Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Ontology-Based Deep Learning Model for Object Detection and Image Classification in Smart City Concepts
Previous Article in Journal
Advancing Urban Resilience Amid Rapid Urbanization: An Integrated Interdisciplinary Approach for Tomorrow’s Climate-Adaptive Smart Cities—A Case Study of Wuhan, China
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey

1
Department of Electrical and Computer Engineering, University of Florida, Gainesville, FL 32603, USA
2
Electric Grid Security and Communications, Sandia National Laboratories, Albuquerque, NM 87123, USA
3
G2Elab, Grenoble INP, CNRS, Université Grenoble Alpes, 38000 Grenoble, France
*
Authors to whom correspondence should be addressed.
Smart Cities 2024, 7(4), 2131-2181; https://doi.org/10.3390/smartcities7040085 (registering DOI)
Submission received: 20 May 2024 / Revised: 19 July 2024 / Accepted: 20 July 2024 / Published: 2 August 2024

Abstract

:
The rise of grid modernization has been prompted by the escalating demand for power, the deteriorating state of infrastructure, and the growing concern regarding the reliability of electric utilities. The smart grid encompasses recent advancements in electronics, technology, telecommunications, and computer capabilities. Smart grid telecommunication frameworks provide bidirectional communication to facilitate grid operations. Software-defined networking (SDN) is a proposed approach for monitoring and regulating telecommunication networks, which allows for enhanced visibility, control, and security in smart grid systems. Nevertheless, the integration of telecommunications infrastructure exposes smart grid networks to potential cyberattacks. Unauthorized individuals may exploit unauthorized access to intercept communications, introduce fabricated data into system measurements, overwhelm communication channels with false data packets, or attack centralized controllers to disable network control. An ongoing, thorough examination of cyber attacks and protection strategies for smart grid networks is essential due to the ever-changing nature of these threats. Previous surveys on smart grid security lack modern methodologies and, to the best of our knowledge, most, if not all, focus on only one sort of attack or protection. This survey examines the most recent security techniques, simultaneous multi-pronged cyber attacks, and defense utilities in order to address the challenges of future SDN smart grid research. The objective is to identify future research requirements, describe the existing security challenges, and highlight emerging threats and their potential impact on the deployment of software-defined smart grid (SD-SG).

1. Introduction

The need for increased electricity usage, declining infrastructure quality, and growing concerns about reliability have prompted the development of grid modernization and the implementation of smart grids (SGs) as replacements for traditional power networks. According to the US Department of Energy, SGs will enable utility companies to perform wide-ranging data collection and implement widespread electrical system control in real time, resulting in more reliable electricity for all grid users. Traditional power grids are hindered by obsolete and unreliable equipment, as well as the need for manual administration and frequent power outages. However, the implementation of SGs brings with it a range of contemporary technologies, such as Internet of Things (IoT) sensors, analytic processes that incorporate machine learning, and advanced control systems. These technologies enable more efficient monitoring and management of energy consumption, generation, and distribution [1]. There are still several challenges in SGs, such as the time-consuming and tedious need for manual network administration. Furthermore, SG networks are made up of hardware and software from various vendors, which can result in interoperability issues for contact between those devices.
Presently, ongoing research has suggested the utilization of software-defined networking (SDN) methods to enhance the performance of SGs [1,2]. SDN is a network design methodology that enables the intelligent control and programming of networks. This is achieved by the utilization of software applications and a distinct network controller function, which is independent of the network’s data transport capabilities. This enables more flexibility, agility, and scalability in the management of network infrastructure [3].
Figure 1 illustrates a software-defined smart grid (SD-SG) architecture. A software controller with centralized control handles and configures all devices and protocols in the SG network. The application plane enables real-time monitoring and analysis, making it easier to proactively detect and resolve faults in the SG network [4]. The upper-layer analysis and control functions can then be used to implement SG network policy in terms of data movement or storage, telecommunications, energy movement or storage, and customer prioritization. Although current SDN research offers broad security response solutions, SD-SGs are vulnerable to many utility-specific cyberattacks, such as distributed denial of service (DDoS), illegal access, and false data injection [5]. Furthermore, the use of SDN increases the susceptibility of the SD-SG to additional weaknesses, particularly aimed at compromising the controller or other designated elements of the SDN network. The possible shortcomings of incorporating SDN into SGs include the risk of having a single point of failure, the requirement to upgrade communication devices to SDN-enabled devices, the additional communication overhead of SDN controller(s), and the increased security demands of the SDN controller. When constructing and planning a communication infrastructure for an SD-SG system, the network operator and designers must take these factors into account.
SGs have a significant impact on the lives of many people. Renewable energy sources play a crucial role in providing power to residential areas, supporting commercial enterprises, and aiding service providers in satisfying the escalating requirements for sustainable energy. SG technology has a significant impact on how we live and conduct our daily lives, and it is thoroughly interwoven in our modern lifestyles. Hence, cyberattacks in an SD-SG system can result in significant repercussions, such as power disruptions for customers, extensive service interruptions, and substantial financial losses for providers [6].
There is a demand for a comprehensive examination that consolidates, condenses, and evaluates these methods for the advancement of future endeavors. Previous studies on security in smart grid networks either provide limited coverage of network security; are now obsolete and lack up-to-date techniques and attack types; or at the time focused solely on one specific type of cyberattack, such as denial of service (DoS), and/or one particular defense strategy per study [1,7,8,9,10,11]. This survey addresses this gap by offering an in-depth, up-to-date survey of existing cyber threats to SD-SG networks, as well as unique future directions and open problems for SD-SG network security research. The survey’s contributions are as follows:
  • It is an up-to-date study on cyberattacks targeting SD-SG and the latest methods used to mitigate them.
  • It provides a contemporary discussion of defense systems that consider multi-pronged cyberattacks and defenses that can be applied to various types of SD-SG networks.
  • It involves a review of open challenges of SD-SG cybersecurity and potential mitigation techniques for emerging cyberattacks such as low-rate denial of service, controller botnet attacks, and black hole attacks for SD-SG network security.
Figure 2 displays a diagram illustrating the overall structure of this article. The green boxes denote the main section headings, which are then followed by the subsection headings in either blue, purple, or red. The subsequent sections of the paper are structured as follows: Section 2 presents the foundational information on SDN and SD-SG. Section 3 provides an overview of previous surveys that are relevant to this work and emphasizes the unique contributions made by this work. Note that Table 1 presents a list of acronyms and their definitions used throughout the paper. A literature review of the SD-SG network security of DDoS/DoS, SDN controller attacks, and multi-pronged cyberattack threats and defense mechanisms is discussed in Section 4, Section 5 and Section 6, respectively. Next, Section 8 presents a discussion of emerging threats on the horizon of SD-SG security solutions. In Section 9, we discuss the open challenges of current SD-SG security solutions. Lastly, the paper is concluded in Section 10.

2. Background

Network security is a critical component of SG systems, which are interconnected with and reliant on communication networks [12,13]. SG systems enhance transparency and accessibility for energy providers, enabling the efficient real-time monitoring and management of energy consumption [14]. They also enable utility companies to offer customers real-time feedback on their energy usage, empowering them to make well-informed decisions regarding energy consumption [15]. These qualities arise from a strong interconnection between the power grid and networking components in SG designs [5,16,17]. Regrettably, the extensive interdependence among components in the system makes it very susceptible to cyberattacks. In such settings, a network attack has the potential to modify the functioning of the power grid [5]. Moreover, as the SG infrastructure expands, the network becomes more complex, necessitating the use of advanced management tools and expertise to effectively handle network performance [18] in terms of energy demand and supply, network management, customer service, monitoring and control, and real-time data delivery to various locations [19].
Managing the complex infrastructure of an SG system can be a daunting task with traditional networking, requiring significant manual intervention and human resources [1]. On the other hand, SDN research has shown rapid improvements and discoveries since its public launch in 2009. SDN has enhanced the utilization, efficiency, and flexibility of network services while also reducing the cost of maintenance when compared to traditional networks [20]. Table 2 shows the current research efforts that have proposed the use of SDN techniques to improve SG network security and performance [1,2].

2.1. Software-Defined Networking (SDN)

SDN is a network management structure that enables the user-controlled management of forwarding in network nodes. SDN developed over several decades and was realized by researchers at Stanford University [21,22,23]. SDN has the following characteristics, as illustrated in Figure 3:
  • The control plane and data plane are independent of one another.
  • The controller functions as the primary decision-making and external component. Its primary function is to manage the flow of traffic throughout the network and ensure the network’s operational status.
  • Forwarding decisions are based on flow policies and not the destination. A flow represents a common set of instructions for the exchange of packets between a source and a destination. SDN controllers provide policies that are used to establish flow tables. The flow tables are then implemented by forwarding devices.
  • The network can be configured using software programs that operate on top of the SDN controller.
  • Application programming interfaces (APIs) facilitate the transfer of data between the different layers of the SDN system.
The infrastructure layer consists of routers, switches, and access points, as depicted in Figure 3. This layer represents the tangible network equipment within the network and is responsible for the data plane. The controller utilizes southbound programming interfaces, such as OpenFlow [24], ForCES [25], PCEP [26], NetConf [27], or I2RS [28], to communicate with the data plane. These interfaces enable the controller to send instructions to switches and routers. In the presence of several controllers, they establish communication with each other through eastbound and westbound APIs, commonly referred to as east/west APIs, such as ALTO [29] or Hyperflow [30]. This enables the controllers to uphold a comprehensive perspective of the network. The highest layer is the application plane. Within this layer, the network operator can establish the guidelines for the network, based on the functional applications for different tasks such as optimizing energy usage, regulating access, managing mobility, and ensuring security. The application layer conveys policies to the network by utilizing northbound APIs, such as FML [31], Procera [32], Frenetic [33], and RESTful [29], through the control layer. The network operator can utilize these APIs to transmit the required modifications to the control layer, enabling the controller to implement the necessary adjustments in the infrastructure layer based on the desired outcomes.
SDN differs from traditional networks in that flow management, or flow policy, is determined by the forwarding devices. The sole method to modify this policy is through the actual reconfiguration of the devices themselves. Due to these obstacles, network management strategies in conventional networks lack flexibility and are challenging to expand. SDN provides the capability to rapidly modify data flows, allowing network operators to effectively address evolving traffic requirements.

2.2. Software-Defined Smart Grid (SD-SG)

SD-SGs use SDN to improve bus communication, network topology organization, security, and grid network visibility and control. SDN data analytics can also be used by SD-SGs to manage grid communication. Figure 1 provides a comprehensive picture of the integration of SDN within an SG system. Each level in relation to SD-SGs can be characterized as follows:
  • Infrastructure/Data Layer: The data layer facilitates the movement of data amongst SG entities, including energy producers, servers, power transmission lines, and private/commercial users. The data are sent to programmable SDN-based switches and routers to be directed to the desired destination. The control layer enforces routing decisions through its policies.
  • Control Layer: The advanced distribution management system (ADMS) and the SDN controller(s) make up the control layer. The ADMS includes supplementary control and data acquisition (SCADA), distributed energy resource management (DERMS), and a distribution management system (DMS) to monitor the smart grid system. Receiving system data from the application layer and returning those data to it is the role of this layer.
  • Application Layer: The application layer receives data from the lower two tiers of the system to verify that the system is functioning in line with the policies set by the control layer. It carries out statistical analysis, load balancing, mobility management, flow filtration, security monitoring, and real-time system monitoring and analysis.
Although current SDN research offers network management capabilities, including security response and solutions, SD-SGs are vulnerable to various utility-specific cyberattacks such as DDoS unauthorized access and false data injection [5]. In addition, an SD-SG will introduce additional attacks that specifically target the controller or other aspects of the SD-SG network, to gain control over the entire system [6].

