2020-Cyber Attack On Smart Grids
2020-Cyber Attack On Smart Grids
Review
Cyber-Security of Smart Microgrids: A Survey
Farzam Nejabatkhah 1, * , Yun Wei Li 2 , Hao Liang 2 and Rouzbeh Reza Ahrabi 2
Abstract: In this paper, the cyber-security of smart microgrids is thoroughly discussed. In smart grids,
the cyber system and physical process are tightly coupled. Due to the cyber system’s vulnerabilities,
any cyber incidents can have economic and physical impacts on their operations. In power electronics-
intensive smart microgrids, cyber-attacks can have much more harmful and devastating effects on
their operation and stability due to low inertia, especially in islanded operation. In this paper, the
cyber–physical systems in smart microgrids are briefly studied. Then, the cyber-attacks on data
availability, integrity, and confidentiality are discussed. Since a false data injection (FDI) attack that
compromises the data integrity in the cyber/communication network is one of the most challenging
threats for smart microgrids, it is investigated in detail in this paper. Such FDI attacks can target state
estimation, voltage and frequency control, and smart microgrids’ protection systems. The economic
and physical/technical impacts of the FDI attacks on smart microgrids are also reviewed in this
paper. The defensive strategies against FDI attacks are classified into protection strategies, in which
selected meter measurements are protected, and detection/mitigation strategies, based on either
static or dynamic detection. In this paper, implementation examples of FDI attacks’ construction and
detection/mitigation in smart microgrids are provided. Samples of recent cyber-security projects in
the world, and critical cyber-security standards of smart grids, are presented. Finally, future trends of
cyber-security in smart microgrids are discussed.
Ukraine blackout in 2016 were all wake-up calls [5]. Based on the study, a blackout across
15 U.S. states would affect 93 million people, which cost between 243 billion and 1 trillion
dollars [6,7].
Considering the disruptive effects of cyber-attacks and smart grids’ vulnerability,
several projects and plans have been initiated recently. The federal governments of the
United States and Canada have started a collaborative effort to protect the emerging
power grid from cyber-attacks (National Electric Grid Security and Resilience action plan).
Moreover, the Department of Energy (DoE) of the United States has initiated several projects
addressing cyber-security issues. For example, the DoE has funded $12.2 million for the
Secure Evolvable Energy Delivery Systems (SEEDS) project at the University of Arkansas.
In another project, the DoE has funded $28.1 million for a project called Cyber Resilient
Energy Delivery Consortium (CREDC) at the University of Illinois, Urbana-Champaign.
In addition to North American projects, the European Union has funded the Smart Grid
Protection Against Cyber-Attacks (SPARKS) project considering EU energy objectives for
2030. In Section 3, examples of projects on cyber-security will be provided.
Data should meet three fundamental requirements in the cyber system; (1) availability
where data are timely and accessible, (2) integrity in which data are accurate and trust-
worthy, and (3) Confidentiality where data are viewed and used by an authorized person.
Among different cyber-attacks, a false data injection (FDI) attack targeting data integrity
is one of the most challenging smart grid threats. If such attacks are crafted intelligently,
they can penetrate the system without being detected by the conventional attack detection
method [8,9]. Those attacks are also called stealth attacks [10–12]. The successful FDI
attack could introduce major economic problems as well as steady-state and dynamic
stability issues. Please refer to the U.S. Department of Energy GMLC project in [13] for
more information on distinguishing cyber events from physical events.
The smart grids’ cyber–physical systems and their security have been studied in some
literature, such as in [1,14–17]. In [1], the importance of cyber-security in microgrids opera-
tion and control are discussed in general. The common cyber vulnerabilities in microgrids
are addressed, and the potential risks of cyber-attacks are studied. The cyber-physical elec-
trical energy systems are thoroughly reviewed in [14], and their critical scientific problems,
including co-simulation, the interaction between energy and information networks, failure
in the communication system, and security of the cyber–physical system, are discussed.
The FDI attacks in power systems are studied in [15]. In addition to the theoretical basis,
the impacts of successful FDI attacks on power systems are studied. Although such surveys
provide valuable discussions on cyber–physical systems and smart power systems’ security,
they do not address smart microgrids with AC-DC subgrids and high penetration of power
electronics converters in detail.
In smart microgrids with high penetration of power electronics converters, the cyber-
attacks can be much harmful. Although the optimal economical operation is not the
primary concern in such microgrids, cyber-attacks could have devastating effects on mi-
crogrids’ stability, especially in islanded mode. In other words, due to the low inertia
of such microgrids, the cyber-attacks could affect the transient and steady-state stability
of microgrids. Further, in the hybrid AC-DC microgrids, any cyber-attack in either AC
or DC subgrid will affect the other side. For instance, if any cyber-attack affects the AC
subgrid’s frequency stability, it will affect DC voltage stability on the DC side through
AC-DC subgrids interlinking power converters. Considering the future roadmap of smart
microgrids (e.g., E-LANs and IoE), the cyber-security will receive more and more attention
in the near future.
In this paper, the cyber-security of smart microgrids is studied. First, the cyber–
physical systems in smart microgrids and their challenges are presented in Section 2. In
Section 3, examples of current cyber-security projects are provided in detail. A few critical
standards and protocols associated with cyber-security of smart grids are discussed in
Section 4. In Section 5, the cyber-attacks on data availability, integrity, and confidentiality
are studied. Due to the importance and devastating effects of FDI attacks targeting data
Energies 2020, 13, x FOR PEER REVIEW 3 of 27
Energies 2021, 14, 27 3 of 27
are studied. Due to the importance and devastating effects of FDI attacks targeting data
integrity, the rest of the paper studies the FDI attacks. The economic and
physical/technical impacts of FDI attacks on smart microgrids are addressed in Section 6.
integrity,
In Sectionthe 7,
rest of the paper
various studies the
construction FDI attacks.
methods of FDITheattacks
economic and physical/technical
targeting state estimation,
impacts
voltage and frequency regulations, and protection systems in 6.smart
of FDI attacks on smart microgrids are addressed in Section In Section 7, various
microgrids are
construction methods of FDI attacks targeting state estimation, voltage and
reviewed. In Section 8, different defensive strategies against FDI attacks are addressed.frequency
regulations, and protection
The implementation systemsof
examples in smart microgrids
cyber-attack are reviewed.
construction, In Section
impact, and8, defensive
different
defensive strategies against FDI attacks are addressed. The implementation examples of
strategy are provided in Section 9. Finally, future trends of cyber-security in smart
cyber-attack construction, impact, and defensive strategy are provided in Section 9. Finally,
microgrids are discussed in Section 10.
future trends of cyber-security in smart microgrids are discussed in Section 10.
2. Cyber–Physical Systems in Smart Microgrids and Challenges
2. Cyber–Physical Systems in Smart Microgrids and Challenges
2.1.Cyber–Physical
2.1. Cyber–PhysicalSystem
System
Thesmart
The smartmicrogrids
microgridsareare dominated
dominated by power
by power electronics
electronics converters
converters used forused for
inter-
interfacing distributed generations and energy storage and loads. In such systems,
facing distributed generations and energy storage and loads. In such systems, the physical, the
physical,components
electrical electrical are
components are tightlybyinterconnected
tightly interconnected information andby information tech-
communication and
communication
nologies, and theirtechnologies,
operations areand theircoupled
tightly operations are system
to cyber tightly functionality.
coupled to cyber system
In Figure 1,
afunctionality.
typical powerInelectronics-intensive
Figure 1, a typical power
smartelectronics-intensive smart microgrid
microgrid with the cyber–physical with the
networks
iscyber–physical
shown. networks is shown.
