Energies 15 08692 v3
Energies 15 08692 v3
Energies 15 08692 v3
Article
Survey of Cybersecurity Governance, Threats, and
Countermeasures for the Power Grid †
Matthew Boeding 1 , Kelly Boswell 1 , Michael Hempel 1 , Hamid Sharif 1, * , Juan Lopez, Jr. 2
Since most OT assets were not designed with security in mind [4], ICS networks will
benefit most by following a Defense-in-Depth (DiD) strategy with a De-Militarized Zone
(DMZ) between the Enterprise Zone and the Manufacturing Zone, as shown in Figure 1.
This provides some isolation of the OT network while specifically only allowing the network
traffic that is needed to enable authorized parties to remotely monitor and control OT assets
into the OT network. However, for proper defense-in-depth the OT section of the network
architecture likely requires new or improved security controls for the devices, software,
and communication protocols that are commonly utilized in these networks [5]. However,
this is particularly challenging for OT networks, because new security measures will likely
introduce more latency, while this additional latency in IT networks is normally acceptable,
in OT networks it can easily become a productivity concern, as well as a safety concern in
terms of human lives and/or the environment [6]. Ideally there would be a one-size-fits-all
approach for ICS entities to establish a cybersecurity governance and management program.
However, each organization must approach a cybersecurity program incrementally and
strategically to account for various factors, including its work force, culture, finances, risk
tolerance, as well as its current cybersecurity posture and the assets it manages.
DMZ
Enterprise
Security Zone
Enterprise Network Level 5
DMZ
Process Level 0
which aims to guide organizations through the process of assessing and furthering their
cybersecurity posture.
A survey of primary cybersecurity concepts and principal threat taxonomy in In-
dustrial Cyber-Physical Systems (ICPS) is provided in [3]. The paper broadly focuses on
an introduction to cybersecurity concepts as they relate to ICPS, highlights prominent
protocols, and presents categories of countermeasures as they relate broadly to ICPS. This
focus on ICPS, however, results in a broad, high-level analysis of mostly IT-driven cyberse-
curity aspects within the ICPS domain. This includes an outline of the convergence of IT
and OT systems and the effects on cybersecurity posture explored in academic research.
They also identified available research into general testbeds and datasets for evaluation of
cybersecurity proposals. However, the work presented in [3] is a broad high-level review
without a focus on application domains. Therefore, our focus is specifically on the energy
sector—a critical infrastructure sector and a cornerstone of our modern society. In this
paper, we identify potential threats, industry guidelines and cybersecurity frameworks
that are driven by the unique challenges and opportunities found in this key application
domain. These frameworks are not only applicable to the energy sector, but can equally be
of benefit in other ICS sectors.
In related works, some broad cybersecurity threads and solutions are given in [9–12].
In [13], several denial-of-service (DoS) attack taxonomies for the Smart Grid (SG) are
defined and some potential solutions are explored. In [14], applications of blockchain
for cybersecurity solutions in the smart grid are explored. The various communications
architectures, technologies, protocols, cyber threats, and countermeasures are explored
in [15–20]. In [21], a taxonomy of false data injection attack (FDIA) detection algorithms is
presented and evaluated. In [22,23], some cyber threats and countermeasures related to
time synchronization of measurement devices are presented.
In this paper, we focus on OT security issues, as the IT security issues are already well-
covered by the IT industry. In particular, we focus on OT security issues in the energy sector,
primarily in power generation and distribution systems, while significant research exists
on OT cybersecurity, this survey is the first to review existing OT cybersecurity threats,
countermeasures, and industry sector guidance to strengthen cybersecurity posture with
primary applicability to the North American energy sector. This paper illustrates differences
in priority assignment for confidentiality, integrity and availability between IT and OT
networks, as a motivator for different cybersecurity approaches between the two domains.
We provide an evaluation of known cybersecurity threats and their countermeasures, with a
focus on OT specific threats and examine the recommended gap analysis provided by NIST.
The remainder of this paper is organized as follows. In Section 2, a survey of energy
sector ICS security governance is provided. In Section 3 we provide some reference
network architectures for OT networks. Section 4 presents a survey of security threats
for OT networks. In Section 5, we provide a survey of countermeasures proposed in the
literature. In Section 6, we analyze the current state of OT network security mitigation
strategies (i.e., by assuming the countermeasures in the current literature may be applied),
by analyzing how well they will assist entities to further manage cybersecurity risk. Finally,
some concluding remarks are provided in Section 7.
Table 1. Summary of Regulations, Standards, and Guidance for the U.S. Energy Grid.
these Functions are divided into Categories that are the next layer of granularity of each
lifecycle stage. Each of the Categories are further divided into another level of granularity
called Subcategories. Subcategories provide context to each category with reference to
other frameworks such as ISO, ISA, etc.
The NIST CSF also provides a scaled ranking system for organizations to evaluate
the degree to which its cybersecurity risk management practices exhibit the characteristics
defined in the framework in the following categories: Risk Management Process, Integrated
Risk Management Program, and External Participation. The values in the scale are called
Tiers and the values range from 1 to 4, 1 being the lowest level of implementation.
Lastly, the NIST CSF Profiles are a method by which organizations evaluate their
current cybersecurity posture. These profiles furthermore allow organizations to determine
recommended next steps for implementation that would help them to achieve their desired
cybersecurity posture. It represents an alignment of the CSF Core with the organization’s
business requirements, capabilities, and risk appetite. For example, NIST provides a Profile
for the Smart Grid in [25].
The C2M2 is a maturity model comprised of a set of common cybersecurity practices
that may be used to evaluate, prioritize, and improve an organization’s cybersecurity
capabilities. It was derived from the Electricity Subsector Cybersecurity Capability Maturity
Model (ES-C2M2) [8], which was developed in response to the U.S. government’s initiative
to improve the cybersecurity posture of its critical infrastructure.
In 2005, the United States Energy Policy Act was signed by the Bush administration. It
mandates the FERC to certify an Electricity Reliability Organization (ERO) to develop bulk
power grid reliability standards to be enforced by FERC. Shortly after, FERC certified the
NERC as the ERO. NERC’s set of standards for the bulk power system are called the NERC
Critical Infrastructure Protection (CIP) standards. At the time of this writing, there are
12 enforceable NERC CIP standards, 11 relating to cybersecurity and 1 relating to physical
security [2]. Other than standards relating to nuclear facilities, these are the only set of
enforceable standards for the power grid in the United States.
The NERC CIP standards define which entities will materially impact the reliability
of the bulk power system if they are compromised. Any entities that meet the inclusion
criteria and none of the exclusion criteria defined in CIP-002 are referred to as a Bulk Electric
System (BES). The CIP standards require that BES entities identify their critical assets, and to
regularly perform risk analysis on them. BES entities are required to establish an Electronic
Security Perimeter (ESP) by creating appropriate firewall rules and policies, enforcing IT
controls to protect critical assets, and implementing cyber attack monitoring tools. They
are also required to regularly patch software and firmware vulnerabilities, use IDS/IPS
tools, use antivirus and anti-malware tools, generate alarms on detected cyber events, and
use secure account and password management. The standards also define requirements for
establishing a cybersecurity policy and program, training personnel, establishing access
controls for personnel, establishing an incident reporting and response planning program,
and establishing recovery plans for critical assets and data.
