Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

A Taxonomy of Cyber Defence Strategies Against False Data Attacks in Smart Grids

Published: 17 July 2023 Publication History

Abstract

The modern electric power grid, known as the Smart Grid, has fast transformed the isolated and centrally controlled power system to a fast and massively connected cyber-physical system that benefits from the revolutions happening in communications (such as 5G/6G) and the fast adoption of Internet of Things devices (such as intelligent electronic devices and smart meters). While the synergy of a vast number of cyber-physical entities has allowed the Smart Grid to be much more effective and sustainable in meeting the growing global energy challenges, it has also brought with it a large number of vulnerabilities resulting in breaches of data integrity, confidentiality, and availability. False data injection (FDI) appears to be among the most critical cyberattacks and has been a focal point of interest for both research and industry. To this end, this article presents a comprehensive review of the recent advances in defence countermeasures of FDI attacks on the Smart Grid. Relevant existing works of literature are evaluated and compared in terms of their theoretical and practical significance to Smart Grid cybersecurity. In conclusion, a range of technical limitations of existing false data attack detection research is identified, and a number of future research directions are recommended.

References

[1]
Yao Liu, Peng Ning, and Michael K. Reiter. 2011. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security (TISSEC) 14, 1 (2011), 1–33.
[2]
Adnan Anwar. Nov. 2017. Data-Driven Stealthy Injection Attacks on Smart Grid. Ph.D. Dissertation. School of Engineering and Information Technology, University of New South Wales.
[3]
Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood, and Naveen Chilamkurti. 2023. Data-driven approach for state prediction and detection of false data injection attacks in smart grid. Journal of Modern Power Systems and Clean Energy 11, 2 (2023), 455–467.
[4]
Y. Gu, T. Liu, D. Wang, X. Guan, and Z. Xu. 2013. Bad data detection method for smart grids based on distributed state estimation. In 2013 IEEE International Conference on Communications (ICC). IEEE, Budapest, Hungary, 4483–4487.
[5]
M. Göl and A. Abur. 2015. A modified Chi-Squares test for improved bad data detection. In 2015 IEEE Eindhoven PowerTech. IEEE, Eindhoven, Netherlands, 1–5.
[6]
Y. Zhou and L. Xie. 2017. Detection of bad data in multi-area state estimation. In 2017 IEEE Texas Power and Energy Conference (TPEC). IEEE, College Station, TX, USA, 1–6.
[7]
Zhitao Guan, Nan Sun, Yue Xu, and Tingting Yang. 2015. A comprehensive survey of false data injection in smart grid. International Journal of Wireless and Mobile Computing 8, 1 (2015), 27–33.
[8]
R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos. 2017. False data injection on state estimation in power systems—attacks, impacts, and defense: A survey. IEEE Transactions on Industrial Informatics 13, 2 (2017), 411–423.
[9]
Xuan Liu and Zuyi Li. 2017. False data attack models, impact analyses and defense strategies in the electricity grid. The Electricity Journal 30, 4 (2017), 35–42.
[10]
G. Liang, J. Zhao, F. Luo, S. R. Weller, and Z. Y. Dong. 2017. A review of false data injection attacks against modern power systems. IEEE Transactions on Smart Grid 8, 4 (2017), 1630–1638.
[11]
Q. Wang, W. Tai, Y. Tang, and M. Ni. 2019. Review of the false data injection attack against the cyber-physical power system. IET Cyber-Physical Systems: Theory Applications 4, 2 (2019), 101–107.
[12]
Meng Zhang, Chao Shen, Ning He, SiCong Han, Qi Li, Qian Wang, and XiaoHong Guan. 2019. False data injection attacks against smart grid state estimation: Construction, detection and defense. Science China Technological Sciences 62, 12 (2019), 2077–2087.
[13]
Ahmed S. Musleh, Guo Chen, and Zhao Yang Dong. 2019. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Transactions on Smart Grid 11, 3 (2019), 2218–2234.
[14]
Souhila Aoufi, Abdelouahid Derhab, and Mohamed Guerroumi. 2020. Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. Journal of Information Security and Applications 54 (2020), 102518.
