Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

IEEE - 56998

Cyber-Physical Security System in Smart Grid-A


Review
2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT) | 979-8-3503-3509-5/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICCCNT56998.2023.10307396

Akshatha Y Dr. A. S Poornima


Department of Computer Science and Engineering Department of Computer Science and Engineering
Siddaganga Institute of Technology Siddaganga Institute of Technology
Tumakuru, India Tumakuru, India
Email: akshathay@sit.ac.in Email: aspoornima@sit.ac.in

Abstract— The Smart Grid System (SGS) is a smart different types of attacks like tuning energy consumption data
technology that is a combination of advanced technology and and unbalancing at the energy generation side. As SG is
physical aspects that facilitates bidirectional communication of significant application in IoT, it is vulnerable to several
information exchange, power generation, and power cyber-attacks to crumble the power grid infrastructure [12].
distribution. The communication technology development in
traditional power systems is by deploying cyber-physical
Implementing information and communication technology
systems in smart grid. SGS has a compound architecture (ICT) into cyber physical system enhancement gives
consisting of several critical devices and infrastructure of the favorable stage for cyber components.
Internet of Things (IoT). The deployment of the devices is Security and sustainability of cyber physical system
vulnerable to many cyber-attacks. Hence, it is required to do pressurized by cyber-attack [13]. According to the research,
much research to secure the devices from attacks and the smart grid control and system function of cyber physical
environmental damage. So, this paper comprehensively reviews system are distributed by cyber-attack. False data Injection
cyber-physical, cyber-security, and key components of cyber- (FDI) mislead estimated data. A Denial of Service (DoS)
attacks. Then we present each section in detail and thoroughly effects on SG CPS’s performance [14][15]. Before
the standards and principles of cyber-physical and cyber-
implementing any algorithm into device or to application, and
security attacks in smart grid systems. This paper gives a deep
understanding of cyber-security systems in smart grid system any other settings into the CPS, it is important to evaluate. In
applications. case of relay malfunctioning in SG-CPS, it may cause
cascade, damage, or false circuit break tripping [15][16].
Keywords—Smart Grid System, Cyber-Physical attack, Cyber- Some of the electronic devices like intelligence electronic
security attacks devices (IED’s), Phaser Measurement Units (PMU), AMI,
SCADA, power system stabilizer (PSS), electric vehicles
I. INTRODUCTION (EVs), Digital Fault Recorder (DFR) connection are
This era is an internet revolt. Almost the whole world vulnerable to cyber-attacks in CPS [15][17].
population depends on the internet. Internet of Things (IoT) Cyber-attacks such as DoS, FDI, MITM attacks in cyber
is the channel for communication between human to machine power system impacts on security of current system and ICT
(H2M) and machine to machine (M2M)[1]. Different devices infrastructure. The power grid resilience can be improved by
are connected through IP address using the internet. The integrating the both CP and cyber security [15][18][19].
home appliance like fridge, laptop, mobile and motorcycle Adopting ICT into SG will have illusion that they never cause
and car have used non-IP based results that aims to connect malfunctions, and it will nolow the attackers or hacker etc, it
all kind of devices that can communicate directly using IP is important to understand the effect of cyber-attacks on SG
address through internet [2][3][4]. IoT is used to make things system. Several attacks on SG may produce blackouts.
easy monitoring; smart house, smart building, smart city, Security evaluation procedure ensures grid security and
smart agriculture, smart health [2]. One of the most important reliability [15][18][19]. Distribution stations will distribute
significance in application like Smart Grid(SG) [5]. Smart electricity through distributed substation to the customers.
Grid consists of power and communication lines between Energy meters are used to count energy consumption. Any
demand sides and generation. Hence the interconnection is devices having their own IP address can be common using
important in SG for communication between generation side internet. A control unit included with all system in one
and consumer side [6][7]. SG is bi-directional domain. Customer side domain and energy distribution
communication devices like smart meters and sensors to domain are interconnected, and both are attached to
measure energy and consumption of power at customer end distributed energy resource (DER) and storage energy system
[8][9]. This kind of communication simplifies the delivery of (SES). The central control unit look after and calculate the
real time data monitoring, which helps to control and balance electricity that consumers uses resource [20]. Fig 1. Shows
everywhere at high accuracy [10]. Because of significance of the diagram for giving review on accomplishing this paper.
IoT, it is more suitable for SG [11]. Since the devices
communicate through internet in IoT, it is vulnerable to
attacks by attacker. In SG, electronic devices undergo