The NERC CIP standards are the primary external influence of cybersecurity gover-
nance for Bulk Electric Systems. However, nuclear power generation systems are further
governed by additional laws, regulations, and standards. These are primarily the Nu-
clear Regulatory Commission (NRC) regulation 10 CFR, Nuclear Energy Institute (NEI)
standards 08-09, 10-04, 10-08, 10-09, and 13-10, and NRC Regulatory Guide 5.71. The US
Department of Homeland Security (DHS) guideline titled “Nuclear Sector Cybersecurity
Framework Implementation Guidance for U.S. Nuclear Power Reactors” is a useful tool to
assist organizations with strategically implementing a cybersecurity program with respect
to the applicable laws, regulations, standards and the NIST CSF.
Besides these, the following International Society of Automation (ISA) and Interna-
tional Electrotechnical Commission (IEC) standards are also important for cybersecurity
management of the Smart Grid: ISA/IEC 62443, IEC 62351, IEC 62541, IEC 614500-25, IEC
62056-5-3 and ISO/IEC 14543. The IEC standards are available at a cost to organizations
Energies 2022, 15, 8692 6 of 22
and individuals but unlike the NERC CIP standards they are not enforceable. The ISA/IEC
62443 is a framework of standards whose goals are to improve the Confidentiality, Integrity,
and Availability of general Industrial Automation and Control systems. The ISA/IEC
62351 are a framework of standards for improving the cybersecurity of communication
system protocols used in power systems. IEC 62541, aka the OPC Unified Architecture,
is a client-server based Machine-to-Machine (M2M) communication protocol for general
Industrial Automation and Control systems.
Furthermore, the following Institute of Electrical and Electronics Engineers (IEEE)
standards are also important for cybersecurity management of Smart Grid systems: IEEE
1646, IEEE 1686, IEEE 2030, and IEEE 1402.
While the above defense-in-depth strategy is a great start to securing ICS networks,
the OT portion of the network may still require additional security controls to improve an
organization’s overall risk posture. Organizations responsible for power transmission and
distribution are responsible for assets distributed over vast geographical areas. Therefore,
Energies 2022, 15, 8692 7 of 22
these systems typically use SCADA technologies to monitor and control these distributed
systems. A typical SCADA system is shown in Figure 3.
Beyond the transmission and distribution domains in the smart grid, there are also
the generation, customer, markets, operations, and service provider domains as defined in
the NIST Smart Grid Framework 3.0 [27]. The domains that are of primary concern in this
paper are the transmission, distribution, operations and customer domains of the smart
grid. The next two sections of this paper will focus on the potential cyber threats to the
Smart Grid and potential countermeasures.
will have little impact on an organization. Most tasks that would fail due to outages can be
completed once systems become available again.
In some cases, an attack may impact more than one security service. In such cases, the
attack will only be described in the higher priority service category but the other services
that are potentially impacted will be mentioned as well. For instance, although a FDIA is
primarily an attack against data integrity, it may potentially impact availability [13]. Since
availability is the higher priority category, it will be described in the Availability Threats
subsection and not in the Integrity Threats subsection.
availability, but in terms integrity and confidentiality as well. The Stuxnet worm and Duqu
malware [37] are two examples of such attacks. These attacks may be able to bypass any
existing defense-in-depth strategies, which makes them particularly dangerous. Further-
more, masquerade attacks may be carried out [35] to penetrate a system and/or elevate
permissions in order to carry out a larger attack that may compromise the availability of
the system.
Impacted
Compromised Application,
Security Model Attack Category Possible Countermeasures Attack Example
Protocol, or Device
Category
AMI puppet attack [32]
SIEM, IDS, flow entropy, signal strength, sensing
Denial of Service time measurement, transmission failure count, smart grid TDS [43]
pushback, reconfiguration methods
PMU, GPS TSA [40]
FDIA Detection [51–125] applied in DLP, IDS, SIEM,
False Data Injection Attack etc.; Secure DNP3; TLS; SSL; encryption, AMI, RTU, EMS, SCADA [21]
authentication; PKI
Availability
PMU [126]
Jamming JADE, anti-jamming, (FHSS, DSSS)
CRN in WSGN MAS-SJ [42]
SCADA, PMU,
Stuxnet [37]
Malware Injection DLP, IDS, SIEM, Anti-virus, Diversity technique Control device
SCADA Duqu [37]
DLP, IDS, Secure DNP3, SIEM, TLS, SSL, encryption,
Masquerade attack PLC [35]
authentication, PKI
HMI, PLC eavesdropping
to notify their neighbors who may then be able to filter the source’s traffic from advancing
any further in the multihop network. The authors in [128] propose an openflow SDN-
based firewall for preventing DDoS attacks in AMI. By connecting the firewall to the SDN
controller and the cloud firewall agent, the firewall policies are able to ensure that incoming
data is safe and filtering of the traffic occurs at the cloud edge.
Intrusion detection systems (IDS) are devices or software applications that typi-
cally exhibit more sophisticated capabilities compared to firewalls, which are primarily
configuration-driven to filter harmful traffic. IDS may be developed with specific use
cases in mind, such as detection for a specific ICS protocol. They are usually designed to
detect more sophisticated intrusion scenarios than firewalls. Intrusion prevention systems
add some automated prevention capabilities to an IDS, e.g., automatically block a source
address when a certain attack scenario is detected. One key difference between firewalls
and IDS is that an IDS can likely decrypt incoming traffic while firewalls likely cannot.
Therefore, they may be more useful for detecting sophisticated attack scenarios, while still
allowing for the data to be encrypted. IDS systems may be classified as signature-based,
anomaly-based, or specification-based.
Signature-based IDSs rely on a rules-based engine of known attack signatures. In [129],
a set of signature rules for detecting intrusions in Modbus communications for SCADA
applications are presented. The authors in [130] present a set of signature rules for the
DNP3 protocol for SCADA. Each of the signature-based IDSs provide rules for preventing
DoS attacks.
Anomaly-based IDSs typically rely on machine learning algorithms or other statistical
methods. In [131], the authors use a time-series model of process measurements to detect
anomalies related to DoS attacks. The authors in [132] develop a deep learning model to
detect anomalies in PMU data. In [133], a machine-learning based anomaly detector to
detect attacks on load forecasting data. Each of these anomaly-based IDS algorithms are
useful for preventing DoS attacks.
Specification-based IDSs rely on manually developed specifications of legitimate
behavior. In [134], a specification-based IDS algorithm to monitor AMI C12.22 transmis-
sions for anomalies using device-based, network-based, and application-based constraints.
In [135], the authors propose a specification-based network-based cyber intrusion detection
system (NIDS) for detection of anomalies in GOOSE and SV multicast messages in substa-
tion automation systems. Each of the presented specification-based anomaly detectors are
useful for preventing DoS attacks.
Cryptographic authentication refers to the use of cryptographic solutions to prevent
the types of data integrity attacks that may lead to a DoS. Some key challenges for the
smart grid, however, are the combined use of resource-constrained computing devices and
long-lived devices that are typical of power systems. Due to the use of low-power devices,
the cryptographic algorithms must be lightweight and due to the use of the long-lived
devices, they must also be stable over long periods of time. Furthermore, the scalability of
key management approaches is a major concern [136]. In short, the use of cryptography in
the SG carries the potential for itself to become a target of DoS attacks [39]. In [137], the
authors propose a hybrid solution of combined public and symmetric key techniques.