Figure1.1.AAtypical
Figure typicalsmart
smartmicrogrid
microgridwith
withcyber-physical
cyber-physicalsystems.
systems.
Thesmart
The smartmicrogrid’s
microgrid’s cyber–physical
cyber–physical model
model includes
includes four layers
four layers in general;
in general; (1)
(1) physi-
physical
cal power power
systemsystem layer,
layer, (2) (2)and
sensor sensor and actuator
actuator layer, (3)layer, (3) communication
communication layer, andlayer, and
(4) man-
(4) management
agement andlayer.
and control control layer.
In the In the following,
following, brief explanations
brief explanations about
about layers layers are
are provided.
provided.
The physical layer contains the microgrid’s power components, such as transformers,
generators, power electronics converters, circuit breakers, and loads.
Energies 2021, 14, 27 4 of 27
The sensor and actuator layer consists of sensors and measurement devices, and
devices to implement the control decisions (made in the management layer). The sensors
and measurement devices are responsible for measuring information about the system’s
state, including voltage, frequency, current, and circuit breaker status. The actuators and
control devices include generator controllers, distributed generation controllers, and relays
of circuit breakers.
The communication layer consists of devices such as routers, switches, and the com-
munication medium and is responsible for information exchange among relevant layers.
In smart microgrids, the communication system can be wired or wireless, depending on
system requirements.
The management layer is a central control system that is responsible for the microgrid
operation under different conditions. This layer receives measurement layer data through
the communication layer and produces control signals for the smart microgrids’ optimal
operation. The control signals are sent to actuators through the communication layer again.
Some studies have been done on the cyber–physical system approach for smart power
system design, modelling, simulation, and verification of cyber–physical systems, real-time
requirements in cyber–physical systems, etc. [18–21]. It should be mentioned that cyber–
physical system is not a new concept, and it has been used in a variety of domains, including
thermal management [22], gaming and social network [23,24], cloud computing [25], and
air-traffic management [26].
From the discussions above and Figure 1, it can be concluded that accurate and optimal
operation of smart microgrids is impossible without the secure and safe communication
infrastructure, distributed computation technologies, and information processing.
3.1. Blockchain-Based Security Framework for the Internet of Thing-Enabled Solar Micro-Inverters
Researchers of the Texas A&M University-Kingsville are investigating threats of cyber-
attacks on the Internet of Things (IoT)-enabled solar micro-inverters [27]. Currently, the
penetration of distributed solar micro-inverters is increasing rapidly, in which they require
communication for power-sharing and distributed hierarchical control [28]. Although the
IoT provides the opportunity for module-to-module communications, it could introduce se-
curity challenges. In this system, the IoT device connected to the solar micro-inverters acts
as a security module. The cloud-based PV management platform supports the PV system,
and the blockchain server provides blockchain service. This system can enhance communi-
cation security, data security, software/firmware security, hardware component security
(supply chain), and cyber-attack detection. The future work includes the blockchain tech-
nology validation for software security, the effectiveness of this security strength under
Energies 2021, 14, 27 5 of 27
portion of the Smart Grid. The AMI-SEC supports all of the AMI system’s use cases,
including AMI communications network device, AMI forecasting system, AMI head
end, AMI meter, AMI meter management, and home area network. The AMI-SEC also
recommends a control system and communication protection, including security function
isolation, cryptographic key establishment and management, the transmission of security
parameters, voice-over-internet protocol, and many more.
the system can defend against threats and restore to the previous state. The compliance of
all smart grid components can be tested with this standard [37,40].
Titles
Descriptions AMI- NERC NISTIR IEC ISO/IEC 27001 NIST SP
GB/T 22239
SEC CIP 7628 62351 27002 800-82
Critical Cyber Asset
8 4 4 8 4 4 4
Identification
Security
8 4 4 8 4 8 4
Management Controls
Personnel and Training 8 4 8 8 4 4 8
Electronic
8 4 4 8 4 8 4
Security Perimeters
Physical Security of
8 4 4 8 4 4 4
Critical Cyber Assets
Systems Security
4 4 4 8 4 4 4
Management
Incident Reporting and
8 4 4 8 8 4 4
Response Planning
Recovery Plans for Critical
8 4 4 8 8 4 4
Cyber Assets
Security guidance for
4 8 8 8 8 8 8
AMI systems
Privacy and the
8 8 4 8 8 8 4
Smart Grid
Security of Power System
4 8 4 4 8 8 8
Information Exchange
Figure
Figure 2. Centralized
Centralizedstructure
structureofof supervisory
supervisory control
control in power
in power electronics-intensive
electronics-intensive smart
smart micro-
microgrids.
grids.
As mentioned
As mentionedabove,
above, the FDI
the attacks
FDI can can
attacks target steady-state
target and transient
steady-state operations
and transient operations
of smart microgrids. Among several attacks, the FDI attacks targeting state estimation,
of smart microgrids. Among several attacks, the FDI attacks targeting state estimation,
voltage and frequency regulations, and system protection are explained in the following
voltage and frequency regulations, and system protection are explained in the following
due to their importance in smart microgrids.
due to their importance in smart microgrids.
7.1. Cyber-Attacks on State Estimation
7.1. Cyber-Attacks on State
The state estimation is Estimation
used to determine the system operation status, including bus
voltage
Themagnitudes and phase
state estimation anglestofrom
is used availablethe
determine measurements. Such attacks’
system operation status,primary
including bus
purpose is to introduce errors in estimating state variables in microgrids
voltage magnitudes and phase angles from available measurements. Such attacks’ by manipulating
sensors’ measurement data. The state estimation helps monitor and control microgrids
primary purpose is to introduce errors in estimating state variables in microgrids by
effectively and efficiently, and it is one of the most critical tasks in microgrids operation
manipulating sensors’ measurement data. The state estimation helps monitor and control
and energy management strategies. The estimated states can also be used for contingency
microgrids effectively
analysis, stability andload
analysis, efficiently, andoptimal
forecasting, it is one of the
power most critical
dispatch, bad datatasks in microgrids
detection,
operation
and powerand energy
markets’ management
locational marginalstrategies. The estimated
pricing [79–81]. statesinducing
Any FDI attacks can alsoerrors
be used for
contingency analysis, stability analysis, load forecasting, optimal power
into estimated states can have disruptive effects on microgrids’ operation and performance. dispatch, bad
data detection,
In general, andtherepower
are twomarkets’
types of locational marginal
state estimation pricing
in power [79–81].
systems: DC Any
state FDI
esti- attacks
mation and
inducing AC state
errors intoestimation
estimated(for more
states information
can about AC
have disruptive and DC
effects on state estimation,
microgrids’ operation
please refer
and performance.to [80] and [82]). Due to simple analytical models, power systems with DC
state estimation have been studied more than AC state estimation in literature [15,83–85].
