Abstract
Cyber-physical attacks are become more challenging in each passing days owing to the continuous advancement of smart-grid systems. In the present industrial revolution, the smart grid is integrated with a wide-range of technologies, equipment/devices and tools/software to make the system more trustworthy, reliable, efficient, and cost-effective. Regardless of achieving these objectives, the peril area for the critical attacks has also been stretched owing to the add-on cyber-layers. In order to detect and mitigate these attacks, the machine learning (ML) tools are being reliably and massively used. In this chapter, the authors have reviewed several state-of-the-art related researches comprehensively. The advantages and disadvantages of each ML based schemes are identified and reported in this chapter. Finally, the authors have presented the shortcomings of the existing researches and possible future research direction based on their investigation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
https://www.iea.org/energy-system/electricity/smart-grids [Accessed on June 28 2023]
https://www.nsgm.gov.in/en/smart-grid [Accessed on July 12, 2023]
Kim, Y., Hakak, S., Ghorbani, A.: Smart grid security: Attacks and defence techniques. IET Smart Grid 6(2), 103–123 (2023)
Canadian Institute for Cybersecurity (CIC): Operational Technology (OT) Forensics, pp. 1–141. University of New Brunswick (2019)
Stouffer, K., Falco, J., Scarfone, K.: Guide to Industrial Control Systems (ICS) Security (No. NIST Special Publication (SP) 800‐82 (Retired Draft)). National Institute of Standards and Technology
Wang, Y., et al.: Analysis of smart grid security standards. In: Proc. Int. Conf. Computer Science and Automation Engineering, Shanghai, China, June 2011, pp. 697–701
https://www.nwkings.com/objectives-of-cyber-security [Accessed on July 15, 2023]
https://sprinto.com/blog/cyber-security-goals/# What_are_Cyber_Security _Goals_or_Objectives [Accessed on July 18, 2023]
Chen, B., Wang, J., Shahidehpour, M.: Cyber–physical perspective on smart grid design and operation. IET Cyber-Physical Systems: Theory & Applications 3(3), 129–141 (2018)
Guo, Q., Hiskens, I., Jin, D., Su, W., Zhang, L.: Editorial: cyberphysical Systems in Smart Grids: security and operation. IET Cyber-Physical Systems: Theory & Applications 2(4), 153–154 (2017)
Patnaik, B., Mishra, M., Bansal, R.C., Jena, R.K.: AC microgrid protection–A review: Current and future prospective. Appl. Energy 271, 115210 (2020)
Mishra, M., Patnaik, B., Biswal, M., Hasan, S., Bansal, R.C.: A systematic review on DC-microgrid protection and grounding techniques: Issues, challenges and future perspective. Appl. Energy 313, 118810 (2022)
Spring, J. M., Fallon, J., Galyardt, A., Horneman, A., Metcalf, L., & Stoner, E. (2019). Machine Learning in Cybersecurity: A Guide. SEI Carnegie Mellon Technical Report CMU/SEI-2019-TR-005.
Apruzzese, G., Laskov, P., Montes de Oca, E., Mallouli, W., Brdalo Rapa, L., Grammatopoulos, A.V., Di Franco, F.: The role of machine learning in cybersecurity. Digital Threats: Research and Practice 4(1), 1–38 (2023)
Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, Alessandro Guido, and Mirco Marchetti. 2018. On the effectiveness of machine and deep learning for cybersecurity. In Proceedings of the IEEE International Conference on Cyber Conflicts. 371–390.
Giovanni Apruzzese, Michele Colajanni, Luca Ferretti, and Mirco Marchetti. 2019. Addressing adversarial attacks against security systems based on machine learning. In Proceedings of the IEEE International Conference on Cyber Conflicts. 1–18.
Kasun Amarasinghe, Kevin Kenney, and Milos Manic. 2018. Toward explainable deep neural network based anomaly detection. In Proceedings of the IEEE International Conference Human System Interaction. 311–317.
