2005.00915
2005.00915
b Cyber Science Lab, School of Computer Science, University of Guelph, Guelph, ON,
Canada
c College of Computing and Software Engineering, Kennesaw State University, GA, USA
d Department of Mathematics and Computer Science, Brandon University, MB, Canada
Abstract
The smart grid is becoming the power systems of the next generation [1]. The
development of todays power systems is aimed towards integrating smart meters,
sensors, and advanced computing technologies [2]. This smart grid technology
greatly enhances the power generation efficiency and prompts the incorporation
of various sources of energy generation into one system [3]. The association
of smart meters and sensors along power grid networks allows the generation
centers access to real-time power demand information. This information can be
used to implement an efficient generation and distribution plan [4, 5]. As such,
integration of these technologies into power system infrastructure has greatly
increased the energy efficiency as well as reduced the price of electricity.
Several countries are investing in smart grid technologies due to its poten-
tial for great economic and social benefits [6]. However, utilizing communication
networks induces security risks and vulnerability to cyber attacks. Therefore,
cybersecurity and detection of cyber attacks is an essential part of smart grid
movement. The National Institute of Standards and Technology (NIST), the
Energy Expert Cyber Security Platform (EESCP), and the European Commis-
sion’s Smart Grids Task Force have all highlighted the importance of cybersecu-
rity in the emerging smart grid technologies [7, 8, 9]. As a result, many studies
have been published that propose cybersecurity methods and cyber attack iden-
tification.
Smart grid systems consist of various resources and technologies [10]. Smart
meters are incorporated to collect consumption data for more efficient power
distribution. Additionally, interconnection of supervisory control and data ac-
quisition (SCADA) allows for more expanded centralized distribution along large
geographical areas [11]. The smart grid also allows for interaction among trans-
mission and distribution grids, building controllers, as well as various sources
of energy generation [12, 13]. However, the integration of digital and informa-
tion technology into the smart grid and the increased complexity of the system
increases the possibility of cyber attacks and failures propagating from one sys-
2
tem to another [14]. As such, there are many challenges accompanying cyber-
security in the smart grid. Some examples include the difficulty modelling the
non-linearities and stochasticity of the system, as well as modeling the various
types of cyber attacks that can potentially inflict the system.
Many Advanced Persistent Threat (APT) actors and hacking teams are tar-
geting critical infrastructure and services [15] ranging from healthcare [16] and
safety critical systems [17] to the smart grid. Furthermore, the rise of Internet of
Things (IoT) technology which can be defined as a network of physical devices
connected to the internet. The use of such devices can help the smart grid by
supporting various network functions in power generation and storage as well
as provide connectivity between supplier and consumers [18]. The integration
of IoT devices in the smart grid also poses additional vulnerabilities to cyber
threats [19].
Various methods for cyber attack detection have been proposed in litera-
ture. Model based solutions, such as variants of state estimation techniques and
statistical-based models, have been suggested [20, 21]. Furthermore, the use of
Kalman filters for measurement estimation has been proposed to detect cyber
attacks [22, 23]. Alternatively, intelligent systems have also been proposed in
literature. The use of supervised learning was proposed for detection of false
data injection (FDI) attacks [24, 25]. While supervised machine learning tech-
niques offer higher accuracy [26], semi-supervised machine learning techniques
may rely on lesser studied features such as spatial and temporal correlation of
smart meter measurements [27].
Other machine learning based solutions have been proposed including rein-
forcement learning and deep learning algorithms. The use of Artificial Immune
Systems (AIS) coupled with an SVM to detect malicious data was proposed in
[28]. Alternatively, the use of deep learning to extract the nonlinear features
in electric load data to improve on an interval state estimation-based defense
system is also proposed in [29]. Deep learning is also implemented in real-time
detection of false data injection attacks in [30]. Additionally, deep learning is
used to analyze real time measurements from PMUs for cyber attack mitigation
3
in [31]. Recurrent Neural Networks (RNNs) are also proposed for detection of
cyber attacks by observing temporal variations in successive historical data in
[32]. Furthermore, unsupervised deep learning is also used to propose a scalable
intelligent attack detection solution in [33].
Many Advanced Persistent Threat (APT) actors and hacking teams are tar-
geting critical infrastructure and services [15] ranging from healthcare [16]and
safety critical systems [17] to the smart grid.