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

Figure 1: The Schematic diagram of the review paper

The paper is organized into seven sections, section 2  Control and Management Unit
discusses the cyber physical system in smart grid. Smart grid Physical Power Unit (PPU): PPU consists of power
communication technology presented in section 3. Cyber generations, power transformer, circuit breaker, converter
security principles are discussed in section 4. Section 5 gives and other loads that run as microgrid system.
representation of key components of cyber-attack. Cyber- Sensors, Devices, and actuators: These consists of
attacks are described in section 6. Finally, the conclusions are sensors and devices which are interconnected mighty and
discussed in section 7. sensor status, exchange the data via internet. Sensors are used
to calculate the voltage, power supply, breakers, and
II. CYBER PHYSICAL SYSTEM IN SMART GRID frequency rank. The both devices and actuators are used to
The smart grid system influences the power of electronic monitor generators, power distributors, storage the data and
converter. This is to hold the energy, interface the electric circuit breaking system [21][22].
power in between side of generation and on customer side. In The communication system in SG can be wired or
CPS, the power electronic components are interconnected to wireless based on requirements. Communication system unit
communicate between communication devices and consists of several communication appliances such as routers,
information technologies to execute the task. medium like broadbands, Wi-Fi, and switches.
The CPS are classified into four groups. Communication systems work as data exchangers in IoT.
 Physical Power System Unit
 Sensors, Devices, and actuators Unit
 Communication system Unit