Protocol-based solutions refer to research related to improving communication proto-
cols used in the SG. The protocols used in the SG carry some unique challenges compared
to those used in the Internet. For instance, since many of the devices have a long lifetime,
the protocols need to be able to evolve over time. In addition to current standardization
efforts to deal with various security requirements, including DoS attacks [138], there is
active research to improve SG protocols further. For instance, in [139], a lightweight and
efficient authentication scheme using one-time signatures for multicast data is presented.
Architectural solutions refer to the design of network topology to mitigate the effective-
ness of certain DoS scenarios. Since the SG is relatively new, there is opportunity to design
the architecture from the ground up to address such needs [140]. For instance, a subnetwork
may be able to isolate itself in the event of a DoS attack to continue operations until the
Energies 2022, 15, 8692 12 of 22
parent network recovers. This type of architectural design is known as islanding [141].
Islanding can be an effective architectural solution in smart grids [141–143].
Honeypots are devices and systems that mimic legitimate network components that
are likely targets of attack in a network. They are typically monitored and isolated from
the production network so that security operations may detect potential attacks early and
potentially block malicious sources before they have a chance to attack the production
systems. A recent survey paper explores the use of honeypots and honeynet [144] in the
smart grid. They find that Conpot [145,146] is a promising open-source project able to
support many smart grid use cases out of the box and may be extensible to support other
use cases as well. There is large potential for future research work in this area, particularly
with a focus on expanding support for more protocols and devices.
The SG presents many challenges for device-level cybersecurity, including (1) physical
security concerns, (2) patching may be difficult or impossible, (3) limited computation
abilities, and (4) cost efficiency of solutions. Plus, many of the legacy devices in the power
grid were designed without security in mind. Some promising solutions for the smart
grid include, (1) trusted computing [147], (2) attestation [148], (3) diversity, (4) secure
bootstrapping [141], and (5) secure patching [141].
Since Smart Grid applications can have strict delay requirements (on the order of a
few milliseconds), DoS attacks against their wireless channels are particularly effective.
Countermeasures in this category are primarily concerned with anti-jamming solutions
and they may be categorized by (1) efficient and robust detection and (2) DoS-resilience
schemes. [36]. In [126], the authors propose a method to detect the jamming channel attacks.
In [30], the authors introduce a new metric called message invalidation ratio to analyze the
effectiveness of a designed jamming detection system in different attack scenarios.
System-theoretic solutions relate to solutions for False Data Injection Attacks. As
described in [21], FDIA detection algorithms may be categorized as follows: model-based
and data-driven detection algorithms. Model-based attacks are further categorized by
static state-estimation techniques, dynamic state-estimation techniques, and other model-
based techniques. In [149], the authors model the False Data Injection Attack, enabling
the design of model-based detection schemes. The authors in [51–61] present static state-
estimation techniques. In [62–77], some dynamic state-estimation techniques are presented.
Some other model-based detection schemes are presented in [78,80–91,150]. Similarly,
data-driven detection algorithms may be further subdivided into machine-learning based
algorithms, data-mining based algorithms, and other data-driven algorithms. Some su-
pervised machine-learning based algorithms are presented in [92–108,151,152]; some un-
supervised machine-learning based algorithms are presented in [106,109–117,153]; and
reinforcement-learning based algorithms are presented in [116]. Data-mining based detec-
tion algorithms are presented in [117–120], and other data-driven detection algorithms are
described in [121–124].
Perhaps one of the more challenging aspects of securing ICS networks in general is to
implement effective countermeasures against malware threats. Some recent high-profile
attacks, including Stuxnet and Havex, utilized zero-day exploits and concealment [154].
In [154], the authors propose the use of multi-layered strategies (i.e., defense-in-depth) to
mitigate some of these threats, among others. An effective defense perimeter for the OT
and IT portions of the network, as shown in Figure 4 may prevent some of these attacks
from starting. However, due to misconfigurations, backdoors, etc. this is not a guarantee.
The IT side of the network should also use endpoint protection, a SIEM, etc., in order to
detect known threats. However, there are also zero-day threats, supply-chain threats, social
engineering threats, USB devices with malware, etc. The NERC CIP standards [2] include
standards for supply chain management and device patching. All of these are a good
place to start to defend against malware threats. However, development of more effective
countermeasures for these threats offers a good opportunity for future research into SG
and ICS networks in general.
Energies 2022, 15, 8692 13 of 22
Internet DMZ
Enterprise Zone
Domain Web Business Enterprise
Controller Servers Servers Desktops
DMZ
AV/WSUS/Patch Remote Access/
Historian
Server Jump Server
Manufacturing Zone
Control Center/ Production/
Processing LAN HMI Application
Database I/O
Historian Domain Engineering
Server Server Controller Workstations
Server
Field Field
Controller LAN
Controllers Controllers
Field I/O Devices Field Sensors Field Sensors Field Sensors Field Sensors
Devices Devices Devices Devices
Instrument Bus
Process SIS Process SIS
Legend:
Local Field bus/hard-wired
Vendor-specific bus
Ethernet TCP/IP
SIS Status Only
2. Orient
3. Create a Current Profile
4. Conduct a Risk Assessment
5. Create a Target Profile
6. Determine, Analyze, and Prioritize Gaps
7. Implement Action Plan
To aid in determination of a target profile, NIST also provides a set of four tiers that
an organization can reference for their management goals. There are 4 tiers referenced:
partial, risk informed, repeatable, and adaptive. The higher the tier, the more rigorous the
protections that are in place within an organization. For example, at tier 1 (partial) there
are no formalized policies in place, with the organization addressing each risk individ-
ually without an evolving procedure. These tiers expand cybersecurity awareness and
risk mitigation up to adaptive, where advanced technologies are implemented and risk
management practices evolve to combat current and past cybersecurity threats.
7. Conclusions
In this paper, we have identified the challenges facing the cybersecurity of ICSs with
the convergence of OT and IT systems. By examining the current standards and organiza-
tions for power grid cybersecurity governance, we showed recommended architectures
and security services specific to the energy sector. We also examined the areas of ICS
cybersecurity model of availability, integrity, and confidentiality.
We specifically illustrated the differences in priority assignment for confidentiality,
integrity and availability between IT and OT networks, as this difference is a key motivator
for different approaches to cybersecurity between these two domains. An evaluation of
known cybersecurity threats and their countermeasures was provided in each of these
three areas, with a focus on OT specific threats. We provided an examination of NIST’s
recommended gap analysis strategy for smart grid profiles with recommended continuous
functions of identify, protect, detect, respond, and recover. Each of these functions was
examined and examples of applicable implementations of presented countermeasures
were provided.
From this survey it is apparent that great strides have been made in the OT realm’s
cybersecurity approaches, while significant work remains, the growing number of tools,
specifications, and capabilities show the amount of effort being vested in securing OT
operations, many of which are at the core of critical infrastructure sectors, such as the
energy grid.
Author Contributions: Investigation, M.B., K.B., M.H. and H.S.; writing—original draft preparation,
M.B., K.B. and M.H.; writing—review and editing, M.B., M.H., H.S., K.P. and J.L.J.; supervision, H.S.,
M.H., K.P. and J.L.J.; project administration, K.P. and J.L.J.; funding acquisition, H.S., M.H., K.P. and
J.L.J. All authors have read and agreed to the published version of the manuscript.
