G.; Weller, S.R.; Zhao, J.; Luo, F.; Dong, Z.Y. A framework for cyber-topology attacks: Line-switching and new attack scenarios. IEEE Trans. Smart Grid 2019, 10, 1704–1712. [Google Scholar] [CrossRef]
- Barreto, C.; Koutsoukos, X. Design of Load Forecast Systems Resilient Against Cyber-Attacks. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Springer Nature Switzerland AG: Cham, Switzerland, 2019; Volume 11836 LNCS, pp. 1–20. [Google Scholar] [CrossRef]
- Cui, M.; Wang, J.; Yue, M. Machine Learning-Based Anomaly Detection for Load Forecasting Under Cyberattacks. IEEE Trans. Smart Grid 2019, 10, 5724–5734. [Google Scholar] [CrossRef]
- Zhou, R.; Cui, Q.; Hao, J. A reliability evaluation method of high reliability products based on evidence fusion. System Eng. Theory Pract. 2018, 38, 2979–2986. [Google Scholar] [CrossRef]
- Chakhchoukh, Y.; Liu, S.; Sugiyama, M.; Ishii, H. Statistical outlier detection for diagnosis of cyber attacks in power state estimation. In Proceedings of the 2016 IEEE Power and Energy Society General Meeting (PESGM), Boston, MA, USA, 17–21 July 2016; pp. 1–5. [Google Scholar] [CrossRef]
- Alimi, O.A.; Ouahada, K.; Abu-Mahfouz, A.M. Real Time Security Assessment of the Power System Using a Hybrid Support Vector Machine and Multilayer Perceptron Neural Network Algorithms. Sustainability 2019, 11, 3586. [Google Scholar] [CrossRef] [Green Version]
- Sun, M.; Konstantelos, I.; Strbac, G. C-Vine Copula Mixture Model for Clustering of Residential Electrical Load Pattern Data. IEEE Trans. Power Syst. 2017, 32, 2382–2393. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, S.; Lee, Y.; Hyun, S.-H.; Koo, I. Covert Cyber Assault Detection in Smart Grid Networks Utilizing Feature Selection and Euclidean Distance-Based Machine Learning. Appl. Sci. 2018, 8, 772. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, S.; Lee, Y.; Hyun, S.H.; Koo, I. Feature Selection-Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning. IEEE Access 2018, 6, 27518–27529. [Google Scholar] [CrossRef]
- Xin, Y.; Kong, L.; Liu, Z.; Chen, Y.; Li, Y.; Zhu, H.; Gao, M.; Hou, H.; Wang, C. Machine Learning, Deep Learning Methods for Cybersecurity. IEEE Access 2018, 6, 35365–35381. [Google Scholar] [CrossRef]
- Wei, L.; Rondon, L.P.; Moghadasi, A.; Sarwat, A.I. Review of Cyber-Physical Attacks and Counter Defense Mechanisms for Advanced Metering Infrastructure in Smart Grid. In Proceedings of the IEEE Power Engineering Society Transmission and Distribution Conference, Denver, CO, USA, 16–19 April 2018. [Google Scholar] [CrossRef] [Green Version]
- Krishna, V.B.; Weaver, G.A.; Sanders, W.H. PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure|TCIPG: Trustworthy Cyber Infrastructure for the Power Grid. Available online: https://tcipg.org/publications/pca-based-method-detecting-integrity-attacks-advanced-metering-infrastructure.html (accessed on 12 November 2020).