In general, there are two types of state estimation in power systems: DC state
However, FDI attacks construction targeting AC state estimation is gradually gaining
estimation and AC state estimation (for more information about AC and DC state
attention [86–89]. It should be highlighted that for the state estimation and the associated
estimation,
FDI attack in please refermicrogrid,
the smart to [80] and [82]).
most Due to simple
researches analytical
are addressing models,
power power systems
transmission
with DC state estimation have been studied more than AC state
system approaches. A few works on the state estimation and FDI attack in MV power estimation in literature
[15,83–85].
distributionHowever,
systems, suchFDIasattacks
[90,91],construction targeting
are more applicable ACsmart
for the statemicrogrids.
estimation is gradually
gaining attention [86–89]. It should be highlighted that for the state estimation and the
associated FDI attack in the smart microgrid, most researches are addressing power
transmission system approaches. A few works on the state estimation and FDI attack in
MV power distribution systems, such as [90,91], are more applicable for the smart
microgrids.
Although research on the construction of FDI attacks mostly focuses on attacks
targeting state estimation, FDI attacks construction targeting voltage, frequency, and
Energies 2021, 14, 27 11 of 27
Although research on the construction of FDI attacks mostly focuses on attacks target-
ing state estimation, FDI attacks construction targeting voltage, frequency, and protection
systems have also been studied [16,92,93].
Figure
Figure 3. 3. Cyber-attacks
Cyber-attacks in smart
in smart microgrids
microgrids and defensive
and defensive lines. lines.
InIn
thethe
following, implementation
following, examples
implementation of FDI attacks’
examples of FDIconstruction
attacks’ and detec-
construction an
tion/mitigation in smart microgrids are provided.
detection/mitigation in smart microgrids are provided.
9. Implementation Examples
9.1. Example 1: Cyber-Attacks in Power Electronics-Intensive DC Microgrids
The FDI cyber-attack construction and detection in DC microgrid in [11] a
presented here. The studied DC microgrid is shown in Figure 4, in which -number
DC power generators are connected to the DC microgrid through DC/DC converters. Th
power converters are controlled to adjust their output voltages to the local primary an
secondary controllers’ reference values.
In DC microgrids, the secondary controller uses local and neighboring measuremen
to globally tune the average voltage and share the currents proportionately to reduce th
circulating currents. Typically, sublayers of secondary control are cooperated to achiev
those objectives in which the first sublayer is responsible for average voltage restoratio
while the current sharing is done in the second sublayer.
To regulate average voltage globally in the first sublayer, a voltage observer is use
to estimate the average voltage ( ) for ith converter. This value is updated by
Energies 2021, 14, 27 14 of 27
Figure 4. DC microgridFigure 4. DC
with the microgrid with
cyber–physical the cyber–physical model.
model.
where IDCj (k) ∀ j ∈ Ni is the measurements of neighboring output current, and wi , IDCi ,
max , and I max denote the desired coupling gain, measured output current in the ith
IDCj , IDC
i DCj
and jth converters, and maximum output current allowed for the ith and jth converters,
respectively.
To implement the above objectives into the ith converter to regulate the output voltage,
two voltage correction terms are considered as follows:
k
∗
∆Vi1 (k ) = K P1 VDC − V DCi (k) + K I1 ∑ p=0 VDC
∗
− V DCi ( p) (3)
| {z }
e1i (k )
, , , and denote the desired coupling gain, measured output current in
the ith and jth converters, and maximum output current allowed for the ith and jth
converters, respectively.
To implement the above objectives into the ith converter to regulate the output
Energies 2021, 14, 27 16 of 27
voltage, two voltage correction terms are considered as follows:
( )= ∗ ( ) + ∑ ∗ ( )
∆ − −
(3)
k
+ K I2 ∑ p=τ i
∗ i ( ) ∗ i
∆Vi2 (k) = K P2 IDC − I DCi k − τinput IDC − I DCi p − τinput (4)
input
∗{z ∗
∆ |( ) = − − } + ∑ − −
e2i (k ) (1)
( )
whereK P1 , ,K I1 , ,K P2 , ,and
where andK I2 are
arethe
thefirst
firstand
andsecond
secondsublayers’
sublayers’PIPIcontroller
controllergains
gains(see
(see
∗
Figure 5). Moreover, global reference current and voltage values are represented by IDC ∗
Figure
∗ 5). Moreover, global reference current and voltage values are represented by
and VDC ∗ , respectively.
and , respectively.
Figure5.5.The
Figure Theith-converter
ith-convertercontroller
controllerfor
forsensors
sensorsand
andcommunication
communicationlink
linkattacks’
attacks’ detection
detection in
in DC
DC
microgrids[11].
microgrids [11].
Finally,the
Finally, thecorrection
correctionterms
termsinin
(3)(3) and
and (4)(4)
areare added
added to the
to the global
global reference
reference voltage
voltage to
to obtain
obtain the the reference
reference value
value for the
for the locallocal voltage
voltage of ith-converter.
of ith-converter.
∗ ( )
∗ =∗ ∗ + ∆ 11 ( ) + ∆ 22( ) (2)
VDC i
( k ) = V DC + ∆Vi ( k ) + ∆Vi ( k ) (5)
In such DC microgrid, using the cooperative-based consensus algorithm, (1) and (2)
shallInconverge
such DCto
microgrid, using the cooperative-based consensus algorithm, (1) and (2)
shall converge to
lim V lim ( ) ∗= ∗ lim I DCi (k() =
; lim ) =0 ∀
0∀i ∈∈N (3)
→ i ( k ) = VDC ;
DC → (6)
k→∞ k→∞
Forcyber-attacks
For cyber-attacksininaasingle
singlesensor/communication
sensor/communication link,
link, (6)
(6)isismodified
modifiedas
asfollows:
follows:
lim ( ) = ∗ ′ ; lim ( ) ≠ 0∀ ∈ (4)
→ (k) = V ∗ 0 ;
lim V DC lim →I DCi (k ) 6= 0 ∀ i ∈ N (7)
i DC
k→∞ k→∞
This criterion can be used to detect cyber-attacks, including DoS and jamming. How-
ever, the stealth attacks can penetrate the system without operators’ knowledge and can
multiple sensors/communication links (the stealth attack can be crafted so that (6) is
satisfied). It is proven in [11] that if a constant value P exists such that
∞ ∞
∑ k =0 a
uV i
(k) ≤ P, ∑ k =0 u aIi (k) ≤ P∀ i ∈ N (8)
Then, the state convergence (6) is not affected in the presence of stealth attacks. In (8),
u aIi (k) and uV
a ( k ) represent the ith-converter current and voltage attack vectors at the kth
i
instant.
In the DC microgrid controlled by cooperative systems, it is challenging to detect the
attacked node since the entire system is affected by the intrusion in any node. Considering
Figure 4, each converter output current depends on voltage levels between two different
points. Thus, any stealth attacks on current value (e.g., attacks on current sensors) will result
in voltage variations across the DC microgrids, which leads to errors in current sharing
among converters. Typically, the current sharing error could be a sufficient criterion to
Energies 2021, 14, 27 17 of 27
If a cyber-link or sensor is attacked in the ith controller, the model of attacked control
input would be as in (10) and (11), respectively.
f i ij
uij (k) = uij k − τinput − τcomm + kuia (k) (10)
f i
ui (k) = ui k − τinput + kuia (k) (11)
where k shows attack presence (when k = 1, there is an attack in the system) and uia (k)
f
represents ith-converter attack vector. From (10) and (11), local investigation of ui (k)
can be done in each converter to detect nonzero synchronization error with the residual
output. However, since each residue comparison needs global information, this is not an
appropriate criterion to detect attacks’ node(s). To verify this case, the controller attempt to
adjust the output to a given reference voltage is considered for attack indication.