[15]
Haftu Tasew Reda, Abdun Mahmood, Abebe Diro, Naveen Chilamkurti, and Suresh Kallam. 2020. Firefly-inspired stochastic resonance for spectrum sensing in CR-based IoT communications. Neural Computing and Applications 32, 20 (2020), 16011–16023.
[16]
Patrick D. Gallagher. Volume 1 - Smart Grid Cybersecurity Strategy, Architecture, and High-Level Requirements. National Institute of Standards and Technology. Retrieved April 5, 2019 from https://nvlpubs.nist.gov/nistpubs/ir/2014/NIST.IR.7628r1.pdf.
[17]
V. Cagri Gungor, Dilan Sahin, Taskin Kocak, Salih Ergut, Concettina Buccella, Carlo Cecati, and Gerhard P. Hancke. 2012. A survey on smart grid potential applications and communication requirements. IEEE Transactions on Industrial Informatics 9, 1 (2012), 28–42.
[18]
M. A. Rahman and H. Mohsenian-Rad. 2012. False data injection attacks with incomplete information against smart power grids. In 2012 IEEE Global Communications Conference (GLOBECOM’12). IEEE, Anaheim, CA, 3153–3158.
[19]
Annarita Giani, Russell Bent, and Feng Pan. 2014. Phasor measurement unit selection for unobservable electric power data integrity attack detection. International Journal of Critical Infrastructure Protection 7, 3 (2014), 155–164.
[20]
Q. Yang, D. An, R. Min, W. Yu, X. Yang, and W. Zhao. 2017. On optimal PMU placement-based defense against data integrity attacks in smart grid. IEEE Transactions on Information Forensics and Security 12, 7 (2017), 1735–1750.
[21]
M. Keshk, B. Turnbull, N. Moustafa, D. Vatsalan, and K. R. Choo. 2020. A privacy-preserving-framework-based blockchain and deep learning for protecting smart power networks. IEEE Transactions on Industrial Informatics 16, 8 (2020), 5110–5118.
[22]
Xin Chen, Jiachen Shen, Zhenfu Cao, and Xiaolei Dong. 2020. A blockchain-based privacy-preserving scheme for smart grids. In Proceedings of the 2020 2nd International Conference on Blockchain Technology. ACM, Hilo, USA, 120–124.
[23]
Rakesh B. Bobba, Katherine M. Rogers, Qiyan Wang, Himanshu Khurana, Klara Nahrstedt, and Thomas J. Overbye. 2010. Detecting false data injection attacks on DC state estimation. In Preprints of the First Workshop on Secure Control Systems, CPSWEEK, Vol. 2010. CPSWEEK, Stockholm, Sweden, 1–9.
[24]
Yi Huang, H. Li, K. A. Campbell, and Zhu Han. 2011. Defending false data injection attack on smart grid network using adaptive CUSUM test. In 2011 45th Annual Conference on Information Sciences and Systems. IEEE, Baltimore, MD, 1–6.
[25]
O. Kosut, L. Jia, R. J. Thomas, and L. Tong. 2011. Malicious data attacks on the smart grid. IEEE Transactions on Smart Grid 2, 4 (2011), 645–658.
[26]
T. T. Kim and H. V. Poor. 2011. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid 2, 2 (2011), 326–333.
[27]
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao. 2012. On false data injection attacks against distributed energy routing in smart grid. In 2012 IEEE/ACM 3rd International Conference on Cyber-Physical Systems. IEEE, Beijing, China, 183–192.
[28]
J. Kim and L. Tong. 2013. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications 31, 7 (2013), 1294–1305.
[29]
L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han. 2014. Detecting false data injection attacks on power grid by sparse optimization. IEEE Transactions on Smart Grid 5, 2 (2014), 612–621.
[30]
M. N. Kurt, O. Ogundijo, C. Li, and X. Wang. 2019. Online cyber-attack detection in smart grid: A reinforcement learning approach. IEEE Transactions on Smart Grid 10, 5 (2019), 5174–5185.
