0% found this document useful (0 votes)
8 views24 pages

Review of Cybersecurity Analysis in Smart Distribu

This document reviews the challenges of cybersecurity in smart distribution systems, focusing on the use of unsupervised learning methods for detecting cyberattacks, particularly False Data Injection Attacks (FDIA). It highlights the limitations of existing supervised learning methods and presents a novel data mining approach that leverages unsupervised algorithms to improve detection rates. The paper also discusses various cyber-attack types, their implications, and the need for robust cybersecurity measures in microgrid systems.

Uploaded by

Murat Yildiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views24 pages

Review of Cybersecurity Analysis in Smart Distribu

This document reviews the challenges of cybersecurity in smart distribution systems, focusing on the use of unsupervised learning methods for detecting cyberattacks, particularly False Data Injection Attacks (FDIA). It highlights the limitations of existing supervised learning methods and presents a novel data mining approach that leverages unsupervised algorithms to improve detection rates. The paper also discusses various cyber-attack types, their implications, and the need for robust cybersecurity measures in microgrid systems.

Uploaded by

Murat Yildiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

energies

Review
Review of Cybersecurity Analysis in Smart Distribution
Systems and Future Directions for Using Unsupervised
Learning Methods for Cyber Detection
Smitha Joyce Pinto 1, *, Pierluigi Siano 2,3, * and Mimmo Parente 3

1 Department of Electronics and Communication, MIT Mysore, Belawadi, Srirangapatna 571438, India
2 Department of Electrical and Electronic Engineering Science, University of Johannesburg,
Johannesburg 2092, South Africa
3 Dipartimento di Scienze Aziendali—Management & Innovation Systems, Università degli Studi di Salerno,
84084 Fisciano, Italy
* Correspondence: [email protected] or [email protected] (S.J.P.); [email protected] (P.S.)

Abstract: In a physical microgrid system, equipment failures, manual misbehavior of equipment, and
power quality can be affected by intentional cyberattacks, made more dangerous by the widespread
use of established communication networks via sensors. This paper comprehensively reviews smart
grid challenges on cyber-physical and cyber security systems, standard protocols, communication,
and sensor technology. Existing supervised learning-based Machine Learning (ML) methods for
identifying cyberattacks in smart grids mostly rely on instances of both normal and attack events
for training. Additionally, for supervised learning to be effective, the training dataset must contain
representative examples of various attack situations having different patterns, which is challenging.
Therefore, we reviewed a novel Data Mining (DM) approach based on unsupervised rules for identify-
ing False Data Injection Cyber Attacks (FDIA) in smart grids using Phasor Measurement Unit (PMU)
data. The unsupervised algorithm is excellent for discovering unidentified assault events since it only
uses examples of typical events to train the detection models. The datasets used in our study, which
looked at some well-known unsupervised detection methods, helped us assess the performances of
different methods. The performance comparison with popular unsupervised algorithms is better at
Citation: Pinto, S.J.; Siano, P.; Parente,
finding attack events if compared with supervised and Deep Learning (DL) algorithms.
M. Review of Cybersecurity Analysis
in Smart Distribution Systems and
Keywords: Association Rule Mining; clustering; cyber-attacks; data mining; FDIA; smart grid
Future Directions for Using
Unsupervised Learning Methods for
Cyber Detection. Energies 2023, 16,
1651. https://doi.org/10.3390/
en16041651
1. Introduction
The growing integration of Distribution Energy Resources (DER) into the electric
Academic Editor: Wencong Su
grid, including photovoltaics (PV), wind, battery storage, fuel cells, and hydro schemes,
Received: 19 December 2022 has benefits, in that it lowers the cost of enhancing the power system, as well as draw-
Revised: 2 February 2023 backs, particularly environmental uncertainty. For efficient and continuous operation, a
Accepted: 4 February 2023 microgrid controller that coordinates and regulates the various DER using communication
Published: 7 February 2023 technologies based on established communication protocols is essential [1]. Concerns with
feeders, grid failure, communication, cyber security, control, islanding, regulation issues,
and protection are some of the specific difficulties associated with the development of
DER consumption into the grid [2]. However, because communication networks are so
Copyright: © 2023 by the authors.
widely used, they are sensitive to harmful cyber-attacks. These attacks can be particularly
Licensee MDPI, Basel, Switzerland.
dangerous if they result in physical harm to devices, technical failures, or human error.
This article is an open access article
Physical and cyber security implies frequently threats that target power utilities [3]. Mi-
distributed under the terms and
crogrid systems are more susceptible to cyberattacks because they are more dependent on
conditions of the Creative Commons
Attribution (CC BY) license (https://
distributed, active network control as their number of components grows, which raises
creativecommons.org/licenses/by/
the potential impact of an intrusion. According to a western US department of energy
4.0/). report from May 2019, the utility’s wind and solar power generation installations were

Energies 2023, 16, 1651. https://doi.org/10.3390/en16041651 https://www.mdpi.com/journal/energies


Energies 2023, 16, 1651 2 of 24

disconnected, its supervisory control and data acquisition (SCADA) systems experienced a
brief outage, and the network was temporarily disconnected for five minutes [4,5]. Both
physical harm and financial loss can result from a cyberattack that introduces instability or
incorrect information into the electrical system. Microgrid operators and developers require
a comprehensive and integrated approach to cyber-physical safety to be more adaptable.
Strengthening the microgrid, a systematic review of the interconnection security controls,
designing and formulation of disaster management, and reserves for the security procedure
are the essentials to guarantee the safety of the key energy configuration [6].
Many kinds of cyber-attacks can jeopardize the data and communication security of
the smart grids, including False Data Injection Attacks (FDIAs) [7], Distributed Denial of
Service (DDoS) attacks [8], topological attacks [9], overloading attacks [10], and resonance
attack [11]. FDIAs have excellent accessibility, interference, and concealment capabilities,
making them one of the most dangerous attack tactics in many power cyber-attacks [12].
FDIA may cause either the automated system or the operator to take incorrect action. As
a result, it leads to incorrect decision-making and control procedures, which ultimately
has fatal effects. In this kind of attack, hackers might use physical, cybernetic, and cyber-
physical channels to fraudulently obtain important information. FDIA seeks to alter data
at the measuring units or control center to achieve a certain goal. The nodal voltage
magnitudes and angles, nodal power injections, line power flows, and digital data such as
the state of breakers and switches are among the analog measured data from the power
system that FDIAs aim to capture. To monitor and manage the operation of the power
grid through analysis of meter measurement data, the power system operator (PSO) needs
to execute state estimation (SE). At the transmission system level, the issue of detecting
cyberattacks through flawed data processing in state estimators has recently attracted a lot
of attention [13].
The SE method’s central concept is the estimation of each area’s state using measure-
ments specific to that area and the sharing of boundary bus states between adjacent areas.
In energy management systems, SE algorithms play a crucial role in the processing of
inaccurate measurements. When bad data are present, it is anticipated that large residual
errors will inevitably result from the bad data, hence bad data detection (BDD) filters
measurement inaccuracies brought on by malicious assaults or device flaws. However,
when a successful FDIA is started, the residual error would remain the same as usual. To
safeguard state estimates, certain strategies for faulty measurement detection have been
developed [14].
Analyzing the power system model is not necessary for the contemporary BDD
methodologies based on data-driven models. To anticipate measurement error, they apply
the ML approach to extract the electrical attributes from the massive historical data. The
next step is to utilize clustering analysis to automatically group good and bad data into
distinct clusters [15]. For selecting the most important features to detect FDIA and remove
bad data, we reviewed unsupervised machine learning methods on smart grids.
This paper gives a comprehensive review of the field of cyber-attacks against smart
grids and introduces the background of state estimation. This paper examines cyber-attack
detection through unsupervised data mining algorithms. Clustering and Association Rule
Mining (ARM) are two different categories under unsupervised techniques. With various
advantages over supervised and reinforcement algorithms, ARM and clustering are data
mining techniques used to calculate the correlation between two or more variables in a
dataset by identifying the strongest rules that exist between their values. On another side,
the unsupervised approach of clustering has a low detection rate with tampered data. As a
result, this article offers a thorough assessment of numerous unsupervised methodologies
and approaches tailored to the difficulties posed by cyberattacks on smart grids, as well as
an analysis of their characteristics.
The structure of this article is as follows: In Section 2 the review methodology is
described and in Section 3 we will provide a general review of the cyber security issues
with smart grid technologies. Section 4 explains FDIA approaches and techniques in smart
attacks over FDIA. Sections 6 and 7 outline future studies and conclusions, re

2. Review Methodology
Energies 2023, 16, 1651 The main goal of this review is to provide a platform for researchers 3 of 24 to
various cyber-attack detection techniques on smart grids and explain the best
attacks. This review offers a thorough explanation of numerous attacks, hig
grids. Section
benefits 5 discusses
and drawbacks, the unsupervised
discusseslearning-based
present trends detection
and techniques
suggested fordirections
cyber- fo
attacks over FDIA. Sections 6 and 7 outline future studies and conclusions, respectively.
and offers a thorough evaluation of the various publications. Significan
2.publications
Review Methodology were searched for electronically in databases such as IEEE Explo
The main
Wiley, PubMed, goal of Science
this review is to provide
Direct, a platform
Frontiers, MDPI, for Research
researchers Gate,
to summarize
and Google S
various cyber-attack detection techniques on smart grids and explain the best one of those
publications were gathered using a variety of criteria, including keyword
attacks. This review offers a thorough explanation of numerous attacks, highlights their
conferences,
benefits different
and drawbacks, attacks,
discusses presentMLtrends
or DLandapproaches, classifier
suggested directions performance,
for the future,
extraction
and techniques.
offers a thorough evaluationAllofaccessible research publications
the various publications. Significant academicpublished
publica- betwee
tions
2022 were
thatsearched
used Datafor electronically
Mining (DM) in databases such as IEEE
applications Explore, Springer,
for diagnosing Wiley,
or forecasting c
PubMed, Science Direct, Frontiers, MDPI, Research Gate, and Google Scholar. The publica-
on smart grids met the screening criteria for this study. The following characte
tions were gathered using a variety of criteria, including keywords, journals, conferences,
coded attacks,
different for each ML article: (a) mainclassifier
or DL approaches, research area within
performance, dialectextraction
and feature studies; (b) g
location All
techniques. of accessible
the cyber-attack on smart
research publications grids between
published (e.g., Israel-2016,
2015 and 2022France-201
that
used Data Mining (DM) applications for diagnosing or forecasting
Portugal-2020); (c) security requirements (e.g., integrity, confidentiality, avai cyberattacks on smart
grids met the screening criteria for this study. The following characteristics were coded
key
for each points
article: (a)of mainML features
research area within (e.g.,
dialectsupervised, unsupervised,
studies; (b) geographical location semi-
ofreinforcement);
the cyber-attack on smart (e) classification type;France-2018,
grids (e.g., Israel-2016, (f) system US-2019, parameters
Portugal-2020); (e.g., su
(c) security requirements (e.g., integrity, confidentiality, availability);
confidence); (g) year of publication; (h) communication networks (e.g., LAN, M (d) key points of ML
features (e.g., supervised, unsupervised, semi-supervised, reinforcement); (e) classifica-
NAN, HAN); (i) I/O sensors (e.g., RTU, PDC, PMU); (j) evaluation
tion type; (f) system parameters (e.g., support, lift, confidence); (g) year of publication;
communication
(h) communication networks layers (e.g.,
(e.g.,LAN,application,
MAN, BAN,transport,
NAN, HAN); MAC,
(i) I/Onetwork,
sensors (e.g., physica
category
RTU, (e.g.,(j)SCADA,
PDC, PMU); evaluationsmart
criteria;meter, physical, data
(k) communication layersinjection, and replay,
(e.g., application, trans- netw
port, MAC, network, physical); (l) attack category (e.g., SCADA,
and (m) attacking cycle (e.g., reconnaissance, scanning, maintenance access, e smart meter, physical,
data injection, and replay, networks based); and (m) attacking cycle (e.g., reconnaissance,
The number
scanning, of articles
maintenance access, reviewed
exploitation).by year
The numberof publication and cyber-attack-aff
of articles reviewed by year of
grids is shown
publication in Figure 1. smart grids is shown in Figure 1.
and cyber-attack-affected