2.3. SD-SG Cyber Threats

Studies in the domain of SD-SG security have investigated numerous types of attacks. Through a thorough examination of the literature on security protocols based on SDN, we have identified the primary types of attacks, which may be classified into the following categories, as depicted in Figure 4:
  • Distributed Denial of Service (DDoS): A DDoS/DoS attack involves launching a coordinated attack from multiple nodes on a target with the aim of overwhelming the server’s resources, rendering it incapable of responding to valid requests [34].
  • Controller Attacks: SDN networks’ controllers are susceptible to many threats, such as DoS, hijacking, and illegal access [3,35]. These attacks seek to exploit the centralized nature of SDN controllers, which creates a single point of failure. Thus, for simple, centralized, SDN controller architectures, these attacks can disrupt the entire network by attacking the controller.
  • Multi-Pronged Attacks: Multi-pronged attacks involve multiple cyberattacks of different types. An attacker can launch cyberattacks (e.g., DDoS/DoS and controller attacks) on a network without authorization. Very few researchers have investigated multi-pronged attacks against SD-SGs [36].
  • Grid Balancing Attacks: Grid balancing attacks refer to the various techniques employed by adversaries to disrupt the demand response (DR) and frequency stability (FS) of SD-SG by initiating cyberattacks, including deception cyberattacks (DCAs), DoS attacks, delay attacks, and replay attacks.
Next, we examine the research field concerning cyberattacks, which is outlined in Figure 4.
Figure 4. Taxonomy of SD-SG network security: cyberattacks and defense techniques (Current focus of research literature: DDoS/DoS Attacks Defense Techniques [37,38,39,40,41,42,43,44,45,46,47,48,49,50]; SDN Controller Attacks Defense Techniques [51,52,53,54,55]; Multi-Pronged Attack Defense Techniques [5,17,36,56,57,58,59,60]; Grid Balancing Attacks Defense Techniques [61,62,63,64,65]).
Figure 4. Taxonomy of SD-SG network security: cyberattacks and defense techniques (Current focus of research literature: DDoS/DoS Attacks Defense Techniques [37,38,39,40,41,42,43,44,45,46,47,48,49,50]; SDN Controller Attacks Defense Techniques [51,52,53,54,55]; Multi-Pronged Attack Defense Techniques [5,17,36,56,57,58,59,60]; Grid Balancing Attacks Defense Techniques [61,62,63,64,65]).
Smartcities 07 00085 g004

2.4. SD-SG Practical Applications

To our knowledge, there are currently no smart grids in operation that have implemented SDN yet. However, a number of studies [66,67,68,69,70,71] recommend the implementation of SDN to enhance the capabilities and enhance quality of service (QoS) of smart grid communication networks by utilizing SDN’s ability to configure and manage communication topology and parameters during future operations. Various previous studies have investigated and verified the benefits of network performance of SD-SG in various size IEEE-bus (i.e., 14-300) systems that reflect real-world applications [5,66,67,72,73,74,75,76,77]. SDN offers enhanced security, adaptability, observability, scalability, and control, which can enhance communication performance across networks of different sizes [1,3,9,78,79,80]. Thus, SDN can offer these advantages compared to conventional approaches when implemented in smart grids of different scales, ranging from small to large (i.e., IEEE 9-300+ bus systems).
Figure 5 depicts an attack scenario on an integrated SDN communication network for the IEEE 14 bus system, presented in a study by Qu et al. [77]. The network includes six switches, four phasor measurement units (PMUs), and two phasor data concentrators (PDCs). In this instance, the attacker takes over the management of PDC 5 located at switch 5. PMUs 2 and 6 send measurement data to PDC 5, whereas PMUs 7 and 9 send measurement data to PDC 4. If an assailant manages to breach the communication integrity of PDC 5, the PMU measurements at buses 2 and 6 will be unable to be relayed to this PDC. Consequently, the control layer experiences a reduction in the system’s observability and efficiency. This figure demonstrates how legacy smart grid systems could be updated and targeted by attackers in future operational integrations. Moreover, Nafi et al. [81] propose an example integration of SDN architecture of a neighborhood area network (NAN) of smart meters. The sensor nodes are deployed in customers’ premises to form home area networks (HANs), building area networks (BANs), or industrial area networks (IANs). One NAN is created when these networks are combined. The sensor nodes and smart meters in a NAN are connected to SDN-enabled switches (SDSWs), as discussed in Nafi et al. [81]. The switches are managed by a hierarchical system of controllers, with the NAN controller/gateway acting as the primary access point for the control plane of the NAN. SDN controllers, which monitor traffic flows by providing directives for packet forwarding, are connected to the switches. The flow table within a switch stores the packet forwarding instructions received from the controller. This example demonstrates how the future integration of SDN for NANs might be controlled and viewed.

3. Related Work

This survey explores the analysis of network security vulnerabilities and strategies for protecting SD-SGs, including complex cyberattacks. Table 2 presents a summary of the comparison between this work and other related survey articles. The existing literature has provided limited coverage of these themes, and as far as we know, it has not addressed multi-pronged cyberattacks. Table 3 provides an overview of the relevant literature on both SG and SD-SG security. This study specifically addresses the security of SD-SG networks and the persistent threats they face. Therefore, any related work that pertains to the general security of SG networks, shown in Table 3, is not within the scope of this paper. In addition, this article takes into account the relevant literature that has been published within the five years leading up to the publication date of the study. This is done to ensure that we examine the most up-to-date research and solutions. This section offers a comprehensive examination of the relevant literature and surveys on SD-SGs, emphasizing the specific components that are absent in previous surveys but are addressed in this paper.
Ibdah et al. [7] examine the shortcomings associated with employing SDN in SG systems. The authors commence by providing a detailed description of the structure of SDN-based SG systems, along with an analysis of the security vulnerabilities linked to this particular technology. Their study presents a security framework consisting of five components for SDN-based SG systems: secure communication, secure data storage, secure computing, secure authentication, and secure access control. The authors provide a comprehensive analysis of each of these components and their potential applications in SDN-based SG systems. The authors employ the Mininet network simulator to simulate the efficacy of their proposed security system. The simulation demonstrates the efficacy of the proposed framework in mitigating a range of security attacks, including DoS attacks, data manipulation, and unauthorized access. While the authors do touch upon the security of SD-SG systems, their presentation is concise and mostly centers around DDoS attacks and their framework proposal. The researchers do not offer an exhaustive analysis of SD-SG security, unlike our survey.
Abujubbeh et al. [9] examine the utilization of software-defined wireless sensor networks (SDWSNs) in SGs. The authors start by outlining the benefits of SDWSNs in comparison to conventional wireless sensor networks, including enhanced flexibility, scalability, and adaptability. Their paper introduces an SDN architecture designed for SDWSNs in SGs, aiming to establish a centralized control layer for network administration. The authors delineate the architecture’s diverse constituents, including sensor nodes, SDN controllers, and network infrastructure. Furthermore, their article examines the diverse obstacles that SDWSNs encounter in SGs, including security, energy efficiency, and network dependability. The authors highlight the significance of surmounting these obstacles to efficiently utilize SDWSNs in SGs. Unlike their survey, this study offers a concise analysis of DDoS attacks and associated defense strategies while excluding other network security risks highlighted in the survey. Moreover, this work specifically focuses on SDWSNs rather than broad SD-SG systems.
Kim et al. [11] examine the development of SG infrastructure and the possibility of SDN to facilitate improved SG functionalities. The authors commence by providing an overview of the SG infrastructure and the pivotal role played by information and communication technologies (ICTs) in facilitating enhanced functions such as demand response, distribution automation, and advanced metering. The report presents an analysis of the challenges encountered by conventional SG infrastructures, including those related to interoperability and adaptability. Their study suggests employing SDN to overcome the difficulties encountered by conventional SG infrastructures while simultaneously facilitating the implementation of sophisticated features. The authors delineate the distinct constituents of an SDN-enabled SG architecture, including the SDN controller, network infrastructure, and applications. The authors examine the possible benefits of an SDN-enabled smart grid architecture, including enhanced dependability, security, and energy efficiency. The use scenarios in which SDN can provide sophisticated capabilities, such as dynamic load balancing and network slicing, are emphasized. However, their paper fails to discuss the issues of DDoS and controller attacks in depth. It simply provides a quick introduction to anonymity/intrusion attacks and defense strategies, which are all covered in this study.
Rehmani et al. [1] provide an extensive analysis of the existing literature on SDN in SG communications. The authors analyze the difficulties presented by SGs and explore how SDNs can aid in surmounting these hurdles. Their article investigates the advantages of SDN-based communication for SGs, encompassing improved network performance, efficient resource management, and greater security. The authors conduct a thorough examination of current SG communication systems that utilize SDN, encompassing their structures, protocols, applications, and security measures. In addition, their report highlights unresolved research topics and obstacles that need to be addressed to enhance the efficiency of SDN-based communication in SGs. It offers valuable knowledge about technologies and highlights potential areas for future study and development. Nevertheless, the security portion cited in the article offers just a concise summary of the security aspects of SD-SGs, and the cited papers on security are currently outdated. Additionally, their article lacks a comprehensive analysis of potential future research endeavors on security vulnerabilities in SD-SG systems.
Akkaya et al. [8] examine the implementation of software-defined networking (SDN) in wireless local networks (WLANs) for SG applications. The authors commence by delineating the challenges that conventional WLANs encounter when accommodating SG applications, including issues related to scalability, dependability, and security. Their study introduces an SDN architecture for wireless local area networks (WLANs) in SG applications. This design incorporates a centralized control plane that can adaptively reconfigure the network in response to evolving requirements. The authors provide a comprehensive description of the proposed architecture, outlining the different components and their respective functions. They employ an NS-3 network simulator [140] to evaluate the efficacy of the SDN-based design. The simulations demonstrate that the suggested architecture surpasses conventional WLANs in terms of network performance, resource utilization, and security. The researchers examine the pertinent security factors for each deployment scenario as they advance. Nevertheless, they solely focus on analyzing anomaly/intrusion detection systems while only briefly addressing controller attacks. Their study lacks a discourse on DDoS attacks or the defensive methodologies for the attacks discussed in this research.
Demirci et al. [10] propose the utilization of SDN as a means to enhance the security of SG systems, as stated in their study. The authors analyze the difficulties faced by traditional SG systems, including the absence of network traffic visibility and control, which hinders the ability to identify and address security issues. Their paper presents a security framework for SG systems that utilizes SDN technology. The framework comprises three essential components: network visibility, policy enforcement, and threat detection and response. The authors offer a comprehensive explanation of each of these elements and examine their potential implementation through the use of SDN. In order to assess the effectiveness of the suggested framework, the authors simulate their networking using the Mininet tool [141]. The simulation illustrates that the suggested architecture can improve network visibility, policy enforcement, and threat detection and response compared to traditional SG systems. Nevertheless, their study prioritizes the presentation of their framework rather than providing an extensive analysis of the network security of SD-SGs. The authors provide a brief analysis of DDoS attacks while only briefly mentioning anomaly/intrusion attacks and response measures for each attack. In comparison, this survey offers a more comprehensive examination of network security concerns. In addition, the existing literature fails to describe any controller attacks.

Specific Contributions of This Study

Table 2 illustrates the range of prior research that has discussed SD-SG network security. The aforementioned discussions often provided concise segments about SD-SG security within a broader survey or study. However, a comprehensive examination of SD-SG security has remained absent until the present study. Moreover, the prior studies on SD-SG, as evidenced by Table 2, have presented fragmented discussions of SD-SG attacks and their defense techniques.
Since SD-SGs differ from traditional SGs in terms of defense techniques and attack threats, it is critical to conduct a thorough assessment that covers a wide range of SD-SG-specific attacks and their corresponding response techniques and consolidates them into a single manuscript. This study offers a comprehensive analysis of DDoS/DoS, SDN controller, multi-pronged, and grid-balancing attacks that explicitly aim at the SDN communication architecture of SD-SG infrastructure, in contrast to prior studies. Furthermore, this survey fills a gap in the current literature by providing an in-depth examination of security systems that handle the challenges of multi-pronged cyberattacks and offer sufficient comprehensive protection for SD-SG networks.
In addition, current surveys have not examined the new and developing risks to SD-SG network security, such as low-rate denial of service, controller botnet attacks, and black hole attacks. This study specifically addresses these emerging threats and offers potential methods for mitigating them, as detailed in Section 8. This study also addresses the unresolved issues surrounding network resilience following a cyberattack, the confidentiality of network data, the dependability of network defense systems, and the flexibility of network solutions in Section 9. Through these contributions, our work sets itself apart from prior surveys.