[31]
Y. Chen, S. Huang, F. Liu, Z. Wang, and X. Sun. 2019. Evaluation of reinforcement learning-based false data injection attack to automatic voltage control. IEEE Transactions on Smart Grid 10, 2 (2019), 2158–2169.
[32]
Aditya Ashok, Pengyuan Wang, Matthew Brown, and Manimaran Govindarasu. 2015. Experimental evaluation of cyber attacks on automatic generation control using a CPS security testbed. In 2015 IEEE Power & Energy Society General Meeting. IEEE, Denver, CO, USA, 1–5.
[33]
Daniel P. Shepard, Todd E. Humphreys, and Aaron A. Fansler. 2012. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection 5, 3-4 (2012), 146–153.
[34]
J. Hao, E. Kang, J. Sun, Z. Wang, Z. Meng, X. Li, and Z. Ming. 2018. An adaptive Markov strategy for defending smart grid false data injection from malicious attackers. IEEE Transactions on Smart Grid 9, 4 (2018), 2398–2408.
[35]
A. Abur and A. G. Exposito. 2004. Power System State Estimation: Theory and Implementation. CRC Press, Boca Raton: CRC, FL.
[36]
Y. Wu, Y. Xiao, F. Hohn, L. Nordström, J. Wang, and W. Zhao. 2018. Bad data detection using linear WLS and sampled values in digital substations. IEEE Transactions on Power Delivery 33, 1 (2018), 150–157.
[37]
T. Liu, Y. Gu, D. Wang, Y. Gui, and X. Guan. 2013. A novel method to detect bad data injection attack in smart grid. In 2013 Proceedings IEEE INFOCOM. IEEE, Turin, Italy, 3423–3428.
[38]
J. Zhao, A. Gómez-Expósito, M. Netto, L. Mili, A. Abur, V. Terzija, I. Kamwa, B. Pal, A. K. Singh, J. Qi, Z. Huang, and A. P. S. Meliopoulos. 2019. Power system dynamic state estimation: Motivations, definitions, methodologies, and future work. IEEE Transactions on Power Systems 34, 4 (2019), 3188–3198.
[39]
D. B. Rawat and C. Bajracharya. 2015. Detection of false data injection attacks in smart grid communication systems. IEEE Signal Processing Letters 22, 10 (2015), 1652–1656.
[40]
K. Manandhar, X. Cao, F. Hu, and Y. Liu. 2014. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems 1, 4 (2014), 370–379.
[41]
Nemanja Živković and Andrija T. Sarić. 2018. Detection of false data injection attacks using unscented Kalman filter. Journal of Modern Power Systems and Clean Energy 6, 5 (2018), 847–859.
[42]
J. Zhao, G. Zhang, M. La Scala, Z. Y. Dong, C. Chen, and J. Wang. 2017. Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Transactions on Smart Grid 8, 4 (2017), 1580–1590.
[43]
E. Drayer and T. Routtenberg. 2020. Detection of false data injection attacks in smart grids based on graph signal processing. IEEE Systems Journal 14, 2 (2020), 1886–1896.
[44]
J. Chen and A. Abur. 2006. Placement of PMUs to enable bad data detection in state estimation. IEEE Transactions on Power Systems 21, 4 (2006), 1608–1615.
[45]
M. Göl and A. Abur. 2013. PMU placement for robust state estimation. In 2013 North American Power Symposium (NAPS). IEEE, Manhattan, KS, 1–5.
[46]
N. M. Manousakis and G. N. Korres. 2016. Optimal PMU placement for numerical observability considering fixed channel capacity—a semidefinite programming approach. IEEE Transactions on Power Systems 31, 4 (2016), 3328–3329.
[47]
C. Pei, Y. Xiao, W. Liang, and X. Han. 2020. PMU placement protection against coordinated false data injection attacks in smart grid. IEEE Transactions on Industry Applications 56, 4 (2020), 4381–4393.