The variety in and complexity of cyber threats in the smart grid provoked
a large amount of solutions. Therefore, a bibliometric analysis and summary
of the up to date solutions to smart grid cybersecurity is important. Such
analysis is also lacking in literature. Several summaries and literature reviews
have already been published on the topic. For example, literature review and
a survey on smart grid cybersecurity was given in [34] and[35]. Similarly, a
systematic mapping study of cyber-physical systems has also been published
in [36]. However, these reviews have all been published before 2016 and, as
such, are outdated and do not include many of the new solutions proposed.
More recent literature reviews have been published which analyze the various
types of cyber threats in the smart grid through a survey of literature [37,
38]. Both articles, however, lack a bibliometric analysis of literature as well
as an inquiry of the attack detection methods used. There are also surveys
of smart grid cybersecurity articles [39, 40]; both of which have emphasized
cybersecurity standards and lack details regarding types of cyber attacks and
defense mechanisms.
The purpose of this paper is to identify, classify, and review existing publi-
cations on cybersecurity of the smart grid to better understand current security
mechanisms in literature. A bibliometric analysis is performed on related ar-
ticles to date, to categorize the publications by its bibliometric characteristics
such as authors and dates. This bibliometric analysis can allow researchers to
better understand the state of the art of the cybersecurity systems implemented
in the smart grid as well as the structure and characteristics of studies in this
field. Understanding patterns in research activities can improve future work
4
and research in the field of smart grid cybersecurity. To perform a successful
bibliometric evaluation, this paper aims to investigate journal articles published
between January 2010 and May 2019 in the domain of cybersecurity in the smart
grid. The paper will consider the following research questions:
2. Methodology
The methods used in this paper follow a similar process to [41], which di-
vides the bibliometric methods into two parts. First, general instructions, which
discusses the search methods and search engines used to find papers and elim-
inate possible sources of error. Next, publication analysis, which discusses the
evaluation of the publications. This method of bibliometric analysis is used in
various subjects, such as the rise of malware in the cybersecurity domain [41],
the expansion of scientific literature on women in science and higher education
[42], and literature trends in the domain of biomass energy [43]. Since this bib-
liometric method is widely used in various subjects of literature, this paper will
follow the same methodology and apply it to the domain of cybersecurity in the
smart grid.
Online research databases are used to retrieve all the relevant journal arti-
cles from January 2010 to May 2019. There are various online databases that
5
include papers in this domain. IEEE Explore and ScienceDirect are two of the
largest databases for smart grid related publications [36]. The Web of Science
(WoS) database is also commonly used since it includes publications from vari-
ous international databases [41]. The three aforementioned databases are used
with the following search query, which was chosen based on survey papers in
this field [37, 38, 39, 40]:
(”Smart Grid” AND ”Cyber Security” OR ”Cyber Attack” OR ”Cyber
Threat” OR ”False Data Injection” OR ”Attack Detection”)
Results from all databases are cross-referenced for repeated results. The
results are filtered based on their relevance to cybersecurity of the smart grid,
which is evaluated based on the abstracts of the papers. The papers excluded
from the bibliometric analysis include papers written in any language other than
English, and papers that contain the specified keywords but are not relevant to
smart grid cybersecurity. The included papers are categorized according to
timeline, journals, and authors. The papers are also categorized based on the
research output, which will be mainly measured by the frequency of key words
and phrases. Software such as Zotero and VOSviewer tool are used to sort and
visualize the bibliometric data.
3. Findings
This section discusses the findings of the bibliometric analysis on the topic
of security systems in the smart grid. Using the search query specified in the
Section 2, the three databases found a total of 2314 search results for journal
articles. After filtering duplicates, 1722 journal articles remained. Figure 1
shows that the largest number of journal articles on this topic are in the WoS
database which account for 61.2% of the findings. ScienceDirect and IEEE
Xplore databases have fewer results accounting for 30.1% and 8.67% respec-
tively. Furthermore, duplicates among the three databases accounted for 25.6%
which indicates that while some papers are mentioned in multiple databases, the
use of only one database is not a sufficient tool to represent the state-of-the-art
6
in this topic.
Figure 1: Percentage of journal articles published in each database on the topic of security
systems in the smart grid
After filtering duplicates, the 1722 journal articles are sorted by year of
publication as seen in Figure 2. The figure demonstrates the novelty of the
subject of security systems in the smart grid. Moreover, the majority of the
articles were published in the last 5 years; 30.2% of the journal articles were
published in 2018, 20.1% were published in 2017, 12.1% in 2016, and 8.2%
and 11.6% were published in 2014 and 2015 respectively. Furthermore, the
upward trend in publications over time demonstrates substantial growth in this
research topic. Additionally, the small number of publications prior to 2010 show
that security systems in the smart grid is a field of study that only recently
commenced; meaning that there are likely several uncertainties and much to
explore in this research field.