4. DDoS/DoS Attacks

As previously mentioned, denial-of-service (DoS) attacks can be used to overwhelm certain target nodes or SD-SG components in order to damage them or force a complete shutdown. DDoS attacks can cause severe damage to SD-SG systems and have become increasingly popular among cyberattackers who target SDN frameworks because of their simplicity [142]. Several countermeasures have been suggested to mitigate DDoS/DoS attacks, such as utilizing blockchain technology, employing machine learning (ML) algorithms, leveraging aspects of SDN, and implementing moving target defenses. Blockchain methodologies can enhance network security by verifying network traffic and the conduct of nodes. Nevertheless, the existing limitations entail the need for recording, storing, and confirming the blockchain process, which might introduce additional burdens and stress to the system.
There is currently a need for the development of a blockchain system that is both lightweight and capable of safeguarding an SD-SG against DDoS/DoS attacks while also allowing for the recovery of nodes. ML models can be trained to identify DDoS/DoS threats; however, they are ineffective in identifying DDoS/DoS attacks initiated through zero-day flaws or utilizing techniques that the model has not been trained and tested on. It may not be practicable to consistently update trained machine learning solutions with the newest accessible data. There is currently a need to establish a strong machine learning model that can accurately identify new DDoS/DoS attacks and offer methods to recover affected nodes. Proposals have been made for techniques such as access control and rate restriction, distributed software-defined networking topologies, and graph learning methodologies, in addition to blockchain and deep learning. These measures have produced encouraging outcomes in enhancing the security of the SD-SG systems against DDoS attacks. We chose to present and examine a selection of current initiatives for detecting and mitigating DDoS attacks in SD-SG systems.

4.1. Blockchain

Blockchain (BC) provides a decentralized communication system where every connection-related record for each network member is stored in a well-maintained and easily accessible database. The database contains information in a structured manner, where each piece of information is organized into blocks. Each block is assigned a unique hash value, which serves as its identification. Moreover, the blockchain demonstrates the characteristics of decentralization and functions autonomously without relying on central nodes. A potential solution is proposed to enforce a verification system at every edge of SD-SG’s SDN networks. This solution aims to address trust-management difficulties and enhance the system’s resilience against authentication assaults [143,144]. These systems utilize a consensus technique to identify and report network dangers.
Xiong et al. [37] introduce a distributed SDN control architecture for SG that is safeguarded by blockchain technology. Their article analyzes the deployment of substation automation through the utilization of the IEC 61850 standard. Originally designed for substation automation, this standard has since been extended to encompass other aspects of smart grid communication. Essentially, the authors’ proposed design entails a switch verifying the presence of a corresponding rule in its table upon receiving a new data packet. If the condition is not met, it initiates a request for a rule assignment to the control layer using the southbound interface API. The control layer then receives and sends these rules to the switch while also storing them on the chain. The transition implements services in compliance with the recently established regulations. Moreover, it compares these rules with the ones recorded on the blockchain to validate them. If there are inconsistencies that arise, which imply the existence of a malevolent regulation, it signifies the detection of an attack. The core idea presented is to use blockchain technology to ensure the consistency of the control layer strategy and the flow rules to prevent faulty or malicious data from being accepted in the network. Figure 6 shows the proposed architecture, which includes three layers. The first layer is the data layer, which involves the common switch and flow forwarding process for SDN, as described in a previous section. The second layer is a control layer consisting of a distributed SDN cluster structure. Every SDN controller is interconnected in a distributed blockchain network. The blockchain layer is the third layer. In this layer, the cluster-head SDN controllers are responsible for verifying whether devices are “on-chain”. Several processes have been proposed for SDN cluster controllers to authenticate both data and devices using blockchain-based verification. To minimize network latency inside each SDN domain, a single SDN controller is designated as the cluster head for each domain. The primary responsibility of this controller is to coordinate and supervise the distribution of control commands throughout the specified area. Within the proposed framework, all SDN controllers are interconnected in a distributed blockchain manner. This setup enables smooth and effective communication between all smart grid devices in the network.
The attack detection technique outlined in this work primarily utilizes the Jaccard similarity coefficient to assess the similarity of data packet transmission rates among switch ports. The Jaccard similarity coefficient between odd and even arrays is computed using the following formula:
J ( O , E ) = O · E O + E O · E
J ( O i , E i ) = i = 1 n ( O i × E i ) i = 1 n O i + i = 1 n E i i = 1 n ( O i × E i )
J ( r i , r ) = i = 2 k , j = 2 k 1 2 m ( r i × r j ) i = 2 k 2 m r 2 k + j = 2 k 1 2 m r 2 k 1 i = 2 k , j = 2 k 1 2 m ( r i × r j )
where m = 1, 2, …, k. By utilizing the Jaccard coefficient, one may determine the extent of change in the port rate. When the magnitude of the change surpasses a specific threshold, it is determined that the network is being targeted by an attack.The simulations demonstrate that the blockchain-based distributed consensus mechanism effectively safeguards the system from DDoS attacks, with a capacity to handle 400 packets per second, while maintaining a bandwidth of over 80%.The DDoS attack simulation mimics a flooding tactic that is specifically intended to make the target switch port unable to function. It occurs in the data plane, specifically among the forwarding switch ports. The attack pattern consists of a persistent and targeted flow aimed toward the switch ports. The application prospects of this study suggest that integrating blockchain technology into SG systems can enhance security and resilience in the face of DDoS attacks. The current limitations of this approach include the need for regular blockchain updates while assuring a minimum workload for controllers. Future research should focus on developing efficient systems that prioritize the speed of verification among blockchain participants by the controllers while minimizing any additional costs or burdens.

4.2. Machine Learning

Machine learning has evolved from a set of robust artificial intelligence (AI) algorithms and is extensively employed in data mining. This enables a system to train on data and acquire valuable structural patterns and models. This application of ML is well suited for network security [145]. Modern methodologies employ diverse machine learning models, such as deep learning models, to create classifiers capable of identifying DDoS attacks in supervisory control and data acquisition (SCADA) and SG systems based on SDN). In addition, these papers emphasize that a good match between classifier and dataset is key to developing a successful model.
Polat et al. [38] propose a technique to accurately detect DDoS attacks in supervisory control and data acquisition (SCADA) systems based on SDN. This method utilizes parallel recurrent neural networks (RNNs). Their proposed approach employs long short-term memory (LSTM) and gated recurrent unit (GRU) recurrent neural network (RNN) models. The LSTM model is a variant of RNNs that is becoming increasingly prominent in the field of machine learning. Its purpose is to tackle difficulties such as the disappearance of gradients and problems with long-term dependencies, even when there are significant delays in time. The structure of the system efficiently captures long-term dependencies by utilizing specialized memory cells. These memory cells can be formed as follows:
f t = σ ( W f · [ h t 1 , x t ] + b f ) ,
i t = σ ( W i · [ h t 1 , x t ] + b i ) ,
C ˜ t = tan h ( W C · [ h t 1 , x t ] + b C ) ,
C t = f t · C t 1 + i t · C ˜ t ,
O t = ( W o · [ h t 1 ; x t ] + b o ) ,
h t = O t · tanh ( C t ) .
The LSTM architecture consists of sequential memory blocks, with each cell formation (f) consisting of a cell and three gates (entrance, (o) output (C), and forget (i)) that regulate the flow of information. The operation of these gates is determined by mathematical equations that incorporate weight matrices (b), bias vectors ( C ˜ ), input directory ( h t ), output directory ( σ ), cell content (W), and activation functions such as the sigmoid and hyperbolic tangent functions. The sigmoid function generates values between 0 and 1, controlling the information flow, whereas the hyperbolic tangent function ( t a n h ) adjusts the output of the cell.Adataset was created by combining non-attack data and DDoS assault traffic data from an experimental topology setting that mimics a small-scale SDN-based SCADA system.To gather the dataset, the researchers designed an experimental topology with four hosts. The OVS switch was targeted with a packet flood attack. The attacks occurred in the data plane layer and used a variety of packet types, including transmission control protocol (TCP), user datagram protocol (UDP), and internet control message protocol (ICMP). The attack was initiated by host 2 and targeted host 4. The dataset comprised 89 features, including 420 instances of non-attack data and 3780 instances of attack data. The RNN model, which included parallel LSTM and GRU layers, was trained and evaluated using the dataset. Their approach highlights a high average accuracy of 97.62% in classifying DDoS attacks and demonstrates its usability for SD-SG cybersecurity defense. The limitations of their study reside in the fact that they generated a unique dataset from their experimental setup. It is unclear how well this testbed represents other systems and the extent to which their DDoS attack scenario accurately reflects real-world attacks. In future research, it is important to examine the representativeness of testbeds and assess the performance of machine learning models in real-world applications. Additionally, it is crucial to evaluate models against unforeseen DDoS attack scenarios and compare their effectiveness with other existing scenarios.
In contrast to the aforementioned work, Nagaraj et al. [39] propose GLASS, a graph learning technique designed to enhance the security of SDN-based SG systems by mitigating DDoS attacks. The proposed methodology employes graph convolutional neural networks (GCNNs) to efficiently detect DDoS assaults in various scenarios by acquiring knowledge of the patterns exhibited by both normal and malicious network traffic. In addition, unsupervised learning methods are used to identify compromised entities. The approach not only involves detecting attacks but also uses spectral clustering to identify DDoS-compromised entities and proposes mitigation strategies. Spectral clustering primarily relies on the utilization of graph Laplacian (L) matrices, which are constructed based on the principles derived from spectral graph theory. The normalized graph Laplacian of a graph ( G t ) has a weighted adjacency matrix ( W a d j t ) and a weighted degree diagonal matrix ( W d e g t ), which is calculated as follows:
L t = I N ( W t d e g ) 1 × W a d j t
where I N R N × N represents the identity matrix of size ( N × N ). The spectral decomposition of matrix L t yields eigenvectors and eigenvalues, which are then combined with the standard K-means technique to separate compromised PMUs from normal PMUs in the SDN-SGC network.
Mitigation is achieved by sending updated flow rules to the northbound interface of the primary SDN controller to change the flow tables in switches. The controller limits the transmission of TCP SYN packets to the affected nodes, leading to a substantial improvement in network performance. The authors assess the effectiveness of the proposed method on a simulated SG network for the IEEE 118-bus power grid system, which commonly uses IEEE C37.118.2 or IEC 61850 communication protocols using TCP/IP. The perpetrator generates abnormal network traffic, specifically a DOS attack, by employing tools such as hping3 [146], to launch TCP flooding attacks. The attack is a TCP flood attack, characterized by a random pattern, targeting a variable number of buses, ranging from 1 to 10. The attack occurs within the data plane layer. The resulting dataset consists of a total of 354,000 data points. Half of these data points correspond to DDoS attacks, while the other half represent regular network performance samples. Their study demonstrates a detection rate exceeding 97% and a throughput of 84% when employing the mitigation strategy, as opposed to a mere 4% throughput during DDoS attack scenarios without implementing the techniques. The shortcomings of this work reside in the simplicity of the attack scenario and the yet-to-be-realized effectiveness of the GCNN in complex attack scenarios. Moreover, when the SD-SG is represented as a graph, there are difficulties in training it when the structure changes due to natural events such as outages or disasters. Additionally, the use of GCNNs poses a challenge in terms of the computational time and overhead in the application layer when scaling the grid. Hence, future endeavors should explore adaptable GCNNs that consider these challenges.
Jung et al. [40] argue that the utilization of feature distributions of the network in entropy-based anomaly detection methods has proven effective in identifying DoS assaults. Therefore, the authors propose using Shannon entropy to detect abnormalities in the communication network of an SG by analyzing the distribution of SDN traffic features such as source Internet Protocol (IP) address and destination IP address. Shannon entropy can be denoted as follows:
H ( X ) = x X p ( x ) log b p ( x )
where x represents an event. High entropy signifies a wide dispersion of the feature distribution, while low entropy suggests a tight clustering of the feature distribution. To generate the necessary data for testing, the authors employed Raspberry Pis equipped with OpenMuc, a framework that facilitates the implementation of crucial smart grid communication protocols such as IEC 61850, IEC 60870-5-104, and Modbus. The researchers conducted a range of attacks, including DoS, network scans, and port scans, against the nodes in the testbed. The attack was launched in the data plane layer, with the attack pattern determined at random for each type of attack. Principal component analysis (PCA) was employed to preprocess the traffic flow before classification. Nevertheless, the authors anticipate applying this suggested entropy-based anomaly detection technique on an SDN-based testbed as part of their ongoing study. Therefore, this proposed method has not undergone validation to ascertain its efficacy in accurately identifying anomalies in SD-SG. Further investigation is needed to assess the feasibility of implementation and the effects on the performance of SD-SG networks.
Allen et al. [41] suggest a hybrid, distributed, and decentralized (HDD) SDN architecture as a means to protect the phasor measurement unit (PMU) subsystem network, which differs from previous studies. HDD-SDN employs a physically distributed controller technique to ensure fault tolerance and fail-over operations. It also incorporates parallel execution of machine learning models to detect abnormal activity, hence creating a resilient SD-SG. The presented technique utilizes the concept of parent–child multiple controllers. The parent controller is responsible for reconfiguring the network and allocating and managing resources. On the other hand, the child controller detects abnormalities in packets and monitors the status of the parent node and other devices in the subregion network. The authors incorporate the OPAL-RT smart grid network emulator into their testbed to produce smart grid data. The server streams virtual measurements from OPAL-RT to clients, which are then examined by the HDD-SDN program in ONOS. The network state information obtained from remote SDN controllers is stored in a database, such as InfluxDB or AWS, for analysis by an AD module. The AD module thereafter communicates the required network reconfigurations to the main SDN controller for implementation. The authors utilize parallel computing to implement both the K-means method and the incremental K-means algorithm. The traditional K-means algorithm recalculates the cluster centroids by taking into account the entire dataset, but the incremental K-means approach just uses newly added data to update the previous centroids in each iteration. These clustering methods identify anomalies in the network traffic data and PMU measurement data. The data points are allocated to the cluster that has the smallest Euclidean distance to the computed cluster centers, which is computed as follows:
d ( P n , C k ) = ( d = 1 D ( P n C k ) 2 ) 1 / 2
where p n = [ p 1 , p 2 , , p D ] R D is a vector of D dimensions that includes the attributes related n t h data point (a network packet), and c k = [ c 1 , c 2 , , c D ] R D is a D dimensional vector of the k t h cluster representative. Cluster representatives are determined by calculating the vector mean of the data points. The cluster algorithms were trained using the KDD CUP 1999 dataset, a standardized collection of data [147]. This dataset contains a diverse range of classified intrusions and cyberattacks, such as DoS, user to root (U2R), remote to local (R2L), and probing. These occurrences were duplicated in a military network environment and employed for the purpose of testing. Their work highlights the clustering-based anomaly detection technique, which achieves an accuracy of around 90%. One of the shortcomings of their work is that it introduces a single point of failure and vulnerability into the system through the parent–child relationship between controllers. If the parent controller is compromised or experiences a failure, the entire system will encounter interruptions. In addition, the utilization of the K-means method for face detection is hindered by challenges related to the expansion of dimensions and the impact of outliers on the classification process. Future research should explore these areas and provide solutions to address them.
Preseka et al. [42] specifically investigate the detection of anomalies in the communication network traffic during its first stages, highlighting a remarkable accuracy of 96% in near real time. The authors propose the utilization of CyResGrid, a technique that utilizes a hybrid deep learning model comprising a graph convolutional long short-term memory (GC-LSTM) and a deep convolutional network. This technique is utilized for identifying abnormalities in operational technology (OT) communication networks for power grids using time-series classification. GC-LSTM is a fusion of two machine learning models, namely the graph convolutional network (GCN) and LSTM. The graph convolutional network (GCN) examines the structural characteristics of the OT network in the spatial domain. The LSTM model acquires knowledge of the time-series data of the observed OT network traffic within the temporal domain. Therefore, GC-LSTM can acquire knowledge from both the spatial and temporal domains. GC-LSTM generates traffic predictions that serve as inputs for time-series classifications (TSCs):
y i l = ReLU ( j = 0 m 1 w y ( i ) l 1 + b ) ]
x = arg max x f ( x )
where the variables considered are the number of layers (l), filter size (m), weight (w), and bias (b). CyResGrid utilizes Bayesian optimization for hyperparameter tweaking in its deep convolutional network to accurately identify anomalies. The authors employ a dynamic model of the IEEE 39-bus test system in DIgSILENT PowerFactory to simulate the power system in real time. To establish a link between the power grid simulation and an operational technology (OT) communication network emulator, the CPS model integrates OPC UA via Python. The OT network emulation, facilitated by Mininet, functions on a collective of 10 virtual servers and includes 27 substations, 118 measurement devices, and over 800 data points. The functionality of the SCADA device is achieved by the utilization of customized Python code. This code is responsible for creating SCADA communication between the substations and the control center. The Linux bwm-ng tool is employed to capture and analyze this traffic. The authors examine the network traffic of OT systems during normal operations as well as during cyberattacks such as DDoS attacks using Syn Flood and OT network scanning attacks using nmap. They collect data on the observed traffic for the purpose of applying deep learning techniques. The control center receives measurement data from each substation using SCADA protocols such as IEC 104 and DNP3. The primary shortcoming of this effort is that the scalability of their solution has not been evaluated yet. As previously stated, GCNs need significant computing resources, and their scalability and resource costs have not yet been thoroughly evaluated. Future studies should focus on exploring a more efficient implementation of GCNs to implement SD-SG.