Using the change in PI output in sublayer 1, a cooperative vulnerability factor (CVF)
h is defined
in [11] asin (12) for each
i converter
h to
determine
the attacked
nodes
i accurately.
∑ j∈ Ni aij ∑ j∈ Ni aij
ij ij
Ci (k) = ci ∆Vj1 k − τcomm − ∆Vi1 (k) + ∆Vj1 k − τcomm − ∆Vi1 (k) (12)
where ci is a positive constant value. If the calculated Ci (k) for each node is a positive
value, that node is the attacked node. While the non-attacked nodes have the Ci (k ) value of
zero. The proposed CVF in [11] is a proper criterion to detect the attacked node, especially
when multiple sensor/communication links are stealthily attacked. The value of Ci (k) is
cross-coupled with the current sublayer to protect against attack to Ci (k). In Figure 5, the
ith-converter controller to detect stealth attacks on communication links and sensors in DC
microgrids is shown. For more detailed information, please refer to [11].
Figure6.6. Frequency
Figure Frequencycontrol
controlschematic
schematicof
ofthe
thetwo-area
two-areasystem.
system.
Figure 6 shows that area control error (ACE) centers receive measured frequency and
power signals and provide frequency error values to the frequency control centers (FCCs).
Then, the FCCs send out frequency control signals to the power sources (e.g., local
controllers of power electronics converters interfaced distributed generations or governor
of generators) to balance active power consumption. In this example, it is assumed that
hackers attack only area A since it is proven that when both areas are compromised, the
Energies 2021, 14, 27 18 of 27
Figure 6 shows that area control error (ACE) centers receive measured frequency
and power signals and provide frequency error values to the frequency control centers
(FCCs). Then, the FCCs send out frequency control signals to the power sources (e.g., local
controllers of power electronics converters interfaced distributed generations or governor
of generators) to balance active power consumption. In this example, it is assumed that
hackers attack only area A since it is proven that when both areas are compromised, the
generators on both sides act in the opposite direction to deal with attacks’ negative impacts.
The ACE center signals sent to FCCs are as follows:
where PTa and PTn represent actual and nominal powers of tie-line, and f a and f n denote
actual and nominal frequency.
In this example, high security is considered for the power components and controllers
(physical system), and hackers could only intrude through communication systems. Fur-
thermore, it is assumed that the channel transmits FCC signals is equipped with advanced
encryption techniques; thus, measured signals can be the only target of hackers. Here,
the measured tie-line interchange power and frequency signals are potential targets of
attacks. It should be mentioned that they are the main variables of interest in frequency
control centers.
In general, the false data injections can be classified into two groups: exogenous
attack in which disturbance signal is added into the measured signals (can be pulse, ramp,
or random signals [133]), and scaling attack where the measured signal is multiplied by
disturbance signal. Considering these two categories, four possible attacks may exist in
the system: exogenous attack on the measured frequency and tie-line power signals, and
scaling attacks on the measured frequency and tie-line power signals. In this paper, the
exogenous attack and scaling attack on the tie-line active power measurement are discussed,
and the other two similar attacks on the measured frequency can be found in [93].
It should be highlighted that hackers should have full information about the system to
design an effective scaling attack to destabilize the system. In other words, k Dis = −αi /α j
should be satisfied to affect the system stability, which requires full information about the
system. Thus, it can be concluded that scaling attacks on sensor measurements of tie-line
active power and system frequency may not affect the system frequency stability. On the
other hand, when comparing exogenous attack on measured line active power and system
frequency signals, it is concluded that tie-line active power measurement is much more
susceptible to attacks (since frequency signal deviation is easily detectable by comparing
with nominal value). Thus, an exogenous attack on active power measurement has the
most destructive effects on the AC microgrid frequency. In [93], the detection method of
such attacks has been addressed in detail.
d = r(x) + e (17)
u = Rc (19)
Energies 2021, 14, 27 20 of 27
From (21), the jth olumn of R∗ is defined as r ∗j ∈ Rm×1 , which represents the state
variable j relationship with meter measurements from 1 to m. Considering the R∗ matrix,
to successfully attack the state variable x j without being detected, the attack cost would be
as follows:
m
q( j) = r ∗j T k = ∑i=1 rij∗ k i ∀j∈N (22)
Since the attackers will choose the easiest target of state variable with the least cost,
the attacker’s strategy can be considered as
min j∈ N q( j)
(23)
subjected to (20)–(22)
maxb≥0 min j∈ N q( j)
m
∑ i = 1 bi ≤ B (24)
subjected to
(20)–(22)
Energies 2021, 14, 27 21 of 27
Assume that the attackers have limited resources R. Since the defenders try to keep
the defense budget as low as possible, (24) can be written as follows:
min
b ≥0 ∑im=1 bi
min j∈ N q( j) ≥ R (25)
subjected to
(20)–(22)
It should be mentioned that the least attack cost should always be higher than the
attacker’s limited resource R. This optimization problem can determine meters to be
protected and the defence budget to deploy on such meter. More details about this example
can be found in [8].
11. Conclusions
The cyber-security of smart microgrids have been reviewed in this paper. Since smart
microgrids require cyber systems and communication networks, they are much more
vulnerable to cyber-attacks. In addition, such power electronics-dominated microgrids
have low inertia; thus, cyber-attacks can negatively affect their stability and operation. This
paper has focused on cyber-attacks on data availability, integrity, and confidentiality after
investigating the cyber-physical system in smart microgrids. Due to the importance of
false data injection (FDI) attacks that compromise the data integrity, this paper has studied
various construction methods, impacts, and detection/defensive strategies of FDI attacks
in smart microgrids. Implementation examples support the provided discussions. In this
paper, recent worldwide projects on cyber-security are also presented. Moreover, important
standards and protocols associated with the cyber-security of smart grids are discussed.
Finally, discussion and recommendations about the future research directions on smart
microgrids’ cyber-security are provided.
Energies 2021, 14, 27 23 of 27
Author Contributions: Conceptualization, F.N., Y.W.L., and H.L.; methodology, F.N.; validation,
F.N., Y.W.L., H.L., and R.R.A.; investigation, F.N.; writing—original draft preparation, F.N.; writing—
review and editing, Y.W.L., H.L., and R.R.A.; visualization, R.R.A. All authors have read and agreed
to the published version of the manuscript.
Funding: This research received no external funding.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Li, Z.; Shahidehpour, M.; Aminifar, F. Cybersecurity in Distributed Power Systems. Proc. IEEE 2017, 105, 1367–1388. [CrossRef]
2. Singh, S.K.; Khanna, K.; Bose, R.; Panigrahi, B.K.; Joshi, A. Joint-Transformation-Based Detection of False Data Injection Attacks
in Smart Grid. IEEE Trans. Ind. Inf. 2018, 14, 89–97. [CrossRef]
3. Available online: https://www.greentechmedia.com/research/subscription/u-s-solar-market-insight#gs.wpfDw8k (accessed on
20 November 2020).
4. Wind Vision. Energy.gov. Available online: https://www.energy.gov/eere/wind/maps/wind-vision (accessed on
20 November 2020).
5. Lee, R.M.; Assante, M.J.; Conway, T. Analysis of the Cyber Attack on the Ukrainin Power Grid. 2016. Available online:
http://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18Mar2016.pdf (accessed on 20 November
2020).