[48]
Qi Wang, Wei Tai, Yi Tang, Ming Ni, and Shi You. 2019. A two-layer game theoretical attack-defense model for a false data injection attack against power systems. International Journal of Electrical Power & Energy Systems 104 (2019), 169–177.
[49]
H. Khazraj, F. Faria da Silva, C. L. Bak, and U. Annakkage. 2017. Addressing single and multiple bad data in the modern PMU-based power system state estimation. In 52nd International Universities Power Engineering Conference (UPEC’17). IEEE, Heraklion, Greece, 1–6.
[50]
George N. Korres and Nikolaos M. Manousakis. 2011. State estimation and bad data processing for systems including PMU and SCADA measurements. Electric Power Systems Research 81, 7 (2011), 1514–1524.
[51]
Hadis Karimipour and Venkata Dinavahi. 2017. Robust massively parallel dynamic state estimation of power systems against cyber-attack. IEEE Access 6 (2017), 2984–2995.
[52]
Rui Chen, Xue Li, Huixin Zhong, and Minrui Fei. 2019. A novel online detection method of data injection attack against dynamic state estimation in smart grid. Neurocomputing 344 (2019), 73–81.
[53]
Q. Yang, L. Jiang, W. Hao, B. Zhou, P. Yang, and Z. Lv. 2017. PMU placement in electric transmission networks for reliable state estimation against false data injection attacks. IEEE Internet of Things Journal 4, 6 (2017), 1978–1986.
[54]
J. Hao, R. J. Piechocki, D. Kaleshi, W. H. Chin, and Z. Fan. 2015. Sparse malicious false data injection attacks and defense mechanisms in smart grids. IEEE Transactions on Industrial Informatics 11, 5 (2015), 1–12.
[55]
X. Liu, Z. Li, and Z. Li. 2017. Optimal protection strategy against false data injection attacks in power systems. IEEE Transactions on Smart Grid 8, 4 (2017), 1802–1810.
[56]
G. Dán and H. Sandberg. 2010. Stealth attacks and protection schemes for state estimators in power systems. In 2010 1st IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, MD, 214–219.
[57]
S. Bi and Y. J. Zhang. 2014. Graphical methods for defense against false-data injection attacks on power system state estimation. IEEE Transactions on Smart Grid 5, 3 (2014), 1216–1227.
[58]
M. H. Ansari, V. T. Vakili, B. Bahrak, and P. Tavassoli. 2018. Graph theoretical defense mechanisms against false data injection attacks in smart grids. Journal of Modern Power Systems and Clean Energy 6, 5 (2018), 860–871.
[59]
C. Liu, M. Zhou, J. Wu, C. Long, and D. Kundur. 2019. Financially motivated FDI on SCED in real-time electricity markets: Attacks and mitigation. IEEE Transactions on Smart Grid 10, 2 (2019), 1949–1959.
[60]
C. Y. T. Ma, D. K. Y. Yau, X. Lou, and N. S. V. Rao. 2013. Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Transactions on Power Systems 28, 2 (2013), 1676–1686.
[61]
K. L. Morrow, E. Heine, K. M. Rogers, R. B. Bobba, and T. J. Overbye. 2012. Topology perturbation for detecting malicious data injection. In 2012 45th Hawaii International Conference on System Sciences. IEEE, Maui, HI, 2104–2113.
[62]
W. Niemira, R. B. Bobba, P. Sauer, and W. H. Sanders. 2013. Malicious data detection in state estimation leveraging system losses estimation of perturbed parameters. In 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm’13). IEEE, Vancouver, BC, Canada, 402–407.
[63]
Subhash Lakshminarayana and David K. Y. Yau. 2020. Cost-benefit analysis of moving-target defense in power grids. IEEE Transactions on Power Systems 36, 2 (2020), 1152–1163.
[64]
Mohammad Ashiqur Rahman, Ehab Al-Shaer, and Rakesh B. Bobba. 2014. Moving target defense for hardening the security of the power system state estimation. In Proceedings of the 1st ACM Workshop on Moving Target Defense. ACM, Scottsdale, AZ, 59–68.