Articles grouped on review of cyber attack


detection in smart grids

2023 2017
4% 9% 2018
4%2019
2022 4%
31% 2020
13%

2021
35%

2017 2018 2019 2020 2021 2022 2023

Figure
Figure 1. Year-wise
1. Year-wise publications
publications withofthe
with the search search ofreviews
cyber-attack cyber-attack
in variousreviews in various
publications. pu

Table 1 provides a comparison between the existing survey papers in terms of the
Table 1 provides a comparison between the existing survey papers in t
main covered areas and publication year. Few reviews [16–21] are more focused on the
main covered areas and publication year. Few reviews [16–21] are more foc
Energies 2023, 16, 1651 4 of 24

sensor and communication-related topics during cyber-attacks. Some other reviews [22,23]
covered all topics of cyber-attack such as the nature of attacks, characteristics of the attack,
monitoring in smart grid, existing co-simulation tools, testbed, and awareness. Other
works focused on cyber-attack detection and mitigation techniques [19,24]. We have
concluded that the twenty-two reviews were more focused on the ML approach considered
to be the best method for the detection and mitigation of cyber-attacks in smart grids. In
these review papers, unsupervised learning algorithms have not received much interest.
Therefore, we considered unsupervised type ML for identifying FDIA cyber-attack in smart
grids which differs from the aforementioned surveys. Clustering and association rules are
two unsupervised algorithm analyses that can help locate hidden patterns and potential
relationships between variables that commonly appear together in datasets. This method
can be used to evaluate network traffic, identify patterns of cyberattacks in smart grids,
and analyze and anticipate user behavior.

Table 1. Comparison between existing journal’s review work.

Ref Sensor Communication Computing Type of Cyber Detection Contributions Limitations


No./Year Technologies Technologies Technologies Attack
Studied FDIA against SE and
Detection and
degrade the microgrids
[25]/2020 No No Yes FDIA No mitigation
inducing a power imbalance
techniques
between supply and demand
Comprehensive overview of
cyber-security in the smart
Virus, DOS, replay, Yes Machine
grid and examined the main
[16]/2018 yes yes No Man in middle Limited learning
approach cyber-attacks threatening its
attacks techniques
structure, network protocols,
and applications.
Analyses the threats and
Attacks on Detection
[26]/2021 No No No No potential solutions of smart
CIA model. techniques
grids based on IoT.
Discussed two modeling
frameworks for CPSs, FDIAs Sensor, com-
against state estimation, munication,
[27]/2021 No No No FDIA No and detection
vulnerabilities, and dynamical techniques
properties of attacks
Overview of SG model, key
elements, ADMS, SCADA, Detection
[17]/2023 yes yes No No No techniques
AMI, cyber security principles,
standards, and protocols.
A complete review of the
nature of complex
Physics aware cyber-attacks, detection and
control command, monitoring capabilities,
measurement Sensor, com-
No No No integrity, FDI, yes Cyber-Physical Situational munication
[22]/2022
control logic Awareness, IDS-based host, technologies.
network, cloud, IoT, signature,
modification,
DOS, etc. distributed, anomaly, ML/DL,
hybrid, moving target defense,
specification, etc.
A broad analysis of the system
structure and vulnerabilities of
typical inverter-based power
systems with DER integration, Communication
Described several several types of cyberattacks, protocols and
[24]/2022 No No yes types of cyber yes modern defense strategies networks,
attack including several detection sensor
and mitigation techniques, and measurement
comparison of testbed and
simulation tools applicable for
cyber-physical research.

Discussed approaches to ML, Limited


yes yes No yes yes approach to
[28]/2022 AI, 5G, blockchain, and data sensor
aggregation methods. technologies
Cyber-attack enhancement Sensor, com-
[29]/2021 No No No FDIA yes methods, challenges, and munication
resilience of the smart grid. technologies.
Energies 2023, 16, 1651 5 of 24

Table 1. Cont.

Ref Sensor Communication Computing Type of Cyber Detection Contributions Limitations


No./Year Technologies Technologies Technologies Attack
Presented attack strategy,
detection methods, and Sensor and
No No No yes yes solutions for cyberattacks in communica-
[23]/2022
tion
terms of blockchain technology technologies.
and AI techniques.
Various threats and
vulnerabilities can affect the Limited
key elements of cyber security approach to
[18]/2021 yes yes No FDIA, DOS yes ML and
in the smart grid network and
blockchain
then present the security techniques.
measures.
Inclusive review of the
cyber-physical attacks,
vulnerabilities, mitigation The limited
All types of attacks approach in
[19]/2021 yes yes yes yes approaches on the power
mentioned ML detection
electronics, and the security
techniques
challenges for the smart grid
applications.
Summarizes impacts of
cyber-attacks on power system Communication
control, power system stability, sensors, and
All types of attacks limited
[30]/2020 No No No yes and types of cyber-attacks, approach to
mentioned
from the viewpoints of detection
topology, mechanism, techniques
probability, and simulation.
Aurora, pricing, Reviewed an abstracted and
AGC, FDI, combined state-space model,
topology, in which cyber-physical attack
GPI-spoofing, load and defense models are Detection
[31]/2021 yes yes yes No effectively widespread, and
redistribution, line techniques
outage masking, advanced in the field, moving
Stuxnet-like target defense, watermarking,
networks and data-driven approaches.
Significance of cyber
infrastructure security in Cyber-attacks,
conjunction with power communica-
[32]/2012 yes No No No No tion, and
application security to prevent, detection
mitigate, and tolerate techniques.
cyber-attacks.
A comprehensive review of the
Detection
No No No FDIA No theoretical and mathematical strategy of
[33]/2017
approach of FDIAs against FDIA
modern power systems.
Limited
Discussed in detail rule
approach to
[20]/2021 yes yes yes No IDS learning-based intrusion
detection
detection systems.
techniques.
Introduced CPS,
distinguishing between cyber,
cyber-physical, and physical
components security Detection
[34]/2017 No No No yes No
techniques
perspective, a taxonomy of
threats, susceptibilities, attacks,
and controls.
The approach of ML in security
concerns.
Limited Overview of big data tools,
All types of attacks approaches system platforms, required ML detection
[35]/2019 yes yes Yes
mentioned and types skill levels, CIA models, techniques
mentioned encryption algorithms,
software attacks, and their
countermeasures
This survey is focused on IOT
technologies that facilitate
smart energy grid systems,
Cyber-attacks
[21]/2021 yes yes yes No No architecture, related software
and detection
standard applications, security
systems
vulnerabilities, and
opportunities to integrate
advanced techniques.
Energies 2023, 16, 1651 6 of 24

Table 1. Cont.

Ref Sensor Communication Computing Type of Cyber Detection Contributions Limitations


No./Year Technologies Technologies Technologies Attack
Blockchain algorithm to
address cyberattacks in Communication,
Attacks of software and cyber networks. sensor
No No yes DOS model and networks, and
[36]/2022 Analyzed multiscale system
driven in PV detection
farms modeling, event-trigger
control, AI application, and techniques.
hot patching.

Summary of IEC 61850 Detection


DOS, MITM, FDIA, methods and
[37]/2020 No yes yes No message structures and related
Intrusion attack sensor
cybersecurity concerns measurements
Defined protected protocols
and standards, cryptographic
and authentication, intrusion Detection
yes yes yes Attacks on CIA Limited prevention, education, access techniques of
[38]/2022
model. approach
control, and required ML techniques
cybersecurity policy
approaches.

A comparison between existing review/survey papers on similar topics is described


in Table 1, accordingly, the novel contribution and motivation of this paper are as follows:
• We have provided the overview of a cyber-attack on smart energy systems, a thorough
description of the features, conceptual model, sensor and communication components,
network protocols, and various cyber-attack types.
• The preceding study review models are summarized by using complex network theory,
power network equations, system state equations, and data-driven methodologies
taking into account the factual context of the CPSs link and the mismatch between
research goals and quantitative indicators. They may describe the operational state of
the energy grid, analyze load or line overload conditions, describe the fault mechanism,
and predict/identify abnormal conditions. Moreover, this classification provides
the network architecture and how to enhance the system’s cyber-physical security.
Considering these key points, suggestions from the previous review papers and we
continued the survey in cyber-attack detection and mitigation.
• The primary contribution of this survey to the existing literature is that it attempts to
investigate FDIA in smart grids and detect it by using unsupervised learning tech-
niques. To realize the detection of cyber-attacks in the smart grid, first, we should
understand the overview of the smart grid’s architecture and the key points of grid
attacks. Therefore, we have considered the literature on network architecture, FDIA at-
tacks, types of detection, etc. We looked at a variety of cyberattack detection techniques
such as replay, DOS, stealthy, and FDIA and concluded that unsupervised learning
algorithms are better at spotting FDIA in smart grids for huge unlabeled data. We
reviewed FDIA from a system-theoretic perspective, which more clearly demonstrates
conceptual parallels and common operating principles. For example, we have shown
how concepts gained from analyzing specific attacks that target different parts of the
network, or how attack schemes can be combined to develop more malicious activities.
• For reliable and quick detection of stealthy FDIA in smart grids without the require-
ment for knowledge of network parameters or measurement distributions, we offer an
unsupervised data mining approach. The algorithm is developed online after being
offline-trained. This algorithm identifies a cyber-attack even when there is a significant
amount of class mismatch, a sudden increase in data transfer in the network, and
abnormalities in the system. This method can still operate well without experiencing
any performance reduction because they do not have any set pattern or context. To the
best of our knowledge, and in contrast to the aforementioned surveys, our work is the
first to examine the features of smart grid security using unsupervised ML approaches
and security metrics.
Energies 2023, 16, 1651 7 of 24

• Finally, the prospects and challenges of cyber-physical smart grids in the future are
examined, which may help to clarify the cyber-physical security concerns that the
next-generation smart grid must resolve.