Funding: This research was partially funded by the Department of Energy Cybersecurity for Energy
Delivery Systems program, and the Oak Ridge National Laboratory project No. 4000175929. It has
also been supported in part by the University of Nebraska-Lincoln’s Nebraska Center for Energy
Sciences Research (NCESR) under Cycle 16 Grant# 20-706.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: This study did not report any data.
Conflicts of Interest: The authors declare no conflict of interest.
Energies 2022, 15, 8692 16 of 22
Abbreviations
The following abbreviations are used in this manuscript:
References
1. Skodvin, T. “Pivotal politics” in US energy and climate legislation. Energy Policy 2010, 38, 4214–4223. [CrossRef]
2. CIP Standards. NERC 2022. Available online: https://www.nerc.com/pa/Stand/Pages
/USRelStand.aspx (accessed on 28 April 2022)
3. Kayan, H.; Nunes, M.; Rana, O.; Burnap, P.; Perera, C. Cybersecurity of Industrial Cyber-Physical Systems: A Review. ACM
Comput. Surv. 2022, 54, 229.. [CrossRef]
4. Hassanzadeh, A.; Rasekh, A.; Galelli, S.; Aghashahi, M.; Taormina, R.; Ostfeld, A.; Banks, M.K. A review of cybersecurity
incidents in the water sector. J. Environ. Eng. 2020, 146, 03120003. [CrossRef]
5. Krause, T.; Ernst, R.; Klaer, B.; Hacker, I.; Henze, M. Cybersecurity in Power Grids: Challenges and Opportunities. Sensors
2021, 21. [CrossRef] [PubMed]
6. Jacobs, N.; Hossain-McKenzie, S.; Jose, D.; Saleem, D.; Lai, C.; Cordeiro, P.; Hasandka, A.; Martin, M.; Howerter, C. Analysis of
System and Interoperability Impact from Securing Communications for Distributed Energy Resources. In Proceedings of the
2019 IEEE Power and Energy Conference at Illinois (PECI), Champaign, IL, USA, 28 February–1 March 2019; pp. 1–8. [CrossRef]
7. Shapsough, S.; Qatan, F.; Aburukba, R.; Aloul, F.; Al Ali, A.R. Smart grid cyber security: Challenges and solutions. In Proceedings
of the 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE), Offenburg, Germany, 20–23
October 2015; pp. 170–175. [CrossRef]
8. Christopher, J.D.; Gonzalez, D.; White, D.W.; Stevens, J.; Grundman, J.; Mehravari, N.; Dolan, T. Cybersecurity Capability Maturity
Model (C2M2); Department of Homeland Security: Washington, DC, USA, 2014; pp. 1–76.
Energies 2022, 15, 8692 17 of 22
9. Scali, D. Developing a Security Strategy to Cover ICS Assets. 17 August 2016. Available online: https://www.fireeye.com/blog/
executive-perspective/2016/08/developing_a_securit.html. (accessed on 28 April 2022)
10. Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures.
IEEE Commun. Surv. Tutor. 2014, 16, 1933–1954. [CrossRef]
11. Line, M.B.; Tøndel, I.A.; Jaatun, M.G. Cyber security challenges in Smart Grids. In Proceedings of the 2011 2nd IEEE PES
International Conference and Exhibition on Innovative Smart Grid Technologies, Manchester, UK, 5–7 December 2011; pp. 1–8.
12. Tan, S.; De, D.; Song, W.Z.; Yang, J.; Das, S.K. Survey of security advances in smart grid: A data driven approach. IEEE Commun.
Surv. Tutor. 2016, 19, 397–422. [CrossRef]
13. Huseinović, A.; Mrdović, S.; Bicakci, K.; Uludag, S. A survey of denial-of-service attacks and solutions in the smart grid. IEEE
Access 2020, 8, 177447–177470. [CrossRef]
14. Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A
comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [CrossRef]
15. Fan, Z.; Kulkarni, P.; Gormus, S.; Efthymiou, C.; Kalogridis, G.; Sooriyabandara, M.; Zhu, Z.; Lambotharan, S.; Chin, W.H. Smart
grid communications: Overview of research challenges, solutions, and standardization activities. IEEE Commun. Surv. Tutor.
2012, 15, 21–38. [CrossRef]
16. Le, T.N.; Chin, W.L.; Chen, H.H. Standardization and security for smart grid communications based on cognitive radio
technologies—A comprehensive survey. IEEE Commun. Surv. Tutor. 2016, 19, 423–445.
17. Peng, C.; Sun, H.; Yang, M.; Wang, Y.L. A survey on security communication and control for smart grids under malicious cyber
attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1554–1569. [CrossRef]
18. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A survey on smart grid communication infrastructures: Motivations, requirements and
challenges. IEEE Commun. Surv. Tutor. 2012, 15, 5–20. [CrossRef]
19. Rehmani, M.H.; Davy, A.; Jennings, B.; Assi, C. Software defined networks-based smart grid communication: A comprehensive
survey. IEEE Commun. Surv. Tutor. 2019, 21, 2637–2670. [CrossRef]
20. Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the
Smart Grid. Energies 2021, 14, 5894. [CrossRef]
21. Musleh, A.S.; Chen, G.; Dong, Z.Y. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans.
Smart Grid 2019, 11, 2218–2234. [CrossRef]
22. Beasley, C.; Zhong, X.; Deng, J.; Brooks, R.; Venayagamoorthy, G.K. A survey of electric power synchrophasor network cyber
security. In Proceedings of the IEEE PES Innovative Smart Grid Technologies, Europe, Istanbul, Turkey, 12–15 October 2014;
pp. 1–5.
23. Moussa, B.; Debbabi, M.; Assi, C. Security assessment of time synchronization mechanisms for the smart grid. IEEE Commun.
Surv. Tutor. 2016, 18, 1952–1973. [CrossRef]
24. Barrett, M.P. Framework for Improving Critical Infrastructure Cybersecurity Version 1.1; National Institute of Standards and Technology:
Gaithersburg, MD, USA, 2018. [CrossRef]
25. Allnutt, J.; Anand, D.; Arnold, D.; Goldstein, A.; Li-Baboud, Y.; Martin, A.; Nguyen, C.; Noseworthy, R.; Subramaniam, R.; Weiss,
M. Timing challenges in the smart grid. NIST Spec. Publ. 2017, 1500, 08.
26. Department of Homeland Security, U.D. Industrial Control Systems Cyber Emergency Response Team. Recommended
Practice: Improving Industrial Control System Cybersecurity with Defense-In-Depth Strategies. 2016. Available online:
https://www.cisa.gov/publication/cybersecurity-best-practices-for-industrial-control-systems (accessed on: 28 April 2022)
27. Greer, C.; Wollman, D.A.; Prochaska, D.; Boynton, P.A.; Mazer, J.A.; Nguyen, C.; FitzPatrick, G.; Nelson, T.L.; Koepke, G.H.;
Hefner, A.R., Jr.; et al. Nist Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0; National Institute of
Standards and Technology: Gaithersburg, MD, USA, 2014.
28. Temple, W.G.; Chen, B.; Tippenhauer, N.O. Delay makes a difference: Smart grid resilience under remote meter disconnect attack.
In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC,
Canada, 21–24 October 2013; pp. 462–467.