4.3. SDN Attributes

As was stated in Section 2, SDN network architecture enables flexibility, control, and security via the SDN controller and its management of data flows through switches and routers. Researchers have utilized these attributes to create security frameworks for SD-SG that exploit the centralized SDN controllers, customized data plane flows, and inherent SDN network resilience.
Mahmood et al. [43] introduce S-DPS, a software-defined networking-based DDoS protection system (S-DPS) designed specifically for SG systems. The suggested system utilizes a centralized SDN controller to oversee the network. DDoS attacks are detected and classified based on employing lightweight Tsallis entropy-based defense mechanisms. Tsallis entropy is commonly defined by its entropic index, which is used to assess non-extensive systems. It is commonly applied to edge detection and image segmentation in image processing. The authors employ the following equations to identify anomalies by utilizing the Tsallis entropy ( H q ):
w = x m i m = 1 , 2 , 3 , 4 ; i = 1 , 2 , , n ,
P m i = x m i n ,
H q = 1 q 1 i = 1 n P m i q ,
Here, as shown in Equation (15), w is regarded as a set of data consisting of n items, where x m i denotes the occurrence related to a certain traffic attribute. The probability of event x m i occurring in window w can be computed using Equation (16). Finally, the Tsallis entropy ( H q ) is computed using Equation (17). When q is greater than 1, higher probabilities have a greater influence on the ultimate entropy value, while lower probabilities have a lesser influence, and vice versa. The authors assigned the value of q as either −1.3 or −0.8 to obtain a higher detection rate and a lower false-positive rate. The authors employed Scapy [148], a versatile tool for generating traffic, to mimic a DDoS attack. Scapy is capable of generating both regular and attack traffic. The software provides functionalities such as scanning, packet spoofing, forging, and sniffing. Scapy enables the generation of TCP packets. The tool is compatible with Python, which was also used by the POX controller in their study. This integration facilitated efficient coordination between the controller and the traffic generator for the authors. The Python function "random" was used to generate spoofed source IP addresses and host IP addresses. This function generates uniform random floats within the range of 0.0 to 1.0. These floats are merged to create forged IP addresses. Scapy’s features, such as the ability to specify packet types and intervals, allow for the generation of both regular and malicious network traffic. The authors employed the Scapy tool to initiate smurf, socket stress, and SYN flood DDoS attacks at the data plane layer. These attacks occur sporadically but consistently target the utility server.
Traffic features are extracted from new packets destined for the SDN controller. The SDN controller matches or identifies flows associated with SDN characteristics that demonstrate an anomaly in their entropy values or changes in entropy. The proposed algorithms effectively identify both low-rate (LR) and high-rate (HR) DDoS attacks and then apply countermeasures such as rate limitation and filtering. Each flow in flow tables is linked to a distinct action performed by the controller. With this technique, a detection rate of DDoS attacks of 100% was observed with a 0% false-positive rate. A shortcoming of this work is that the testbed design utilizes a single POX controller to accommodate the detecting module. Nevertheless, this creates a single point of vulnerability that might cause the entire system to fail. Additionally, POX is a legacy controller that is implemented using Python. Many practical applications utilize advanced controller systems, such as ONOS, for instance. The implementation of a distributed strategy with modern controllers has not yet been achieved. Moreover, the efficacy of their system in addressing more practical attack scenarios has not yet been achieved.

4.4. Moving Target Defense—Dynamic Topology

Used as a countermeasure, a moving target defense (MTD) implements flow, path, or route/switching mutation to defend normal operations in communication networks, making it difficult for attackers to launch successful DoS attacks along a given set of devices or paths. MTD enhances the ambiguity and complexity faced by system attackers, hence reducing their ability to identify targets such as susceptible system components. Additionally, it increases the cost of assaults and scans, including reconnaissance attacks [149]. An instance of an MTD is illustrated in Figure 7. The SDN controller communicates with the switches with the help of southbound API to instruct the switches on which links to use for flows. The green links are “on”, i.e., are active flows being used by the network. The red links contain data that are false or are links that are no longer active because they have been turned off by the SDN controller. When an attacker attacks these links, the false packets are not routed to the correct destination and are essentially dropped, which prevents them from affecting the intended network traffic.
Abdelkhalek et al. [44] introduce an MTD routing method to enhance the security of SDN-enabled SG systems. This technique synergizes the benefits of SDN’s dynamic programmability and MTD’s randomization in topology changes to avoid and mitigate cyberattacks in the smart grid. Their proposed mechanism randomizes the network topology by changing the paths that network flows take in response to a DoS attack. The SDN controller detects the obstruction of the communication pathway and redirects the data flow to an alternative accessible channel. The focus of this work is on DoS attacks on links and connections between the substations and the control center. To evaluate their implementation, it consists of four primary components: (1) The OPAL-RT is a power system simulator that combines physical grid models with network communication interfaces in real time. (2) The SD-WAN is based on Mininet and uses SDN technology to imitate routers, switches, and a controller. (3) The control center houses a comprehensive wide-area control system (WACS) program for overseeing the grid. (4) The external nodes comprise a cyber assailant who inserts denial-of-service (DoS) attacks into the SD-WAN, and a maintenance node that transmits legitimate data to the grid and control center. The grid and WACS exchange data via the DNP3 protocol, where measurements are converted from IEEE C37.118 to DNP3 using OPAL-RT’s I/O interface.
The SD-WAN enables DNP3-based communication using three concurrent channels, where the attacker and maintenance node are connected to the SD-WAN through a switch. The attack is characterized by a TCP SYN packet flood. The location is the data plane. The attack pattern involves an attacker carrying out a DoS attack on a communication channel that acts as the main route for data exchange between the control center and the grid. This attack assumes that the attacker can completely obstruct only one channel. Attack vectors exhibit varying levels of intensity, which can be quantified by the rate at which TCP SYN packets are injected each second. The rate can range from 0% to 100% of the maximum attack volume, which is set at 1000 packets per second for different test cases. One shortcoming of this work is that DDoS attacks and attacks on nodes/devices as single points of failure are not considered and should be investigated for future work. The proposed mechanism involves simulation using a real-time power system simulator (OPAL-RT), a Mininet network, and an SDN emulator, with external hosts acting as the attacker and the maintenance node. The proposed approach highlights significantly reduced packet drop percentages. The researchers also examine the link switching time that minimizes packet drops during DoS attacks.