To study the contributions of different journals to the topic of security sys-
tems in the smart grid, the articles are sorted by journal of publication. Table
1 shows the 40 most prominent journals in this research field, sorted by number
of publications. These results demonstrate that while some journals hold more
publications in this field than others, the research papers are spread out among
7
Figure 2: Number of journal articles on security systems of the smart grid published every
year
8
IEEE Transactions on Information Forensics and Security 25 1.45%
Ad Hoc Networks 21 1.22%
Energy Procedia 20 1.16%
Sensors 20 1.16%
Journal of Network and Computer Applications 19 1.10%
Neurocomputing 19 1.10%
Electric Power Systems Research 18 1.05%
IFAC Proceedings Volumes 17 0.99%
Computer Communications 16 0.93%
Computers & Electrical Engineering 16 0.93%
Energy Policy 15 0.87%
Expert Systems with Applications 15 0.87%
IEICE Transactions on Information and Systems 15 0.87%
Wireless Personal Communications 15 0.87%
Journal of the Franklin Institute 14 0.81%
Information Sciences 13 0.75%
International Journal of Distributed Sensor Networks 13 0.75%
Procedia Technology 13 0.75%
Automatica 12 0.70%
IEEE Communications Surveys & Tutorials 11 0.64%
IEEE Transactions on Industrial Informatics 11 0.64%
Multimedia Tools and Applications 11 0.64%
IEEE Transactions on Power Systems 10 0.58%
Journal of Information Security and Applications 10 0.58%
Sustainable Energy, Grids and Networks 10 0.58%
Energy 9 0.52%
International Journal of Security and Its Applications 9 0.52%
Technological Forecasting and Social Change 9 0.52%
Energies 8 0.46%
Aside from journals, articles are also sorted and analyzed based on author.
9
Table 2 shows the 40 authors with the most publications in security systems of
the smart grid. The author with the most publications in this research field,
Kim-Kwang Raymond Choo, has authored 1.16% of the publications found.
The authors with the second and third most publications, Xuan Liu and Zuyi
Li, have authored 0.58% and 0.52% of the journal articles respectively. The low
percentage of publications for the most prominent authors in the field shows that
security systems in the smart grid is a vastly growing field that is gaining interest
from various authors around the world. Furthermore, there are 4952 authors
who contributed to the 1722 journal articles analyzed. This demonstrates the
high demand for research advancement in the topic of security systems in the
smart grid.
10
Alcaraz, Cristina 5 0.29%
Elovici, Yuval 5 0.29%
Guizani, Mohsen 5 0.29%
Han, Zhu 5 0.29%
Janicke, Helge 5 0.29%
Kundur, Deepa 5 0.29%
Liu, Anfeng 5 0.29%
Qian, Yi 5 0.29%
Qiu, Meikang 5 0.29%
Vasilakos, Athanasios V. 5 0.29%
Wang, Jianhui 5 0.29%
Wang, Wei 5 0.29%
Wazid, Mohammad 5 0.29%
Xiang, Yang 5 0.29%
Yu, Wei 5 0.29%
Amjad, Muhammad Faisal 4 0.23%
Anwar, Zahid 4 0.23%
Bou-Harb, Elias 4 0.23%
Bretas, Arturo S. 4 0.23%
Cai, Zhongmin 4 0.23%
Chen, Jiming 4 0.23%
Chilamkurti, Naveen 4 0.23%
Czajka, Adam 4 0.23%
Du, Xiaojiang 4 0.23%
11
demonstrates the main concepts associated with this research field.
Figure 3: A heat-map of keywords mentioned in all journal articles in the subject of smart
grid cybersecurity
12
4. Reported Attacks on the Smart Grid
There have been several documented attacks on the electric grid attributed
to cyber attacks. In January 2003, the computer network at the Davis-Besse
nuclear plant in Oak Harbor, Ohio was compromised by a malware disabling its
processing computer and safety monitoring system for several hours [44]. Simi-
larly, circulation pumps at the Brown Ferry nuclear plant in Alabama failed due
to excessive traffic, believed to be attributed to a DoS attack [44]. Furthermore,
an investigation in 2009 revealed that hackers are able to steal power through
compromising the smart meters and changing the consumption readings [45].