[65]
C. Liu, J. Wu, C. Long, and D. Kundur. 2018. Reactance perturbation for detecting and identifying FDI attacks in power system state estimation. IEEE Journal of Selected Topics in Signal Processing 12, 4 (2018), 763–776.
[66]
C. Liu, H. Liang, T. Chen, J. Wu, and C. Long. 2020. Joint admittance perturbation and meter protection for mitigating stealthy FDI attacks against power system state estimation. IEEE Transactions on Power Systems 35, 2 (2020), 1468–1478.
[67]
J. Tian, R. Tan, X. Guan, Z. Xu, and T. Liu. 2020. Moving target defense approach to detecting Stuxnet-like attacks. IEEE Transactions on Smart Grid 11, 1 (2020), 291–300.
[68]
J. Tian, R. Tan, X. Guan, and T. Liu. 2019. Enhanced hidden moving target defense in smart grids. IEEE Transactions on Smart Grid 10, 2 (2019), 2208–2223.
[69]
Z. Zhang, R. Deng, D. K. Y. Yau, P. Cheng, and J. Chen. 2020. On hiddenness of moving target defense against false data injection attacks on power grid. ACM Transactions on Cyber-Physical Systems 4, 3 (2020), 1–29.
[70]
B. Liu, H. Wu, A. Pahwa, F. Ding, E. Ibrahim, and T. Liu. 2018. Hidden moving target defense against false data injection in distribution network reconfiguration. In 2018 IEEE Power Energy Society General Meeting (PESGM’18). IEEE, Portland, OR, 1–5.
[71]
Oliver Kosut, Liyan Jia, Robert J. Thomas, and Lang Tong. 2010. Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures. In 2010 1st IEEE International Conference on Smart Grid Communications. IEEE, Gaithersburg, MD, 220–225.
[72]
Bo Tang, Jun Yan, Steven Kay, and Haibo He. 2016. Detection of false data injection attacks in smart grid under colored Gaussian noise. In 2016 IEEE Conference on Communications and Network Security (CNS’16). IEEE, Philadelphia, PA, 172–179.
[73]
Sindhuja Mangalwedekar, Prashant Bansode, Faruk Kazi, and Navdeep Singh. 2017. A Bayesian game-theoretic defense strategy for false data injection attacks in smart grid. In 2017 14th IEEE India Council International Conference (INDICON’17). IEEE, Roorkee, India, 1–6.
[74]
X. Liu, Y. Guan, and S. W. Kim. 2018. Bayesian test for detecting false data injection in wireless relay networks. IEEE Communications Letters 22, 2 (2018), 380–383.
[75]
A. Gaber, K. G. Seddik, and A. Y. Elezabi. 2015. Joint estimation-detection of cyber attacks in smart grids: Bayesian and non-Bayesian formulations. In 2015 IEEE Wireless Communications and Networking Conference (WCNC’15). IEEE, New Orleans, LA, 2245–2250.
[76]
M. N. Kurt, Y. Yılmaz, and X. Wang. 2018. Distributed quickest detection of cyber-attacks in smart grid. IEEE Transactions on Information Forensics and Security 13, 8 (2018), 2015–2030.
[77]
C. Murguia and J. Ruths. 2016. CUSUM and Chi-squared attack detection of compromised sensors. In 2016 IEEE Conference on Control Applications (CCA’16). IEEE, Buenos Aires, Argentina, 474–480.
[78]
Y. Huang, J. Tang, Y. Cheng, H. Li, K. A. Campbell, and Z. Han. 2016. Real-time detection of false data injection in smart grid networks: An adaptive CUSUM method and analysis. IEEE Systems Journal 10, 2 (2016), 532–543.
[79]
Samrat Nath, Israel Akingeneye, Jingxian Wu, and Zhu Han. 2019. Quickest detection of false data injection attacks in smart grid with dynamic models. IEEE Journal of Emerging and Selected Topics in Power Electronics 10, 1 (2019), 1292–1302.
[80]
S. Li, Y. Yılmaz, and X. Wang. 2015. Quickest detection of false data injection attack in wide-area smart grids. IEEE Transactions on Smart Grid 6, 6 (2015), 2725–2735.