4.5. Flow Filtration

Static state estimation (SSE) does not take into account the historical information of the measurement vector z and simply provides a single snapshot of the system. The concept of “memorylessness” in SSE was demonstrated to be suitable for real-time monitoring in early EMS. Historically, power networks had a less structured distribution level, with fewer microgrids, dispersed energy resources, and netload dynamics compared to contemporary systems. In addition, the measurement data that were provided to the state estimator usually came from measurement equipment with low sample frequencies, such as the SCADA system, which had sampling rates that fell within the range of 2–4 s. The modest metering rates were the primary hindrance to adequately capturing dynamic activity in state estimation. Nevertheless, Schweppe’s formulation emerged shortly after the introduction of the Kalman filter in 1961 [150], prompting academics to investigate alternative formulations beyond the then-nascent SSE. The problem of slow meter sample rates would be partially alleviated by implementing synchronized phasor measurements in the 1980s [151]. Phasor measurement units (PMUs) provide higher sampling rates in comparison to SCADA systems, together with GPS coordination to eliminate any uncertainty regarding synchronization. Dynamic state estimation (DSE) is akin to SSE and encompasses a range of methodologies. At first, the formulas for DSE used the same set of measurements and state variables as the classic SSE approach. These variables included both active and reactive power flow and injections, as well as complex bus voltages. Alternative approaches strive to enhance the accuracy of the representation of load dynamics by including the generator rotor angle and speed as differential-algebraic state variables [45,46,47]. However, this review will primarily concentrate on anomaly detection implementations that utilize algebraic state variables and are based on DSE. DSE can be accomplished by modeling the power system as a discrete-time dynamic system. The Kalman filter utilizes the method described in [48] to estimate the state variables at time k. This is achieved by carrying out prediction and measurement update stages in each iteration.
Predict:
x ^ k | k 1 = A k x ^ k 1 | k 1
F k | k 1 = A k F k 1 | k 1 A k T + Q k .
Update:
K k = F k | k 1 H k T H k F k | k 1 H k T + R k 1
x ^ k | k = x ^ k | k 1 + K k z k H k x ^ k | k 1
F k | k = F k | k 1 K k H k F k | k 1
where at time k, A k denotes the state transition matrix, K k denotes the Kalman gain matrix, and H k denotes the measurement matrix. The symbols F k | k and F k | k 1 denote the state covariance matrices inferred from measurements up to times k and k 1 correspondingly. The matrices Q k and R k reflect the statistical measure of the variability or dispersion of the process noise and observation noise, respectively. The creators of the original Kalman filter power system DSE approach [152] proposed that it may be combined with anomaly detection technologies, which were being studied for SSE at that particular period. Initial investigations, based on the studies conducted by [153,154], focused on identifying erroneous data by analyzing the process of innovation.
v k = y k h ( x ^ k | k 1 ) .
Additional approaches for managing inaccurate data in DSE include asymmetry analysis, which relies on evaluating the skewness of the normalized estimation error [48,49]. Research on anomaly detection in the field of DSE remains a lively and active area of study, as evidenced by [47,50]. This is especially significant due to the widespread occurrence of dynamic demand and generation profiles in microgrid systems that integrate distributed energy resources (DERs).

4.6. Summary and Lessons Learned

This section presents a comprehensive examination of the taxonomy of defense strategies employed to mitigate DDoS and DoS attacks in the context of SD-SG network security. In this section, we provide several solutions, namely blockchain, machine learning (ML), SDN attributes, and MTD. The performance of each is thoroughly examined, along with the respective benefits they offer. It is revealed that each proposed solution has demonstrated enhancements in the areas of confidence augmentation within the system; the precise identification of attacks; and the utilization of the inherent properties of SDN, such as the installation of flow rules, to bolster the security of SD-SG against DDoS and DoS attacks. Furthermore, certain domains have not been thoroughly investigated. Future research efforts should focus on examining the most suitable deployment site to minimize network overhead, enhance the speed of response of defense systems, and explore methods to retain throughput in order to restore connectivity in areas affected by DDoS attacks.
Several strategies have been proposed to counter controller attacks, such as the implementation of moving target defense (MTD) and the utilization of deep learning techniques. Game theory is being explored as a novel approach to enhancing network security in SD-SGs. Game developers utilize game theory to design games where the security system, acting as a player, must make several options to accomplish a pre-established goal, such as safeguarding the controller from an adversary. While game theory can enhance controller security and prevent data leakage to safeguard data privacy, integrating it into a system may lead to increased system overhead. In the following section, we will analyze the most recent research on defenses against controller attacks.

5. SDN Controller Attacks

SDN controllers are a crucial element in any SD-SG framework because of their significance in the background, algorithms, protocols, and tactics for DoS attacks. The ability to access the controller grants an operator full authority over network topology, as well as the ability to modify or create traffic regulations for their applications. SDN controllers are attractive to cyberattackers and are a significant concern for safe network management [155]. This section analyzes the tactics for defending against SD-SG controller attacks and classifies them according to their use of moving target defense (MTD) and game theory. This section focuses on reviewing the most recent literature about the protection of SDN controllers. Specifically, we will discuss the utilization of MTD strategies and game theory in defending against potential threats.

5.1. Moving Target Defense for Controller Attacks: Controller Migration

As discussed in Section 4.4, MTD defenses implement flow, path, or route/switching mutation to defend normal operations in communication networks. In this section, MTD is applied to protect against controller attacks by virtually migrating the controller instance instead of altering the network topology, in contrast to Section 4.4.
Lin et al. [51] introduce an MTD strategy that utilizes virtual security functions such as firewalls, intrusion detection systems (IDSs), traffic classifiers, and others to enhance the security of SDN networks in SG environments. Moreover, the researchers propose transferring the virtual security functions to servers with ample resources, which aids in reducing the impact on the virtual security activities. The suggested work comprises a three-tier architecture comprising an SDN controller layer, a virtual security function layer, and an infrastructure layer. Aside from the typical components of an SDN controller, there is an additional component known as migration controllers, which oversee the dynamic allocation of physical resources. The infrastructure layer consists of the typical hardware resource servers that operate using VSF instances and OpenFlow switches. The virtual security function enables the migration of the virtual security instantiation to new locations in the network to respond to network attacks. During the migration process, the authors carefully took into account parameters such as uniqueness, resource capacity, and bandwidth capacity limits. For example, the bandwidth capacity constraint can be defined as follows:
d m E t V b v w i j ( t ) × p i j v w ( t ) B i j , t R , i , j V P
where symbol B i j represents the bandwidth of the physical link e i j for all elements in the set E p . The symbol b v w ( t ) represents the bandwidth allocated to the virtual link d v w for all elements in the set E t V at time t. The sets V P and E P represent the collection of physical resource servers and the network links connecting them, respectively.
The suggested approach seeks to mitigate controller assaults by implementing a dynamic defense strategy of virtualized security in SD-SG, thereby impeding attackers from identifying and exploiting vulnerabilities. To evaluate their pre-approach against greedy and random migration policies, they developed a virtual testbed. The testbed consisted of virtual PCs connected by a network comprising five OpenFlow switches and one SDN controller. The current servers were interconnected using switches in a sporadic fashion. The server resources and residual bandwidth of physical links were assumed to follow uniform distributions. There were a total of 20 physical servers, with each server having a resource capacity ranging from 1000 to 1200 Mb. Each server had the capacity to accommodate one to five virtual security function (VSF) instances. The remaining bandwidth on physical lines varied between 100 and 150 Mb. The assigned resources for a VSF instance ranged from 150 to 200 Mb, with an occupancy rate ranging from 0.2 to 0.9. Moreover, the aggregate amount of data to be transmitted for a VSF instance varied between 3000 and 5000 megabytes. The strategies highlight their effectiveness in countering cyberattacks that specifically aimed at the controller’s physical location or sought to take advantage of weaknesses in the controller’s software. A shortcoming of their study is the presence of a persistent SDN controller responsible for overseeing the migration of other controllers. Their study does not address the possibility of the migration controller being attacked and compromised, which would render the migration scheme ineffective as the attackers may modify the migration process. Incorporating a migration scheme into the controller responsible for managing the migration should be considered in future studies. Another shortcoming of their work is that, despite the implementation of a distributed approach for the controller architectures, the entire framework introduces single points of failure due to certain modules such as "AllocatoR" being responsible for selecting the optimal location for SDN controllers to move to. These specialized modules might become vulnerable sources of failure and targets for attackers to exploit. Future work should aim to decentralize these modules to enhance ambiguity.
Azab et al. [52] introduce “MystifY”, a proactive MTD strategy designed to enhance the resilience of the software-defined control plane in software-defined cyber–physical systems (SD-CPSs) against attacks. The approach employs regular changes to the network addresses and/or ports of the controller, hence complicating the task of attackers in tracking the controller’s whereabouts and taking advantage of weaknesses. AllocatoR identifies the optimal location for deploying the controller. The system determines the most suitable site, referred to as S , such that | S | = c , with a capacity of c representing the number of SDN controllers connected to the network at that specific location S . AllocatoR selects the optimal position by taking into account the latency between the controller and the nodes, which is represented as L a v g ( S ) . The following equation is used to determine the average distance between SDN controller nodes and other connected nodes:
L a v g ( S ) = 1 n v V min d ( v , s )
Then, the controller is dynamically relocated among heterogeneously configured hosts. However, in contrast to other approaches, the workload of the controller also migrates among a set of multiple controllers for robust and increased resilience with controller operations. In order to assess the system, the authors employed the PYGRID framework, as described in [156], to simulate an SD-SG. PYGRID is a sophisticated software development and evaluation framework specifically created for grid-aware software-defined networking, making use of the Python programming language. In addition, in their simulation, they used several Python scripts to create grid traffic and establish paths between the mimicked power components. The testbed was constructed utilizing the IEEE 24-Bus power system to showcase the efficiency and efficacy of their proposed design. The PYGRID simulator had the IEEE 24-Bus system using twenty-four emulated virtual hosts. Their simulation scenario involved eight ‘Docker’ stations to symbolize the controller migration tier. Each Docker station contained an SDN container that included Ubuntu 14.04, Mininet 2.1.0, and POX 0.1.0 SDN controller. Based on their findings, MystifY can decrease the effectiveness of different types of attacks by preventing the attacker from determining the position or identity of the controller. The IEEE1646 [157] international standard in the energy industry specifies the communication delivery time and performance standards for the automation process in electric power substations. It was utilized to evaluate the performance of the author’s suggested framework. Their system has an average communication speed of 30 ms for both node-to-controller and controller-to-controller communication. This speed falls within the “medium speed” range (10–100 ms) for non-critical information of the IEEE1646 standards. The strategy is highly effective in countering assaults that specifically target the controller’s network location or seek to exploit flaws in the controller’s software.