6. Bindra, A. Securing the Power Grid: Protecting Smart Grids and Connected Power Systems from Cyberattacks. IEEE Power
Electron. Mag. 2017, 4, 20–27. [CrossRef]
7. Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector. 2016; [ebook] Mission Support Center, Idaho National Labora-
tory. Available online: https://www.energy.gov/sites/prod/files/2017/01/f34/Cyber%20Threat%20and%20Vulnerability%
20Analysis%20of%20the%20U.S.%20Electric%20Sector.pdf (accessed on 20 November 2020).
8. Deng, R.; Xiao, G.; Lu, R. Defending Against False Data Injection Attacks on Power System State Estimation. IEEE Trans. Ind. Inf.
2017, 13, 198–207. [CrossRef]
9. Yu, J.J.Q.; Hou, Y.; Li, V.O.K. Online False Data Injection Attack Detection with Wavelet Transform and Deep Neural Networks.
IEEE Trans. Ind. Inf. 2018, 14, 3271–3280. [CrossRef]
10. Zhao, J.; Mili, L.; Wang, M. A Generalized False Data Injection Attacks Against Power System Nonlinear State Estimator and
Countermeasures. IEEE Trans. Power Sys. 2018, 33, 4868–4877. [CrossRef]
11. Sahoo, S.; Mishra, S.; Peng, J.C.; Dragicevic, T. A Stealth Cyber Attack Detection Strategy for DC Microgrids. IEEE Trans. Power
Electron. 2019, 34, 8162–8174. [CrossRef]
12. Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False Data Injection on State Estimation in Power Systems—Attacks, Impacts,
and Defense: A Survey. IEEE Trans. Ind. Inf. 2017, 13, 411–423. [CrossRef]
13. Available online: https://www.energy.gov/sites/prod/files/2018/01/f46/GMI%20Peer%20Review%20Report%202017_1-2
2%20FINAL%20online.pdf (accessed on 20 November 2020).
14. Shi, X.; Li, Y.; Cao, Y.; Tan, Y. Cyber-physical electrical energy systems: Challenges and issues. Csee J. Power Energy Syst. 2015,
1, 36–42. [CrossRef]
15. Liang, G.; Zhao, J.; Luo, F.; Weller, S.R.; Dong, Z.Y. A review of false data injection attacks against modern power systems. IEEE
Trans. Smart Grid 2017, 8, 1630–1638. [CrossRef]
16. Habib, H.F.; Lashway, C.R.; Mohammed, O.A. A Review of Communication Failure Impacts on Adaptive Microgrid Protection
Schemes and the Use of Energy Storage as a Contingency. IEEE Trans. Ind. Appl. 2018, 54, 1194–1207. [CrossRef]
17. Cintuglu, M.H.; Mohammed, O.A.; Akkaya, K.; Uluagac, A.S. A Survey on Smart Grid Cyber-Physical System Testbeds. IEEE
Commun. Surv. Tutor. 2017, 19, 446–464. [CrossRef]
18. Kang, K.; Son, S. Real-time data services for cyber physical systems. In Proceedings of the 2008 The 28th International Conference
on Distributed Computing Systems Workshops, Beijing, China, 17–20 June 2008; pp. 483–488.
19. Lin, K.; Panahi, M. A real-time service-oriented framework to support sustainable cyber-physical systems. In Proceedings of the
2010 8th IEEE International Conference on Industrial Informatics, Osaka, Japan, 13–16 July 2010; pp. 15–21.
20. Huang, H.M.; Tidwell, T.; Christopher, G.; Chenyang, L.; Xiuyu, G.; Shirley, D. Cyber-physical systems for real-time hybrid
structural testing: A case study. In Proceedings of the 1st ACM/IEEE International Conference Cyber-Physical Systems,
Stockholm, Sweden, 13–15 April 2010; pp. 69–78.
21. Venkataramanan, V.; Hahn, A.; Srivastava, A. CP-SAM: Cyber-Physical Security Assessment Metric for Monitoring Microgrid
Resiliency. IEEE Trans. Smart Grid 2020, 11, 1055–1065. [CrossRef]
22. Qian, H.; Huang, X.; Yu, H.; Chang, C.H. Real-time thermal management of 3D multi-core system with fine-grained cool-
ing control. In Proceedings of the 2010 IEEE International 3D Systems Integration Conference (3DIC), Munich, Germany,
16–18 November 2010; pp. 1–6.
23. Wu, F.; Chu, F.; Tseng, Y. Cyber-physical handshake. In Proceedings of the ACM SIGCOMM Computer Communication Review,
Toronto, ON, Canada, 15–19 August 2011; pp. 472–473.
Energies 2021, 14, 27 24 of 27
24. Miluzzo, E.; Lane, N.D.; Fodor, K.; Peterson, R.; Lu, H.; Musolesi, M.; Eisenman, S.B.; Zheng, X.; Campbell, A.T.; Campbell,
A.T.; et al. Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application.
In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, Raleigh, NC, USA, 5–7 November 2008;
pp. 337–350.
25. Craciunas, S.S.; Haas, A.; Kirsch, C.M.; Payer, H.; Röck, H.; Rottmann, A.; Sokolova, A.; Trummer, R.; Love, J.; Sengupta, R.
Information-acquisition-as-a-service for cyber-physical cloud computing. In 2nd USENIX Conference on Hot Topics in Cloud
Computing; USENIX Association: Berkeley, CA, USA, 2010; p. 14.
26. Zhang, W.; Kamgarpour, M.; Sun, D.; Tomlin, C.J. A Hierarchical Flight Planning Framework for Air Traffic Management. Proc.
IEEE 2012, 100, 179–194. [CrossRef]
27. Kim, T. Blockchain-Based Security Framework for IoT-Enabled Solar Micro Inverters: Opportunities and Challenges. In
Proceedings of the CyberPELS 2019 Presentations, Knoxville, TN, USA, 29 April–1 May 2019.
28. Available online: https://www.nrel.gov/grid/virtual-oscillator-controls.html (accessed on 20 November 2020).
29. Carlson, R.; Rohde, K. Consequence-driven Cybersecurity for High Power EV Charging Infrastructure. In Proceedings of the
CyberPELS 2019 Presentations, Knoxville, TN, USA, 1 May 2019.
30. Available online: https://inl.gov/research-programs/control-systems-cyber-security/ (accessed on 20 November 2020).
31. Saleem, D. Design Considerations of Cryptographic Module for Distributed Energy Resources. In Proceedings of the CyberPELS
2019 Presentations, Knoxville, TN, USA, 15 May 2019.
32. Available online: https://www.energy.gov/sites/prod/files/2018/12/f58/NREL%20-%20Module-OT.PDF (accessed on
20 November 2020).
33. Siddiqui, A.S.; Chowdhury, P.R.; Gui, Y.; Manjrekar, M.; Essakiappan, S.; Saqib, F. Design for Secure Reconfigurable Power
Converters. In Proceedings of the 2019 IEEE CyberPELS (CyberPELS), Knoxville, Tennessee, 29 April–1 May 2019.