- Hao, J.; Piechocki, R.J.; Kaleshi, D.; Chin, W.H.; Fan, Z. Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids. IEEE Trans. Ind. Inform. 2015, 11, 1198–1209. [Google Scholar] [CrossRef] [Green Version]
- Amin, S.; Schwartz, G.A.; Cardenas, A.A.; Sastry, S.S. Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure. IEEE Control Syst. 2015, 35, 66–81. [Google Scholar] [CrossRef] [Green Version]
- Wang, H.; Ruan, J.; Wang, G.; Zhou, B.; Liu, Y.; Fu, X.; Peng, J.-C. Deep Learning-Based Interval State Estimation of AC Smart Grids Against Sparse Cyber Attacks. IEEE Trans. Ind. Inform. 2018, 14, 4766–4778. [Google Scholar] [CrossRef]
- Zhou, T.; Tao, D. GoDec: Randomized Low rank & Sparse Matrix Decomposition in Noisy Case. In Proceedings of the International Conference on Machine Learning, ICML 2011, Bellevue, WA, USA, 28 June–2 July 2011; pp. 33–40. [Google Scholar]
- Li, B.; Ding, T.; Huang, C.; Zhao, J.; Yang, Y.; Chen, Y. Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go- Decomposition (GoDec) Approach. IEEE Trans. Ind. Inform. 2018. [Google Scholar] [CrossRef] [Green Version]
- Morrow, K.L.; Heine, E.; Rogers, K.M.; Bobba, R.B.; Overbye, T.J. Topology Perturbation for Detecting Malicious Data Injection. In Proceedings of the 2012 45th Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2012; pp. 2104–2113. [Google Scholar]
- Kuntz, K.; Smith, M.; Wedeward, K.; Collins, M. Detecting, locating, & quantifying false data injections utilizing grid topology through optimized D-FACTS device placement. In Proceedings of the 2014 North American Power Symposium (NAPS), Pullman, WA, USA, 7–9 September 2014; pp. 1–6. [Google Scholar]
- Ganjkhani, M.; Fallah, S.N.; Badakhshan, S.; Shamshirband, S.; Chau, K.-W. A Novel Detection Algorithm to Identify False Data Injection Attacks on Power System State Estimation. Energies 2019, 12, 2209. [Google Scholar] [CrossRef] [Green Version]
- Candes, E. Robust Principal Component Analysis? J. ACM 2011, 58, 11. [Google Scholar] [CrossRef]
- Xie, L.; Mo, Y.; Sinopoli, B. Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2011, 2, 659–666. [Google Scholar] [CrossRef]
- Kim, J.; Tong, L.; Thomas, R.J. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. IEEE Trans. Signal Process. 2015, 63, 1102–1114. [Google Scholar] [CrossRef] [Green Version]
- Higgins, M.; Teng, F.; Parisini, T. Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems. IEEE Trans. Inf. Forensics Secur. 2021, 16, 1275–1287. [Google Scholar] [CrossRef]
- Yu, Z.; Chin, W. Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid. IEEE Trans. Smart Grid 2015, 6, 1219–1226. [Google Scholar] [CrossRef]
- Anwar, A.; Mahmood, A.N.; Pickering, M. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements. J. Comput. Syst. Sci. 2017, 83, 58–72. [Google Scholar] [CrossRef] [Green Version]
- Xie, S.; Yang, J.; Xie, K.; Liu, Y.; He, Z. Low-sparsity unobservable attacks against smart grid: Attack exposure analysis and a data driven attack scheme. IEEE Access 2017, 5, 8183–8193. [Google Scholar] [CrossRef]
- Chin, W.L.; Lee, C.H.; Jiang, T. Blind false data attacks against AC state estimation based on geometric approach in smart grid communications. IEEE Trans Smart Grid. 2017. [Google Scholar] [CrossRef]
- ISO/IEC 27000: 2018 International Standard, Information technology—Security techniques—Information security management systems—Overview and vocabulary. Available online: https://www.iso.org/standard/73906.html (accessed on 23 November 2020).
- Maynard, P.; McLaughlin, K. Towards Understanding Man-in-the-Middle Attacks on IEC 60870-5-104 SCADA Networks, 2nd ed.; International Symposium for ICS & SCADA Cyber Security Research: St Polten, Austria, 2014; pp. 1–11. [Google Scholar]
- IEEE Std 2030–2011 Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation with the Electric Power System (EPS), and End-Use Applications and Loads. Available online: http://grouper.ieee.org/groups/scc21/dr_shared/2030/ (accessed on 27 November 2020).
- National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES); Federal Information Processing Standards Publication; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001.
- U.S. Department of Commerce. Data Encryption Standard (DES); Federal Information Processing Standards (FIPS) Publication 46-7; U.S. Department of Commerce: Washington, DC, USA, 1999.
- IEEE 1547 Series of Standards. Available online: http://grouper.ieee.org/groups/scc21/dr_shared/ (accessed on 19 January 2021).
- Davis, M. Recoverable Advanced Metering Infrastructure. In Proceedings of the Black Hat security conference, Las Vegas, NV, USA, 3–8 August 2019; Available online: https://www.blackhat.com/html/bh-usa-09/bh-usa-09-archives.html (accessed on 21 January 2021).
- Lauriat, N. NERC 1200 and CIP-002 through CIP-009 Comparison; Network & Security Technologies: Pearl River, NY, USA, 2006; Available online: http://www.netsectech.com/wp-content/uploads/2013/05/WP_NERC_CIP_Analysis_NST.pdf (accessed on 23 January 2021).
- Byres, E. Revealing Network Threats, Fears: How to Use ANSI/ISA-99 Standards to Improve Control System Security. 2006. Available online: https://www.tofinosecurity.com/system/files/Professional/Articles/Intech-Jan-Feb-2011-Using-ISA99.pdf (accessed on 27 January 2021).