Figure 2: Cyber Physical system in Smart Grid

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

In CPS, measurement units control SG operations at more installation cost, installation time, wired nature, even
different conditions. Based on communication unit signal, though SG-CPS selected FOS infrastructure [18] [24] [29].
measurement units send commands through IoT to utilize SG Ethernet is generally suitable for wide area network (WAN)
operation. According to several studies, the basic approach of which communicates between control center and substations.
CPS is design, simulation validation of hardware and real The pros of ethernet are high reliability and availability. In
time execution which are necessary for SG application. The SGS, it is used to exchange the data between home center and
different fields like various domains, cloud computing, social smart meter [30][31].
network and game network, air traffic were used CPS hence
it is not a new concept [23][24][25]. Fig 2 represents the
B. Wireless Communication
cyber-physical system in smart grid. According to this above
negotiation, SGS expects a safe and source communication Cellular Communication: Cellular Communication
system to execute operation. As well as the security required technology is another system of communication in SG-CPS.
for transmitting information and distributing information In these systems, the high data rate is achieved on an average
along with computing technologies in SG. of 100Gbps. From last few years, cellular technology has
been more desired in different application because of high
data rate exchanged through minimum delay [6][16].
III. SMART GRID COMMUNICATION TECHNOLOGY Microwave Communication (MWC) supports wireless
The SG-CPS depends on network or cyber infrastructure. communication applications for critical applications. This
This is different for convectional communication system. technique reached a high rate to meet the SG-CPS
SG-CPS expects resilience, high availability, reliability, requirements. These technologies have a high data rate
minor packet drops and good scalability. Apart from this, SG- compared to wired communication. This also has less
CPS may require typical commercial cellular based installation cost with lower time in remote areas. It is
application [26]. SG-CPS communication technology is concerned with high data security and reliability [32][33].
divided into two categories such as wired and wireless as Zigbee technologies are mainly created for sensor network
shown in below fig 3. and control system. This is by depending on IEEE 802.15.4
standard for LAN by MAC and Physical layers. It works on
bidirectional communication between network and control
system by exchanging basic sensor data. This technology is
organized by involving coordinators, routers, and end
devices. Smart sensors are used for monitoring SG, and it is
used as medium of communication for electronic current
transformers (ECT) for overhead after LAN connection fails.
It is easier to connect than WSN and Bluetooth. The ZigBee
network can be expanded using routers to create large
Figure 3: Smart Grid Communication Technologies significant area network [6][34].
Radio Frequency (RF) is a communication technology in
Some of example for wired communication technology
network system, which gives the platform for deploying AMI
are power line, ethernet, optical fiber, whereas in wireless
communication technology, cellular, ZigBee, satellite and RF to retire daily meter reading in large scale area. Basically, RF
is a mesh network which are strong and cost effective for
mesh were used.
establishing distributed network in large distance area.
A. Wired Communication Electric network demands can be changed using RF. RF mesh
Power Line Communication System (PLC) system helps the nodes in the network to self-heal when it fails. RF
utilizes conventional power line transmission data between is stated as self-forming network because it allows signal to
control centers and substations. This kind of technology identify ideal path to go back to front end system even
requires less cost because of using existing infrastructure. though, in the place of hurdles like high risk buildings or
This kind of PLC consists of broadband PLC and narrow mountains. Whereas in rural areas, RF uses additional
band PLC. Higher data rated applications are allowed from infrastructures if it is needed to deploy in large distances. But
broadband whereas narrowband support lower rated if RF is unlicensed, then it may create interference [35][36].
applications. PLC is limitedly used in SG-CPS because huge At last satellite communication (SC), is better monitoring and
noise do the PLC based on one way analysis model also more gives solution for accessing remotely. From past few years,
difficult. In SGS, the data rate is 2-3 Mbps broadband PLC SC shown its highest growth in the context of data rate, delay
which is selected as good support [27][28]. in communication, and transmission. This kind of technology
Optical Fiber Communication (FOP) gives the high rate of is cost effective and suitable for monitoring power generation
data transmission furthermore the secure data exchange for and substation distribution in remote areas. SC gives some
long distance communication. Based on research, it is proved application demands. But it is not suitable for SG-CPS critical
that FOC decreased the amount of operation. And it also application [37][38].
proved that signal noise ratio (SNR) has significantly
improved. Hence, adopting FOC in SG-CPS is going to be a
IV. CYBER SECURITY PRINCIPLES
better choice for critical application. Several fields that are
supported by FOC are substation protection, Automation and Information and communication technology (ICT) is
tele control. There are some issues in FOC that are scalability, required to revolutionize the earlier power grid system to
smart grid system. There is disadvantage in SG system that is