3. Network Architecture under Cyber-Attacks in Smart Grids


Dispatcher sources, power electronic converters, communication cables, and loads
make up the physical layer. System hardening can be used to take preventive action against
physical layer threats. The communication channels that are bridged among the sources
to enable data transfer make up the cyber layer. To save money by avoiding the costs
associated with a fully connected communication infrastructure, networked converters
display sparsity in their cyber-connections. A centralized approach necessitates consid-
erable computation and communication over a wide geographic area. This prerequisite
makes the centralized control strategy unworkable. Again, a fully decentralized control
solution is not feasible due to the requirement of a very tight coupling between the unit
operations. The key benefit of decentralized control is that it allows for the incorporation of
various DG units into the microgrid without requiring any adjustments to the controller
settings. However, in this instance, coordination must be sufficiently robust. The system’s
units cannot be coordinated to a sufficient degree using local variables [39]. To solve these
problems, the installation of secondary, primary, and tertiary controllers in a hybrid cyber-
layered microgrid with n parallel bidirectional converters and an equal power rating is
shown in Figure 2. The cyber layer is represented by red arrows, and the physical circuit
is represented by black lines. In a microgrid, the load is typically distributed across the
converters at the primary control level, which is typically drooped control. On the other
hand, the secondary control level lessens the steady-state inaccuracy caused by the droop
control, while the tertiary level is in charge of energy export or import for microgrids.
The distributed control topology has advantages over the centralized control topologies,
including lower communication needs, lower computation burden, better scalability, good
reliability, and better resilience.
The operating mode for each converter is either voltage or current-controlled. Primary
layer control actions are independent of the communication system since local controllers
are directly connected to converters. To enhance the performance of the sources’ coordina-
tion, cooperative secondary controllers are used. A distributed communication layer, which
only exchanges information with nearby units, enables these controllers. To accomplish
secondary control goals, such as average voltage regulation and proportionate current
sharing, each unit, represented as an agent in the cyber layer, sends and receives DC/AC
voltage and current from the nearby agent(s). Tertiary control operates power management,
energy management, system optimization, and economic dispatch as the highest level in
the hierarchical design. Using a local converter and a digital communication link-based
coordinated control system, such as a cutting-edge cloud-based communication platform,
which has control bandwidths that are at least an order of magnitude apart, simultaneously
allows for the implementation of hierarchical control. As the time scale lengthens and the
level of control shifts from primary to tertiary, the control bandwidth contracts [40].
On a communication graph with an adjacency matrix, each converter broadcasts
Ii (t) and/or Vi (t) to the DG units that are close by. Each analog voltage and current
measurement from each converter is transmitted to its nearby control units utilizing a USB
in conjunction with the Modbus protocol to carry out scattered, undirected communication.
It is a technique for information transfer between electronic devices through serial lines.
Signals from instrumentation and control devices are often transmitted using Modbus
back to the main controller or data collection system. The simplest configuration would
be connecting the serial ports on two machines, a client and a server, using a single serial
cable. Each bit of the data is conveyed as a voltage, and the data are sent as a succession of
ones and zeroes. Zeroes are sent as positive voltages and ones as negative. These voltage
and current measurements will be collected from the Remote Terminal Unit (RTU) from the
sensors. Telemetry Devices consist of RTUs and Master Terminal Units (MTUs). The RTUs
Energies 2023, 16, 1651 8 of 24

collect
Energies 2023, 16, x FOR PEER REVIEW telemetry data from sensor components (distributed across domains), and MTUs,
8 of 25
receive and process that data for management and topology manipulation (connected to
core systems). This promotes efficient power generation and transmission.

Figure 2. Hierarchal power sharing control


control building
building blocks
blocks in
in microgrids
microgrids during
during aa cyber-attack.
cyber-attack.

The
The current electricity
operating mode grid is becoming
for each more
converter is vulnerable, mostly
either voltage or because it develops
current-controlled.
and
Primary layer control actions are independent of the communication system since (IoT).
adopts new technologies such as telemetry devices and the Internet of Things local
Additionally,
controllers are recent research
directly and publications
connected show To
to converters. an increase
enhanceinthecyber security incidents
performance of the
and threatscoordination,
sources’ related between telemetry systems,
cooperative SCADA,
secondary IoT, and are
controllers the electric
used. power grid [41].
A distributed
Smart Grid is monitored and managed by a SCADA system that collects
communication layer, which only exchanges information with nearby units, enables these consumption
statistics andTobehavior
controllers. using
accomplish IoT devices
secondary and Advanced
control goals, suchMetering
as averageInfrastructure (AMI).
voltage regulation
By enabling two-way communication inside the system’s infrastructure, using
and proportionate current sharing, each unit, represented as an agent in the cyber layer, wireless
communication
sends and receives networks
DC/ACimproves the efficiency
voltage and of electricity
current from the nearbygeneration
agent(s). and delivery.
Tertiary To
control
implement an effective generation and distribution plan, the generating centers have access
operates power management, energy management, system optimization, and economic
to real-time data on power demand due to the association of smart meters and sensors
dispatch as the highest level in the hierarchical design. Using a local converter and a
across the power grid network [42]. As a result, the infrastructure of the power system
digital communication link-based coordinated control system, such as a cutting-edge
has benefited considerably from the integration of these technologies, increasing energy
cloud-based communication platform, which has control bandwidths that are at least an
efficiency and lowering electricity costs.
order of magnitude apart, simultaneously allows for the implementation of hierarchical
Real-time data from the electrical power grid are monitored, measured, and analyzed
control. As the time scale lengthens and the level of control shifts from primary to tertiary,
via SCADA, a type of process control system [43]. While it can ensure both short-range and
the control bandwidth contracts [40].
long-range communications, SCADA is most effective in large-scale environments. The
RTU, MTU, and Human–Machine Interface (HMI) are the three primary components of
Energies 2023, 16, 1651 9 of 24

this system. RTU is a device made up of three units. Data acquisition is performed by the
first unit, logic programs from the MTU are run by the second unit, and communication
infrastructure development is mostly handled by the third unit [44]. The MTU, which is a
device for controlling and monitoring the RTU, is another component of SCADA. HMI is
regarded as the final component of SCADA and serves as the operator’s Graphical User
Interface (GUI).
Over time, a few protocols were created to offer smart grid systems secure and depend-
able communication. Several industrial communication protocols used inside SCADA are
Modicon Communication Bus (Modbus), Distributed Network Protocol version 3 (DNP3),
Process Field Bus (Profibus), and International Standard Defining Communication Protocol
61850 (IEC61850). Smart meters, home appliances, and AMIs all communicate with one
another via different communication protocols. Their vulnerabilities and intrinsic security
requirements differ greatly [45,46].
While using two separate communication mediums, namely wired and wireless,
new communication and information technologies with current intelligent monitoring
systems play a crucial role in securing data transmission between smart meters and utilities.
The advantages of wireless communications over wired communications include lower
infrastructure costs and more robust connections in remote areas. Wireless technologies
include Zigbee, Z-wave, WiMAX, Wi-Fi, DASH7 (D7A), cellular, and satellite. PLC is a
wired communication that supports high-speed data from one device to another. It is
suitable for some applications, such as smart metering, home automation, and lighting.
To guarantee end-to-end data transmission, the Transmission Control Protocol/Internet
Protocol (TCP/IP) was initially applied in the smart grid. Due to its complex memory
management issues and the fact that it is only appropriate for broad-area networks, this
protocol is not thought to be a good choice for smart networks.
The Wide Area Network (WAN), Neighborhood Area Network (NAN), Home Area
Network (HAN), Building Area Network (BAN), and Industrial Area Network (IAN),
are all parts of the smart grid’s communication architecture. Each NAN has a Control
Center (CC) that is designed to handle its own. Building gateways track electricity use and
client needs, which they subsequently send to the CC. Customers can alter their electricity
usage and further energy conservation measures at any time to the CC, which saves both
cost and energy. In the context of the smart grid, the security and privacy of information
exchanges between customers and the CC have emerged as crucial and difficult issues. The
man-in-the-middle, DDOS, impersonation, FDIA, brute-force, and replay attacks are just a
few of the malicious assaults that the smart grid is susceptible to. These attacks have the
potential to have a substantial negative impact on society. As a result, a security protocol
should be provided in the smart grid.
The hierarchical architecture of the smart grid according to Figure 2, which has a
limited number of sub-networks, is seen to be crucial in the infrastructure since it connects
a wide range of systems; nevertheless, each sub-network is only in charge of a single
geographic area. According to Figure 3, the smart grid network is divided into three primary
sub-networks: WAN, NAN, and HAN. The additional sub-networks of WAN and NAN
are Local Area Networks (LAN) and Field Area Networks (FAN). Industrial Area Network
(IAN) and Building Area Network (BAN) are the two sub-networks that comprise FAN.
PAN is a subnetwork of either IAN or BAN or HAN. Most of the research in FDIA primarily
concentrates on four vulnerable protocols, including Modbus, DNP3, Profibus, and IEC61850,
which are employed in the infrastructure of smart grids [47–49]. The expected communication
network which includes RTU, MTU, smart meters, communication protocols such as Zigbee,
Z-wave, WiMAX, etc., IoT, WAN, LAN, NAN, FAN BAN, IAN, HAN, and PAN established
in the microgrid is shown in Figure 3.
Energies 2023, 16, x FOR PEER REVIEW 11 of 25
Energies 2023, 16, 1651 10 of 24

Thebasic
Figure3.3.The
Figure basicnetwork
networkarchitecture
architectureof
ofDG
DGmicrogrid
microgrid system.
system.