29. Ma, J.; Liu, Y.; Song, L.; Han, Z. Multiact dynamic game strategy for jamming attack in electricity market. IEEE Trans. Smart Grid
2015, 6, 2273–2282. [CrossRef]
30. Lu, Z.; Wang, W.; Wang, C. Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE
Trans. Mob. Comput. 2013, 13, 1746–1759. [CrossRef]
31. Li, H.; Lai, L.; Qiu, R.C. A denial-of-service jamming game for remote state monitoring in smart grid. In Proceedings of the 2011
45th Annual Conference on Information Sciences and Systems, Baltimore, MD, USA, 23–25 March 2011; pp. 1–6. [CrossRef]
32. Yi, P.; Zhu, T.; Zhang, Q.; Wu, Y.; Li, J. A denial of service attack in advanced metering infrastructure network. In Proceedings of
the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 1029–1034.
33. Choi, K.; Chen, X.; Li, S.; Kim, M.; Chae, K.; Na, J. Intrusion detection of NSM based DoS attacks using data mining in smart grid.
Energies 2012, 5, 4091–4109. [CrossRef]
34. Jin, D.; Nicol, D.M.; Yan, G. An event buffer flooding attack in DNP3 controlled SCADA systems. In Proceedings of the 2011
Winter Simulation Conference (WSC), Phoenix, AZ, USA, 11–14 December 2011; pp. 2614–2626.
Energies 2022, 15, 8692 18 of 22
35. Cleveland, F.M. Cyber security issues for advanced metering infrasttructure (AMI). In Proceedings of the 2008 IEEE Power and
Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, PA, USA, 20–24
July 2008; pp. 1–5.
36. Wang, W.; Lu, Z. Cyber security in the smart grid: Survey and challenges. Comput. Netw. 2013, 57, 1344–1371. [CrossRef]
37. Yi, P.; Zhu, T.; Zhang, Q.; Wu, Y.; Pan, L. Puppet attack: A denial of service attack in advanced metering infrastructure network. J.
Netw. Comput. Appl. 2016, 59, 325–332. [CrossRef]
38. Asri, S.; Pranggono, B. Impact of distributed denial-of-service attack on advanced metering infrastructure. Wirel. Pers. Commun.
2015, 83, 2211–2223. [CrossRef]
39. Kolesnikov, V.; Lee, W. MAC aggregation protocols resilient to DoS attacks. Int. J. Secur. Netw. 2012, 7, 122–132. [CrossRef]
40. Zhang, Z.; Gong, S.; Dimitrovski, A.D.; Li, H. Time synchronization attack in smart grid: Impact and analysis. IEEE Trans. Smart
Grid 2013, 4, 87–98. [CrossRef]
41. Risbud, P.; Gatsis, N.; Taha, A. Vulnerability analysis of smart grids to GPS spoofing. IEEE Trans. Smart Grid 2018, 10, 3535–3548.
[CrossRef]
42. Gai, K.; Qiu, M.; Ming, Z.; Zhao, H.; Qiu, L. Spoofing-jamming attack strategy using optimal power distributions in wireless
smart grid networks. IEEE Trans. Smart Grid 2017, 8, 2431–2439. [CrossRef]
43. Sargolzaei, A.; Yen, K.; Abdelghani, M.N. Delayed inputs attack on load frequency control in smart grid. In Proceedings of the
ISGT 2014, Washington, DC, USA, 19–22 February 2014; pp. 1–5.
44. Li, Q.; Ross, C.; Yang, J.; Di, J.; Balda, J.C.; Mantooth, H.A. The effects of flooding attacks on time-critical communications in the
smart grid. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT),
Washington, DC, USA, 18–20 February 2015; pp. 1–5.
45. Beigi-Mohammadi, N.; Mišić, J.; Khazaei, H.; Mišić, V.B. An intrusion detection system for smart grid neighborhood area network.
In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014;
pp. 4125–4130.
46. Goel, S.; Hong, Y.; Papakonstantinou, V.; Kloza, D. Smart Grid Security; Springer: Berlin/Heidelberg, Germany, 2015; pp. 1–39.
[CrossRef]
47. Mohsenian-Rad, A.H.; Leon-Garcia, A. Distributed internet-based load altering attacks against smart power grids. IEEE Trans.
Smart Grid 2011, 2, 667–674. [CrossRef]
48. Li, Y.; Wang, R.; Wang, P.; Niyato, D.; Saad, W.; Han, Z. Resilient PHEV charging policies under price information attacks. In
Proceedings of the 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), Tainan, Taiwan,
5–8 November 2012; pp. 389–394.
49. Anzalchi, A.; Sarwat, A. A survey on security assessment of metering infrastructure in smart grid systems. In Proceedings of the
SoutheastCon 2015, Fort Lauderdale, FL, USA, 9–12 April 2015; pp. 1–4.
50. Asghar, M.R.; Dán, G.; Miorandi, D.; Chlamtac, I. Smart meter data privacy: A survey. IEEE Commun. Surv. Tutor. 2017,
19, 2820–2835. [CrossRef]
51. Chung, H.M.; Li, W.T.; Yuen, C.; Chung, W.H.; Wen, C.K. Local cyber-physical attack with leveraging detection in smart grid. In
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany,
23–27 October 2017; pp. 461–466.
52. Jiang, Q.; Chen, H.; Xie, L.; Wang, K. Real-time detection of false data injection attack using residual prewhitening in smart grid
network. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden,
Germany, 23–27 October 2017; pp. 83–88.
53. Sreenath, J.; Meghwani, A.; Chakrabarti, S.; Rajawat, K.; Srivastava, S. A recursive state estimation approach to mitigate false
data injection attacks in power systems. In Proceedings of the 2017 IEEE Power & Energy Society General Meeting, Chicago, IL,
USA, 16–20 July 2017; pp. 1–5.
54. Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving efficient detection against false data injection attacks in smart grid.
IEEE Access 2017, 5, 13787–13798. [CrossRef]
55. Liu, T.; Sun, Y.; Liu, Y.; Gui, Y.; Zhao, Y.; Wang, D.; Shen, C. Abnormal traffic-indexed state estimation: A cyber–physical fusion
approach for smart grid attack detection. Future Gener. Comput. Syst. 2015, 49, 94–103. [CrossRef]
56. Lukicheva, I.; Pozo, D.; Kulikov, A. Cyberattack detection in intelligent grids using non-linear filtering. In Proceedings of the
2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), Sarajevo, Bosnia and Herzegovina, 21–25
October 2018; pp. 1–6.
57. Kallitsis, M.G.; Bhattacharya, S.; Stoev, S.; Michailidis, G. Adaptive statistical detection of false data injection attacks in smart
grids. In Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Washington, DC,
USA, 7–9 December 2016; pp. 826–830.
58. Moslemi, R.; Mesbahi, A.; Velni, J.M. A fast, decentralized covariance selection-based approach to detect cyber attacks in smart
grids. IEEE Trans. Smart Grid 2017, 9, 4930–4941. [CrossRef]
59. Chen, Y.; Huang, S.; Liu, F.; Wang, Z.; Sun, X. Evaluation of reinforcement learning-based false data injection attack to automatic
voltage control. IEEE Trans. Smart Grid 2018, 10, 2158–2169. [CrossRef]
Energies 2022, 15, 8692 19 of 22
60. Tang, B.; Yan, J.; Kay, S.; He, H. Detection of false data injection attacks in smart grid under colored Gaussian noise. In Proceedings
of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17–19 October 2016;
pp. 172–179.