Phishing incidents have also been reported at electric bulk providers and mal-
ware samples were found indicating a targeted and sophisticated intrusion [44].
Additionally, in April of 2012, the FBI was asked to investigate widespread in-
cidents of power thefts through smart meter attacks [45]. The report indicates
that hackers changed the power consumption of smart meters using software
available easily on the internet.
Such incidents in recent history induce various security concerns regarding
critical infrastructure. As such, it is crucial that security of the smart grid is
explored at every level including adequate situational awareness at all times. In
fact, lack of situational awareness can have devastating impacts beyond cyber
threats. For example, in August of 2003, a blackout occurred in the north east
of the United States due to a cascading failure of the power system due to
the lack of awareness of the Ohio-based electric utility company. This lack of
awareness resulted in a cascading failure of 508 generators and 265 power plants
across eight states and southern Ontario [45]. This clearly shows how adequate
security systems can have benefits beyond mitigating cyber threats, including
minimizing damage from faults or incidents.
This section examines the security threats facing the smart grid, as well as
the state of the art of the current countermeasures of these threats. Subsection
13
Figure 4: The number of journal articles studying each attack type
5.1 discusses the specific types of cyber threats in power systems, and subsection
5.2 discusses the defense mechanisms proposed in literature.
Cyber threats or cyber attacks are among the most discussed and studied
threats for the smart grid [37]. The wide interest in studying cyber threats in
the smart grid is due to the number of significant vulnerabilities identified [46].
Furthermore, cyber attacks have the potential of leading power systems into
total collapse [47]. These cyber attacks can occur for various purposes and are
generally divided into two main types: Passive Attacks and Active Attacks [48].
Passive attacks include eavesdropping, spying, and traffic analysis; while active
attacks include denial of service (DoS) and malware attacks.
The various types of attacks are not equally studied in literature. Figure 4
shows the number of articles studying each type of attack. While there are more
14
types of cyber threats that can compromise a network, the following sections
discuss the attacks studied in the smart grid, which are mentioned in Figure 4.
15
ARP spoofing [55]. This allows the attacker to capture the communication
information within the SCADA system [56].
5.1.5. Malware
The propagation of malicious software, known as malware, is another poten-
tial cyber threat to the smart grid [60]. One paper tests security methods for
three different types of malware, pandemic malware, endemic malware, and con-
tagion malware [61]. Pandemic malware is an aggressive malware that infects
all devices in the shortest time possible through a topological scan strategy. En-
demic malware, however, is the more intelligent type which sacrifices speed for
stealth by operating with less conspicuous hit list. Finally, contagion malware
is highly stealth and does not initiate connections with the network but rather
appends on legitimate communication flows.
The dangers of malware are accentuated in the communication layer of the
smart grid. It has been noted that thousands of smart meters may feature
identical hardware and firmware [62]. While this reduces cost and automates
maintenance, the closeness in device types and software induces susceptibility
to malware propagation.
16
current state estimation techniques [65]. Furthermore, these attacks can be
created in various strategies with limited knowledge of power system topology
[66, 67, 68]. As such, these types of attacks are widely studied in the smart grid
cybersecurity field [63, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75].
• discovery
• detection
• denial
• disruption
• degradation
• destruction
The following subsections of Subsection 5.2 will discuss each of the compo-
nents and their proposed methods in literature.
5.2.1. Discovery
The discovery process in cybersecurity involves identifying and locating sen-
sitive data for adequate protection. In general applications of cybersecurity,
data discovery consists of auditing regulated information to ensure its protec-
tion. This is helpful because it enables context aware security, in which infor-
mation within the system is protected based on its sensitivity. In smart grid
17
security, the discovery phase mainly consists of identification of vulnerabilities
within the system.
Various methods are proposed in literature for vulnerability analysis in power
grids. One paper proposes an automated binary-based vulnerability discovery
method that extracts security-related features from the system [79]. This au-
tomatic discovery algorithm is tested on real smart meter data from Korean
infrastructure. Vulnerability analysis specific to certain types of environments
or threats are also proposed. In another paper, the survivability of smart grid
under is modeled under random and targeted attacks considering a networking
islanding scheme [80]. Another paper uses automatic static analysis (ASA) to
detect buffer-overflow vulnerabilities of terminal devices [81]. Such automated
techniques for vulnerability analysis can be useful due to their robustness and
scalability to larger systems. As such, a comprehensive assessment of vulner-
abilities in the smart grid from past to future has been published highlighting
the various vulnerabilities and discovery techniques [82].