4. FDIA Attack on Smart Grids


4. FDIA Attack on Smart Grids
An Industrial Control System (ICS) is a special type of CPS that incorporates physical
An Industrial
industrial processControl
systemsSystem (ICS) is as
and facilities a special
well astype
SCADAof CPSsystems,
that incorporates physical
smart sensors, the
industrial process systems and facilities as well as SCADA systems, smart
industrial internet of things (IIOT), networked systems, and data analytics. The extensive sensors, the
industrial internet
use of sensors, of things devices,
networked (IIOT), networked
and SCADA systems, andvoltage
to reduce data analytics. The extensive
deviations, assess the
use of sensors,
network voltagenetworked
profile, anddevices,
provideand SCADA tovoltage/current
appropriate reduce voltage references
deviations,isassess the
a result of
network
the rapidvoltage profile,ofand
organization provide appropriate
digitalization and growthvoltage/current references
of CPS. Situational is a result
awareness of
of cyber
the rapid organization
invasions of digitalization
and resistance to cyber-attacksandare
growth of CPS. and
both present Situational awareness
developing of cyber
security needs
invasions and resistance to cyber-attacks are both present and developing
are expanding to incorporate both resilience to cyber-attacks and situational alertness security needsof
are expanding
cyber to incorporate
intrusions. ICS systemsboth are resilience
organizedtosafety
cyber-attacks and situational
and high-value alertness[50].
critical systems of
cyber intrusions.
Security concernsICS
aresystems are organized
acknowledged safety
as a major issueandforhigh-value
CPSs, where critical
bothsystems
physical[50].
and
Security concerns
cyber-attacks andare acknowledged
defects as a majoraffect
could significantly issuehowfor CPSs,
stablewhere both physical
and secure and
a PV power
Energies 2023, 16, 1651 11 of 24

system operates. Regarding the security of CPS, confidentiality, integrity, and availability
are three essential characteristics that must be safeguarded [51]. The disclosure, disruption,
and deception attacks are three types of DDD attacks that can be used to categorize the
attack models of CPSs. Attacks on disclosures might result in the release of confidential
information. There are different types of cyber-attacks. For instance, denial of service (DoS),
replay, jamming, random, topological, overloading, resonance, FDIA, Man in the middle,
stealthy, etc., can be considered cyber-attacks. The commonly used cyber-attacks in DC/AC
microgrids are DoS, FDIA, and replay attacks. DoS tries to make the communication
network completely unavailable in the microgrid. Attacks that prevent users from using
information are referred to as disruption assaults are DoS attacks. Replay attacks are
another type of cyber-attack to record the reading of sensors for a certain amount of time
and after that, repeat these readings in the system to deceive the operator. FDIAs, for
example, include deception attacks to corrupt real data [52]. The various systems and
layers of the smart grid can use FDIA. Four categories—physical, network, communication,
and cyber—could be used to group them. Attacks on monitoring, control, and protection
systems are included in physical-based FDIA. The communication-based FDIA gives a
thorough analysis of the various communication methods used in smart grids and the risks
that go along with them. If the attacker gains access to any network node, network FDIA
is possible from anywhere. Cyber-based attacks are extremely harmful since they affect
the system much more severely. These assaults occur when the adversary gains access
to the control system or any applications connected to it, such as forecasting, estimating,
economic dispatching, and trading in energy.
FDIA is regarded as a remote access intrusion since it alters the payloads of packets,
compromising their data integrity [53]. Attackers use FDIA to obtain access to crucial ICS
processes or process parameters and force them to carry out a freshly injected command or
code. In cyber-physical systems, the term “FDIA” refers to a class of cyber-attacks where
the goal is to alter the integrity of the network by manipulating some sensor devices and
transmitting false data readings to the controller. The physical equipment affected by this
attack includes switches for VSI, filters, active/reactive power controllers, and MPPTs.
It also damages the electrical grid. System monitoring is necessary to ensure the power
network operates dependably, and state estimation is a result of such monitoring to give
attackers the most accurate assessment of the power grid.
False Setting Injection (FSI) and false command injection (FCI) are the two main
forms of cyber-physical attacks that are highlighted in the literature that is currently
available [54,55]. These attacks all impact system behavior, loss of inverter process control,
current controller set points, device connection, and configuration. The FSI takes into
account the hardware and software management of overcurrent, differential, and distance
relays. The aforementioned ideas offer FSI protection utilizing local end data, but they
are unreliable in a hybrid data and physical attack scenario. In the event of FCI attacks,
proposals such as [56,57] offer the creation of attack models and system vulnerability
analysis. A vulnerability known as a “command injection” allows an attacker to take
control of one or more commands that are being executed on a system. Without the need to
inject malicious code, command injection expands an application’s normal capabilities by
allowing it to deliver commands to the physical system shell.
FDIA can be modeled mathematically as in Equation (1),

FalseData = Di,j + Fi,j (1)

where Di,j is the original dataset, and Fi,j is the injected data. The amalgamation of injected
data with original data generates false data. Here, Fi,j can be any of the following:
• Deletion of data from the original dataset, Di,j
• Change of the data in the original dataset, Di,j
• Addition of fake data to the original dataset, Di,j
ergies 2023, 16, x FOR PEER REVIEW 13 o

• Addition of fake data to the original dataset, 𝐷 ,


Energies 2023, 16, 1651 12 of 24
Although the representation in Equation (1) considers the data to be structured,
false data injection attacks can also be considered for unstructured data.
State estimate
Although is essential
the representation for linking
in Equation measurements
(1) considers the data to beobtained through
structured, the
communication network
false data injection attacksand managing
can also the operational
be considered for unstructuredactivities
data. in a smart grid. The
automatically removes the faulty information brought on by the
State estimate is essential for linking measurements obtained through communica-
random interferen
tion network and managing the operational activities in a smart grid. The SE automatically
estimates or predicts the system operating state, and uses the redundancy of a real-t
removes the faulty information brought on by random interferences, estimates or predicts
measurement system to
the system operating increase
state, and usesdata accuracy [58].
the redundancy Using real-time
of a real-time measurementinformation
system to gathe
fromincrease
measuring devices
data accuracy such
[58]. Usingasreal-time
PMU as depictedgathered
information in Figurefrom 4, SE aimsdevices
measuring to estimate
such
smart as PMU
grid’s as depictedconditions.
operational in Figure 4, SE
Busaims to estimate
voltage, active theand
smart grid’s operational
reactive power injection
each bus, and complex power flow on branches are examples of typicalcomplex
conditions. Bus voltage, active and reactive power injections at each bus, and measurement
power flow on branches are examples of typical measurements.

Figure
Figure 4. State
4. State estimation under
estimation under Cyber-attack
Cyber-attackin smart grid. grid.
in smart
The state vector for a system with n buses is represented as follows:
The state vector for a system with 𝑛 buses is represented as follows:
v = [ v1 , v2 , v3 . . . . . . v n ] T ( v i ∈ R ) (2)
𝑣 = 𝑣 , 𝑣 ,𝑣 ……𝑣 (𝑣 ∈ 𝑅)
where vi indicates the state variable at the ith bus, usually includes the voltage angle or
where 𝑣 indicates
voltage amplitude.the state variable
Consider at the ith
the measurement bus,z. usually
vector includesvector
The measurement the voltage
for a angl
system
voltage with n busesConsider
amplitude. the measurement vector 𝑧. The measurement vector fo
is written as
system with 𝑛 buses is written as T
z = [ z1 , z2 , z3 . . . . . . z n ] ( zi ∈ R ) (3)
𝑧 =between
There are some differences 𝑧 , 𝑧 measurement
, 𝑧 … … 𝑧 function (𝑧 ∈ 𝑅) and actual mea-
values
surement values for non-ideal sensors. State estimate in the actual electric power system,
accounting for measurement errors, can be defined as:
There are some differences

z1
  between measurement
H1 (v1 , v2 , v3 . . . . . . vn )
  function
e1
 values and ac
measurement values for  znon-ideal sensors. State estimate   in  the actual electric po
 2   H2 (v1 , v2 , v3 . . . . . . vn )   e2 
 
z =
system, accounting for  . =
measurement errors, . + . (4)
 ..  
  .. can be defined   ..as:
  

zm 𝑧 Hm (v1 ,𝐻v(𝑣
2 , v,3 .𝑣
. . ., .𝑣. vn…) … 𝑣 ) em 𝑒
𝑧 𝑒
𝐻 (𝑣 , 𝑣 , 𝑣 … … 𝑣 ) z can be created as a
𝑧 = system
The relationship between
⋮ = states v and measurements + ⋮
linear model using the DC power flow model, as shown ⋮ below:
𝑧 𝐻 (𝑣 , 𝑣 , 𝑣 … … 𝑣 ) 𝑒
z = Hv + e (5)
The relationship between system states 𝑣 and measurements 𝑧 can be created
linear model using the DC power flow model, as shown below:
𝑧 = 𝐻𝑣 + 𝑒

where 𝑒 is the measurement error (additive noise) vector that is typically represented
the Gaussian distribution, 𝑣 contains the voltage amplitude and voltage phase angl
Energies 2023, 16, 1651 13 of 24

where e is the measurement error (additive noise) vector that is typically represented by
the Gaussian distribution, v contains the voltage amplitude and voltage phase angle at the
buses, z is the vector of measurements, and H is a Jacobian topological matrix that maps
the system states to the measurements.
∂H (v)
Where H = ∂v is an invariable Jacobi matrix that depends on the impedance of the
network topology. These issues are frequently resolved using the Weighted Least Squares
algorithm. A quadratic optimization problem is created from the state estimation form,
and the estimated linearized state vector v0 is given by
  −1
v0 = H T H HT z (6)

Bad data are produced as a result of measurement errors that happen at random,
whereas false data are created knowingly by malicious attackers. SE, is a common method
for detecting faulty data, is inefficient for detecting FDIA but excellent for detecting bad
data. FDIA allows for the malicious injection of the generated data b into the power flow
measurement vector as
Zbad = Hv + b + e (7)
and the injected false data vector is

b = [b1 , b2 , b3 . . . . . . bm ] T (8)

Zbad = z + b (9)
When there exist false data injected by some attackers, b will be a nonzero vector.
The estimation state variable v0 will be changed into v0F due to the injected false data
and there is v0F = v0 + c, where c is an n dimensional and nonzero vector. Assuming that the
injected data vector Zbad equals Hv, b will be ignored by the traditional detection method
as mentioned above. This is because

k Zbad − Hv0F k = kz + b − H (v0 + c)k = kz − Hv0 )k (10)

Measurement data will be reviewed to ensure maximum accuracy and faulty data will
be removed. Traditionally, the 2-norm residual test is used to identify faulty data:

kz − Hvk2 <∈ (11)

where ∈ is the threshold for BDD. Bad data exist and should be eliminated before the
next iteration if the measurement residual rises above the threshold. However, these
conventional BDD techniques are unable to identify stealthy and intelligent attacks such
as FDI.
ˆ , x̂, and b denote the estimated state vector under attack, perfect FDI attack,
Where vbad
and injected attack vector, respectively. In this case, the derived measurement residual
in both with and without malicious data b is equal. Therefore, b = H (v̂ + c) − Hv which
results in
kz − Hvk2 = k Zbad − Hvbad k2 + Γ (12)
where Γ is an error term attributed to the state estimation that must remain within a
certain threshold depending on the power system. A method of attack that meets the
aforementioned requirement is said to be stealthy. Even if the attacker just has a limited
understanding of the network topology, such a covert attack vector is always there [59]. As
a result, the traditional residual-based BDD process in DC state estimation may be unable
to identify FDIA that are skillfully created by adversaries who are already familiar with the
grid, such as its network architecture H and estimated states v̂.
Energies 2023, 16, 1651 14 of 24