5.2. Game Theory

Game theory is a framework that considers numerous decisions, such as in games, where players attempt to maximize their advantages while considering the rational choices of others, such as cyberattackers [158]. Game theory involves people making choices and acting to attain their goals. SD-SG network security studies evaluate cyber-threat scenarios using gaming theory. Control and data planes are evaluated as players.
Sivaraman et al. [53] suggest a game-theoretic strategy for enhancing data privacy in SD-SGs. The objective is to minimize the unintentional disclosure of information by compromised controllers. The privacy framework is based on the creation of a noncooperative game that involves switches. The quantification of privacy requirements is accomplished by employing information theory, namely mutual information and differential privacy. The game’s Nash equilibrium is computed using an iterative best-response approach [159]. The Nash equilibrium, a key idea in game theory, proposes that maintaining one’s initial approach can lead to advantageous outcomes, considering the decisions made by other participants. The authors’ proposed game theory achieves Nash equilibrium in their game. Their mapping probability matrix P is considered Nash equilibrium if and only if
f u ( p u , P u ) f u ( p u , P u ) p u S u u U .
The performance of the proposed strategy is evaluated by comparing it to both the globally optimal solution and the exponential mechanism, which is used for differential privacy. In comparison to global solutions (globally optimal mapping game), the theoretical game (differential private mapping game) achieved nearly optimal outcomes and demonstrated greater fairness on the IEEE 30, 118, and 300 networks [160]. Additionally, it enhanced the data security of the controller, safeguarding it against passive attacks. To summarize the highlights, the suggested method can enhance data confidentiality in SG systems and safeguard against compromised controllers. A shortcoming of this study is that the impact of quick scalability is not assessed. The presented technique is tailored for specific IEEE bus systems, but its performance under real-life scenarios of rapid expansion and grid education has not been evaluated yet. This aspect should be investigated in future research.
Unlike existing game-based methods, Samir et al. [54] propose a software-defined controller placement camouflage (SD-CPC) method as a stochastic game-based MTD technique to enhance the resilience of SDN controllers against cyberattacks. The model of a game-based MTD is depicted in Figure 8. The technique aims to enhance the security of SDN controllers by dynamically relocating virtualized controllers and altering their IP addresses, hence reducing their vulnerability to potential attackers. The objective is to identify the optimal positioning S in order to achieve the optimum outcome.
| S | = k
where the variable k represents the number of controllers dispatched at each of these locations. The game developed by the authors aims to reduce latency L a v g ( S ) by decreasing the distance between the placed controllers and the nodes assigned to them. The average latency can be calculated using the following formula:
L a v g ( S ) = 1 h v V min s S d ( v , s )
where the variable d ( v , s ) represents the shortest path from node v to node s, with v considered an element of the set V and s an element of the set S.The game consists of two participants: player 1 serves as the system defender, while player 2 assumes the role of the attacker. The assailant focused on the most susceptible areas of the network throughout their simulations, while the system defender identified the optimal position to relocate the controllers in response. The approach has exceptional performance in countering attacks that attempt to exploit flaws in the software of the controller or specifically target the physical location of the controller.To devise an optimal gaming strategy, the defender is advised to assign an equal chance of “0.25” to all places and acquire knowledge during gameplay, rather than consistently selecting the options with the lowest latency. This facilitates a fluid and adaptable learning process. The attacker’s cyberattack is classified as a DoS attack, specifically targeting the controller in the control plane at unpredictable intervals. Both the attacker and the defender employ dynamic strategies, such as adaptive learning, to ascertain the most effective approach in anticipation of real-world implementation. The game has little impact on system performance, and the SD-CPC technique provides a highly effective and efficient option for enhancing SDN resilience against advanced persistent threats to controllers. A shortcoming of this study is its exclusive focus on a single defender and attacker. The extent to which this system can handle and counter more complex and coordinated attacks has not been determined yet and should be investigated in future research.
SDN-related issues such as SDN controller assignment, anomaly detection, and mitigation can be represented as game models [55]. Niazi et al. [55] consider an intrusion detection system (IDS)-SDN architecture, such as the one shown in Figure 9, and formulate the strategic interaction between a hypervisor and a possible attack source, while the hypervisor monitors its virtual SDN (vSDN) controllers in the control plane, and the attack source launches DDoS attacks via compromised switches. The game is modeled as a noncooperative dynamic Bayesian game-theoretic IDS [55]. The conditional probabilities are utilized to forecast the adversary’s next activities, taking into account the historical profile and the sort of assailant in the preceding round. Subsequently, these probabilities are employed in Bayes’ law to gauge the hypervisor’s ( H s ) inference regarding the specific type of compromised switch. The authors leverage Bayes’ law to establish the belief update mechanism utilized by the hypervisor, allowing it to update its belief from stage game t n to t n + 1 . Thus, the belief about the type of switch ( S ) is modified at the end of the game in the following way:
μ H ( T D | a D ( t n ) , h D H ( t n ) ) = μ H ( T D | h D H ( t n ) ) P ( a s ( t n ) | T D , h d H ( t n ) ) μ H ( T D | h D H ( t n ) ) P ( a s ( t n ) | T D , h D H ( t n ) )
Figure 9 provides an example game scenario from [55]. The four scenarios show strategic interactions between the hypervisor and the attacker. Within the game model, a hypervisor can efficiently allocate its finite resources in order to effectively supervise guest virtualized SDN controllers. The depicted approach involves a hostile entity that strategically alters its behavior between normal and malicious states to evade detection. This is achieved through the breaching of a switch. In order to mitigate the impact of a DDoS attack on virtualized SDN-based SGs, the authors examine an attack method that takes advantage of a switch to generate low-traffic flows. This attack is designed to trigger packet-in signals to the controller, specifically targeting the control plane. This attack will finally overwhelm the hypervisor by excessively utilizing its resources with policy composition activities, potentially resulting in a random pattern. Therefore, if a hypervisor’s processing and storage resources are all exhausted, it will result in the services becoming unavailable. The analysis highlights that the noncooperative dynamic Bayesian game-theoretic intrusion detection system (IDS) enhances the likelihood of a hypervisor detecting distributed attacks, decreases the occurrence of false positives, and lowers the expenses associated with monitoring. An inherent shortcoming of the approach is that the use of a single hypervisor creates a new potential target for attackers. The attacker may attempt to directly target the hypervisor in order to render the game ineffective. Future work should consider protection measures to be implemented.

5.3. Summary and Lessons Learned

In this section, we examined the taxonomy of mitigation measures used to mitigate SDN controller-based attacks. We presented solutions in the form of MTD and game theory. We analyzed the individual advantages associated with each proposed option. It was observed that each proposed solution has the objective of enhancing the security of the controller to prevent the unauthorized disclosure of sensitive information, or alternatively, frequently relocating the virtualized instances of the controller to create a continuously evolving and dynamic environment for controllers to thwart targeting by attackers. Nevertheless, there are a few areas that require further investigation in future research. Future research should focus on investigating methods for detecting hacked controllers and examining the impact of frequently changing the virtual location of the controller on the quality of service (QoS) for end users. If a controller has already been compromised, it is clear that the approaches proposed in existing research will be insufficient.
Game-theoretic approaches are a recently explored field of study for SD-SG systems. A novel field of research in SD-SG focuses on developing multifaceted strategies for both attacking and defending. SD-SG is susceptible to various types of assaults, including false data injection (FDI), man-in-the-middle (MITM) attacks, and DDoS/DoS. To our knowledge, no other research has focused on the multi-attack scenario. However, at the University of Florida, with the support of a grant from the National Science Foundation (NSF), we have developed a suite of cross-layered strategies enhanced by machine learning algorithms to detect multi-pronged cyberattacks with greater performance than other state-of-the-art single-attack methods. We have developed distributed SDN-controller strategies to enable risk mitigation and throughput maintenance during cyberattacks.

6. Multi-Pronged Attacks

Multi-pronged attack defensive SD-SG solutions are primarily cross-layered, machine learning algorithm-assisted approaches that dynamically update the statistical model of both the system measurement parameters and the network parameters based on power flow traffic to improve the likelihood of detection of multi-pronged cyberattacks. Our multidisciplinary smart grid team at the University of Florida, consisting of experts in power, networks, and machine learning, has developed several ground-breaking cross-layered machine learning algorithms and demonstrated robustness in the presence of a range of SG attacks.

6.1. Cross-Layered Machine Learning Approach

Our suite of Cross-Layer Ensemble CorrDet with Adaptive Statistics (CECD-AS) methods has been designed to detect many types of cyberattack threats that have random attack patterns, including FDI, DoS, and MITM attacks, within the data plane layer of the SD-SG  [5,17,36,56,57,58].Allen et al. (2022) propose an SDN-based cross-layered strategy to safeguard SGs from cyberattacks. Their solution involves integrating data from the power grid, networking, and communication levels into a machine learning model. The cross-layer architecture is shown in Figure 10. The smart grid layer provides physical/physics-based monitoring and measurements, while the communication network layer monitors and provides cyber-based measurements. The analysis layer trains and tests the cross-layer data to model the system’s normal operations versus anomalous operations. The data are trained to detect and identify the presence of single attacks and multiple types of cyberattacks, including false data injection (FDI), denial-of-service (DoS), and man-in-the-middle (MITM) attacks. The management layer is responsible for mitigation actions using the SDN-based control of the SD-SG system.
The CECD-AS algorithm is used to evaluate data from the power grid and SDN-communication layers. Its purpose is to detect any unusual behavior in real time in the SD-SG. The algorithm is described in Algorithm 1. The equations required for the implementation of the CECD-AS algorithm are as follows:
The Mahalanobis distance equation:
δ m E C D ( z m ) = ( z m μ m ) T Σ m 1 ( z m μ m )
The threshold equation for the CECD-AS algorithm:
τ m = μ thr , m + η σ thr , m
The Woodbury matrix identity [161] in Equations (32) and (33) is used as follows:
μ n e w , m = ( 1 α ) μ m + α ( z m μ m )
Σ n e w , m 1 = 1 1 α Σ m 1 ( z m μ m ) ( z m μ m ) T 1 α α + ( z m μ m ) T ( z m μ m )
According to Starke et al. [36], the threshold value τ m for each local cross-layer CorrDet detector is modified using Equation (34), which considers the updated values of μ t h r , m , β and σ t h r , m , β . Here, the term β indicates that the threshold is updated based on the past β number of samples.
τ m = μ t h r , m , β + η σ t h r , m , β .
The framework is designed to facilitate a streamlined and cohesive approach across different components of the SG. The authors highlight the efficacy of the framework through a case study, which exhibits a classification accuracy of over 98% in countering the aforementioned multifaceted cyberattacks. It is crucial to ensure the dependability and robustness of contemporary power systems; therefore, the proposed method provides a proactive and all-encompassing strategy for SG cybersecurity. CECD-AS is an extension of our prior research and employs machine learning techniques [56,57,58], which will be further elaborated.
The CECD-AS algorithm, which enabled multi-pronged cyberattack detection, built upon the Ensemble CorrDet with Adaptive Statistics (ECD-AS) algorithm and the research efforts described in [57,58]. Nagaraj et al. [56] introduce the ECD-AS approach for identifying FDI attacks in the IEEE 118-bus system [162]. Their study introduces a technique that uses adaptive statistics to identify erroneous data in power systems, considering the typical or abnormal attributes of the constantly evolving state of a power system. The ECD-AS algorithm is based on the research carried out in the CorrDet algorithm [57] and the ECD algorithm [58]. ECD-AS is a set of CorrDet detectors that collect adaptive statistics for each local CorrDet environment. The method proposed in this research for detecting bad data is based on data-driven methods. It utilizes adaptive mean, adaptive covariance, and adaptive anomaly threshold, which are derived using a sliding window approach. This allows the technology to adapt to changes in the system state when processing incoming data. Through thorough experimentation with the hyperparameters of the ECD-AS process, in the case study of the IEEE 118-bus system, an optimal solution was achieved. These results highlight that this method outperforms the state-of-the-art ML algorithm in terms of accuracy, precision, recall, and F1 score when it comes to detecting bad data. A shortcoming of this work is that it does not investigate how well the method can be scaled to larger grid sizes, which is yet to be determined because it was tested solely on the IEEE 118 system. Further research should explore this topic.
Algorithm 1: Cross-Layer Ensemble CorrDet with Adaptive Statistics (CECD-AS) Algorithm from Aljohani et al. [17]
1:
Train a Cross-Layer Ensemble CorrDet classifier:
Input: 
Z , Y , Z ˜
2:
for Every local Cross-layer CorrDet classifier m = 1 : M  do
3:
    Initialize the mean μ m and covariance Σ m 1 of normal statistics using the sample mean and covariance of normal samples in the training set with selected triple elements associated with ϕ m
4:
    Initialize the squared Mahalanobis distance δ Z , m using Equation (30)
5:
    Initialize the threshold τ m using Equation (31)
6:
end for
 
7:
Test using the Cross-Layer Ensemble CorrDet classifier with Adaptive Statistics:
 
8:
for Every test sample k = 1 : K 2  do
9:
    Compute the squared Mahalanobis distance δ z ˜ k using Equation (30)
10:
    if  m , δ z ˜ k < τ m  then
11:
        Classify z ˜ k as normal sample: y ˜ k = 0
12:
        Update the mean μ m and covariance Σ m 1 using Equations (32) and (33)
13:
        Update the sliding window by adding δ z ˜ k to B and removing the oldest value from B .
14:
        Update the mean μ t h r , m , β and variance σ t h r , m , β of squared Mahalanobis distances in the updated sliding window of each local cross-layer CorrDet detector
15:
        Update the threshold value τ m for each local cross-layer CorrDet detector using Equation (34)
16:
    else
17:
        Classify z ˜ k as abnormal sample: y ˜ k = 1
18:
    end if
19:
end for
Output: 
Y ˜
A cross-layered cyber–physical power system state estimation framework was implemented by Aljohani et al. in [17] using the Cross-Layer Ensemble CorrDet with Adaptive Statistics (CECD-AS) method. The framework utilizes data from the physical layer and communication layer to assess the condition of the power system. It synchronizes the measurements for the CECD-AS machine learning algorithm, as demonstrated in Algorithm 1. The results highlight that the real-time CECD-AS approach surpasses other advanced state estimation methods in terms of F1 score when dealing with various cyberattacks. This is due to its capability to learn from the data collected across multiple layers of the SG and adjust to dynamic spatiotemporal changes in measurement data. A shortcoming of this technique is that data synchronization is required. Any errors or discrepancies can lead to unanticipated adverse outcomes in the classification process. Hence, it is crucial to guarantee that the sliding window has the same duration for both layers of the grid. Future research should explore a more resilient sliding window approach to address synchronization difficulties.
Agnew et al. [5] further develop the SDN architecture layer of the CECD-AS method, presenting a flat, distributed design for enhancing resilience against DoS cyberattacks. The proposed architecture depicted in Figure 11 utilizes a set of open network operating system (ONOS) controllers [163]. These controllers have a distributed control and decision-making control plane for the SD-SG, which is referred to as D3-SDN for the three-controller system. In the study conducted by Agnew et al. [76], a benchmarking analysis was carried out to compare the performance of the proposed architecture with the POX controller, which is a commonly used controller solution in SD-SG research [43,164,165]. The purpose of this comparison was to highlight that, when compared to the POX controller architecture, the D3-SDN framework improved throughput and reduced latency during DoS attack scenarios. A shortcoming of this research is that we have not yet determined how well the controller framework performs in comparison to other widely used controllers such as RYU or Opendaylight. Future analytical studies should conduct performance comparisons between the ONOS framework and other modern controllers.