More specific vulnerability modeling is also proposed in literature. One such
work models the vulnerabilities of the smart grid with incomplete topology in-
formation [83]. The results of this paper demonstrate the high level of threat in
the smart grid by exhibiting vulnerabilities that can be exploited with limited
knowledge of the system. Another paper reveals the cascading failure vulnera-
bility in the smart grid using a novel metric, called risk graph, which shows the
importance of nodes within the system as well as the relationship among them
[84]. Using this method, Zhu et al. develop a new node attack strategy and
introduce new vulnerabilities not considered before in literature.
Vulnerability analyses are also performed on specific attacks. One paper
performs a vulnerability analysis of the smart grid to GPS spoofing, a type
of attack capable of altering measurements to mislead network operators [50].
Another paper analyzes the vulnerability for simultaneous attacks in the smart
grid [85]. Paul and Ni consider various combinations of attacks and proposes a
new damage measurement matrix to quantify the loss of generation power and
time to reach steady-state. Web-based threats are also considered in another
18
paper which tackles the penetration of digital devices in the smart grid and the
associated consequences [86].
Most articles assess the vulnerability of the smart grid by analyzing either
substations or transmission lines. One article, however, performs a vulnera-
bility assessment on a joint substation and transmission line system in which
attacks can happen in either the substation, the transmission line, or both [87].
Another article takes into account scenarios of severe emergencies in the smart
grid and SCADA network and performs a vulnerability analysis of the system
under emergencies such as attacks from weapons of mass destruction (WMD)
[88]. Chopade and Bikdash analyze structural vulnerabilities, which consider in-
frastructures topology, and functional vulnerabilities, which consider operating
regimes of different infrastructures.
As demonstrated by the aforementioned articles, there is sufficient analysis
on vulnerabilities in the smart grid. Various attack strategies are identified
and implemented in literature that demonstrate the potential of cyber threats.
Detection and mitigation of some of these threats remains as a gap in this
research field. Next, we discuss the detection mechanisms proposed as well as
the future trend in these methods.
19
grid [92, 25]. As such, the use of intelligent systems and machine learning for
detecting cyber attacks is proposed. Supervised and unsupervised learning have
been tested and compared to conclude that supervised learning approaches gen-
erally result in more accurate classification of attacks [93]. Various supervised
learning algorithms have been successfully implemented [94, 95]. The results of
comparing these learning algorithms demonstrate that a Gaussian-based Sup-
port Vector Machine (SVM) is more robust with more accurate classification
among larger test systems [95]. Furthermore, another paper implemented the
margin setting algorithm (MSA) demonstrating better results than SVM and
artificial neural networks (ANN) [96, 25]. Other intelligent techniques include
adaboost, random forests, and common path mining method [97, 98, 99].
A critical concern in the use of intelligent systems in smart grid is computa-
tional efficiency [100, 101]. Many researchers try to tackle this issue by reducing
the dimensions of the data through principal component analysis [93, 94]. One
paper proposes the use of a genetic algorithm to select an ideal subset of fea-
tures that can increase the computation speed while maintaining the detection
accuracy of the machine learning algorithms [102]. Exploring various feature
selection techniques can be effective at increasing the computational efficiency
of machine learning algorithms. However, there have not been many papers
exploring this subject in the area of smart grid cybersecurity. As such, deep
learning techniques with automated or unsupervised feature selection methods
are likely to be proposed to tackle the computational burden of larger power
systems.
20
for encryption and decryption [10, 104]. Asymmetric key encryption requires
a larger computational capacity and is therefore not suitable for time-sensitive
information. Symmetric key encryption does not induce significant computa-
tional delay. However, it requires a public infrastructure for key management.
Therefore, it is suitable for encryption of distribution and transmission systems
[105, 106, 107].
Various encryption and key management methods have been proposed. One
scheme is based on Needham-Shroeder authentication protocol and elliptic curve
cryptographic algorithms for generating public keys [108]. Another scheme uses
digital certificates to establish symmetric communication sessions [105]. Ad-
ditionally, another authentication method is proposed that is based on S/key
one-time password scheme aimed to provide mutual authentication between the
meters and servers of the smart grid [109]. Mutual authentication between
smart grid utility network and Home Area Network (HAN) smart meters is
also explored through a novel key management protocol [110]. The proposed
mechanism aims at preventing various attacks including Brute-force, Replay,
Man-in-The-Middle, and Denial-of-Service attacks. Furthermore, encryption of
specific variables and measurements is also studied, specifically pertaining to
FDI attacks [111, 112, 112].