Big data classification becomes a challenge when examining several combinations of


natural and artificial disturbances using typical sequential mining techniques. Addition-
ally, important characteristics of an efficient classification technique include the capacity
Energies 2023, 16, x FOR PEER REVIEW 15 of 25
to identify large-area attack situations and handle data inconsistency difficulties, and
dimensionality issues.
5. Detection Techniques of Cyber Attacks in Smart Grid
5. Detection Techniques of Cyber Attacks in Smart Grid
IoT technologies are widely used in smart grids to track changes in the environment
IoT technologies are widely used in smart grids to track changes in the environment
or physical situations. In particular, SE is a crucial IoT-based smart grid application. It is
or physical situations. In particular, SE is a crucial IoT-based smart grid application. It is
used in
used in system
system monitoring
monitoring to to obtain
obtain the
the most
most accurate
accurate assessment
assessment of of the
the condition
condition of
of the
the
power grid through a study of the meter readings and power system
power grid through a study of the meter readings and power system topologies. FDIA, on topologies. FDIA,
on the
the otherother hand,
hand, poses
poses a serious
a serious threat
threat to SEto because
SE because
it isitusually
is usually difficult
difficult to detect.
to detect.
Artificial Intelligence (AI) category consists of various ML and
Artificial Intelligence (AI) category consists of various ML and DL, DM, evolutionary, DL, DM,
evolutionary,
and fuzzy logicand fuzzy to
methods logic methods
detect FDIA. to detect FDIA.
Techniques Techniques
to detect to detect
cyber-attacks thatcyber-attacks
target smart
that target smart grids can be mainly classified into four categories
grids can be mainly classified into four categories ML: supervised, unsupervised, ML: supervised,
semi-
unsupervised, semi-supervised, and reinforcement algorithms. The various
supervised, and reinforcement algorithms. The various cyber-attack detecting algorithms cyber-attack
detecting
in the smartalgorithms in thein
grid as shown smart grid
Figure 5. as shown in Figure 5.

Figure 5.
Figure 5. Cyber-attack
Cyber-attack detecting
detecting techniques
techniques in
in smart
smart grid.
grid.

To minimize
To minimize and and identify
identify FDIAs
FDIAs on on SESE in
in smart
smart grids,
grids, some
some techniques
techniques have have been
been
proposed in
proposed in the
the literature
literature [60–63].
[60–63]. While
While thethe major
major objective
objective of of ML
ML isis to
to give
give the
the learning
learning
agent the ability to learn learn without
without guidance or human involvement, it might be seen as aa
potential example
potential exampleofof MLML in future.
in the the future. Thekind
The first firstofkind of ML technique,
ML technique, supervised supervised
learning,
learning,that
assumes assumes that the
the training training
data data labeled
have been have been andlabeled
that theand that the algorithm’s
algorithm’s output
output has already
been input into
has already beenthe machine.
input into theThe learningThe
machine. agent constructs
learning agenta constructs
model to go from the
a model to input
go fromto
the
the output,
input to ledthe
by output,
the trainingled data,
by theonce it is aware
training data,ofonce
the output. The supervised
it is aware learning
of the output. The
techniques
supervisedcan be divided
learning into Support
techniques can be Vector Machine
divided into (SVM),
Support Artificial
Vector Neural
Machine Networks
(SVM),
(ANN), Decision Trees (DTs), K-Nearest Neighbor (KNN),
Artificial Neural Networks (ANN), Decision Trees (DTs), K-Nearest Neighbor (KNN), and Naive Bayesian Classifier
(NB). Unsupervised
and Naive learning, (NB).
Bayesian Classifier whichUnsupervised
belongs to the second which
learning, group belongs
of ML approaches
to the second is
computationally
group of ML approaches more expensive than supervised
is computationally more learning
expensive techniques but requires
than supervised no
learning
labeling
techniques of datasets [64]. no
but requires Unsupervised learning[64].
labeling of datasets methods often focuslearning
Unsupervised on the following
methods three
often
objectives:
focus on the (i) clustering,
following three(ii) dimensionality
objectives: (i)reduction,
clustering, and(ii)(iii) density evaluation.
dimensionality Principal
reduction, and
component
(iii) density evaluation. Principal component analysis (PCA), Dirichlet processes,few
analysis (PCA), Dirichlet processes, K-means, and spectral clustering are a K-
examples
means, and of unsupervised
spectral clusteringML. Between the supervised
are a few examples of and unsupervisedML.
unsupervised learning families,
Between the
semi-supervised models use both
supervised and unsupervised labeled
learning and unlabeled
families, semi-supervised data for training.
models Algorithms
use both labeled
used in reinforcement learning models use the estimated errors
and unlabeled data for training. Algorithms used in reinforcement learning models as rewards or deterrents.
use
The
the most important
estimated errorsfeatures of reinforcement
as rewards learningThe
or deterrents. are trial-error
most importantsearch and delayed
features of
reinforcement learning are trial-error search and delayed reward. To maximize the
desired performance, this family of models enables the automatic determination of the
optimum behavior within a particular environment. Q-learning, Monte Carlo, and the
Hidden Markov are illustrations of a model that fits inside this family.
Energies 2023, 16, 1651 15 of 24

reward. To maximize the desired performance, this family of models enables the automatic
determination of the optimum behavior within a particular environment. Q-learning,
Monte Carlo, and the Hidden Markov are illustrations of a model that fits inside this family.
Because the dataset’s observations are all unlabeled and the algorithms learn the
inherent structure from the input data, researchers are now advised to utilize unsupervised
algorithms in smart grids to identify cyber-attacks [65,66]. The supervised technique has a
high computing cost and necessitates measurements with labels from continuous samplings
that may not be available in real-world operations. The majority of ML algorithms now
in use for identifying FDIAs, including [67,68], are supervised and assess anomalous data
that deviates in some way from the labeled data made available during training. Due
to high labeling costs, the datasets gathered from real-world cyber-physical systems are
only partially labeled [69]. Additionally, in practice, the scale of unlabeled data is typically
much larger than that of labeled data, and these enormous amounts of unlabeled data
infrequently participate in the supervised learning process. This absence causes the loss
of important data and, ultimately, the collapse of the process. Some newly discovered
cyberattack data are inherently unlabeled, making it challenging for supervised or semi-
supervised learning to identify FDIA. To detect unobservable attacks or outliers that avoid
the traditional BDD method, this research describes a new learning-based FDIA detection
algorithm. This unsupervised learning technique can be used online and can identify these
threats in milliseconds. The following sections describe ARM and clustering, which are
two main categories for unsupervised algorithms. ARM is about finding relationships
between the attributes of those data points and is the process of measuring the degree of
association between any two items. On the other hand, clustering is about the data points
and the process of segregating a huge number of data points into small groups sharing
similar characteristics.

5.1. Association Rule Mining (ARM)


To be more advantageous, association rule learning, a form of unsupervised learning
technique, looks for the dependence of one data item on another data item and maps ac-
cordingly [70]. It looks for any relevant relationships or correlations between the dataset’s
variables. It is built on various rules to find the significant relationships between database
variables. Although data-mining techniques have some advantages, they can occasionally
be used to detect FDIA in a smart grid since they only occasionally require high compu-
tational complexity depending on the data quantity. To improve outage diagnosing, this
paper presents an ARM method to extract rules that help to find faulty pieces of equipment
and identify FDI attacks [71,72]. To do this, three different datasets are processed and com-
bined to gain useful features. This dataset includes the outage dataset, sub-transmission
substation hourly load recorded by smart meters, and weather historical data. After the
preprocessing section, the outage classes are labeled according to the malfunctioning piece
of equipment. For every equipment-related outage cause, we form a dataset in which
the record is labeled as either the main class or others depending on the main outage
cause. After balancing the particular ARM algorithm is run and the obtained rules are
evaluated using confidence, support, and lift to filter important rules. Support represents
the percentage of things in a database that satisfy both the physical and its cyber-attack,
whereas confidence represents the proportion of items that satisfy both the physical and its
cyber-attack. Figure 6 depicts the process for finding a cyberattack that has affected the
smart grid.
Energies 2023, 16,
Energies 2023, 16, 1651
x FOR PEER REVIEW 1716of
of 25
24

Flow chart
Figure 6. Flow chart of detecting cyber-attack based on ARM.

Smart meters,
Smart meters, MTUs,
MTUs, RTUs,
RTUs, PDCs,
PDCs, and
and other
other devices
devices will
will be
be sensing
sensing the
the high
high volume
volume
of current and voltage produced by DG units. This dataset must include both invasion
of current and voltage produced by DG units. This dataset must include both invasion
and attacked signals. The sequential selection, preprocessing, transformation, data mining,
and attacked signals. The sequential selection, preprocessing, transformation, data
interpreting, and evaluating database procedure used in this study makes use of the
mining, interpreting, and evaluating database procedure used in this study makes use of
knowledge discovery database. Data cleaning is the process of eliminating noisy and useless
Energies 2023, 16, 1651 17 of 24