61. Akingeneye, I.; Wu, J. Low latency detection of sparse false data injections in smart grids. IEEE Access 2018, 6, 58564–58573.
[CrossRef]
62. Kurt, M.N.; Yılmaz, Y.; Wang, X. Real-time detection of hybrid and stealthy cyber-attacks in smart grid. IEEE Trans. Inf. Forensics
Secur. 2018, 14, 498–513. [CrossRef]
63. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using
Kalman filter. IEEE Trans. Control. Netw. Syst. 2014, 1, 370–379. [CrossRef]
64. Rawat, D.B.; Bajracharya, C. Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process.
Lett. 2015, 22, 1652–1656. [CrossRef]
65. Khalaf, M.; Youssef, A.; El-Saadany, E. Detection of false data injection in automatic generation control systems using Kalman
filter. In Proceedings of the 2017 IEEE Electrical Power and Energy Conference (EPEC), Saskatoon, SK, Canada, 22–25 October
2017; pp. 1–6.
66. Khalaf, M.; Youssef, A.; El-Saadany, E. Joint detection and mitigation of false data injection attacks in AGC systems. IEEE Trans.
Smart Grid 2018, 10, 4985–4995. [CrossRef]
67. Kurt, M.N.; Yılmaz, Y.; Wang, X. Distributed quickest detection of cyber-attacks in smart grid. IEEE Trans. Inf. Forensics Secur.
2018, 13, 2015–2030. [CrossRef]
68. Jiang, Y.; Hui, Q. Kalman filter with diffusion strategies for detecting power grid false data injection attacks. In Proceedings of
the 2017 IEEE International Conference on Electro Information Technology (EIT), Lincoln, NE, USA, 14–17 May 2017; pp. 254–259.
69. Khalid, H.M.; Peng, J.C.H. Immunity toward data-injection attacks using multisensor track fusion-based model prediction. IEEE
Trans. Smart Grid 2015, 8, 697–707. [CrossRef]
70. Musleh, A.S.; Khalid, H.M.; Muyeen, S.; Al-Durra, A. A prediction algorithm to enhance grid resilience toward cyber attacks in
WAMCS applications. IEEE Syst. J. 2017, 13, 710–719. [CrossRef]
71. Karimipour, H.; Dinavahi, V. Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE
Access 2017, 6, 2984–2995. [CrossRef]
72. Karimipour, H.; Dinavahi, V. On false data injection attack against dynamic state estimation on smart power grids. In Proceedings
of the 2017 IEEE International Conference on Smart Energy Grid Engineering (SEGE), Oshawa, ON, Canada, 14–17 August 2017;
pp. 388–393.
73. Shi, W.; Wang, Y.; Jin, Q.; Ma, J. PDL: An efficient prediction-based false data injection attack detection and location in smart
grid. In Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan,
23–27 July 2018; Volume 2, pp. 676–681.
74. Zhao, J.; Zhang, G.; La Scala, M.; Dong, Z.Y.; Chen, C.; Wang, J. Short-term state forecasting-aided method for detection of smart
grid general false data injection attacks. IEEE Trans. Smart Grid 2015, 8, 1580–1590. [CrossRef]
75. Anwar, A.; Mahmood, A.N.; Tari, Z. Ensuring data integrity of OPF module and energy database by detecting changes in power
flow patterns in smart grids. IEEE Trans. Ind. Inform. 2017, 13, 3299–3311. [CrossRef]
76. Li, Y.; Li, J.; Luo, X.; Wang, X.; Guan, X. Cyber attack detection and isolation for smart grids via unknown input observer. In
Proceedings of the 2018 37th Chinese Control Conference (CCC), Wuhan, China, 25–27 July 2018; pp. 6207–6212.
77. Wang, X.; Luo, X.; Zhang, M.; Guan, X. Distributed detection and isolation of false data injection attacks in smart grids via
nonlinear unknown input observers. Int. J. Electr. Power Energy Syst. 2019, 110, 208–222. [CrossRef]
78. Sahoo, S.; Mishra, S.; Peng, J.C.H.; Dragičević, T. A stealth cyber-attack detection strategy for DC microgrids. IEEE Trans. Power
Electron. 2018, 34, 8162–8174. [CrossRef]
79. Li, B.; Ding, T.; Huang, C.; Zhao, J.; Yang, Y.; Chen, Y. Detecting False Data Injection AttacNs Against Power System State
Estimation with Fast Go-Decomposition (GoDec) Approach. IEEE Trans. Ind. Inform. 2014, 15, 2892–2904. [CrossRef]
80. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization.
IEEE Trans. Smart Grid 2014, 5, 612–621. [CrossRef]
81. Kushal, T.R.B.; Lai, K.; Illindala, M.S. Risk-based mitigation of load curtailment cyber attack using intelligent agents in a shipboard
power system. IEEE Trans. Smart Grid 2018, 10, 4741–4750. [CrossRef]
82. Singh, S.K.; Khanna, K.; Bose, R.; Panigrahi, B.K.; Joshi, A. Joint-transformation-based detection of false data injection attacks in
smart grid. IEEE Trans. Ind. Inform. 2017, 14, 89–97. [CrossRef]
83. Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online detection of stealthy false data injection attacks in power system state estimation.
IEEE Trans. Smart Grid 2016, 9, 1636–1646. [CrossRef]
84. Kumar, R.J.R.; Sikdar, B. Efficient detection of false data injection attacks on AC state estimation in smart grids. In Proceedings of
the 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, USA, 9–11 October 2017; pp. 411–415.
85. Sridhar, S.; Govindarasu, M. Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart
Grid 2014, 5, 580–591. [CrossRef]
86. Hao, J.; Kang, E.; Sun, J.; Wang, Z.; Meng, Z.; Li, X.; Ming, Z. An adaptive Markov strategy for defending smart grid false data
injection from malicious attackers. IEEE Trans. Smart Grid 2016, 9, 2398–2408. [CrossRef]
Energies 2022, 15, 8692 20 of 22
87. Ameli, A.; Hooshyar, A.; El-Saadany, E.F. Development of a cyber-resilient line current differential relay. IEEE Trans. Ind. Inform.
2018, 15, 305–318. [CrossRef]
88. Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid
2015, 6, 2476–2483. [CrossRef]
89. Khanna, K.; Singh, S.K.; Panigrahi, B.K.; Bose, R.; Joshi, A. On detecting false data injection with limited network information
using transformation based statistical techniques. In Proceedings of the 2017 IEEE Power & Energy Society General Meeting,
Chicago, IL, USA, 16–20 July 2017; pp. 1–5.
90. Li, S.; Yılmaz, Y.; Wang, X. Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 2014,
6, 2725–2735. [CrossRef]
91. Huang, Y.; Tang, J.; Cheng, Y.; Li, H.; Campbell, K.A.; Han, Z. Real-time detection of false data injection in smart grid networks:
An adaptive CUSUM method and analysis. IEEE Syst. J. 2014, 10, 532–543. [CrossRef]
92. Yip, S.C.; Wong, K.; Hew, W.P.; Gan, M.T.; Phan, R.C.W.; Tan, S.W. Detection of energy theft and defective smart meters in smart
grids using linear regression. Int. J. Electr. Power Energy Syst. 2017, 91, 230–240. [CrossRef]
93. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting stealthy false data injection using machine learning in smart
grid. IEEE Syst. J. 2014, 11, 1644–1652. [CrossRef]
94. Yan, J.; Tang, B.; He, H. Detection of false data attacks in smart grid with supervised learning. In Proceedings of the 2016
International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Canada, 24–29 July 2016; pp. 1395–1402.