34. Johnson, J. Securing Vehicle Charging Infrastructure. In Proceedings of the CyberPELS 2019 Presentations, Knoxville, TN, USA,
29 April–1 May 2019.
35. Harvey, M.; Long, D.; Reinhard, K. Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security. In Proceedings of the
2014 Power and Energy Conference at Illinois (PECI), Champaign, IL, USA, 28 February–1 March 2014; pp. 1–8.
36. Hussain, S.M.S.; Ustun, T.S.; Kalam, A. A Review of IEC 62351 Security Mechanisms for IEC 61850 Message Exchanges. IEEE
Trans. Ind. Inform. 2020, 16, 5643–5654. [CrossRef]
37. Leszczyna, R. Standards on cyber security assessment of smart grid. Int. J. Crit. Infrastruct. Prot. 2018, 22, 70–89. [CrossRef]
38. ISO/IEC. ISO/IEC 27001:2013: Information Technology Security Techniques Information Security Management Systems Requirements;
ISO: Geneva, Switzerland, 2013.
39. ISO/IEC. ISO/IEC 27002:2013: Information Technology –Security Techniques –Code of Practice for Information Security Controls; ISO:
Geneva, Switzerland, 2013.
40. Barbara, L.; Bohua, Y. GB/T 22239:2008–Information Security Technology–Baseline for Classified Protection of Information System Security;
Technical Report; National Standard of the People’s Republic of China: Beijing, China, 2008.
41. Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. NIST SP 800-82 Guide to Industrial Control Systems ICS Security
Revision 2; Technical Report; NIST: Gaithersburg, MD, USA, 2015.
42. CEN-CENELEC-ETSI Smart Grid Coordination Group, SG-CG/M490/H_Smart Grid Information Security. Technical Report.
2014. Available online: https://ec.europa.eu/energy/sites/ener/files/documents/xpert_group1_reference_architecture.pdf
(accessed on 20 November 2020).
43. NIST. NIST SP 1108r3: NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0.; Technical Report; IST:
Gaithersburg, MD, USA, 2014. [CrossRef]
44. European Commission. M/490 Smart Grid Mandate Standardization Mandate to European Standardisation Organisations ESOs
to support European Smart Grid deployment. Technical Report. 2011. Available online: https://ec.europa.eu/energy/sites/
ener/files/documents/2011_03_01_mandate_m490_en.pdf (accessed on 20 November 2020).
45. OpenSG, Security Working Group. 2017. Available online: http://osgug.ucaiug.org/utilisec (accessed on 20 November 2020).
46. DKE. German Roadmap E-Energy/Smart Grid 2.0; Technical Report; German Commission for Electrical, Electronic & Information
Technologies of DIN and VDE: Ann Arbor, MI, USA, 2013.
47. State Grid Corporation of China. SGCC Framework and Roadmap to Strong & Smart Grid Standards; Technical Report; State Grid
Corporation of China: Beijing, China, 2010.
48. IEC. Smart Grid Standards Map 2017. Available online: http://smartgridstandardsmap.com/ (accessed on 20 November 2020).
49. IEEE Standards Association. IEEE Smart Grid Interoperability Series of Standards. IEEE, 2015. Available online: http://grouper.
ieee.org/groups/scc21/2030_series/2030_series_index.html (accessed on 20 November 2020).
50. Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-physical system security for the electric power grid. Proc. IEEE 2012, 100, 210–224.
[CrossRef]
51. NIST. Guidelines for Smart Grid Cyber Security: Volume 3; Supportive Analyses and References; NIST: Gaithersburg, MD, USA, 2010.
52. Chlela, M. Cyber Security Enhancement Against Cyber-Attacks on Microgrid Controllers. Ph.D. Thesis, McGill University,
Montréal, QC, Canada, 2017.
53. Mirkovic, J.; Reiher, P. A taxonomy of DDoS attack and DDoS defense mechanisms. ACM Sigcomm Comput. Commun. Rev. 2004,
34, 39–53. [CrossRef]
Energies 2021, 14, 27 25 of 27
54. Zargar, S.T.; Joshi, J.; Tipper, D. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.
Commun. Surv. Tutor. IEEE 2013, 15, 2046–2069. [CrossRef]
55. NISTIR 7628: Guidelines for Smart Grid Cyber Security: Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements;
The Smart Grid Interoperability Panel–Cyber Security Working Group: Washington, DC, USA, 2010.
56. Liu, Y.; Reiter, M.K.; Ning, P. False data injection attacks against state estimation in electric power grids. In Proceedings of the
16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9–13 November 2009; pp. 21–32.
57. Kosut, O.; Jia, L.; Thomas, R.J.; Tong, L. Malicious Data Attacks on the Smart Grid. IEEE Trans. Smart Grid 2011, 2, 645–658.
[CrossRef]
58. Yang, Q.; Yang, J.; Yu, W.; An, D.; Zhang, N.; Zhao, W. On false data-injection attacks against power system state estimation:
Modeling and countermeasures. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 717–729. [CrossRef]
59. Chen, J.; Liang, G.; Cai, Z.; Hu, C.; Xu, Y.; Luo, F.; Zhao, J. Impact analysis of false data injection attacks on power system static
security assessment. J. Mod. Power Syst. Clean Energy 2016, 4, 496–505. [CrossRef]
60. Tan, S.; Song, W.-Z.; Stewart, M.; Yang, J.; Tong, L. Online data integrity attacks against real-time electrical market in smart grid.
IEEE Trans. Smart Grid 2018, 9, 313–322. [CrossRef]
61. Zhao, C.; He, J.; Cheng, P.; Chen, J. Analysis of consensus-based distributed economic dispatch under stealthy attacks. IEEE Trans.
Ind. Electron. 2017, 64, 5107–5117. [CrossRef]
62. Li, P.; Liu, Y.; Xin, H.; Jiang, X. A robust distributed economic dispatch strategy of virtual power plant under cyber-attacks. IEEE
Trans. Ind. Inf. 2018, 14, 4343–4352. [CrossRef]
63. Xie, L.; Mo, Y.; Sinopoli, B. Integrity Data Attacks in Power Market Operations. IEEE Trans. Smart Grid 2011, 2, 659–666. [CrossRef]
64. Thomas, R.J.; Tong, L.; Jia, L.; Kosut, O.E. Some economic impacts of bad and malicious data. PSerc 2010 Workshop 2010, 1, 1.
65. Xie, L.; Mo, Y.; Sinopoli, B. False data injection attacks in electricity markets. In Proceedings of the IEEE 2010 SmartGridComm,
Gaithersburg, MD, USA, 4–6 October 2010.
66. Jia, L.; Thomas, R.J.; Tong, L. Impacts of malicious data on real-time price of electricity market operations. In Proceedings of the
IEEE Hawaii International Conference on System Sciences (HICSS), Maui, HI, USA, 4–7 January 2012; pp. 1907–1914.
67. Liu, X.; Shahidehpour, M.; Cao, Y.; Wu, L.; Wei, W.; Liu, X. Microgrid Risk Analysis Considering the Impact of Cyber Attacks on
Solar PV and ESS Control Systems. IEEE Trans. Smart Grid 2017, 8, 1330–1339. [CrossRef]
68. Gholami, S.; Saha, S.; Aldeen, M. A cyber-attack resilient control for distributed energy resources. In Proceedings of the 2017 IEEE
PES Innovative Smart Grid Technologies Conf. Europe (ISGT-Europe), Torino, Italy, 26–29 September 2017; pp. 1–6.