data from a collection. The term data integration refers to the combining of heterogeneous
data from various sources into a single source, such as the fact that the same attacks
occurred repeatedly in the same DG. The extract-load-transformation method is used for
data integration. Data selection is the process by which data from the data collection,
such as FDIA, plug or play, communication latency, load change, and link failure, that are
determined to be pertinent to the analysis are chosen and retrieved. Data transformation
is the process of converting data into the format needed for mining operations, such as
values or legends. A method used to extract potentially relevant patterns is known as
data mining. Identification of strictly increasing patterns that indicate knowledge based
on predetermined metrics is the definition of pattern evaluation. The term knowledge
representation refers to a method for visualizing data mining outcomes such as support, lift,
and confidence. The data mining outcomes were calculated by using the following method.
Training historical datasets are a primary goal of DM methods in this study [73].
Finding interesting rules from transactional databases was the original purpose of ARM. A
relationship between various attributes is described by an association rule: I f ( A AND B)
then (C ). Following this criterion, C must also be present wherever A and B are. A given
the relationship’s frequency in the data can be determined via metrics for association rules.
The conditional probability of C given A and B is the confidence, while the support is
the prior probability of A, B, and C. It finds frequent sets of items (i.e., combinations of
items that are purchased together in at least N transactions in the database), and from
the frequent items sets such as { X, Y }, generates association rules of the form: X → Y
and/or Y → X .
Multiple algorithms, including Apriori [74], FP-Growth association rule [75], Eclat [76],
Prefixspan [77], and Spade [78], are included in the ARM approach. For instance, Agarwal
and Srikant [79] proposed the Apriori method in 1994. To extract common item sets
(candidate generation) from a dataset, a level-wise bottom-up strategy is used. According
to the required minimum support count, it locates the item sets. Apriori does have some
restrictions, though. For instance, several scans are necessary. Each data set requires an
explicit scan, which could result in I/O expenses. The existence of all necessary patterns
is not guaranteed. Due to the requirement for extensive storage and processing time, the
computational cost is likewise considerable.
The other method used frequently to mine the entire set of frequent patterns is pattern
fragment growth (FP-Growth ARM). This methodology employs a divide-and-conquer
strategy to establish a connection between various elements. The processing speed is
relatively quick, and it makes greater use of the available space. When the patterns are
paired and the dataset contains a lot of objects, this strategy is ineffective. The full set of
patterns in sequential pattern mining is mined using Prefixspan (also known as Prefix-
projected Sequential pattern mining). Candidate sequel generation efforts are far fewer
than those for FP-Growth. It employs the divide and conquers strategy to unearth hidden
patterns in the database. Prefixspan’s drawbacks include the processing need for additional
child patterns and gaps. However, since we would need to identify malicious patterns in
real-time IoT traffic, these algorithms do not work well in network security applications.
The SPADE algorithm makes use of the vertical ID-list format, which enables the creation
of patterns and the computation of support for each sequence without engaging in an
excessive amount of database reading that could burden the system. However, the SPADE
algorithm has a problem that results from the generate-candidate-and-test methodology.
This method might produce many sequence patterns that do not appear in the database
very frequently. SPADE is a SNORT plugin and it minimizes computational and I/O costs
by reducing database scans.

5.2. Clustering
The clustering approach is a typical matrix-theory-based unsupervised data-driven
method. To put it another way, clustering is a technique used to divide up dissimilar
data into many clusters while grouping like data into a single cluster. AMI offers network
Energies 2023, 16, 1651 18 of 24

interoperability and communications in an open environment, but it is susceptible to data


integrity attacks, a common kind of cyberattack in the smart grid. Existing research has
revealed that the adversary could attack the AMI with data integrity assaults by inserting
altered and false data, leading to energy loss, power outages, welfare losses, infrastructure
damage, and other problems [80–84]. Designing and creating efficient detection systems
to lessen data integrity assaults in the AMI is therefore a primary issue. Data analysis
methods such as association and supervised algorithms are the foundation of the majority
of the detection schemes used to stop data integrity assaults [85]. Regression, prediction,
and classification algorithms rely on the historical data that smart meters transmit, and
they are sensitive to huge data set fluctuations that produce a broad range of normal data
and low detection accuracy. As a result, there is a strong likelihood that the malicious
data introduced by adversaries will go undetected. Therefore, it is essential to create a
detection method that can overcome the aforementioned restrictions and is appropriate
for real-world use. When data volatility is high, clustering is one of the methods that
can achieve a high detection accuracy without relying on either predefined thresholds or
external information.
Using cluster analysis, it is possible to show odd patterns of activity and identify
assaults that would not be picked up by studying a single point by grouping together
similar or related data points that are present throughout the network. Attacks that might
otherwise go unnoticed can far more easily be found by analyzing groups of related actions.
Without depending on signatures, explicit descriptions of attack classes, or labeled data
for training. The goal of clustering algorithms is to divide the provided unlabeled data
into clusters that achieve high inner similarity and outer dissimilarity. The input data
can be clustered using a variety of techniques, including the well-known K-means [86], K-
Medoids [87], Gaussian mixture model (GMM) [88], and Density-based Spatial Clustering
of Applications with Noise (DBSCAN) methods [89].
K-means clustering is straightforward, effective, and widely used in the data mining
industry. It is a signal processing-based vector quantization technique. Its flaw is that it
randomly chooses K points at the beginning to serve as the cluster centroids, making it
simple to get stuck in the local optimum. K-means clustering is a fast and robust algorithm
and provides good results when the data are well separated. It calculates the square
distance between the k numbers of centroids and an object; the object is assigned to the
cluster of the nearest centroid. As a result, it is critical to identify objects that behave
similarly near neighborhoods when under an FDI attack [90]. A K-means variation is
more resistant to noise and outliers than K-Medoids clustering. K-Medoids employ a real
point in the cluster to represent the cluster center rather than the mean point. It looks at
cluster heads whose overall dissimilarity to all other cluster objects is the smallest [91].
Due to its efficiency in clustering data, DBSCAN has attracted attention for use in power
systems to categorize measurement data. It is utilized for data measurement classification
and gathering relevant input data sets before training, and it has not been fully taken into
account in the online detection of FDI attacks on Microgrids. This problem is resolved
by using a state observer to estimate converter voltage and current measurements, which
are then provided to a well-trained ML model as inputs for the calculation of FDI attack
vectors to update the state-space representation model [92]. Figure 7 depicts the flowchart
for clustering-based cyber threat detection. The method utilized in ARM-based detection
techniques for data selection, preprocessing, transformation, interpretation, and evaluation
is the same. Attacked or normal data will have distinct distributions, which will lead to
different cluster formations. In a feature space with adequate dimensions, these clusters
would be recognizable. Additionally, a classifier can be trained to distinguish between the
two groups such as attacked and normal, provided the data are supplied with class labels.
When the size of measurement features grows along with an increase in the size of the
power system, which results in more computing complexity, the curse of dimensionality
becomes difficult to overcome. An ML classifier that can identify attacks on the dataset is
then trained using the chosen best characteristics.
supplied with class labels. When the size of measurement features grows along with an
increase in the size of the power system, which results in more computing complexity, the
Energies 2023, 16, 1651 19 of 24
curse of dimensionality becomes difficult to overcome. An ML classifier that can identify
attacks on the dataset is then trained using the chosen best characteristics.

Figure 7. Cyber-attack detecting techniques in smart grid by using clustering.

6. Challenges and Future Generation


Some technical challenges must be overcome if cyber-resilient power systems are to
become a reality. The problems and directions for the future are considered in the following
few points.
Energies 2023, 16, 1651 20 of 24

The traditional grid and the smart grid are susceptible to human error. These mistakes
may be the result of overworked personnel, which limits their ability to make decisions, or
they may be the result of social engineering or insider attacks if workers are not prepared
to deal with these types of assaults. Therefore, the smart grid would maintain service
availability while providing several layers of security, utilizing the virtual private network
(VPN) to increase secure communication during attacks.
Future CPS research should take into account the unpredictability of system pa-
rameters, modeling, observations, and the dynamic properties of smart grids, which are
restricted by their varied states and operating conditions. The next generation of electri-
cal systems will be completely dependent on the smart grid. Investigating and creating
a standardized architecture, framework, and technology standard for the smart grid is
crucial since it will serve as the basis for more suitable security regulations and remedies
against cyberattacks.
The protocols that are currently being used would not offer very high security. With
such outdated protocols, confidentiality, privacy, integrity, and responsibility can all be
readily compromised. New security protocols are therefore required for smart grid net-
works. Depending on the needs of the smart grid application, a new protocol must be
created or the existing protocol must be improved.
The absence of research interest in hybrid AC/DC smart grids or microgrids presents
another difficulty for power system security. Future smart grids will likely combine AC/DC
smart grids with DG power interfaces with load, energy storage, and power electronics
converter grids. In a hybrid microgrid, the number of points of vulnerability to cyber
exploitation has the potential to increase significantly because the CPS now includes various
AC-based appliances in addition to the necessary protections against cyberattacks, which
makes modeling, creating control strategies, and designing detection algorithms more
challenging. Moreover, the control strategy for the hybrid grid, in addition to protecting
their respective voltage regions, needs to consider AC/DC interlinking problem.
Before any cyberattack occurs, the models for AI-based detection systems must un-
dergo significant training. As a result, strategies that identify not only incoming signals but
also serve to both prevent new attacks and help in system recovery are required. In the field
of power system control, a cutting-edge unsupervised ML application for CPS is emerging.
To track the stability of CPS, it combines hybrid data from cyber and physical systems.
Future research in cybersecurity is suggested to concentrate more on the model-free ap-
proach, either using an unsupervised or reinforcement detection method or enhanced SE
that can assess the state of the system regardless of system dynamics. High-level security
data structures and algorithms are required because the current state estimator methods
cannot identify improper/defective data using the existing detection techniques present in
the FDIAs.
Because intelligent grids connect many devices over extensive networks of geographic
locations, this presents a problem. Protecting this equipment from the bigger infrastructure
consequently becomes the main concern. A large amount of data from a power system
requires fast and efficient computing, which has been a concern for several researchers. Task
parallelism with multi-core, cluster and grid computing can reduce the computational time
in an efficient data mining algorithm. Blockchain technology may help with future security
issues brought on by bad nodes or hackers by enabling data sharing and encryption.

7. Conclusions
Smart grids integrate cutting-edge information and communication technologies into
conventional power grids to provide and manage power efficiently. On the other hand,
newly discovered security flaws in cyberspace could be used by potential adversaries to
launch cyberattacks that cause enormous harm. An exhaustive analysis of the network
architecture under cyber-attacks, state estimation in FDIA, and detection of FDIA by using
unsupervised learning algorithms are presented in this research. Additionally, we reviewed
occurrences of cyberattacks against smart grids that occurred globally between 2017 and
Energies 2023, 16, 1651 21 of 24

2023, taking into account a variety of factors such as attack type, detection, merits, and
demerits. As a result, this article takes into account the limitations of the previous studies
and offers a detailed analysis of potential attacks on smart grids as well as a comparison of
various security measures. We analyzed and suggested a method based on unsupervised
learning algorithms to detect cyber threats in smart grids using PMU and AMI metrics that
connect the physical and cyber realms. Future research paths are thus presented from the
standpoint of emerging technologies for the robust cybersecurity of smart grids against
complex cyberattacks, as novel attack strategies are boundlessly exposed.

Author Contributions: Conceptualization, M.P. and S.J.P.; methodology, M.P. and P.S; validation,
S.J.P., P.S. and M.P.; writing—original draft preparation, S.J.P.; writing—review and editing, P.S.;
visualization, P.S.; supervision, P.S.; funding acquisition, P.S. All authors have read and agreed to the
published version of the manuscript.
Funding: This research received no external funding.
Data Availability Statement: Not applicable.
Acknowledgments: This work was supported by SERB, Department of Science and Technology,
Government of India for the project file number SIR/2022/000299 through SIRE fellowship.
Conflicts of Interest: The authors declare no conflict of interest.