Baig, Z.A., Amoudi, A.R.: An analysis of smart grid attacks and countermeasures. J. Commun. 8(8), 473–479 (2013). https://doi.org/10. 12720/jcm.8.8.473‐479
Bou‐Harb, E., et al.: Communication security for smart grid distribution networks. IEEE Commun. Mag. 51(1), 42–49 (2013). https://doi.org/10. 1109/mcom.2013.6400437
Hansen, A., Staggs, J., Shenoi, S.: Security analysis of an advanced metering infrastructure. Int. J. Crit. Infrastruct. Protect. 18, 3–19 (2017). https://doi.org/10.1016/j.ijcip.2017.03.004
Wang, K., et al.: Strategic honeypot game model for distributed denial of service attacks in smart grid. IEEE Trans. Smart Grid. 8(5), 2474–2482 (2017). https://doi.org/10.1109/tsg.2017.2670144
Farraj, A., Hammad, E., Kundur, D.: A distributed control paradigm for smart grid to address attacks on data integrity and availability. IEEE Trans. Signal Inf. Process. Netw. 4(1), 70–81 (2017). https://doi.org/10. 1109/tsipn.2017.2723762
Chen, P.Y., Cheng, S.M., Chen, K.C.: Smart attacks in smart grid communication networks. IEEE Commun. Mag.Commun. Mag. 50(8), 24–29 (2012). https://doi.org/10.1109/mcom.2012.6257523
Sanjab, A., et al.: Smart grid security: threats, challenges, and solutions. arXiv preprint arXiv: 1606.06992
Liu, S.Z., Li, Y.F., Yang, Z.: Modeling of cyber‐attacks and defenses in local metering system. Energy Proc. 145, 421–426 (2018). https://doi.org/10.1016/j.egypro.2018.04.069
Sun, C.C., et al.: Intrusion detection for cybersecurity of smart meters. IEEE Trans. Smart Grid. 12(1), 612–622 (2020). https://doi.org/10. 1109/tsg.2020.3010230
Bansal, G., Naren, N., Chamola, V.: RAMA: real‐time automobile mutual authentication protocol using PUF. In: Proc. Int. Conf. Cloud Computing Environment Based on Game Theory, Barcelona, Spain, January 2020, pp. 265–270
Bhattacharjee, S., et al.: Statistical security incident forensics against data falsification in smart grid advanced metering infrastructure. In: Proc. Int. Conf. Data and Application Security and Privacy, Scottsdale, USA, March 2017, pp. 35–45
Wei, L., et al.: Stochastic games for power grid protection against co-ordinated cyber-physical attacks. IEEE Trans. Smart Grid. 9(2), 684–694 (2018). https://doi.org/10.1109/tsg.2016.2561266
“Shodan,” https://www.shodan.io/. [Accessed on August 8, 2023]
Mashima, D., Li, Y., & Chen, B. (2019, December). Who's scanning our smart grid? empirical study on honeypot data. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). IEEE.
Liu, N., et al.: A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans. Ind. Electron. 60(10), 4746–4756 (2012). https://doi.org/10.1109/tie.2012.2216237
Liu, X., et al.: A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Trans. Smart Grid. 6(5), 2435–2443 (2015). https://doi.org/10.1109/tsg.2015.2418280
Lee, S.: Security and privacy protection of vehicle-to-grid technology for electric vehicle in smart grid environment. J. Convergence Culture Technol. 6(1), 441–448 (2020)
Park, K.S., Yoon, D.G., Noh, S.: A secure authentication and key agreement scheme for smart grid environments without tamper-resistant devices. J. Korea Inst. Inf. Secur. Cryptol. 30(3), 313–323 (2020)
Kaveh, M., Martín, D., Mosavi, M.R.: A lightweight authentication scheme for V2G communications: a PUF-based approach ensuring cyber/physical security and identity/location privacy. Electronics 9(9), 1479 (2020). https://doi.org/10.3390/electronics9091479
Zhang, L., et al.: A lightweight authentication scheme with privacy protection for Smart Grid communications. Future Generat. Comput. Syst. 100, 770–778 (2019). https://doi.org/10.1016/j.future.2019.05.069
Go, Y.M., Kwon, K.H.: Countermeasure of SIP impersonation attack using a location server. J. Korea Contents Assoc. 13(4), 17–22 (2013). https://doi.org/10.5392/jkca.2013.13.04.017
Roberts, B., et al.: An authentication framework for electric vehicle‐to‐ electric vehicle charging applications. In: Proc. Int. Conf. Mobile Ad Hoc and Sensor Systems, Orlando, USA, November 2017, pp. 565–569
Guo, Z., et al.: Time synchronization attack and countermeasure for multisystem scheduling in remote estimation. IEEE Trans. Automat. Control. 66(2), 916–923 (2020). https://doi.org/10.1109/tac.2020.2997318
Chan, A.C.F., Zhou, J.: A secure, intelligent electric vehicle ecosystem for safe integration with smart grid. IEEE Trans. Intell. Transport. Syst. 16(6), 3367–3376 (2015). https://doi.org/10.1109/tits.2015.2449307
Kakei, S., et al.: Cross-certification towards distributed authentication infrastructure: a case of hyperledger fabric. IEEE Access. 8, 135742–135757 (2020). https://doi.org/10.1109/access.2020.3011137
Li, Q., et al.: A risk assessment method of smart grid in cloud computing environment based on game theory. In: Proc. Int. Conf. Cloud Computing and Big Data Analytics, Chengdu, China, April 2020, pp. 67–72
Shen, S., Tang, S.: Cross‐domain grid authentication and authorization scheme based on trust management and delegation. In: Proc. Int. Conf. Computational Intelligence and Security, Suzhou, China, December 2008, pp. 399–404
Chu, Z., et al.: Game theory based secure wireless powered D2D communications with cooperative jamming. In: Proc. Int. Conf. Wireless Days, Porto, Portugal, March 2017, pp. 95–98
Pawlick, J., Zhu, Q.: Proactive defense against physical denial of service attacks using Poisson signaling games. In: International Conference on Decision and Game Theory for Security, October 2017, pp. 336–356. Springer, Cham
Lu, Z., et al.: Review and evaluation of security threats on the communication networks in smart grid. In: Proc. Int. Conf. Military Communications, San Jose, USA
Hewett, R., Rudrapattana, S., Kijsanayothin, P.: Cyber‐security analysis of smart grid SCADA systems with game models. In: Proc. Int. Conf. Cyber and Information Security Research, New York, USA, April 2014, pp. 109–112
Pan, K., et al.: Combined data integrity and availability attacks on state estimation in cyber‐physical power grids. In: Proc. Int. Conf. Smart Grid Communications, Sydney, Australia, November 2016, pp. 271–277
Jeong, Y.S.: Probability-based IoT management model using blockchain to expand multilayered networks. J. Korea Convergence Soc. 11(4), 33–39 (2020)
Wang, D., Wang, X., Zhang, Y., Jin, L.: Detection of power grid disturbances and cyber-attacks based on machine learning. Journal of information security and applications 46, 42–52 (2019)
Vijayanand, R., Devaraj, D., & Kannapiran, B. (2019, April). A novel deep learning based intrusion detection system for smart meter communication network. In 2019 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1–3). IEEE.