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

cyber security problems (CS). For optimizing the operation, to the network, smart devices or users. The method used for
SG system must give attention to the CS issues. SG system is identification is a password. The SG systems can adapt the
improving experimentally day by day. CS guarantees control identification methods for authenticating purposes. This may
system as well as CIA (Confidentiality, Integrity, and also fail if the authentication process cannot give attention to
Authentication) where CIA is ensures energy management. achieving the security. To achieve secure data integrity and
Operation, protection, and the necessary infrastructure. Fig 4 confidentiality, encryption and authentication are mandatory
shows the cyber security objectives and requirements in smart cryptographic approaches in SGS. It is also considered as an
grid. efficient identification procedure to avoid data integrity
attacks [43]. Authentication is to prove that the users or
devices involved in SGS applications are genuine. An
example of authentication is digital signatures, which are
used to authenticate the data that is to be transmitted. A
exchange secret key or else public key infrastructure should
be exchanged to transmit within the interwork. In this kind of
authentication. The concerned authority will distribute the
certificate to the users [44][45]. Therefore, it ensure only
genuine device or users can approach the device.
Authorization classifies the legitimate and illegitimate users
or devices for all CS requirements based on authentication.
Access control identify the users or devices accurately, while
using the resources. The strict access control mechanism
Figure 4: Cyber Security Objectives and Requirements in
prevents the data from being accessed by unauthorized users.
Smart Grid
There are many methods for access control, such as
A. Cyber Security Objective mandatory access control, discretionary access control, and
In SG, the CS objectives secure the data from CIA. The role based access control. These methods prevent security
SG system accomplishes the key principles of issues which issues and improve reliability of the system. Generally, in the
occur in CS, that is, the obtained data must be protected from entire network, it is compulsory to involve access control to
unauthorized access by CS. Confidentiality allows authorized control devices and users. This is easily recorded and
people to access the data in SGS. In real time scenario, SG is traceable. It can be further given for audit [46][47]. The
bidirectional communication where customer devices are recorded and traceable data helps to identify illegitimate users
connected to power grid. It is important to maintain privacy by asking for evidence. If illegitimate users fail to give
in SGS for user data which are more scathing and important evidence, it is confirmed that the user is illegitimate.
issues. In this case, attackers can hack user information and Whenever the user or devices refuse to accept the data or if it
data by misusing communication system information, trace receives misinformation, it is called non-repudiation. In
the lifestyle, mismatch the electric power flow [39][40]. addition to this, non-repudiation enables accountability. In
Smart Grid system data should be correct, and it must be non- applications of SG, accountability expects better privacy, and
tamped. To achieve data authenticity, integrity is needed. It a system security so that when the security system starts,
prevents the data from being altered or changed in an accountability detects the responsible users or the devices.
unauthorized or undeleted way. The power system expected Since accountability keeps the information in the network,
uninterrupted supply of energy which guarantees reliable and based on the information evidence, further actions will be
timely use and using the system data so that the control taken so that users cannot escape from their activities. In
system assures systems reliability and availability. The SGS, accountability does surveys on customers’ electricity
availability keeps power system information and safeguard bills. Even though smart meters used to count the energy
from damage[41][42]. Unauthorized parties investigate consumption and in real-time, smart meter generates the bill,
attacks that is confidentiality to attract the data and also customers still doubt the correctness of billing from the smart
integrity attacks by adding false data and altering primary meter. If an attacker has some personal advantage or other
data. The target of an attacker is the CIA and attack on every issues, he will alter the exchanged data, then the meter
object of SGS. Some of the common attacks are to insert to generates the incorrect bill. It can conclude as, the meter or
the SGS. The attack affects data to breakout and delays in the system is abused [12][48][46]. The customer doesn’t want
communication system and disturbs the electric power to give data related to power consumption patterns, usage of
delivery to harm others or to take benefits for themselves. power or any other power-related information to
unauthorized people. This kind of data requires personal
B. Cyber Security Requirements privacy for customers that unauthorized access cannot occur
In the applications of SG, CS expects little more security without the permission of the customer. And security is given
instants to CIA. These approaches are co-related to one other. to defining the permission. The structure of the network
CS ensured the available objectives and important securely makes use of heterogeneous security technology.
requirements. To guarantee legitimacy. The specification of Additionally, safety is considered an important security
CS requirements and its objectives are shown in Fig 4. The requirement for cyber security in SGS.
SGS uses some of the secret processes to identify and
authenticate the devices and users from being accessed by
unauthorized users. This kind of process ensures the valid
objects. The object can be the components that are connected