References
1. Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication Technologies for Smart Grid: A Comprehensive Survey. Sensors 2021,
21, 8087. [CrossRef]
2. Pinto, S.J.; Panda, G. Improved Decoupled Control and Islanding Detection of Inverter-based Distribution in Multibus Microgrid
Systems. J. Power Electron. 2016, 4, 1526–1540. [CrossRef]
3. Yan, Y.; Qian, Y.; Sharif, H.; Tipper, D. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements, and
Challenges. IEEE Commun. Surv. 2013, 15, 5–20. [CrossRef]
4. Alanazi, M.A.; Mahmood, A.; Chowdhury, M.J.M. SCADA Vulnerabilities and Attacks: A Review of the State-of-the-Art and
Open Issues. Comput. Secur. 2023, 125, 103028. [CrossRef]
5. Shi, L.; Dai, Q.; Ni, Y. Cyber-Physical Interactions in Power Systems: A Review of Models, Methods, and Applications. Electr.
Power Syst. Res. 2018, 163, 396–412. [CrossRef]
6. Mohammadi, Z.; Pinto, S.J.; Panda, G.; Thokchom, S. A Survey of Cyber Security in Smart Microgrid. In Sustainable Energy,
and Technological Advancements; Panda, G., Naayagi, R.T., Mishra, S., Eds.; Advances in Sustainability Science and Technology;
Springer: Singapore, 2022.
7. Bo, X.; Qu, Z.; Wang, L.; Dong, Y.; Zhang, Z.; Wang, D. Active Defense Research against False Data Injection Attacks of Power
CPS Based on Data-Driven Algorithms. Energies 2022, 15, 7432. [CrossRef]
8. Lai, S.; Chen, B.; Li, T.; Yu, L. Packet-Based State Feedback Control under DOS Attacks in Cyber-Physical Systems. IEEE Trans.
Circuits Syst. II Express Briefs 2019, 66, 1421–1425. [CrossRef]
9. Kim, J.; Tong, L. On Topology Attack of a Smart Grid. In Proceedings of the IEEE PES Innovative Smart Grid Technologies
Conference (ISGT), Washington, DC, USA, 24–27 February 2013.
10. Antoniadis, N.; Cordy, M.; Sifaleras, A.; Le Traon, Y. Preventing Overloading Incidents on Smart grids: A Multi-Objective
Combinatorial Optimization Approach. In Optimization and Learning OLA; Springer: Cham, Switzerland, 2020; Volume 1173,
pp. 269–281.
11. Wu, Y.; Wei, Z.; Weng, J.; Li, X.; Deng, R.H. Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid
2018, 9, 4490–4502. [CrossRef]
12. Du, M.; Pierrou, G.; Wang, X.; Kassouf, M. Targeted False Data Injection Attacks against AC State Estimation without Network
Parameters. IEEE Trans. Smart Grid 2021, 12, 349–5361. [CrossRef]
13. Costilla-Enriquez, N.; Weng, Y. Attack Power System State Estimation by Implicitly Learning the Underlying Models. IEEE Trans.
Smart Grid 2022, 14, 649–662. [CrossRef]
14. Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst.
Secur. 2011, 14, 33. [CrossRef]
15. Heming, H.; Fei, L.; Tinghui, O.; Xiaoming, Z. Sequential Detection of Microgrid Bad Data via a Data-Driven Approach Combining
Online Machine Learning with Statistical Analysis. Front. Energy Res. 2022, 10, 861563.
16. El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-Security in Smart Grid: Survey and Challenges. Comput. Electr. Eng.
2018, 67, 469–482. [CrossRef]
17. Hasan, M.K.; Habib, A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on Cyber-Physical and Cyber-Security System
in Smart Grid: Standards, Protocols, Constraints, and Recommendations. J. Netw. Comput. Appl. 2023, 209, 103540. [CrossRef]
Energies 2023, 16, 1651 22 of 24

18. Tufail, S.; Parvez, I.; Batool, S.; Sarwat, A. A Survey on Cybersecurity Challenges, Detection, and Mitigation Techniques for the
Smart Grid. Energies 2021, 14, 5894. [CrossRef]
19. Amin, M.; El-Sousy, F.F.M.; Aziz, G.A.A.; Gaber, K.; Mohammed, O.A. CPS Attacks Mitigation Approaches on Power Electronic
Systems with Security Challenges for Smart Grid Applications: A Review. IEEE Access 2021, 9, 38571–38601. [CrossRef]
20. Liu, Q.; Hagemeyer, V.; Keller, H.B. A Review of Rule Learning-Based Intrusion Detection Systems and their Prospects in Smart
Grids. IEEE Access 2021, 9, 57542–57564. [CrossRef]
21. Abir, S.M.A.A.; Anwar, A.; Choi, J.; Kayes, A.S.M. IoT-Enabled Smart Energy Grid: Applications and Challenges. IEEE Access
2021, 9, 50961–50981. [CrossRef]
22. Nafees, M.N.; Saxena, N.; Cardenas, A.; Grijalva, S.; Burnap, P. Smart Grid Cyber-Physical Situational Awareness of Complex
Operational Technology Attacks: A Review. ACM Comput. Surv. 2022, 55, 215. [CrossRef]
23. Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and
Future Directions. Energies 2022, 15, 6799. [CrossRef]
24. Tuyen, N.D.; Quan, N.S.; Linh, V.B.; Van Tuyen, V.; Fujita, G. A Comprehensive Review of Cybersecurity in Inverter-Based Smart
Power System Amid the Boom of Renewable Energy. IEEE Access 2022, 10, 35846–35875. [CrossRef]
25. Xu, Y. A Review of Cyber Security Risks of Power Systems: From Static to Dynamic False Data Attacks. Prot. Control. Mod. Power
Syst. 2020, 5, 19. [CrossRef]
26. Faquir, D.; Chouliaras, N.; Sofia, V.; Olga, K.; Maglaras, L. Cybersecurity in Smart Grids, Challenges, and Solutions. AIMS
Electron. Electr. Eng. 2021, 5, 24–37.
27. Liberati, F.; Garone, E.; Di Giorgio, A. Review of Cyber-Physical Attacks in Smart Grids: A System-Theoretic Perspective.
Electronics 2021, 10, 1153. [CrossRef]
28. Alsuwian, T.; Butt, S.A.; Amin, A.A. Smart Grid Cyber Security Enhancement: Challenges and Solutions—A Review. Sustainability
2022, 14, 14226. [CrossRef]
29. Mohammadi, F. Emerging Challenges in Smart Grid Cybersecurity Enhancement: A Review. Energies 2021, 14, 1380. [CrossRef]
30. Yohanandhan, R.V.; Elavarasan, R.M.; Manoharan, P.; Mihet-Popa, L. Cyber-Physical Power System (CPPS): A Review on
Modeling, Simulation, and Analysis with Cyber Security Applications. IEEE Access 2020, 8, 151019–151064. [CrossRef]
31. Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-Physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659. [CrossRef]
32. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proc. IEEE 2012, 100, 210–224.
[CrossRef]
33. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A Review of False Data Injection Attacks Against Modern Power Systems.
IEEE Trans. Smart Grid 2017, 8, 1630–1638. [CrossRef]
34. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-Physical Systems Security—A Survey. IEEE Internet Things J. 2017, 4, 1802–1831.
[CrossRef]
35. Hossain, E.; Khan, I.; Un-Noor, F.; Sikander, S.S.; Sunny, M.S.H. Application of Big Data and Machine Learning in Smart Grid,
and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [CrossRef]
36. Ye, J.; Giani, A.; Elasser, A.; Mazumder, S.K.; Farnell, F.; Mantooth, H.A.; Kim, T.; Liu, J.; Chen, B.; Seo, G.-S.; et al. A Review of
Cyber–Physical Security for Photovoltaic Systems. IEEE J. Emerg. Sel. Top. Power Electron. 2022, 10, 4879–4901. [CrossRef]
37. Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE
Trans. Ind. Inform. 2020, 16, 5643–5654. [CrossRef]
38. Khoei, T.T.; Slimane, H.O.; Kaabouch, N. A Comprehensive Survey on the Cyber-Security of Smart Grids: Cyber-Attacks,
Detection, Countermeasure Techniques, and Future Directions. In Cryptography and Security; Artificial Intelligence; Cornell
University: Ithaca, NY, USA, 2022.
39. Gaggero, G.B.; Girdinio, P.; Marchese, M. Advancements and Research Trends in Microgrids Cybersecurity. Appl. Sci. 2021,
11, 7363. [CrossRef]
40. Villalón, A.; Rivera, M.; Salgueiro, Y.; Muñoz, J.; Dragičević, T.; Blaabjerg, F. Predictive Control for Microgrid Applications: A
Review Study. Energies 2020, 13, 2454. [CrossRef]
41. Sayed, K.; Gabbar, H.A. SCADA and Smart Energy Grid Control Automation. Smart Energy Grid Eng. 2017, 18, 481–514. [CrossRef]
42. Ferrag, M.A.; Babaghayou, M.; Yazici, M.A. Cyber Security for Fog-based Smart Grid SCADA Systems: Solutions and Challenges.
J. Inf. Secur. Appl. 2020, 52, 102500. [CrossRef]
43. Huitsing, P.; Chandia, R.; Papa, M.; Shenoi, S. Attack Taxonomies for the Modbus Protocols. Int. J. Crit. Infrastruct. Prot. 2008,
1, 37–44. [CrossRef]
44. Kuzlu, M.; Pipattanasompom, M.; Rahman, S. A Comprehensive Review of Smart Grid Related Standards and Protocols. In Pro-
ceedings of the 2017 5th International Istanbul Smart Grid and Cities Congress and Fair (ICSG), Istanbul, Turkey, 12–16 April 2017.
45. Mackiewicz, R.E. Overview of IEC 61850 and Benefits. In Proceedings of the 2006 IEEE PES Power Systems Conference and
Exposition, Atlanta, GA, USA, 29 October–1 November 2006.
46. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. A Survey on Smart Grid Potential Applications
and Communication Requirements. IEEE Trans. Ind. Inform. 2013, 9, 28–42. [CrossRef]
47. Burg, A.; Chattopadhyay, A.; Lam, K.-Y. Wireless Communication and Security Issues for Cyber-Physical Systems and the
Internet-of-things. Proc. IEEE 2018, 106, 38–60. [CrossRef]
Energies 2023, 16, 1651 23 of 24