69. Beg, O.A.; Johnson, T.T.; Davoudi, A. Detection of false-data injection attacks in cyber-physical DC microgrids. IEEE Trans. Ind.
Inf. 2017, 13, 2693–2703.
70. Hao, J.; Kang, E.; Sun, J.; Wang, Z.; Meng, Z.; Li, X.; Ming, Z. An Adaptive Markov Strategy for Defending Smart Grid False Data
Injection from Malicious Attackers. IEEE Trans. Smart Grid 2018, 9, 2398–2408. [CrossRef]
71. Farraj, A.; Hammad, E.; Kundur, D. On the Impact of Cyber Attacks on Data Integrity in Storage-Based Transient Stability Control.
IEEE Trans. Ind. Inf. 2017, 13, 3322–3333. [CrossRef]
72. Farraj, A.; Hammad, E.; Kundur, D. A systematic approach to delay adaptive control design for smart grids. In Proceedings of the
IEEE International Conference on Smart Grid Communications, Miami, FL, USA, 2–5 November 2015; pp. 768–773.
73. Farraj, A.; Hammad, E.; Kundur, D. Enhancing the performance of controlled distributed energy resources in noisy communication
environments. In Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, Vancouver, BC, Canada,
15–18 May 2016; pp. 1–4.
74. Farraj, A.; Hammad, E.; Kundur, D. A cyber-physical control framework for transient stability in smart grids. IEEE Trans. Smart
Grid 2016, 9, 1205–1215. [CrossRef]
75. Bobba, R.B.; Rogers, K.M.; Wang, Q.; Khurana, H.; Nahrstedt, K.; Overbye, T.J. Detecting false data injection attacks on DC state
estimation. In Proceedings of the Preprints 1st Workshop Secure Control Systems (CPSWEEK), Stockholm, Sweden, 12–15 April
2010; pp. 1–9.
76. Salmeron, J.; Wood, K.; Baldick, R. Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst. 2004, 19, 905–912.
[CrossRef]
77. Nejabatkhah, F.; Li, Y.W.; Tian, H. Power Quality Control of Smart Hybrid AC/DC Microgrids: An Overview. IEEE Access 2019,
7, 52295–52318. [CrossRef]
78. Unamuno, E.; Barrena, J.A. Hybrid ac/dc microgrids—Part II: Review and classification of control strategies. Renew. Sustain.
Energy Rev. 2015, 52, 1123–1134. [CrossRef]
79. Sou, K.C.; Sandberg, H.; Johansson, K.H. On the exact solution to a smart grid cyber-security analysis problem. IEEE Trans. Smart
Grid 2013, 4, 856–865. [CrossRef]
80. Abur, A.; Exposito, A.G. Power System State Estimation: Theory and Implementation; CRC Press: New York, NY, USA, 2004.
81. Monticelli, A. Electric power system state estimation. Proc. IEEE 2000, 88, 262–282. [CrossRef]
82. Monticelli, A. State Estimation in Electric Power Systems; Springer Science and Business Media, LLC: New York, NY, USA, 1999.
83. Liang, J.; Sankar, L.; Kosut, O. Vulnerability analysis and consequences of false data injection attack on power system state
estimation. IEEE Trans. Power Syst. 2016, 31, 3864–3872. [CrossRef]
84. Yu, Z.H.; Chin, W.L. Blind false data injection attack using PCA approximation method in smart grid. IEEE Trans. Smart Grid
2015, 6, 1219–1226. [CrossRef]
Energies 2021, 14, 27 26 of 27
85. Liu, X.; Bao, Z.; Lu, D.; Li, Z. Modeling of local false data injection attacks with reduced network information. IEEE Trans. Smart
Grid 2015, 6, 1686–1696. [CrossRef]
86. Hug, G.; Giampapa, J.A. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE
Trans. Smart Grid 2012, 3, 1362–1370. [CrossRef]
87. Zhao, J.; Zhang, G.; Dong, Z.Y.; Wong, P.K. Forecasting-aided imperfect false data injection attacks against power system nonlinear
state estimation. IEEE Trans. Smart Grid 2016, 7, 6–8. [CrossRef]
88. Liu, X.; Li, Z. False data attacks against AC state estimation with incomplete network information. IEEE Trans. Smart Grid 2017,
8, 2239–2248. [CrossRef]
89. Chakhchoukh, Y.; Ishii, H. Coordinated Cyber-Attacks on the Measurement Function in Hybrid State Estimation. IEEE Trans.
Power Syst. 2015, 30, 2487–2497. [CrossRef]
90. Zhuang, P.; Deng, R.; Liang, H. False data injection attacks against state estimation in multiphase and unbalanced smart
distribution systems. IEEE Trans. Smart Grid 2019, 10, 6000–6013. [CrossRef]
91. Deng, R.; Zhuang, P.; Liang, H. False data injection attacks against state estimation in power distribution systems. IEEE Trans.
Smart Grid 2019, 10, 2871–2881. [CrossRef]
92. Isozaki, Y.; Yoshizawa, S.; Fujimoto, Y.; Ishii, H.; Ono, I.; Onoda, T.; Hayashi, Y. Detection of Cyber Attacks Against Voltage
Control in Distribution Power Grids with PVs. IEEE Trans. Smart Grid 2016, 7, 1824–1835. [CrossRef]
93. Chen, C.; Zhang, K.; Yuan, K.; Zhu, L.; Qian, M. Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency
Control. IEEE Trans. Ind. Inform. 2018, 14, 1932–1941. [CrossRef]
94. Domínguez-García, A.D.; Hadjicostis, C.N.; Vaidya, N.H. Resilient networked control of distributed energy resources. IEEE J. Sel.
Areas Commun. 2012, 30, 1137–1148. [CrossRef]
95. Qi, J.; Hahn, A.; Lu, X.; Wang, J.; Liu, C.-C. Cybersecurity for distributed energy resources and smart inverters. IET Cyber Phys.
Syst. Theory Appl. 2016, 1, 28–39. [CrossRef]
96. Mercier, P.; Cherkaoui, R.; Oudalov, A. Optimizing a battery energy storage system for frequency control application in an
isolated power system. IEEE Trans. Power Syst. 2009, 24, 1469–1477. [CrossRef]
97. Wei, J.; Kundur, D.; Zourntos, T.; Butler-Purry, K. A flocking-based paradigm for hierarchical cyber-physical smart grid modeling
and control. IEEE Trans. Smart Grid 2014, 5, 2687–2700. [CrossRef]
98. Farraj, A.; Hammad, E.; Kundur, D. A cyber-enabled stabilizing control scheme for resilient smart grid systems. IEEE Trans. Smart
Grid 2016, 7, 1856–1865. [CrossRef]
99. Sargolzaei, A.; Yen, K.; Abdelghani, M. Delayed inputs attack on load frequency control in smart grid. In Proceedings of the IEEE
PES Innovative Smart Grid Technology Conference, Washington, DC, USA, 19–22 February 2014; pp. 1–5.
100. Esfahani, P.M.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. Cyber-attack in a two-area power system: Impact iden-
tification using reachability. In Proceedings of the 2010 American Control Conference, Baltimore, MD, USA, 30 June–2 July 2010;
pp. 962–967.