95. Binna, S.; Kuppannagari, S.R.; Engel, D.; Prasanna, V.K. Subset level detection of false data injection attacks in smart grids. In
Proceedings of the 2018 IEEE Conference on Technologies for Sustainability (SusTech), Long Beach, CA, USA, 11–13 November
2018; pp. 1–7.
96. Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture
Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 161–171. [CrossRef]
97. Vimalkumar, K.; Radhika, N. A big data framework for intrusion detection in smart grids using apache spark. In Proceedings of
the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 13–16
September 2017; pp. 198–204.
98. Jindal, A.; Dua, A.; Kaur, K.; Singh, M.; Kumar, N.; Mishra, S. Decision tree and SVM-based data analytics for theft detection in
smart grid. IEEE Trans. Ind. Inform. 2016, 12, 1005–1016. [CrossRef]
99. Wang, D.; Wang, X.; Zhang, Y.; Jin, L. Detection of power grid disturbances and cyber-attacks based on machine learning. J. Inf.
Secur. Appl. 2019, 46, 42–52. [CrossRef]
100. Khanna, K.; Panigrahi, B.K.; Joshi, A. AI-based approach to identify compromised meters in data integrity attacks on smart grid.
IET Gener. Transm. Distrib. 2018, 12, 1052–1066. [CrossRef]
101. Zhao, H.; Liu, H.; Hu, W.; Yan, X. Anomaly detection and fault analysis of wind turbine components based on deep learning
network. Renew. Energy 2018, 127, 825–834. [CrossRef]
102. Xue, D.; Jing, X.; Liu, H. Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework. IEEE
Access 2019, 7, 31762–31773. [CrossRef]
103. Yang, L.; Li, Y.; Li, Z. Improved-ELM method for detecting false data attack in smart grid. Int. J. Electr. Power Energy Syst. 2017,
91, 183–191. [CrossRef]
104. Punmiya, R.; Choe, S. Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing.
IEEE Trans. Smart Grid 2019, 10, 2326–2329. [CrossRef]
105. Razavi, R.; Gharipour, A.; Fleury, M.; Akpan, I.J. A practical feature-engineering framework for electricity theft detection in smart
grids. Appl. Energy 2019, 238, 481–494. [CrossRef]
106. McLaughlin, S.; Holbert, B.; Fawaz, A.; Berthier, R.; Zonouz, S. A multi-sensor energy theft detection framework for advanced
metering infrastructures. IEEE J. Sel. Areas Commun. 2013, 31, 1319–1330. [CrossRef]
107. Sedghi, H.; Jonckheere, E. Statistical structure learning to ensure data integrity in smart grid. IEEE Trans. Smart Grid 2015,
6, 1924–1933. [CrossRef]
108. Sedghi, H.; Jonckheere, E. Statistical structure learning of smart grid for detection of false data injection. In Proceedings of the
2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5.
109. Zanetti, M.; Jamhour, E.; Pellenz, M.; Penna, M.; Zambenedetti, V.; Chueiri, I. A tunable fraud detection system for advanced
metering infrastructure using short-lived patterns. IEEE Trans. Smart Grid 2017, 10, 830–840. [CrossRef]
110. Viegas, J.L.; Vieira, S.M. Clustering-based novelty detection to uncover electricity theft. In Proceedings of the 2017 IEEE
International Conference on Fuzzy Systems (FUZZ-IEEE), Naples, Italy, 9–12 July 2017; pp. 1–6.
111. Ahmed, S.; Lee, Y.; Hyun, S.H.; Koo, I. Unsupervised machine learning-based detection of covert data integrity assault in smart
grid networks utilizing isolation forest. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2765–2777. [CrossRef]
112. Wei, L.; Gao, D.; Luo, C. False data injection attacks detection with deep belief networks in smart grid. In Proceedings of the 2018
Chinese Automation Congress (CAC), Xi’an, China, 30 November–2 December 2018; pp. 2621–2625.
113. He, Y.; Mendis, G.J.; Wei, J. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent
mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [CrossRef]
114. Ghasemi, A.A.; Gitizadeh, M. Detection of illegal consumers using pattern classification approach combined with Levenberg–
Marquardt method in smart grid. Int. J. Electr. Power Energy Syst. 2018, 99, 363–375. [CrossRef]
Energies 2022, 15, 8692 21 of 22
115. Ntalampiras, S. Fault diagnosis for smart grids in pragmatic conditions. IEEE Trans. Smart Grid 2016, 9, 1964–1971. [CrossRef]
116. Kurt, M.N.; Ogundijo, O.; Li, C.; Wang, X. Online cyber-attack detection in smart grid: A reinforcement learning approach. IEEE
Trans. Smart Grid 2018, 10, 5174–5185. [CrossRef]
117. Adhikari, U.; Morris, T.H.; Pan, S. Applying non-nested generalized exemplars classification for cyber-power event and intrusion
detection. IEEE Trans. Smart Grid 2016, 9, 3928–3941. [CrossRef]
118. Adhikari, U.; Morris, T.H.; Pan, S. Applying hoeffding adaptive trees for real-time cyber-power event and intrusion classification.
IEEE Trans. Smart Grid 2017, 9, 4049–4060. [CrossRef]
119. Pan, S.; Morris, T.; Adhikari, U. Classification of disturbances and cyber-attacks in power systems using heterogeneous
time-synchronized data. IEEE Trans. Ind. Inform. 2015, 11, 650–662. [CrossRef]
120. Adhikari, U.; Morris, T.H.; Pan, S. A causal event graph for cyber-power system events using synchrophasor. In Proceedings of
the 2014 IEEE PES General Meeting| Conference & Exposition, National Harbor, MD, USA, 27–31 July 2014; pp. 1–5.
121. Beg, O.A.; Nguyen, L.V.; Johnson, T.T.; Davoudi, A. Signal temporal logic-based attack detection in DC microgrids. IEEE Trans.
Smart Grid 2018, 10, 3585–3595. [CrossRef]
122. Ding, Y.; Liu, J. Real-time false data injection attack detection in energy internet using online robust principal component analysis.
In Proceedings of the 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2), Beijing, China, 26–28
November 2017; pp. 1–6.
123. Li, B.; Lu, R.; Wang, W.; Choo, K.K.R. Distributed host-based collaborative detection for false data injection attacks in smart grid
cyber-physical system. J. Parallel Distrib. Comput. 2017, 103, 32–41. [CrossRef]
124. Villar-Rodriguez, E.; Del Ser, J.; Oregi, I.; Bilbao, M.N.; Gil-Lopez, S. Detection of non-technical losses in smart meter data based
on load curve profiling and time series analysis. Energy 2017, 137, 118–128. [CrossRef]
125. Saad, A.A.; Faddel, S.; Mohammed, O. A secured distributed control system for future interconnected smart grids. Appl. Energy
2019, 243, 57–70. [CrossRef]
126. Lu, Z.; Wang, W.; Wang, C. From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. In
Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 1871–1879.
127. Wang, X.; Yi, P. Security framework for wireless communications in smart distribution grid. IEEE Trans. Smart Grid 2011,
2, 809–818. [CrossRef]
128. Diovu, R.; Agee, J. A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks. In
Proceedings of the 2017 IEEE PES PowerAfrica, Accra, Ghana, 27–30 June 2017; pp. 28–33.