48. Ahmed, S.; Gondal, T.M.; Adil, M.; Malik, S.A.; Qureshi, R. A Survey on Communication Technologies in Smart Grid. In
Proceedings of the 2019 IEEE PES GTD Grand International Conference and Exposition Asia (GTD Asia), Bangkok, Thailand,
19–23 March 2019; pp. 7–12.
49. Gungor, V.C.; Sahin, D.; Kocak, T.; Ergut, S.; Buccella, C.; Cecati, C.; Hancke, G.P. Smart Grid Technologies: Communication
Technologies and Standards. IEEE Trans. Ind. Inform. 2011, 7, 529–539. [CrossRef]
50. Sengupta, J.; Ruj, S.; Bit, S.D. A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.
J. Netw. Comput. Appl. 2020, 149, 102481. [CrossRef]
51. Lopez, C.; Sargolzaei, A.; Santana, H.; Huerta, C. Smart Grid Cyber Security: An Overview of Threats and Countermeasures.
J. Energy Power Eng. 2015, 9, 632–647.
52. Musleh, A.S.; Chen, G.; Dong, Z.Y. A Survey on the Detection Algorithms for False Data Injection Attacks in Smart Grids. IEEE
Trans. Smart Grid 2020, 11, 2218–2234. [CrossRef]
53. Zhang, Y.; Wang, J.; Chen, B. Detecting False Data Injection Attacks in Smart Grids: A Semi-Supervised Deep Learning Approach.
IEEE Trans. Smart Grid 2021, 12, 623–634. [CrossRef]
54. Hong, J.; Nuqui, R.F.; Kondabathini, A.; Ishchenko, D.; Martin, A. Cyber Attack Resilient Distance Protection and Circuit Breaker
Control for Digital Substations. IEEE Trans. Ind. Inform. 2019, 15, 4332–4341. [CrossRef]
55. Qu, Z.; Dong, Y.; Qu, N.; Li, H.; Cui, M.; Bo, X.; Wu, Y.; Mugemanyi, S. False Data Injection Attack Detection in Power Systems
Based on Cyber-Physical Attack Genes. Front. Energy Res. 2021, 9, 644489. [CrossRef]
56. Kleinmann, A.; Amichay, O.; Wool, A.; Tenenbaum, D.; Bar, O.; Lev, L. Stealthy Deception Attacks Against SCADA Systems,
Computer Security. SECURE CyberICPS 2017. In Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2018;
p. 10683.
57. Rajesh, L.; Satyanarayana, P. Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA
Systems with Modbus Protocol. Secur. Commun. Netw. 2021, 4, 8887666.
58. Aeiad, F.; Gao, W.; Momoh, J. Bad Data Detection for Smart Grid State Estimation. In Proceedings of the 2016 North American
Power Symposium (NAPS), Denver, CO, USA, 18–20 September 2016; pp. 1–6.
59. Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid.
IEEE Access 2017, 5, 13787–13798. [CrossRef]
60. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting Stealthy False Data Injection using Machine Learning in Smart
Grid. IEEE Syst. J. 2017, 11, 1644–1652. [CrossRef]
61. Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting False Data Injection Attacks in AC state estimation. IEEE Trans. Smart Grid
2015, 6, 2476–2483. [CrossRef]
62. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning based Intelligent
Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [CrossRef]
63. Ashok, A.; Govindarasu, M.; Ajjarapu, V. Online Detection of Stealthy False Data Injection Attacks in Power System State
Estimation. IEEE Trans. Smart Grid 2018, 9, 1636–1646. [CrossRef]
64. Zhuang, P.; Deng, R.; Liang, H. False Data Injection Attacks Against State Estimation in Multiphase and Unbalanced Smart
Distribution Systems. IEEE Trans. Smart Grid 2019, 10, 6000–6013. [CrossRef]
65. Aboelwafa, M.M.N.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A Machine-Learning-Based Technique for False
Data Injection Attacks Detection in Industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [CrossRef]
66. Vincent, P.; Larochelle, H.; Lajoie, I.; Bengio, Y.; Manzagol, P.-A. Stacked Denoising Autoencoders: Learning Useful Representa-
tions in a Deep Network with a Local Denoising Criterion. J. Mach. Learn. Res. 2010, 11, 3371–3408.
67. Yao, L.; Ge, Z. Scalable Semi-Supervised GMM for Big Data Quality Prediction in Multimode Processes. IEEE Trans. Ind. Electron.
2019, 66, 3681–3692. [CrossRef]
68. Bennett, K.P.; Demiriz, A. Semi-Supervised Support Vector Machines, in NIPS; The MIT Press: Cambridge, MA, USA, 1998;
pp. 368–374.
69. Wilson, D.; Tang, Y.; Yan, J.; Lu, Z. Deep Learning-Aided Cyber-Attack Detection in Power Transmission Systems. In Proceedings
of the IEEE Power Energy Soc General Meet PESGM, Portland, OR, USA, 5–10 August 2018.
70. Ju, C.; Bao, F.; Xu, C.; Fu, X. A Novel Method of Interestingness Measures for Association Rules Mining Based on Profit. Discret.
Dyn. Nat. Soc. 2015, 2, 868634. [CrossRef]
71. Abu, M.S.; Selamat, S.R.; Yusof, R.; Ariffin, A. An Attribution of Cyberattack using Association Rule Mining (ARM). Int. J. Adv.
Comput. Sci. Appl. (IJACSA) 2020, 11, 2. [CrossRef]
72. Lou, P.; Lu, G.; Jiang, X.; Jiang, Z.; Hu, J.; Yan, J. Cyber Intrusion Detection through Association Rule Mining on Multi-Source
Logs. Appl. Intell. 2021, 51, 4043–4057. [CrossRef]
73. Wu, X.; Zhang, C.; Zhang, S. Efficient Mining of both Positive and Negative Association Rules. ACM Trans. Inf. Syst. 2004, 22,
381–405. [CrossRef]
74. Prakash, S.; Vijayakumar, M. An Effective Network Traffic Data Control Using Improved Apriori Rule Mining. Circuits Syst. 2016,
7, 3162–3173. [CrossRef]
75. Rosyid, N.R.; Ohrui, M.; Kikuchi, H.; Sooraksa, P.; Terada, M. A Discovery of Sequential Attack Patterns of Malware in Botnets. In
Proceedings of the 2010 IEEE International Conference on Systems, Istanbul, Turkey, 10–13 October 2010; Man and Cybernetics,
pp. 2564–2570.
Energies 2023, 16, 1651 24 of 24

76. Isam, K.T.; Osman, N.U.; Bayat, O.; Alsaedi, K.H. Improving IDSs Alerts to Improve High-Quality Network Security by using
Data Mining Techniques. Aurum J. Eng. Syst. Archit. 2017, 1, 17–29.
77. Ohrui, M.; Kikuchi, H.; Rosyid, N.R.; Terada, M. Mining Botnet Coordinated Attacks using an Apriori-Prefix Span Hybrid
Algorithm. J. Inf. Process. J. Inf. Process. 2013, 21, 607–616.
78. Nugroho, E.P.; Megasari, R.; Junaeti, E.; Pribadi, S.R. Implementation of CM-SPADE Algorithm in Building Denial of Service
Detection System Model Using Snort. In Proceedings of the 7th Mathematics, Science, and Computer Science Education
International Seminar, MSCEIS 2019, Bandung, West Java, Indonesia, 12 October 2019.
79. Agrawal, R.; Srikant, R. Mining sequential patterns. In Proceedings of the Eleventh International Conference on Data Engineering,
Taipei, Taiwan, 6–10 March 1995; pp. 3–14.
80. Silva, C.; Faria, P.; Vale, Z. Clustering Support for an Aggregator in a Smart Grid Context. In Hybrid Intelligent Systems;
Madureira, A., Abraham, A., Gandhi, N., Varela, M., Eds.; HIS 2018; Advances in Intelligent Systems and Computing; Springer:
Berlin/Heidelberg, Germany, 2020; Volume 923.
81. Saddam, A.; Muhammad, I.; Ahmed, H.S.; Wu, J.; Nan, D.D.; Ahmad, S. Protection of a Smart Grid with the Detection of
Cyber-Malware Attacks using Efficient and Novel Machine Learning Models. Front. Energy Res. 2022, 10, 1102.
82. Lei, W.; Xu, P.; Qu, Z.; Bo, X.; Dong, Y.; Zhang, Z.; Li, Y. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power
System Based on the Operating State Data Link. Front. Energy Res. 2021, 9, 666130.
83. Hussain, T.; Saeed, M.I.; Khan, I.U.; Aslam, N.; Aljameel, S.S. Implementation of a Clustering Based DDoS Detection Method.
Electronics 2022, 11, 2804. [CrossRef]
84. Bohara, B.; Bhuyan, J.; Wu, F.; Ding, J. A Survey on the Use of Data Clustering for Intrusion Detection System in Cyber Security.
Int. J. Netw. Secur. Appl. 2020, 12, 1–18. [PubMed]
85. Faisal, M.A.; Aung, Z.; Williams, J.R.; Sanchez, A. Data-Stream based Intrusion Detection System for Advanced Metering
Infrastructure in Smart Grid: A feasibility study. IEEE Syst. J. 2015, 9, 31–44. [CrossRef]
86. Pena, J.; Lozano, J.; Larranaga, P. An Empirical Comparison of Four Initialization Methods for the k-Means Algorithm. Pattern
Recognit. Lett. 1999, 20, 1027–1040. [CrossRef]
87. Jin, X.; Han, J. K-Medoids Clustering. In Encyclopedia of Machine Learning; Sammut, C., Webb, G.I., Eds.; Springer:
Berlin/Heidelberg, Germany, 2011.
88. Sreenivasulu, V.; Prasad, R.S. A Methodology for Cybercrime Identification using Email Corpus based on the Gaussian Mixture
Model. Int. J. Comput. Appl. 2015, 117, 29–32.
89. Farrokhifard, M.M.; Hatami, M.; Venkatasubramanian, V.M.; Torresan, G.; Panciatici, P.; Xavier, F. Clustering of Power System
Oscillatory Modes using Dbscan Technique. In Proceedings of the 2019 North American Power Symposium (NAPS), Wichita, KS,
USA, 13–15 October 2019; pp. 1–6.
90. Anwar, A.; Mahmood, A.N.; Zahir, T. Identification of Vulnerable Node Clusters against False Data Injection Attack in an
AMI-based Smart Grid. Inf. Syst. 2015, 53, 201–212. [CrossRef]
91. Gallardo, J.L.; Ahmed, M.A.; Jara, N. Clustering Algorithm-Based Network Planning for Advanced Metering Infrastructure in
Smart Grid. IEEE Access 2021, 9, 48992–49006. [CrossRef]
92. Abazari, A.; Zadsar, M.; Ghafouri, M.; Atallah, R.; Assi, C. A Data Mining/ANFIS and Adaptive Control for Detection and
Mitigation of Attacks on DC MGs. IEEE Trans. Smart Grid, 2022; (Early access). [CrossRef]

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.

You might also like