Choosing appropriate key management schemes is done by considering the
trade-off between security and computational efficiency. However, other issues
pertaining denial of attacks arise from the distributed nature of smart grid sys-
tems. One paper proposes an efficient framework to read isolated smart grid de-
vices that satisfies the hardware constraints while maintaining integrity against
most typical attacks [113]. Another protocol is proposed for preserving privacy
through aggregation of metering data in distributed scenarios and encryption
of measurements using a secret sharing scheme [114].
Other denial techniques are proposed in literature include increasing situa-
tional awareness to prevent attacks. One paper proposes specific measures to
tackle issues that lead to lack of awareness among smart grid operators. Such
measures include separate networks for actuators and sensors and restricting the
21
use of real time clocks to write-only data storage [115]. Another paper proposes
a different proactive defense approach which consists of randomizing meter in-
frastructure configurations to lower the predictability of the system to potential
adversaries [116]. While there are many approaches to deny or prevent cyber
threats, further research is likely necessary due to the continuous improvement
and modifications of adversarial techniques.
22
theory to analyze such attacks. Similarly, a game-theoretic perspective of data
injection attacks with multiple adversaries is also studied [124].
There is also focus on the disruption of specific common attacks in the smart
grid. Game theory based defense strategies against DoS attacks are proposed
which use Nash Equilibrium to maintain dynamic stability in an attacked system
[125, 126]. Minimizing the effects of jamming attacks is also studied through a
modified version of contract network protocol (CNP) as a negotiation protocol
among agents [127]. Results of this paper indicate that applying the proposed
protocol can reduce the jammers illegal profit and decrease their motive. The
problem with most of the proposed game theory techniques, however, is their
tendency to view network interdictions as one-time events. Further research in
this topic is likely to take shape as more comprehensive modeling of network
interdictions occurs. There are few papers in literature that take this into
consideration. One paper, however, uses zero-sum Markov games and a more
comprehensive model of attacker behavior [128]. This paper also demonstrates
a defender can use deception as a defense mechanism. Next, we discuss the
deception techniques proposed in literature, which when combined with the
aforementioned disruption techniques, can act as a comprehensive strategy for
mitigating attacks.
23
equilibriums is proved. However, this method was designed and tested for one
specific type of attack. A more general honeypot system is proposed to emulate
an entire smart grid field communication infrastructure in [130]. This paper
claims that their honeynet system can emulate high-fidelity and realistic power
grid behavior to deceive the attackers. However, evaluation of its realism and
scalability are only preliminary and testing was done on a single simulated sys-
tem. Another paper identifies the various types of honeypots and built a test
system to emulate a device on a utility network [131]. However, similarly to
the aforementioned papers, analysis regarding realism and scalability are insuf-
ficient. This is identified as a research gap in the deception strategies for smart
grid security. Future research is expected to involve more comprehensive system
modeling and the proposal of more versatile honeynet systems.
24
theory approaches, as mentioned in Subsection 5.2.4. As such, defense solutions
that only focus on degradation of attacks are limited. Furthermore, due to the
legal implications, there are no solutions proposed that focus on destroying the
attack through hostile actions towards the adversary. Therefore, most solutions
in literature focus on denying, detecting, and minimizing the effect of attacks.
6. Conclusion
References
[1] X. Fang, S. Misra, G. Xue, D. Yang, Smart grid the new and improved
power grid: A survey, IEEE Communications Surveys Tutorials 14 (4)
25
(2012) 944–980. doi:10.1109/SURV.2011.101911.00087.
[3] M. C. Such, C. Hill, Battery energy storage and wind energy integrated
into the smart grid, in: 2012 IEEE PES Innovative Smart Grid Technolo-
gies (ISGT), 2012, pp. 1–4. doi:10.1109/ISGT.2012.6175772.
26
[8] E. E. C. S. Platform, Recommendations for the european commission on
a european strategic framework and potential future legislative acts for
the energy sector, Tech. rep., EECSP (2017).
27
ries, Methods, Tools and Technologies, 2019, pp. 221–244. doi:10.1007/
978-3-030-00024-0_12.
[20] A. Tajer, S. Kar, H. V. Poor, S. Cui, Distributed joint cyber attack detec-
tion and state recovery in smart grids, in: 2011 IEEE International Con-
ference on Smart Grid Communications (SmartGridComm), IEEE, Brus-
sels, Belgium, 2011, pp. 202–207. doi:10.1109/SmartGridComm.2011.