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

V. KEY COMPONENETS OF CYBER ATTACK adversarial network (GAN). But it is not possible to recognize
In the smart grid system, more cyber-attacks happen in the particular sensor at which FDIA is attacked.
entire world, which leads to severe damage to power and B. Denial of Service (DoS) Attack
energy resources. Hence, the cyber requirements and
In DoS attack, the intruder makes the device inaccessible for
objectives become inconclusive. The possible attacks cannot authorized user by flooding the large, unexpected data traffic.
be the reason because of extending the network and rigidity The flooding and crashing the attacker focuses on physical
of SG. Therefore, all CA in SGS is divided into three types
network and communication channel to alter the readings of
represented in Fig 5.
sensor. The impact of FDIA is identified in SG at both static
and Dynamic location. To collect the ideal measurements in
state estimation against FDIA, data model based on
generative adversarial network (GAN). But it is not possible
to recognize the particular sensor at which FDIA is attacked.
C. Denial of Service (DoS) Attack
In DoS attack, by flooding the large and unexpected data
traffic intruder makes the devices inaccessible for authorized
users. Flooding and crashing the services are binary methods
in DoS attacks. In pouring the services, there are three major
attacks: buffer overflow attack, synchronization and ICMP
attacks. The updated form of DoS is Distributed Denial of
Service (DDoS) attack. The DDoS instead of flooding the
services, it crashes the target system by compromising the
Figure 5: Cyber Security Strategy in Smart Grid system with multiple host rather than single source. In context
The probable solution for security threats in SGS is using of smart grid, DoS attacks on network topology then after it
single security solutions ie, encryption and cryptographic exploits all possible attacks, but DDoS attack make use of
techniques, which couldn’t deal with real threats, but it gives compromised hosts to deploy DoS attack to several target
impact on improvising confidentiality and integrity in smart system.
grid data communication system. In cryptography, D. Spoofing Attack
encryption is a basic step for providing security to the The attacker concentrates on the connection links in
communication network. Anyhow, the encryption process is spoofing attack. In smart grid system, GPS spoofing attack is
complex, and SG expects confidentiality and integrity data majorly used as an attack. The GPS spoofing attack is
balance. Encryption also deals with eavesdropping and replay illustrated in. The communication link between devices and
attack. The SGS is involved with several encryption and control center which are vulnerable to spoofing attacks. In
authentication methods. Here, there exist two types of order to switch the real time control system of smart grid with
encryptions, they are symmetric an asymmetric encryption. less cost and elevated precision GPS devices are attached into
Division of employment security (DES), advanced the high number of grid sensors, like phasor measurement
encryption standard (AES)[12]. units. The nearby attackers can spoof the GPS receivers that
transmit high power as well as false signals with the GPS
VI. CYBER ATTACK IN SMART GRID frequency.
The survey of cyber-attacks in smart grid system mainly rely
on false data injection attacks (FDIAs), denial of service VII. CONCLUSION
(DoS) attacks, man-in-the-middle (MiTM) attack, data Smart Grid System (SGS) that gathers and issues the
framing attacks (DFA), load redistribution attack (LRA), several devices and power system which integrates the power
false command injection attack (FCIA), replay attack so on., generation side and customer side. This paper gives the
integration of power system into information system faces overview on cyber physical attack (CP) and cyber security
many attacks like malware attack etc. Some of such attacks attack (CS) of smart grid (SGs). Though SG expects
are represented in the section below. communication network and cyber security systems, it is
A. False Data Injection Attack revealed to cyber-attacks. In this article we outlined the CS
False Data Injection Attack (FDIA) is one of the most system objectives, requirements as well as key components.
dangerous attacks in SGS. In FDIA, an intruder attacks the The paper gives review on cyber-attacks which includes false
system and alters the sensor reading in such a manner that data injection attacks, denial of service, distributed denial of
unidentifiable errors are deployed into the estimation and service and GPS spoofing attacks in smart grids. This paper
scheduling decisions. Accessing the physical network is reviews all the possible cyber-attacks that occur in smart grid,
difficult when compared to acquiring the communication further it can be expanded individually on the attacks in smart
channel. The attacker focuses on physical network and grid area, which is the serious issue in the vicinity.
communication channel to alter the readings of sensor. The
impact of FDIA is identified in SG at both static and Dynamic At this end, this paper aims to showcase the review on the
location. To collect the ideal measurements in state cyber physical attack schemes in smart grid. Instead of listing
estimation against FDIA, data model based on generative all potential schemes, the paper enlight on the critical