129. Morris, T.H.; Jones, B.A.; Vaughn, R.B.; Dandass, Y.S. Deterministic intrusion detection rules for MODBUS protocols. In Proceed-
ings of the 2013 46th Hawaii International Conference on System Sciences, Wailea, HI, USA, 7–10 January 2013; pp. 1773–1781.
130. Li, H.; Liu, G.; Jiang, W.; Dai, Y. Designing snort rules to detect abnormal DNP3 network data. In Proceedings of the 2015
International Conference on Control, Automation and Information Sciences (ICCAIS), Wailea, HI, USA, 7–10 January 2015;
pp. 343–348.
131. Kemal, M.S.; Aoudi, W.; Olsen, R.L.; Almgren, M.; Schwefel, H.P. Model-free detection of cyberattacks on voltage control in
distribution grids. In Proceedings of the 2019 15th European Dependable Computing Conference (EDCC), Naples, Italy, 17–20
September 2019; pp. 171–176.
132. Wang, J.; Shi, D.; Li, Y.; Chen, J.; Ding, H.; Duan, X. Distributed framework for detecting PMU data manipulation attacks with
deep autoencoders. IEEE Trans. Smart Grid 2018, 10, 4401–4410. [CrossRef]
133. Cui, M.; Wang, J.; Yue, M. Machine learning-based anomaly detection for load forecasting under cyberattacks. IEEE Trans. Smart
Grid 2019, 10, 5724–5734. [CrossRef]
134. Berthier, R.; Sanders, W.H. Specification-based intrusion detection for advanced metering infrastructures. In Proceedings of the
2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing, Pasadena, CA, USA, 12–14 December 2011;
pp. 184–193.
135. Hong, J.; Liu, C.C.; Govindarasu, M. Detection of cyber intrusions using network-based multicast messages for substation
automation. In Proceedings of the ISGT 2014, Washington, DC, USA, 19–22 February 2014; pp. 1–5.
136. Smith, S.W. Cryptographic scalability challenges in the smart grid. In Proceedings of the 2012 IEEE PES Innovative Smart Grid
Technologies (ISGT), Washington, DC, USA, 16–20 January 2012; pp. 1–3.
137. Wu, D.; Zhou, C. Fault-tolerant and scalable key management for smart grid. IEEE Trans. Smart Grid 2011, 2, 375–381. [CrossRef]
138. Rosinger, C.; Uslar, M. Smart grid security: Iec 62351 and other relevant standards. In Standardization in Smart Grids; Springer:
Berlin/Heidelberg, Germany, 2013; pp. 129–146.
139. Wang, Q.; Khurana, H.; Huang, Y.; Nahrstedt, K. Time valid one-time signature for time-critical multicast data authentication. In
Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 1233–1241.
140. Pillitteri, V.Y.; Brewer, T.L. Guidelines for Smart Grid Cybersecurity; National Institute of Standards and Technology: Gaithersburg,
MD, USA, 2014. [CrossRef]
141. Tesfay, T.T.; Hubaux, J.P.; Le Boudec, J.Y.; Oechslin, P. Cyber-secure communication architecture for active power distribution
networks. In Proceedings of the 29th Annual ACM Symposium On Applied Computing, Gyeongju, Republic of Korea, 24–28
March 2014; pp. 545–552.
142. Lasseter, R.H. Microgrids. In Proceedings of the 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.
02CH37309), New York, NY, USA, 27–31 January 2002; IEEE: New York, NY, USA, 2002; Volume 1, pp. 305–308.
Energies 2022, 15, 8692 22 of 22
143. Isikman, A.O.; Altun, C.; Uludag, S.; Tavli, B. Power scheduling in privacy enhanced microgrid networks with renewables and
storage. In Proceedings of the 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas,
NV, USA, 9–12 January 2016; pp. 405–410.
144. Dalamagkas, C.; Sarigiannidis, P.; Ioannidis, D.; Iturbe, E.; Nikolis, O.; Ramos, F.; Rios, E.; Sarigiannidis, A.; Tzovaras, D. A
survey on honeypots, honeynets and their applications on smart grid. In Proceedings of the 2019 IEEE Conference on Network
Softwarization (NetSoft), Paris, France, 24–28 June 2019; pp. 93–100.
145. Rist, L. Introducing conpot. The Honeynet Project Available online: https://www.honeynet.org/2013/05/11/introducing-conpot/
(accessed on: 14 November 2022).
146. Jicha, A.; Patton, M.; Chen, H. SCADA honeypots: An in-depth analysis of Conpot. In Proceedings of the 2016 IEEE conference
on intelligence and security informatics (ISI), Tucson, AZ, USA, 28–30 September 2016; pp. 196–198.
147. Paverd, A.J.; Martin, A.P. Hardware security for device authentication in the smart grid. In Proceedings of the International Workshop
on Smart Grid Security, Berlin, Germany, 3 December 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 72–84.
148. Castelluccia, C.; Francillon, A.; Perito, D.; Soriente, C. On the difficulty of software-based attestation of embedded devices. In
Proceedings of the 16th ACM conference on Computer and Communications Security, Chicago, IL, USA, 9–13 November 2009;
pp. 400–409.
149. Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst.
Secur. TISSEC 2011, 14, 13. [CrossRef]
150. Pal, S.; Sikdar, B.; Chow, J.H. Classification and detection of PMU data manipulation attacks using transmission line parameters.
IEEE Trans. Smart Grid 2017, 9, 5057–5066. [CrossRef]
151. Wang, Y.; Amin, M.M.; Fu, J.; Moussa, H.B. A novel data analytical approach for false data injection cyber-physical attack
mitigation in smart grids. IEEE Access 2017, 5, 26022–26033. [CrossRef]
152. El Hariri, M.; Harmon, E.; Youssef, T.; Saleh, M.; Habib, H.; Mohammed, O. The iec 61850 sampled measured values protocol:
Analysis, threat identification, and feasibility of using nn forecasters to detect spoofed packets. Energies 2019, 12, 3731. [CrossRef]
153. Li, B.; Lu, R.; Xiao, G. HMM-based fast detection of false data injections in advanced metering infrastructure. In Proceedings of
the GLOBECOM 2017–2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6.
154. Marali, M.; Sudarsan, S.D.; Gogioneni, A. Cyber security threats in industrial control systems and protection. In Proceedings of
the 2019 International Conference on Advances in Computing and Communication Engineering (ICACCE), Sathyamangalam,
India, 4–6 April 2019; pp. 1–7.
155. Mix S.; Hadley M.; Becker F.; Cenzon E.; Corrigan R.; Dood M.; Edgar T.; Formea J.; Goransan C.; Huntley C.; et al. IIEEE
1711.2-2019; IEEE Standard for Secure SCADA Communications Protocol (SSCP). EEE Standards Association: Piscataway, NJ,
USA, 2020; pp. 1–37. [CrossRef]
156. Ferst, M.K.; de Figueiredo, H.F.; Denardin, G.; Lopes, J. Implementation of secure communication with modbus and transport
layer security protocols. In Proceedings of the 2018 13th IEEE International Conference on Industry Applications (INDUSCON),
Sao Paulo, Brazil, 12–14 November 2018; pp. 155–162.