6.2. Machine Learning

The investigation conducted in [59] reveals that cyberattack detection solutions relying on a single machine learning model face challenges such as limited ability to adapt to different scenarios and inadequate detection of all sorts of attacks. Zakaria et al. [59] propose BoostIDS, a new framework that utilizes ensemble learning to effectively identify and address security threats such as DDoS, probing, fuzzers, and backdoor attacks in SD-SG. BootIDS is implemented as an application within the application layer of the SDN architecture and comprises two components. The authors’ study employs the NSW-NB15 and NSL-KDD datasets. These datasets contain many sorts of real attacks based on SG technology, including fuzzers (24,246 attack data samples), DDoS (16,353 attack data samples), analysis (2677 attack data samples), reconnaissance (13,987 attack data samples), backdoors (2329 attack data samples), and other types of attacks. The NSLKDD dataset is an enhanced iteration of the KDD’99 dataset that includes genuine SG-based assaults like probe (probing) and DDoS. Attacks are randomly generated and occur within the data plane of the network. The initial module uses the boosting feature selection algorithm to identify pertinent SG characteristics. The second module employs a lightweight boosting algorithm to efficiently identify intrusions in an SD-SG. The empirical findings highlight that BoostIDS exhibits superior precision, accuracy, detection rate, and F1 score in comparison to pre-existing machine learning intrusion detection systems. A shortcoming of this work is that it is only meant to be utilized for a single controller framework. Nevertheless, if a malicious actor successfully infiltrates the controller, the framework would be rendered inoperable. Further work should integrate a distributed strategy or failsafe.
Unlike the previous studies, deep learning is considered in [60] for the anomaly detection of multi-pronged cyberattacks since it has great feature learning capabilities. Penpeng et al. [60] present a hybrid convolutional neural network (HYBRID-CNN) to detect irregular flow caused by various attacks, including scan, DoS, root-to-local (R2L), probe, and user-to-root (U2R) assaults, that are randomly initiated in the data plane of an SD-SG. The proposed approach employs a deep neural network (DNN) to store and recall global characteristics, while the convolutional neural network (CNN) is utilized to generalize local features, resulting in enhanced feature learning skills. After combining the features for each sample, the authors utilize a fully connected layer to perform detection and classification. This implies that there is a complete and direct connection between every neuron in the preceding layer and every neuron in the current layer. The fully connected layer of the authors is located before the output layer. After converting the retrieved characteristics into a one-dimensional feature vector, they are connected to each neuron in the current layer to accurately represent the high-level properties in a specific way, which is as follows:
x i = f ( i = 1 n w i , j x i + b 1 ) .
While the HYBRID-CNN approach highlights the successful detection of anomalous data flows with a high detection rate, a limitation of this study is its tendency to favor certain attack classes. This is a result of using unbalanced datasets in the implementation. Nevertheless, it yields superior outcomes compared to conventional and deep learning approaches. Future research should aim to employ a dataset that is more unbiased and equitable for the purposes of training and testing.

6.3. Summary and Lessons Learned

This section provides an overview of the taxonomy of multi-pronged cyberattack solutions for the security of SD-SG networks. The performance and benefits of each solution were examined and analyzed during our discussion. We observed that the main focus of each solution is to gather measurements from the communication layer and the power grid in a cross-layered manner to boost overall security. Nevertheless, it is imperative to acknowledge that certain domains still need further investigation in subsequent research efforts. The discussion regarding the optimization of these solutions has not yet occurred. The presented articles do not thoroughly address the added complexity caused by the requirement for consistent timestamped measurements from each physical and network layer, as well as each communicating device in the forwarding layer. Furthermore, their methodology necessitates extracting comprehensive data from both layers of the SD-SG and fails to yield adequate results in the absence of either. Future research endeavors should focus on the development of optimized systems that can effectively minimize overhead and offer versatile multi-attack capabilities, functioning independently in each layer without reliance on the other.

7. Grid Balancing Attacks

Another growing area of concern that is becoming increasingly important is cybersecurity research related to SG demand response (DR) and frequency stability (FS). Power fluctuations present a potential hazard to the secure functioning of power systems. Nevertheless, DR provides a solution by modifying the power usage of adaptable loads on the demand side. This efficiently resolves power oscillations, ensuring an equilibrium between power supply and demand in power systems. Therefore, distributed renewable energy is expected to play a progressively vital role in modern power systems in the near future.
Frequency stability refers to the power system’s capacity to keep the system frequency within the predetermined operational boundaries. Maintaining the system frequency at its prescribed value is crucial for the secure and steady operation of the power system. Any departure from this frequency could lead to substantial harm or possibly the complete failure of the system. Therefore, frequency regulation and stability are considered to be among the most crucial operational functions for the power system. The system achieves this by modifying the production or usage of electricity to match the frequency variation, thus keeping the system frequency within the specified range. Adversaries may employ many methods to disrupt the demand response (DR) and frequency (FS) stability of SD-SG by launching cyberattacks such as deception cyberattacks (DCAs), DoS attacks, delay attacks, and replay attacks [61]. Therefore, in this section, we will examine the current advances in both fields.

7.1. Demand Response

Yang et al. [61] emphasize the crucial importance of DR in power systems, highlighting its capability to provide operating reserves by utilizing variable demand-side loads. They emphasize the transformation of disaster recovery into a cyber–physical system enabled by progress in communication, information, and control technology. Nevertheless, they warn that this extensive integration of cyber and physical systems increases vulnerability to cybersecurity threats, particularly deception cyberattacks (DCAs), which put the effectiveness of disaster recovery and the overall safety of power system operations at risk. Their study suggests implementing a secure distributed control mechanism to strengthen the defense of DR against DCAs. The core of their strategy is creating a cyber–physical demand response community that is based on a decentralized control architecture. The goal is to enhance the available reserves for power systems. The authors rigorously measure the effects of different DCA patterns on DR, clarifying potential outcomes such as power deviation, delayed response, and power fluctuation. Additionally, they provide an anti-attack secure distributed control architecture specifically developed to reduce the impact of arbitrary DCAs. The effectiveness of this control technique is thoroughly verified using Lyapunov theorem-based demonstrations, guaranteeing stability and convergence in demand response power regulation even in the presence of malicious cyberattacks.
Their case studies provide evidence supporting the effectiveness of the suggested control technique, demonstrating notable improvements in demand response performance across several attack situations. The effectiveness of the suggested ASD control is confirmed in a DR community consisting of 10 buildings. Each building is equipped with an inverter-based HVAC system, specifically the LSBLX650SVE model. This model is capable of regulating the temperature of an entire building. Each HVAC unit has the ability to communicate with nearby units in its vicinity. The HVAC characteristics, including the COP (coefficient of performance) and rated power, are determined through realistic testing conducted in accordance with the ARI550/590-2003 standard operating circumstances. It is worth highlighting that the suggested anti-attack secure distributed (ASD) control can significantly reduce the detrimental effects of DCAs, as indicated by a dramatic rise in the average CR of DR from 29.18% to 99.67% during testing under linear attack settings. The authors present evidence demonstrating that the ASD control paradigm is highly effective in protecting against DR in hostile cyber environments, hence improving the resilience and security of power systems. A potential shortcoming could arise from the difficulty of creating and maintaining a secure distributed control system. Given the complex combination of digital and physical elements in DR and the always-changing cyber risks, setting up and maintaining such a system may necessitate significant knowledge and adjustments for implementation. Future research should focus on ensuring the generalizability of their system to accommodate legacy systems as efficiently as possible.
Similarly, Yang et al. [62] explore the use of DR mechanisms, namely by utilizing heating, ventilation, and air conditioning (HVAC) loads, as a crucial method for maintaining power system balance. The HVAC loads, which account for a major proportion of overall power usage, have considerable potential for regulation that justifies additional investigation. Distributed control approaches are crucial for managing scattered HVAC resources within the DR framework because of their inherent flexibility and scalability. Nevertheless, the decentralized structure of DR systems makes them vulnerable to cyberattacks, particularly FDI attacks, which endanger the proper functioning of DR. In order to mitigate this vulnerability, their study presents a robust distributed controller specifically designed to protect HVAC systems from FDI attacks. The first implementation of an HVAC-based demand response system using distributed control lays the groundwork for further analysis and mitigation techniques. Mathematical calculations demonstrate that even small FDI attacks can cause substantial changes in power output, emphasizing the importance of strong security mechanisms. Therefore, a distributed controller that is impervious to FDI attacks has been developed to ensure that grid operating reserve needs are met even in the presence of adversarial intrusions. The effectiveness of the suggested controller is supported by thorough mathematical demonstrations, utilizing the Laplace transform and final value theorem to illustrate convergence.
The case study provides evidence that supports the theoretical predictions, demonstrating the disruptive impact of FDI attacks on DR performance. The use of the robust distributed controller significantly improves the completion rates of DR tasks, increasing them from 58.63% to 100% even when facing FDI attacks. This demonstrates the controller’s efficiency in reducing cybersecurity threats in HVAC-based DR systems. The case study utilizes Intel Core i7-10700 CPU, running at a clock speed of 2.90 GHz, and the simulation environment employed is Matlab R2022a. There are two categories of cyberattacks that are replicated: single-action cyberattacks and series-of-action cyberattacks. The former strategy entails a sustained attack for the whole 15-min duration of the DR period, whereas the latter consists of five distinct attack rounds, with each round lasting 3 min. During a succession of cyberattacks, the system is targeted with dynamic false data, which poses different obstacles. Notwithstanding these challenges, the suggested robust distributed controller guarantees agreement on the control of HVACs’ power and comfort levels. The DR system highlights exceptional resistance against cyberattacks, attaining a flawless 100% completion rate without any power fluctuation. This highlights the efficacy of the suggested controller in reducing negative impacts and fulfilling the power system’s need for operational reserves, even when confronted with advanced cyber threats. One possible shortcoming is that the attack protection architecture is only evaluated using two distinct attack patterns: single-action cyberattacks and series-of-action cyberattacks. During a sequence of consecutive cyberattacks, each attack occurs in succession to the previous one. Nevertheless, the manner in which the suggested architecture manages simultaneous cyberattacks remains to be implemented. The attackers may initiate dynamic cyberattacks, which need further investigation in future research.