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

schemes, where attackers can potentially disturb or destroy Grid Cyber Physical System,” Technol. Econ. Smart Grids Sustain.
Energy, vol. 7, no. 1, 2022, doi: 10.1007/s40866-022-00146-x.
power operation. The victims are generated from the critical [19] P. Lau, L. Wang, W. Wei, Z. Liu, and C. W. Ten, “A Novel Mutual
benefits and transmission system and also with customers. As Insurance Model for Hedging Against Cyber Risks in Power Systems
exhibited in the paper, the attacks are real time and frequent Deploying Smart Technologies,” IEEE Trans. Power Syst., vol. 38,
we made it understand the existing and upcoming no. 1, pp. 630–642, 2022, doi: 10.1109/TPWRS.2022.3164628.
[20] R. Das Zekeriya Gündüz, “Analysis of Cyber attacks on Smart Grid
vulnerabilities and to motivate for innovating and giving
Applications,” in 2018 International Conference on Artificial
solutions for securing ad resilience of smart grid as well as Intelligence and Data Processing (IDAP), 2018, pp. 1–5.
other cyber physical system infrastructure. [21] R. A. Osman, Nagi Faroug M, AAA Ahmed, E S A and Saeed, “Cyber
Physical System for MSart Grid,” in Artficial intelligence paradigms
for Smart cyber physical systems, 2021, pp. 301–323.
REFERENCES [22] S. M. Faiq Khalid, Rehman S, Overview of Security for Smart Cyber-
Physical Systems. 2020.
[1] R. Hassan, F. Qamar, M. K. Hasan, A. Hafizah, M. Aman, and A. S. [23] I. Zografopoulos, J. Ospina, X. Liu, and C. Konstantinou, “Cyber-
Ahmed, “SS symmetry Internet of Things and Its Applications :,” pp. Physical Energy Systems Security: Threat Modeling, Risk
1–29, 2020. Assessment, Resources, Metrics, and Case Studies,” IEEE Access,
[2] E. Sisinni, A. Saifullah, S. Han, U. Jennehag, and M. Gidlund, vol. 9, pp. 29775–29818, 2021, doi:
“Industrial internet of things: Challenges, opportunities, and 10.1109/ACCESS.2021.3058403.
directions,” IEEE Trans. Ind. Informatics, vol. 14, no. 11, pp. 4724– [24] S. H. Bei Yu, Junlong Zhou, Cyber_Physical Systems: An Overview.
4734, 2018, doi: 10.1109/TII.2018.2852491. 2020.
[3] H. Golpîra, S. A. R. Khan, and S. Safaeipour, “A review of logistics [25] F. Nejabatkhah, Y. W. Li, H. Liang, and R. R. Ahrabi, “Cyber-security
Internet-of-Things: Current trends and scope for future research,” J. of smart microgrids: A survey,” Energies, vol. 14, no. 1, 2021, doi:
Ind. Inf. Integr., vol. 22, no. December 2020, 2021, doi: 10.3390/en14010027.
10.1016/j.jii.2020.100194. [26] K. Jha, A. Doshi, P. Patel, and M. Shah, “A comprehensive review on
[4] yuzi L. Reinaldo Padilha France, Ana Carolina Borge Monteiro, automation in agriculture using artificial intelligence,” Artif. Intell.
Rangel Arhutr, An Overview of Internet of Things Security from a Agric., vol. 2, pp. 1–12, 2019, doi: 10.1016/j.aiia.2019.05.004.
Modern Perspective, 5th ed. Springer, Cham, 2020. [27] A. Z. Abdellah Chehri, Spectrum Management of Power Line
[5] P. S. Danielly B. Avancini, Joel J. P. C. Rodrigues, Ricardo A. L. COmmunications Networks for Industrial Applications. 2020.
Rabêlo, Ashok Kumar Das, Sergey Kozlov, “A new IoT-based smart [28] Y. M. Chung, “Performance comparisons of broadband power line