SG Structure | Category | Reference | ||
---|---|---|---|---|
Communication Technologies | Wireless | IEEE 802.15 | [52,53] | |
Wireless Mesh Network | [4,54] | |||
Cellular Communication | [55] | |||
Cognitive Radio | [56] | |||
Bluetooth, ZigBee, Microwave and Free Space Optical Communication | [4,6,11] | |||
Satellite Communication | [57] | |||
Wired | Fibre Optic Communication | [58] | ||
Powerline Communication | Broadband PLC Technology (BPLC) | [8,59,60] | ||
Narrowband PLC Technology (NBPLC) | [8,60,61] |
Paradigm Change | Digitalization | Standardization | |
---|---|---|---|
Impact On | Operation | Easy maintenance | Interoperability and Interchangeability |
Serves Scalability | Addition of new equipment is easy | ||
More and High-Quality | Paves the way for Plug and Play (PnP) | ||
Data Collection | |||
Cyber Security | Physical Security is compromised | Security by obscurity is lost | |
Easier Access to Networks | Hackers can use legitimate models to identify | ||
Connectivity is disadvantageous | All the data objects are known |
Detection Methods | References | Year | Datasets |
---|---|---|---|
MGD Based | [16] | 2017 | Synthetic Datasets in Matpower |
KPCA | [17] | 2020 | Synthetic Datasets in Matpower |
FFNN | [111] | 2020 | Random Data simulated in Matpower |
RF, Adaboost | [128] | 2019 | Synthetic Datasets in Matpower |
CDBN | [131] | 2017 | Synthetic Datasets in Matpower |
Perceptron, k-NN, SLR | [137] | 2016 | Synthetic Datasets in Matpower |
XGBoost | [138] | 2019 | Provided by Endsea |
KF, DKF, EKF | [141,142,143,144] | 2017, 2018 | Simulated |
DSVM | [145] | 2017 | Synthetic Datasets in Matpower |
MSA | [146] | 2017 | Synthetic Datasets in Simulink |
UIO | [147] | 2019 | Random Data for each grid subarea |
OCSVM | [155] | 2018 | Synthetic Datasets in Matpower |
DT and SVM | [156] | 2016 | Real Dataset in USA |
SVM Based | [157] | 2016 | Smart Energy Datasets from Ireland |
S3VM Based | [158] | 2019 | Irish Smart Energy Trial Data |
ANN | [159] | 2013 | Real Datasets in Brazil |
PARX | [160] | 2016 | Synthetic Datasets in Matpower |
ARIMA and ANN | [161] | 2015 | Real Datasets in Amsterdam |
GBTD | [162] | 2019 | Irish Smart Energy Trial Data |
RNN | [163] | 2018 | Synthetic Datasets in Matpower |
CNN and Encryption | [164] | 2019 | Released by SGCC |
MFEFD | [165] | 2019 | Irish Smart Energy Trial Data |
KLD Based | [166] | 2015 | Synthetic Datasets in Matpower |
SARSA | [167] | 2018 | Synthetic Datasets in Matpower |
ISOF | [168] | 2019 | Synthetic Datasets in Matpower |
Deep autoencoder | [169] | 2019 | Real PMU data |
GAN | [170] | 2019 | IoT-based smart home data |
RNN and CNN | [171] | 2019 | Released by SGCC |
MLR and NN | [172] | 2019 | CEFcom 2012 |
NNS and Game Theory | [173] | 2019 | Synthetic Datasets in Matpower |
NB | [174] | 2019 | ISO New England |
POMDP | [167] | 2018 | Synthetic Datasets in Matpower |
LR and DBSCAN | [175] | 2018 | Real PMU Data |
DRE | [176] | 2016 | Synthetic Datasets in Matpower |
SVM & ANN | [177] | 2019 | Nigerian Power Grid |
C-Vine Copulas Based | [178] | 2016 | Low carbon London load dataset |
DNN and LRC | [179] | 2019 | Released by SGCC |
GoDec | [180] | 2011 | Simulated |
ALM-based, LMaFit, GoDec | [181] | 2018 | Simulated |
D-FACTS | [182] | 2012 | Synthetic Datasets in Matpower |
D-FACTS | [183] | 2014 | Random Data simulated in Matpower |
NARX | [184] | 2019 | Synthetic Datasets in Matpower |
RPCA | [185] | 2011 | Released by SGCC |
LMP | [186] | 2011 | Real Time Marketing Data |
Subspace Methods | [187] | 2015 | Simulated Probability Detections |
Standards | Protocols | General Issues | |
---|---|---|---|
Communication | NIST, FERC | Structured Query Language (SQL) or Hypertext Transfer Protocol (HTTP), TCP and User Datagram Protocol (UDP) Internet Control Message Protocol (ICMP), Path Maximum Transmission Unit (PMTU) and Internet Protocol Security (IpSec) | IPv4 and IPv6 discussions [41,42,193]. |
ISO/IEC 15,408/EAL, ITSEC, TCSEC, CTCPEC | IoT and Internet Protocols such as REST, CoAP, MQTT, MQTT-SN, AMQP…etc. | Insufficient for complex infrastructures [43,194]. | |
ISO/IEC 27,000 Series | Security Management System Protocols, ISMS, SSL/TLS/SSH, VPN, IPSec | Unauthorized Access [193]. | |