101. Esfahani, P.M.; Vrakopoulou, M.; Margellos, K.; Lygeros, J.; Andersson, G. A robust policy for automatic generation control
cyber-attack in two area power network. In Proceedings of the 49th IEEE Conference Decision Control, Atlanta, GA, USA,
15–17 December 2010; pp. 5973–5978.
102. Tan, R.; Nguyen, H.H.; Foo, E.Y.S.; Dong, X.; Yau, D.K.Y.; Kalbarczyk, Z.; Iyer, R.K.; Gooi, H.B. Optimal false data injection attack
against automatic generation control in power grids. In Proceedings of the 7th International Conference Cyber-Physical Systems,
Vienna, Austria, 11–14 April 2016; pp. 1–10.
103. Manson, S.; Anderson, D. Cybersecurity for Protection and Control Systems: An Overview of Proven Design Solutions. IEEE Ind.
Appl. Mag. 2019, 25, 14–23. [CrossRef]
104. TKim, T.; Poor, H.V. Strategic protection against data injection attacks on power grids. IEEE Trans. Smart Grid 2011, 2, 326–333.
105. Bi, S.; Zhang, Y.J. Graphical methods for defense against false-data injection attacks on power system state estimation. IEEE Trans.
Smart Grid 2014, 5, 1216–1227. [CrossRef]
106. Foroutan, S.A.; Salmasi, F.R. Detection of false data injection attacks against state estimation in smart grids based on a mixture
Gaussian distribution learning method. IET Cyber-Phys. Syst. Theory Appl. 2017, 2, 161–171. [CrossRef]
107. Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using
Kalman filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [CrossRef]
108. Liu, L.; Esmalifalak, M.; Ding, Q.; Emesih, V.A.; Han, Z. Detecting false data injection attacks on power grid by sparse optimization.
IEEE Trans. Smart Grid 2014, 5, 612–621. [CrossRef]
109. Zhao, J.; Zhang, G.; Scala, M.L.; Dong, Z.Y.; Chen, C.; Wang, J. Short-term state forecasting-aided method for detection of smart
grid general false data injection attacks. IEEE Trans. Smart Grid 2017, 8, 1580–1590. [CrossRef]
110. Xu, R.; Wang, R.; Guan, Z.; Wu, L.; Wu, J.; Du, X. Achieving efficient detection against false data injection attacks in smart grid.
IEEE Access 2017, 5, 13787–13798. [CrossRef]
111. Guan, Y.; Ge, X. Distributed attack detection and secure estimation of networked cyber-physical systems against false data
injection attacks and jamming attacks. IEEE Trans. Signal Inf. Process. Netw. 2018, 4, 48–59. [CrossRef]
112. He, Y.; Mendis, G.J.; Wei, J. Real-time detection of false data injection attacks in smart Grid: A deep learning-based intelligent
mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [CrossRef]
Energies 2021, 14, 27 27 of 27
113. Adhikari, U.; Morris, T.H.; Pan, S. Applying non-nested generalized exemplars classification for cyber-power event and intrusion
detection. IEEE Trans. Smart Grid 2016, 9, 3928–3941. [CrossRef]
114. Esmalifalak, M.; Liu, L.; Nguyen, N.; Zheng, R.; Han, Z. Detecting stealthy false data injection using machine learning in smart
grid. IEEE Syst. J. 2017, 11, 1644–1652. [CrossRef]
115. Ozay, M.; Esnaola, I.; Vural, F.T.Y.; Kulkarni, S.R.; Poor, H.V. Machine learning methods for attack detection in the smart grid.
IEEE Trans. Neural Netw. Learn. Syst. 2016, 27, 1773–1786. [CrossRef] [PubMed]
116. Khanna, K.; Panigrahi, B.K.; Joshi, A. AI-based approach to identify compromised meters in data integrity attacks on smart grid.
IET Gener. Transmiss. Distrib. 2018, 12, 1052–1066. [CrossRef]
117. Li, S.; Yilmaz, Y.; Wang, X. Quickest detection of false data injection attack in wide-area smart grids. IEEE Trans. Smart Grid 2015,
6, 2725–2735. [CrossRef]
118. Rawat, D.; Bajracharya, C. Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett.
2015, 22, 1652–1656. [CrossRef]
119. Rana, M.M.; Li, L.; Su, S.W. Cyber-attack protection and control of microgrids. IEEE/CAA J. Autom. Sin. 2017, 5, 602–609.
[CrossRef]
120. Chaojun, G.; Jirutitijaroen, P.; Motani, M. Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid
2015, 6, 2476–2483. [CrossRef]
121. Liu, T.; Sun, Y.; Liu, Y.; Gui, Y.; Zhao, Y.; Wang, D.; Shen, C. Abnormal traffic-indexed state estimation: A cyber-physical fusion
approach for smart grid attack detection. Future Gener. Comput.Syst. 2015, 49, 94–103. [CrossRef]
122. Tian, J.; Tan, R.; Guan, X.; Liu, T. Enhanced hidden moving target defense in smart grids. IEEE Trans. Smart Grid 2018,
10, 2208–2223. [CrossRef]
123. Chlela, M.; Mascarella, D.; Joos, G.; Kassouf, M. Cyber-resilient control of inverter based microgrids. In Proceedings of the
2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Washington, DC, USA, 7–9 December 2016;
pp. 841–845.
124. Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 2013,
58, 2715–2729. [CrossRef]
125. Ntalampiras, S. Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling. IEEE Trans. Ind.
Inform. 2015, 11, 104–111. [CrossRef]
126. Fawzi, H.; Tabuada, P.; Diggavi, S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE
Trans. Autom. Control 2014, 59, 1454–1467. [CrossRef]
127. Chen, Y.; Kar, S.; Moura, J.M. Cyber-physical systems: Dynamic sensor attacks and strong observability. In Proceedings of the
2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brisbane, Australia, 19–24 April 2015;
pp. 1752–1756.
128. Mo, Y.; Chabukswar, R.; Sinopoli, B. Detecting integrity attacks on SCADA systems. IEEE Trans. Control Syst. Technol. 2014,
22, 1396–1407.
129. Chen, Y.; Kar, S.; Moura, J.M. Dynamic attack detection in cyber physical systems with side initial state information. IEEE Trans.
Autom. Control 2016, 62, 4618–4624. [CrossRef]
130. Liu, S.; Liu, X.P.; el Saddik, A. Denial-of-service (DOS) attacks on load frequency control in smart grids. In Proceedings of the
2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 24–27 February 2013; pp. 1–6.
131. Liu, S.; Liu, P.X.; Wang, X. Effects of cyber-attacks on islanded microgrid frequency control. In Proceedings of the 2016 IEEE
20th International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanchang, China, 4–6 May 2016;
pp. 461–464.
132. Zhu, M.; Martinez, S. Discrete-time dynamic average consensus. Automatica 2010, 46, 322–329. [CrossRef]
133. Siddharth, S.; Manimaran, G. Model-based attack detection and mitigation for automatic generation control. IEEE Trans. Smart
Grid 2014, 5, 580–591.
134. Jin, D.; Li, Z.; Hannon, C.; Chen, C.; Wang, J.; Shahidehpour, M.; Lee, C.W. Toward a Cyber Resilient and Secure Microgrid Using
Software-Defined Networking. IEEE Trans. Smart Grid 2017, 8, 2494–2504. [CrossRef]