energy meter for smart grids,” Int. J. Energy Reaserach, vol. 45, pp. communication technologies,” Appl. Sci., vol. 10, no. 9, pp. 1–21,
189–202, 2020, doi: https://doi.org/10.1002/er.5177. 2020, doi: 10.3390/app10093306.
[6] F. E. Abrahamsen, Y. Ai, and M. Cheffena, “Communication [29] Z. A. S. Bernd M Buchholz, Advanced Information and
technologies for smart grid: A comprehensive survey,” Sensors, vol. Communication Technology: The Backbone of Smart Grids. 2020.
21, no. 23, pp. 1–24, 2021, doi: 10.3390/s21238087. [30] Z. A. S Vikram Singh, Aizad Khursheed, Wired Communication
[7] M. L. A Philips, J Jayakumar, “A Review on Cyber Security in Technologies and Netwoks for Smart grid - A Review. 2022.
Metering Infrastructure of Smart Grids,” Comput. Methods Data Eng. [31] A. Jain and S. Bhullar, “Online management and assessment of power
Adv. Intell. Syst. Comput., vol. 1227, 2021, doi: quality issues through smart metering in smart grid architecture,”
https://doi.org/10.1007/978-981-15-6876-3_10. Energy Reports, vol. 8, pp. 613–631, 2022, doi:
[8] R. E. Perez-Guzman, Y. Salgueiro, M. Rivera, and P. W. Wheeler, 10.1016/j.egyr.2022.05.140.
“Control strategy and communication architecture for power sharing [32] L. B. Umit Cali, Murat Kuzlu, Manisa Pipattanasomporn, James
in microgrids,” Proc. IEEE Int. Conf. Ind. Technol., vol. 2020-Febru, Kempf, Smart Grid Applications and Communication Technologies.
pp. 1167–1172, 2020, doi: 10.1109/ICIT45562.2020.9067288. 2021.
[9] M. R. R. Pérez-Guzmán, Yamisleydi Salgueiro-Sicilia, [33] Y. K. Ersan Kabalci, Emerging Wireless Communication
“Communication systems and security issues in smart microgrids,” Technologies for Smart Grid Applications. 2019.
2017, pp. 1–6, doi: https://doi.org/10.1109/SPEC.2017.8333659. [34] N. Suhaimy, N. A. M. Radzi, W. S. H. M. W. Ahmad, K. H. M. Azmi,
[10] S. Ahmed, T. M. Gondal, M. Adil, S. A. Malik, and R. Qureshi, “A and M. A. Hannan, “Current and Future Communication Solutions for
Survey on Communication Technologies in Smart Grid,” 2019 IEEE Smart Grids: A Review,” IEEE Access, vol. 10, pp. 43639–43668,
PES GTD Gd. Int. Conf. Expo. Asia, GTD Asia 2019, pp. 7–12, 2019, 2022, doi: 10.1109/ACCESS.2022.3168740.
doi: 10.1109/GTDAsia.2019.8715993. [35] N. A. Azhar, N. A. M. Radzi, K. H. M. Azmi, F. S. Samidi, and A. M.
[11] P. Wlazlo et al., “Man-in-the-middle attacks and defence in a power Zainal, “Criteria Selection Using Machine Learning (ML) for
system cyber-physical testbed,” IET Cyber-Physical Syst. Theory Communication Technology Solution of Electrical Distribution
Appl., vol. 6, no. 3, pp. 164–177, 2021, doi: 10.1049/cps2.12014. Substations,” Appl. Sci., vol. 12, no. 8, 2022, doi:
[12] R. Da and M. Zekeriya Gündüz, “Analysis of Cyber-Attacks in IoT- 10.3390/app12083878.
based Critical Infrastructures,” Int. J. Inf. Secur. Sci. Da¸sDa¸s al, vol. [36] E. Longman, O. Cetinkaya, M. El-Hajjar, and G. V. Merrett, “Mesh
8, no. 4, pp. 122–133, 2019. Networking for Intermittently Powered Devices: Architecture and
[13] J. . Czekster, R.M., Morisset, C., Moorsel, A.v., Mace, J.C., Bassage, Challenges,” IEEE Netw., vol. 36, no. 3, pp. 122–128, 2022, doi:
W.A., Clark, Cybersecurity Roadmap for Active Buildings. Springer, 10.1109/MNET.105.2000782.
Cham, 2022. [37] A. Meloni and L. Atzori, “The Role of Satellite Communications in
[14] A. Kazemy and M. Hajatipour, “Event-triggered load frequency the Smart Grid,” IEEE Wirel. Commun., vol. 24, no. 2, pp. 50–56,
control of Markovian jump interconnected power systems under 2017, doi: 10.1109/MWC.2017.1600251.
denial-of-service attacks,” Int. J. Electr. Power Energy Syst., vol. 133, [38] M. M. N Shaukat, S M Ali, C A Mehmood, B Khan, M Jawad, U farid,
no. March, p. 107250, 2021, doi: 10.1016/j.ijepes.2021.107250. Z Ullah, S M anwar, “A Survey on Consumers empowerment,
[15] R. V. Yohanandhan, R. M. Elavarasan, P. Manoharan, and L. Mihet- communication technologies, and renewable generation penetration
Popa, “Cyber-Physical Power System (CPPS): A Review on within Smart Grid,” Renew. Sustain. Energy Rev., vol. 81, no. Part 1,
Modeling, Simulation, and Analysis with Cyber Security pp. 1453–1475, 2018.
Applications,” IEEE Access, vol. 8, pp. 151019–151064, 2020, doi: [39] F. Mohammadi, “Emerging challenges in smart grid cybersecurity
10.1109/ACCESS.2020.3016826. enhancement: A review,” Energies, vol. 14, no. 5, 2021, doi:
[16] H. Zhang, B. Liu, and H. Wu, “Smart Grid Cyber-Physical Attack and 10.3390/en14051380.
Defense: A Review,” IEEE Access, vol. 9, no. December 2015, pp. [40] P. E. Nordbø, “Cyber security in smart grid stations,” IET Conf. Publ.,
29641–29659, 2021, doi: 10.1109/ACCESS.2021.3058628. vol. 2013, no. 615 CP, pp. 26–30, 2013, doi: 10.1049/cp.2013.0946.
[17] B. Ti, J. Wang, G. Li, and M. Zhou, “Operational Risk-averse Routing [41] V. Lamba, N. Šimková, and B. Rossi, “Recommendations for smart
Optimization for Cyber-physical Power Systems,” CSEE J. Power grid security risk management,” Cyber-Physical Syst., vol. 5, no. 2,
Energy Syst., vol. 8, no. 3, pp. 801–811, 2022, doi: pp. 92–118, 2019, doi: 10.1080/23335777.2019.1600035.
10.17775/CSEEJPES.2021.00370. [42] X. Huang, Z. Qin, and H. Liu, “A Survey on Power Grid Cyber
[18] A. V. Jha, B. Appasani, and A. N. Ghazali, “A Comprehensive Security: From Component-Wise Vulnerability Assessment to
Framework for the Assessment of Synchrophasor Communication System-Wide Impact Analysis,” IEEE Access, vol. 6, pp. 69023–
Networks from the Perspective of Situational Awareness in a Smart

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India
IEEE - 56998

69035, 2018, doi: 10.1109/ACCESS.2018.2879996. [44] Z. Elmrabet, H. Elghazi, N. Kaabouch, and H. Elghazi, “1809.02609,”
[43] A. Ayad, H. Farag, A. Youssef, and E. El-Saadany, “Cyber-physical pp. 1–13, 2004.
attacks on power distribution systems,” IET Cyber-Physical Syst. [45] R. Q. H. Feng Ye, Yi Qian, Smart Grid Communication
Theory Appl., vol. 5, no. 2, pp. 218–225, 2020, doi: 10.1049/iet- Infrastructures: Big Data, cloud computing security. 2018.
cps.2019.0032.

14th ICCCNT IEEE Conference


Authorized licensed use limited to: Indian Institute of Technology - Jodhpur. Downloaded on April 21,2024 at 15:51:06 UTC from IEEE Xplore. Restrictions apply.
July 6-8, 2023
IIT - Delhi, Delhi, India

You might also like