6102319.
URL http://ieeexplore.ieee.org/document/6102319/
[21] Shuguang Cui, Zhu Han, S. Kar, T. T. Kim, H. V. Poor, A. Tajer, Coordi-
nated Data-Injection Attack and Detection in the Smart Grid: A Detailed
Look at Enriching Detection Solutions, IEEE Signal Processing Magazine
29 (5) (2012) 106–115. doi:10.1109/MSP.2012.2185911.
URL http://ieeexplore.ieee.org/document/6279584/
28
[22] D. B. Rawat, C. Bajracharya, Detection of False Data Injection Attacks
in Smart Grid Communication Systems, IEEE Signal Processing Letters
22 (10) (2015) 1652–1656. doi:10.1109/LSP.2015.2421935.
URL http://ieeexplore.ieee.org/document/7084114/
29
doi:10.1109/TSG.2011.2159818.
URL http://ieeexplore.ieee.org/document/5963752/
30
[34] T. Baumeister, Literature review on smart grid cyber security, Depart-
ment of Information and Computer Sciences, University of Hawaii.
31
URL https://linkinghub.elsevier.com/retrieve/pii/
S0167404818302803
32
pp. 1–39. doi:10.1007/978-1-4471-6663-4_1.
URL https://doi.org/10.1007/978-1-4471-6663-4_1
[52] J. Zhao, J. Wang, L. Yin, Detection and control against replay attacks
in smart grid, in: 2016 12th International Conference on Computational
Intelligence and Security (CIS), 2016, pp. 624–627. doi:10.1109/CIS.
2016.0151.
[53] T. Tran, O. Shin, J. Lee, Detection of replay attacks in smart grid sys-
tems, in: 2013 International Conference on Computing, Management and
Telecommunications (ComManTel), 2013, pp. 298–302. doi:10.1109/
ComManTel.2013.6482409.
33
[55] D. Sharma, O. Khan, N. Manchanda, Detection of ARP Spoofing: A
command line execution method, in: 2014 International Conference on
Computing for Sustainable Global Development (INDIACom), 2014, pp.
861–864. doi:10.1109/IndiaCom.2014.6828085.
[59] C. Bekara, Security issues and challenges for the iot-based smart
grid, Procedia Computer Science 34 (2014) 532 – 537, the 9th
International Conference on Future Networks and Communica-
tions (FNC’14)/The 11th International Conference on Mobile Sys-
tems and Pervasive Computing (MobiSPC’14)/Affiliated Workshops.
doi:https://doi.org/10.1016/j.procs.2014.07.064.
URL http://www.sciencedirect.com/science/article/pii/
S1877050914009193
34
[61] P. Eder-Neuhauser, T. Zseby, J. Fabini, Malware propagation in smart
grid networks: metrics, simulation and comparison of three malware
types, Journal of Computer Virology and Hacking Techniquesdoi:10.
1007/s11416-018-0325-y.
[63] J. Tian, B. Wang, X. Li, Data-Driven and Low-Sparsity False Data Injec-
tion Attacks in Smart Grid, Security and Communication Networks 2018
(2018) 1–11. doi:10.1155/2018/8045909.
URL https://www.hindawi.com/journals/scn/2018/8045909/
[65] X. Liu, Z. Li, False data attack models, impact analyses and defense
strategies in the electricity grid, The Electricity Journal 30 (4) (2017)
35–42. doi:10.1016/j.tej.2017.04.001.
URL http://www.sciencedirect.com/science/article/pii/
S1040619017300684
[66] X. Liu, Z. Li, False Data Attacks Against AC State Estimation With
Incomplete Network Information, IEEE Trans. Smart Grid 8 (5). doi:
10.1109/TSG.2016.2521178.
URL http://ieeexplore.ieee.org/document/7401110/
35
[68] H. Zhong, D. Du, C. Li, X. Li, A Novel Sparse False Data Injection At-
tack Method in Smart Grids with Incomplete Power Network Information,
Complexity 2018 (2018) 8503825–8503825. doi:10.1155/2018/8503825.
[71] L. Che, X. Liu, Z. Li, Y. Wen, False Data Injection Attacks Induced
Sequential Outages in Power Systems, IEEE Trans. Power Syst. 34 (2)
(2019) 1513–1523. doi:10.1109/TPWRS.2018.2871345.