Zhou, L., Ouyang, X., Ying, H., Han, L., Cheng, Y., & Zhang, T. (2018, October). Cyber-attack classification in smart grid via deep neural network. In Proceedings of the 2nd international conference on computer science and application engineering (pp. 1–5).
Niu, X., Li, J., Sun, J., & Tomsovic, K. (2019, February). Dynamic detection of false data injection attack in smart grid using deep learning. In 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (pp. 1–6). IEEE.
Mohammadpourfard, M., Genc, I., Lakshminarayana, S., & Konstantinou, C. (2021, October). Attack detection and localization in smart grid with image-based deep learning. In 2021 IEEE international conference on communications, control, and computing technologies for smart grids (SmartGridComm) (pp. 121–126). IEEE.
Farrukh, Y. A., Ahmad, Z., Khan, I., & Elavarasan, R. M. (2021, November). A sequential supervised machine learning approach for cyber attack detection in a smart grid system. In 2021 North American Power Symposium (NAPS) (pp. 1–6). IEEE.
Sakhnini, J., Karimipour, H., Dehghantanha, A., Parizi, R.M.: Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach. Physical Communication 47, 101394 (2021)
Kurt, M.N., Ogundijo, O., Li, C., Wang, X.: Online cyber-attack detection in smart grid: A reinforcement learning approach. IEEE Transactions on Smart Grid 10(5), 5174–5185 (2018)
Siniosoglou, I., Radoglou-Grammatikis, P., Efstathopoulos, G., Fouliras, P., Sarigiannidis, P.: A unified deep learning anomaly detection and classification approach for smart grid environments. IEEE Trans. Netw. Serv. Manage.Netw. Serv. Manage. 18(2), 1137–1151 (2021)
Al-Abassi, A., Karimipour, H., Dehghantanha, A., Parizi, R.M.: An ensemble deep learning-based cyber-attack detection in industrial control system. IEEE Access 8, 83965–83973 (2020)
He, Y., Mendis, G.J., Wei, J.: Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Transactions on Smart Grid 8(5), 2505–2516 (2017)
Wilson, D., Tang, Y., Yan, J., & Lu, Z. (2018, August). Deep learning-aided cyber-attack detection in power transmission systems. In 2018 IEEE Power & Energy Society General Meeting (PESGM) (pp. 1–5). IEEE.
Sengan, S., Subramaniyaswamy, V., Indragandhi, V., Velayutham, P., Ravi, L.: Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning. Comput. Electr. Eng.. Electr. Eng. 93, 107211 (2021)
Wang, H., Ruan, J., Wang, G., Zhou, B., Liu, Y., Fu, X., Peng, J.: Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks. IEEE Trans. Industr. Inf.Industr. Inf. 14(11), 4766–4778 (2018)
Ismail, M., Shaaban, M.F., Naidu, M., Serpedin, E.: Deep learning detection of electricity theft cyber-attacks in renewable distributed generation. IEEE Transactions on Smart Grid 11(4), 3428–3437 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Patnaik, B., Mishra, M., Hasan, S. (2024). Cyber-Physical Security in Smart Grids: A Holistic View with Machine Learning Integration. In: Nayak, J., Naik, B., S, V., Favorskaya, M. (eds) Machine Learning for Cyber Physical System: Advances and Challenges. Intelligent Systems Reference Library, vol 60. Springer, Cham. https://doi.org/10.1007/978-3-031-54038-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-031-54038-7_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-54037-0
Online ISBN: 978-3-031-54038-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)