[81]
S. Li, X. Li, X. Wang, and J. Liu. 2017. Decentralized sequential composite hypothesis test based on one-bit communication. IEEE Transactions on Information Theory 63, 6 (2017), 3405–3424.
[82]
I. Akingeneye and J. Wu. 2018. Low latency detection of sparse false data injections in smart grids. IEEE Access 6 (2018), 58564–58573.
[83]
G. Chaojun, P. Jirutitijaroen, and M. Motani. 2015. Detecting false data injection attacks in AC state estimation. IEEE Transactions on Smart Grid 6, 5 (2015), 2476–2483.
[84]
S. K. Singh, K. Khanna, R. Bose, B. K. Panigrahi, and A. Joshi. 2018. Joint-transformation-based detection of false data injection attacks in smart grid. IEEE Transactions on Industrial Informatics 14, 1 (2018), 89–97.
[85]
H. Manyun, N. Ming, L. Manli, W. Zhinong, S. Guoqiang, Z. Haixiang, and L. Zhongxi. 2018. Detecting false data injection attacks on modern power systems based on Jensen-Shannon distance. In 2018 IEEE 8th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER’18). IEEE, Tianjin, China, 1154–1159.
[86]
Lanchao Liu, Mohammad Esmalifalak, and Zhu Han. 2013. Detection of false data injection in power grid exploiting low rank and sparsity. In 2013 IEEE International Conference on Communications (ICC’13). IEEE, Budapest, Hungary, 4461–4465.
[87]
B. Li, T. Ding, C. Huang, J. Zhao, Y. Yang, and Y. Chen. 2019. Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Transactions on Industrial Informatics 15, 5 (2019), 2892–2904.
[88]
M. Ozay, I. Esnaola, F. T. Yarman Vural, S. R. Kulkarni, and H. V. Poor. 2016. Machine learning methods for attack detection in the smart grid. IEEE Transactions on Neural Networks and Learning Systems 27, 8 (2016), 1773–1786.
[89]
Mohammad Esmalifalak, Lanchao Liu, Nam Nguyen, Rong Zheng, and Zhu Han. 2014. Detecting stealthy false data injection using machine learning in smart grid. IEEE Systems Journal 11, 3 (2014), 1644–1652.
[90]
Z. Zhang, Y. Wang, and L. Xie. 2018. A novel data integrity attack detection algorithm based on improved grey relational analysis. IEEE Access 6 (2018), 73423–73433.
[91]
S. A. Foroutan and F. R. Salmasi. 2017. Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method. IET Cyber-Physical Systems: Theory Applications 2, 4 (2017), 161–171.
[92]
Mehdi Ganjkhani, Seyedeh Narjes Fallah, Sobhan Badakhshan, Shahaboddin Shamshirband, and Kwok-wing Chau. 2019. A novel detection algorithm to identify false data injection attacks on power system state estimation. Energies 12, 11 (2019), 2209.
[93]
D. Xue, X. Jing, and H. Liu. 2019. Detection of false data injection attacks in smart grid utilizing ELM-based OCON framework. IEEE Access 7 (2019), 31762–31773.
[94]
J. Yan, B. Tang, and H. He. 2016. Detection of false data attacks in smart grid with supervised learning. In 2016 International Joint Conference on Neural Networks (IJCNN’16). IEEE, Vancouver, BC, Canada, 1395–1402.
[95]
M. Ashrafuzzaman, Y. Chakhchoukh, A. A. Jillepalli, P. T. Tosic, D. C. de Leon, F. T. Sheldon, and B. K. Johnson. 2018. Detecting stealthy false data injection attacks in power grids using deep learning. In 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC’18). IEEE, Limassol, Cyprus, 219–225.
[96]
Y. He, G. J. Mendis, and J. Wei. 2017. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Transactions on Smart Grid 8, 5 (2017), 2505–2516.