URL https://ieeexplore.ieee.org/document/8468098/
[72] J.-W. Kang, I.-Y. Joo, D.-H. Choi, False Data Injection Attacks on Con-
tingency Analysis: Attack Strategies and Impact Assessment, IEEE Ac-
cess 6 (2018) 8841–8851. doi:10.1109/ACCESS.2018.2801861.
URL http://ieeexplore.ieee.org/document/8281015/
[73] Y. Li, D. Shi, T. Chen, False Data Injection Attacks on Networked Control
Systems: A Stackelberg Game Analysis, IEEE Trans. Automat. Contr.
63 (10) (2018) 3503–3509. doi:10.1109/TAC.2018.2798817.
URL https://ieeexplore.ieee.org/document/8270717/
36
URL http://www.sciencedirect.com/science/article/pii/
S1570870514001061
[75] Y. Liu, J. Ma, L. Song, Z. Han, Jamming Attack in Smart Grid with
Dynamic Gaming Theory, 2014.
37
[81] H. Ying, Y. Zhang, L. Han, Y. Cheng, J. Li, X. Ji, W. Xu, Detect-
ing Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic
Static Analysis, in: 2019 IEEE 3rd Information Technology, Networking,
Electronic and Automation Control Conference (ITNEC), 2019, pp. 813–
817. doi:10.1109/ITNEC.2019.8729362.
38
tions on Information Forensics and Security 10 (5) (2015) 1010–1024.
doi:10.1109/TIFS.2015.2394240.
[92] Yilin Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, Heejo Lee, A. Perrig,
B. Sinopoli, CyberPhysical Security of a Smart Grid Infrastructure, Proc.
IEEE 100 (1) (2012) 195–209. doi:10.1109/JPROC.2011.2161428.
URL http://ieeexplore.ieee.org/document/6016202/
39
Transactions on Neural Networks and Learning Systems 27 (8) (2016)
1773–1786. doi:10.1109/TNNLS.2015.2404803.
[95] J. Yan, B. Tang, H. He, Detection of false data attacks in smart grid
with supervised learning, in: 2016 International Joint Conference on Neu-
ral Networks (IJCNN), 2016, pp. 1395–1402. doi:10.1109/IJCNN.2016.
7727361.
[98] S. Li, Y. Ylmaz, X. Wang, Quickest detection of false data injection attack
in wide-area smart grids, IEEE Transactions on Smart Grid 6 (6) (2015)
2725–2735. doi:10.1109/TSG.2014.2374577.
40
URL http://www.sciencedirect.com/science/article/pii/
S2214212618304617
[108] D. Wu, C. Zhou, Fault-Tolerant and Scalable Key Management for Smart
Grid, IEEE Transactions on Smart Grid 2 (2) (2011) 375–381. doi:10.
1109/TSG.2011.2120634.
41
[110] H. Nicanfar, P. Jokar, V. C. M. Leung, Smart grid authentication and key
management for unicast and multicast communications, in: 2011 IEEE
PES Innovative Smart Grid Technologies, 2011, pp. 1–8. doi:10.1109/
ISGT-Asia.2011.6167151.
42
[117] P. Srikantha, D. Kundur, A DER Attack-Mitigation Differential Game
for Smart Grid Security Analysis, IEEE Transactions on Smart Grid 7 (3)
(2016) 1476–1485. doi:10.1109/TSG.2015.2466611.
[122] L. Wei, A. I. Sarwat, W. Saad, S. Biswas, Stochastic Games for Power Grid
Protection Against Coordinated Cyber-Physical Attacks, IEEE Trans-
actions on Smart Grid 9 (2) (2018) 684–694. doi:10.1109/TSG.2016.
2561266.
43
[124] A. Sanjab, W. Saad, Data Injection Attacks on Smart Grids With Multiple
Adversaries: A Game-Theoretic Perspective, IEEE Transactions on Smart
Grid 7 (4) (2016) 2038–2049. doi:10.1109/TSG.2016.2550218.
[127] J. Ma, Y. Liu, L. Song, Z. Han, Multiact Dynamic Game Strategy for
Jamming Attack in Electricity Market, IEEE Transactions on Smart Grid
6 (5) (2015) 2273–2282. doi:10.1109/TSG.2015.2400215.
44
[132] O. Vukovic, K. C. Sou, G. Dan, H. Sandberg, Network-Aware Mitiga-
tion of Data Integrity Attacks on Power System State Estimation, IEEE
Journal on Selected Areas in Communications 30 (6) (2012) 1108–1118.
doi:10.1109/JSAC.2012.120709.
45