ISO/IEC 62,351, IEC 60870-5 and DNP, IEC 563 | TCP/IP and specify security requirements for communication protocols as QoS, MMS, DNP, GOOSE defined by IEC Technical Committee 57, specifically the IEC 60870-5, the IEC 60870-6, the IEC 61,850, the IEC 61,970, and the IEC 61,968 families. | Vulnerabilities about protocol-based attack such as IP spoofing and DoS [48,194]. | |
IEEE 802.11.i and IEEE 802.16.e, IEEE 61,850 | Wireless Communication protocols (Bluetooth, Zigbee, WiMax…etc), Internet Protocol (IP), Information and Communication Technologies (ICT), Dynamic Host Configuration Protocol (DHCP), SMTP (Simple Mail Transfer Protocol) with Communication Technology-Interoperability architectural perspective (CT-IAP) | Setting security level and protecting to MitM [194,195] | |
AES | Structured Query Language (SQL) or Hypertext Transfer Protocol (HTTP), TCP, UDP, Internet Control Message Protocol (ICMP), Path Maximum Transmission Unit (PMTU) and IpSec with AES-128, AES-192, AES-256 Algorithms for cryptography. | Despite being approved by many organizations, selection of encryption techniques is not trivial [196]. | |
3DES | Public key-based protocols may also be used (e.g., ANSI X9.42). | Expected to be rolled out by 2030 due to insufficient security, as stated by NIST [197]. | |
Power | IEEE 2030-2011, IEEE 1686-2007, IEEE 1402-2000 | IPSec, VPN, TCP/IP, Smart Energy Profile Protocol version 2.0 (SEP 2.0), IETF with Power Systems Interoperability architectural perspective (PS-IAP) | Non-homogenous protocol structure of IEEE standards is a cause of vulnerability [62,63,195,198]. Bilateral information and power flow is targeted with IEEE 2030 [199]. |
EISA, NIST, NISTIR 7628, FERC | Structured Query Language (SQL) or Hypertext Transfer Protocol (HTTP), TCP and User Datagram Protocol (UDP) port filtering and Internet Control Message Protocol (ICMP), Path Maximum Transmission Unit (PMTU) and Internet Protocol Security (IpSec) | NIST and FERC should coordinate the development and adoption of smart grid guidelines and standards [41]. | |
NERC, CIP | SCADA, for dial-up accessible Critical Cyber Assets that use non-routable protocols | Unauthorized access issues [42,200]. | |
Control | IEC 61,850, IEC 608750-5, IEEE 802.x | DNP3, GOOSE, Supervisory Control and Data Acquisition systems, Modbus, BACnet, LonWorks, Wireless (ZigBee, Bluetooth) Protocols, Information Technology Interoperability architectural perspective (IT-IAP) protocols | SCADA needs holistic security solutions as it combines monitoring and control which creates significant vulnerabilities in the system [59,66,88,195] |
NIST SP 800-41, NIST 800-82 and 53 | Structured Query Language (SQL) or Hypertext Transfer Protocol (HTTP), TCP and User Datagram Protocol (UDP) port filtering and Internet Control Message Protocol (ICMP) | Used in corporate networks behind a firewall. However, it is weak against MitM, Trojan or Ddos launched within the network [59]. | |
ANSI/ISA-SP99, SA-99 | SCADA, DNP-3, Ethernet/IP and Modbus/TCP. | Heterogeneous protocol use inherently secures the system such as “push for productivity” and “Son-of-Stuxnet”. Needs mitigation of MitM and Ddos for all protocol types [43,48,201]. | |
NERC 1300 | NERC Cyber Security Standards | Needs constant updates in parallel with experiences in the field [43,69]. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Unsal, D.B.; Ustun, T.S.; Hussain, S.M.S.; Onen, A. Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation. Energies 2021, 14, 2657. https://doi.org/10.3390/en14092657
Unsal DB, Ustun TS, Hussain SMS, Onen A. Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation. Energies. 2021; 14(9):2657. https://doi.org/10.3390/en14092657
Chicago/Turabian StyleUnsal, Derya Betul, Taha Selim Ustun, S. M. Suhail Hussain, and Ahmet Onen. 2021. "Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation" Energies 14, no. 9: 2657. https://doi.org/10.3390/en14092657
APA StyleUnsal, D. B., Ustun, T. S., Hussain, S. M. S., & Onen, A. (2021). Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation. Energies, 14(9), 2657. https://doi.org/10.3390/en14092657