[97]
J. J. Q. Yu, Y. Hou, and V. O. K. Li. 2018. Online false data injection attack detection with wavelet transform and deep neural networks. IEEE Transactions on Industrial Informatics 14, 7 (2018), 3271–3280.
[98]
Moslem Dehghani, Abdollah Kavousi-Fard, Morteza Dabbaghjamanesh, and Omid Avatefipour. 2020. Deep learning based method for false data injection attack detection in AC smart islands. IET Generation, Transmission & Distribution 14, 24 (2020), 5756–5765.
[99]
X. Niu, J. Li, J. Sun, and K. Tomsovic. 2019. Dynamic detection of false data injection attack in smart grid using deep learning. In 2019 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT’19). IEEE, Washington, DC, 1–6.
[100]
S. Wang, S. Bi, and Y. J. A. Zhang. 2020. Locational detection of the false data injection attack in a smart grid: A multilabel classification approach. IEEE Internet of Things Journal 7, 9 (2020), 8218–8227.
[101]
Ying Zhang, Jianhui Wang, and Bo Chen. 2020. Detecting false data injection attacks in smart grids: A semi-supervised deep learning approach. IEEE Transactions on Smart Grid 12, 1 (2020), 623–634.
[102]
M. I. Oozeer and S. Haykin. 2019. Cognitive dynamic system for control and cyber-attack detection in smart grid. IEEE Access 7 (2019), 78320–78335.
[103]
D. An, Q. Yang, W. Liu, and Y. Zhang. 2019. Defending against data integrity attacks in smart grid: A deep reinforcement learning-based approach. IEEE Access 7 (2019), 110835–110845.
[104]
Yao Sun, Yashan Mao, Ting Liu, Yanan Sun, Yang Liu, and Xiaohong Guan. 2012. A dynamic secret-based encryption method in smart grids wireless communication. In IEEE PES Innovative Smart Grid Technologies. IEEE, Tianjin, 1–5.
[105]
N. Saxena and S. Grijalva. 2017. Dynamic secrets and secret keys based scheme for securing last mile smart grid wireless communication. IEEE Transactions on Industrial Informatics 13, 3 (2017), 1482–1491.
[106]
Hosam Hittini, Atef Abdrabou, and Liren Zhang. 2020. FDIPP: False data injection prevention protocol for smart grid distribution systems. Sensors 20, 3 (2020), 679.
[107]
Khalid Mahmood, Shehzad Ashraf Chaudhry, Husnain Naqvi, Taeshik Shon, and Hafiz Farooq Ahmad. 2016. A lightweight message authentication scheme for Smart Grid communications in power sector. Computers & Electrical Engineering 52 (2016), 114–124.
[108]
S. Garg, K. Kaur, G. Kaddoum, J. J. P. C. Rodrigues, and M. Guizani. 2020. Secure and lightweight authentication scheme for smart metering infrastructure in smart grid. IEEE Transactions on Industrial Informatics 16, 5 (2020), 3548–3557.
[109]
N. Saxena and S. Grijalva. 2018. Efficient signature scheme for delivering authentic control commands in the smart grid. IEEE Transactions on Smart Grid 9, 5 (2018), 4323–4334.
[110]
G. Liang, S. R. Weller, F. Luo, J. Zhao, and Z. Y. Dong. 2019. Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Transactions on Smart Grid 10, 3 (2019), 3162–3173.
[111]
Bacem Mbarek, Stanislav Chren, Bruno Rossi, and Tomás Pitner. 2020. An enhanced blockchain-based data management scheme for microgrids. In Workshops of the International Conference on Advanced Information Networking and Applications. Springer, Caserta, Italy, 766–775.
[112]
G. N. Korres, P. J. Katsikas, K. A. Clements, and P. W. Davis. 2003. Numerical observability analysis based on network graph theory. IEEE Transactions on Power Systems 18, 3 (2003), 1035–1045.
[113]
Jane Webster and Richard T. Watson. 2002. Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly 26, 2 (2002), xiii–xxiii.
[114]
J. v Brocke, A. Simons, B. Niehaves, B. Niehaves, K. Riemer, R. Plattfaut, and A. Cleven. 2009. Reconstructing the giant: On the importance of rigour in documenting the literature search process. In Information Systems in a Globalising World: Challenges, Ethics and Practices; 17th European Conference on Information Systems (ECIS’09). Università di Verona, Facoltà di Economia, Departimento de Economia Aziendale, Verona, 2206–2217.
[115]
Md Abul Hasnat and Mahshid Rahnamay-Naeini. 2022. A graph signal processing framework for detecting and locating cyber and physical stresses in smart grids. IEEE Transactions on Smart Grid 13, 5 (2022), 3688–3699.
[116]
Md Masud Rana, Rui Bo, and Ahmed Abdelhadi. 2020. Distributed grid state estimation under cyber attacks using optimal filter and Bayesian approach. IEEE Systems Journal 15, 2 (2020), 1970–1978.
[117]
S. Pan, T. Morris, and U. Adhikari. 2015. Developing a hybrid intrusion detection system using data mining for power systems. IEEE Transactions on Smart Grid 6, 6 (2015), 3104–3113. DOI:
[118]
Adnan Anwar, Abdun Naser Mahmood, and Zubair Shah. 2015. A data-driven approach to distinguish cyber-attacks from physical faults in a smart grid. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management. ACM, New York, NY, 1811–1814.
[119]
A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu. 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid 4, 2 (2013), 847–855.

Cited By

View all
  • (2024)A Review of Power System False Data Attack Detection Technology Based on Big DataInformation10.3390/info1508043915:8(439)Online publication date: 28-Jul-2024
  • (2024)A Secure Federated Learning Framework for Residential Short-Term Load ForecastingIEEE Transactions on Smart Grid10.1109/TSG.2023.329238215:2(2044-2055)Online publication date: Mar-2024
  • (2024) FDI Attack Detection Based on L 2 Gain Performance Adaptive Integral Sliding Mode Observer 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS)10.1109/ICPS59941.2024.10640058(1-6)Online publication date: 12-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 55, Issue 14s
December 2023
1355 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3606253
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 July 2023
Online AM: 14 April 2023
Accepted: 02 April 2023
Revised: 31 October 2022
Received: 19 January 2021
Published in CSUR Volume 55, Issue 14s

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Communication system
  2. cyberattack
  3. cyber-physical system
  4. cybersecurity
  5. detection
  6. false data injection
  7. Internet of Things
  8. power system
  9. smart grid

Qualifiers

  • Survey

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)534
  • Downloads (Last 6 weeks)43
Reflects downloads up to 14 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Review of Power System False Data Attack Detection Technology Based on Big DataInformation10.3390/info1508043915:8(439)Online publication date: 28-Jul-2024
  • (2024)A Secure Federated Learning Framework for Residential Short-Term Load ForecastingIEEE Transactions on Smart Grid10.1109/TSG.2023.329238215:2(2044-2055)Online publication date: Mar-2024
  • (2024) FDI Attack Detection Based on L 2 Gain Performance Adaptive Integral Sliding Mode Observer 2024 IEEE 7th International Conference on Industrial Cyber-Physical Systems (ICPS)10.1109/ICPS59941.2024.10640058(1-6)Online publication date: 12-May-2024
  • (2023)Digital Transformation of Microgrids: A Review of Design, Operation, Optimization, and CybersecurityEnergies10.3390/en1612459016:12(4590)Online publication date: 8-Jun-2023
  • (2023)Network Attack Tracking Method for Digital Substation Power Industry Control System Based on Apriori Algorithm2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507398(1206-1210)Online publication date: 8-Dec-2023
  • (2022)Increasing the Security of Advanced Metering Infrastructure Using Dynamic Defense Methods2022 12th Smart Grid Conference (SGC)10.1109/SGC58052.2022.9998971(1-5)Online publication date: 13-Dec-2022
  • (2022)Cybersecurity and Forensics in Connected Autonomous Vehicles: A Review of the State-of-the-ArtIEEE Access10.1109/ACCESS.2022.321384310(108979-108996)Online publication date: 2022

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media