7.2. Frequency Stability

Su et al. [63] emphasize the importance of enhancing the dynamic performance in secondary frequency control for islanded microgrids (MGs) to guarantee stability, especially with synchronous distributed energy supplies. Their paper presents a control technique that utilizes membership functions (MFs) to achieve a compromise between transient frequency regulation and error elimination. A proposed solution to address time-varying communication delays in control loops is an adaptive delay compensator, which successfully minimizes negative impacts. The method’s advantages are demonstrated by numerical simulations conducted on IEEE 34-bus and common 40-bus islanded MG systems. Three synchronous distributed energy resources (DERs) are utilized for secondary frequency regulation in the IEEE 34-bus test system. These DERs are located at nodes 800, 816, and 840. Two inverter-based DERs, located at nodes 828 and 848, are currently operating in the PQ mode. In a standard 40-bus MG system, three synchronous DERs are assigned the task of regulating the frequency, while three DERs based on inverters operate in the PQ mode. Every synchronous DER is fitted with a digital phasor measurement unit (D-PMU) to give precise synchronization measurements with timestamps. After the first stabilization of primary regulation, the MF-SFR method enhances the settling time by 21.07% and 13.92%, minimizes the frequency overshoot by 95.78% and 93.95%, and reduces the mechanical power overshoot by 26.44% and 2.68%, respectively. Conducting both primary and secondary frequency control at the same time while experiencing a 30% rise in power demand results in a 65.17% and 57.43% reduction in the settling time, a 96.76% and 94.19% drop in frequency overshoot, and a 23.29% and 5.02% reduction in mechanical power overshoot. In addition, when compared to situations involving unpredictable communication delays, the suggested delay compensator enhances the time it takes for the system to stabilize by 66.46% and decreases the occurrences of excessive frequency and mechanical power by 69.41% and 21.14%, respectively. A possible shortcoming of this research is that the suggested framework exclusively concentrates on the IEEE 34-bus system and does not address the scalability of the framework for microgrids of different sizes. Subsequent research should assess the performance of this approach considering this aspect.
Similarly, Yang et al. [64] address the critical issue of managing multiple emergency events in modern power systems, which can lead to frequency deterioration and threaten energy security. They propose a robustness-enhanced frequency regulation (REFR) scheme based on coordinate transformation and the Lyapunov theorem. The scheme reconstructs the power system frequency regulation model to accommodate various emergency events and utilizes a virtual auxiliary surface for control reference, enabling a robust controller to maintain system frequency stability and ensure minor frequency deviations and faster recovery speeds even during emergencies. The stability of the proposed controller is rigorously proven, and case studies highlight significant improvements in the maximum frequency deviation and recovery time, up to 61.11% and 46.40%, respectively, compared to original values. The testbed is constructed using the Simulink module of Matlab R2021a. For the case study, the authors set the electricity system to have a generation capacity of 800 MW and operate at a planned frequency of 50 Hz. The time constants of the speed governor ( T g ) and the steam turbine ( T t ) are 0.1 s and 0.3 s, respectively. The drooping characteristic (R) has a value of 0.05, while the integral control gain ( K e ) is 21. The inertia constant ( T p ) and damping coefficient ( K d ) have values of 10 and 1, respectively. Once the setup and configuration are complete, the power system operation center continuously monitors the system frequency in real time. During emergency occurrences, such as unplanned generator failures, sudden increases in electricity demand, and unforeseen communication delays, the system frequency will diverge from the planned frequency. In real-world scenarios, when the frequency deviation δ f surpasses the frequency deviation threshold, ( f t h r = 0.001 Hz), the system operator will issue a frequency control order that includes the observed parameter regarding the frequency deviation. Upon receiving the command, the frequency regulation is initiated using the proposed REFR scheme based on the detected parameter, which may be subject to inaccuracies caused by communication time delays. The REFR scheme effectively mitigates frequency fluctuations and enables convergence to scheduled frequency within a short time, even in complex scenarios with multiple emergency events. Overall, the proposed method shows promising results in enhancing frequency regulation and addressing power energy security concerns. An inherent limitation arises when employing a robust controller for their framework since any malfunction or misinterpretation of the controller’s frequency could impede the proper functioning of their proposed framework. Hence, further research should explore a decentralized, localized approach for reading and decision-making on frequency correction to ensure enhanced resiliency.
Comparably, Su et al. [65] present a hierarchical control technique for inverter air conditioners (IACs) that aims to enhance the frequency performance of islanded microgrids (MGs) while also assuring user comfort and equitable power distribution among IACs. The occurrence of an emergency might be attributed to either cyberattacks or natural disasters during the operation of the grid. The strategy comprises a localized layer and a supervisory layer, each dedicated to unique control objectives. The local layer utilizes a decentralized controller that is based on normal-form-based nonlinear control theory. It uses system frequency and indoor temperature signals to improve frequency dynamic performance while ensuring user comfort. Meanwhile, the supervisory layer utilizes a consensus-based distributed controller to guarantee equitable power involvement among IACs, taking into account the varying power levels of isolated MGs. A membership function resembling a trapezoid is introduced to automatically swap between the dominant roles of the two controllers. The simulation results conducted on the IEEE 34-bus system illustrate the efficacy of the suggested hierarchical control technique across several scenarios, encompassing varying amounts of power deficit and ongoing critical contingencies. The proposed hierarchical control strategy is validated using the IEEE 34-bus system, a commonly used system for studying islanded microgrids.
The strategy is shown to improve the system frequency performance while ensuring user comfort requirements and fair power participation of inverter air conditioners (IACs). The nominal power of the test system and the standard frequency of the system are 100 kW and 60 Hz, respectively. The comprehensive system parameters are determined. The modeling and simulation are conducted using MATLAB/Simulink. Distributed energy resources (DER1 and DER3), which are part of the simulation system, are assigned the task of regulating the frequency of the MG system. These distributed energy resources have assured regulatory reserves. In addition, the controllable loads selected for providing frequency regulation service are buses 808, 820, 830, 844, 860, and 890. These loads consist of IACs, which contribute to 10% of the total active power. The control center serves as the primary node in a leadership role. Bus 808 is connected to the control center in order to receive the consensus index, which is the power adjusting ratio. Then, the index is exchanged among IACs to ensure fair power participation. The implementation of the hierarchical control approach highlights favorable outcomes in enhancing the performance of system frequency, diminishing frequency overshoot, and expediting the settling time in comparison to other strategies. In a situation where there is a 40% shortage of power, the suggested plan greatly enhances the lowest point of frequency, decreases the amount by which the frequency exceeds its target, and speeds up the time it takes for the system to stabilize when compared to alternative methods. Furthermore, the technique successfully promotes equitable power involvement among IACs while also prioritizing user comfort, suggesting its potential suitability in practical microgrids. In addition, the control mode demonstrates robust user privacy protection capability and offers plug-and-play and scalable functionality. The authors point out a potential shortcoming of the work that an increase in communication delay would negatively impact the dynamic performance of the system frequency. However, the researchers did not delve into the development of the proposed hierarchical technique to mitigate these communication delays, since it falls outside the scope of their research. The authors conducted tests to measure the performance of their framework for delays of 0 ms, 30 ms, 60 ms, and 100 ms. Frequently, in communication, the delays exhibit greater variability and are influenced by the level of traffic demand. Future studies should focus on investigating not only the impact of increased delay magnitude on this framework but also the consequences of delay variability.

7.3. Summary and Lessons Learned

This section provides an overview of the taxonomy of demand response and frequency stability solutions pertaining to the security of SG networks. Demand response (DR) and frequency stability (FS) are emerging areas of cybersecurity that focus on ensuring the security of smart grids. Adversaries might use several techniques to disrupt the demand response and frequency stability of SD-SG by initiating coordinated attacks such as deception cyberattacks (DCAs), DoS attacks, delay attacks, and replay attacks. The present research has established frameworks for ensuring the security and stability of grids and microgrids. Subsequent research should aim to build upon these findings in order to enhance the grid further. SDN can be utilized for resource allocation in the mentioned DR and FS defensive models. Future research on SD-SG security should consult these review articles to guide the integration of DR and FS for SD-SG security.

8. Emerging Security Threats to SD-SG

This section focuses on analyzing developing possible risks to SD-SG network security in the form of cyber assaults that have not been studied in the context of SD-SG. We also present potential remedies that have been identified in earlier research on SDN security. Figure 4 illustrates the rising threats to SD-SG network security research, which include low-rate denial-of-service (LDoS) attacks, controller botnet attacks, controller impersonation attacks, and black hole attacks.

8.1. Low-Rate Denial-of-Service (LDoS) Attacks

LDoS attacks are a more covert iteration of the forceful character exhibited by distributed denial-of-service (DDoS) attacks [166]. Advancements in network security technology have made it easier to quickly identify and minimize denial-of-service (DoS) attacks. To evade detection and improve their effectiveness, other kinds of DoS attacks, such as LDoS attacks, have emerged. Unlike DoS attacks, LDoS attacks utilize a focused approach by exploiting vulnerabilities in network protocols to cause significant harm with minimal effort. LDoS attacks are characterized by periodic surges of activity rather than continuous data streams, resulting in a lower average attack rate. Their periodic habit enhances their ability to remain undetected by conventional security systems, making them more elusive and adaptable. Multiple network platforms such as software-defined networks (SDNs) are increasingly vulnerable to LDoS attacks [167,168]. LDoS attacks utilize network bandwidth, processing power, and memory resources to impair the performance or availability of the target. LDoS attacks aim to evade detection and prevent overwhelming the target system or network with excessive traffic. LDoS attacks can circumvent intrusion detection systems and other security measures that detect large-scale attacks by transmitting small amounts of traffic in quick bursts of packets over a period of time. LDoS attacks are aimed at long-term disruption. Over time, this will degrade the QoS of affected businesses, service providers, and end users while avoiding detection by existing solutions.
Presently, the strategies employed to counter LDoS assaults encompass the implementation of filtering mechanisms, enhancing network parameters, and reallocating resources [166]. Researchers employed comb filter-to-filter LDoS attacks from TCP traffic by evaluating the amplitude spectrum and determining the periodic characteristics of the LDoS attack [169]. Other researchers have utilized the random early detection (RED) algorithm, an active queue management (AQM) technique implemented on the router. The RED algorithm proactively discards packets before the router’s buffer reaches its maximum capacity in order to prevent congestion. Researchers [170,171] have implemented modified versions of random early detection (RED) and active queue management (AQM) techniques on routers to identify LDoS assaults. Previous studies [172] have utilized Q-learning-based machine learning models to allocate resources dynamically according to requirements. The incorporation of these algorithms and methodologies could prove valuable in the field of SD-SG network security research. One possible challenge in transferring these techniques is the high computing cost and the lack of evaluation on larger systems such as power grids. The system’s overhead and latency are increased when network traffic is filtered at the controller or application layer; this can have a significant negative influence on grid performance. Future research should explore methods of implementing these solutions or alternative approaches to enhance the communication performance of the SD-SG grid without compromising its efficiency. A potential solution is to transfer the processing to the data plane layer in order to decrease communication latency and alleviate the computational burden on the controller.

8.2. Controller Botnet Attacks

Botnets are networks of compromised computers that have been infected with malware and are under the control of a single individual known as the botmaster. A botnet consists of three main components: bots, a botmaster, and a command and control channel (C&C) [173]. Bots are computers that are infected with malware and are part of a network called a botnet. The number of bots in a botnet can reach hundreds of thousands. The C&C channel functions as a server that is tasked with distributing commands and collecting information for further retrieval by the botmaster. By gaining control of the botnet, the botmaster can begin cyberattacks, distribute spam or malware, carry out extortion attacks, steal personal information, and cause significant financial losses, among other malicious activities [173]. Figure 12 illustrates the structure of a botnet. In addition, botmasters may provide compromised systems to other hackers for utilization in their own assaults. Due to their significant role in network governance, as previously indicated, SDN controllers are attractive targets for botmasters seeking to gain control of them for their own benefit. The utilization of an impacted controller has the potential to propagate malware from the botnet to other devices inside the network, impacting all interconnected nodes on the network. In addition, the individual in possession of the botnet could employ the controller to initiate various cyberattacks, such as launching denial-of-service (DoS) attacks on additional networks. Moreover, the controller can be employed to collect network statistics in order to identify additional vulnerabilities within the network. Compromised controllers may cause network disruptions and outages that affect businesses, service providers, and end users.
Recent studies have employed diverse techniques, including honeypots, intrusion detection systems (IDSs), and machine learning, to identify botnets [173]. Honeypots serve as deceptive nodes inside a network, enticing attackers to focus their efforts on them. In response, defense frameworks have been created to incorporate the usage of honeypots [174,175,176]. When the device is targeted by attackers, network operators can obtain information about the size and strength of the botnet without compromising the security of the legitimate network nodes [177]. Previous studies have devised techniques to identify botnet command and control (C&C) server bots through the analysis of Domain Name System (DNS) requests [178,179,180]. The botnet command and control (C&C) servers commonly utilize Dynamic DNS (DDNS) providers. In addition, scientists have developed intrusion detection systems (IDSs) to identify botnets [181,182,183]. A potential challenge in transferring these strategies to the SD-SG is the need to manage the additional overhead and optimize the placement of honeypot instances, as well as the machine learning (ML) and intrusion detection systems (IDSs). Honeypot systems must be disguised as typical grid buses, necessitating the use of unnecessary communication to create the illusion. This will result in additional communication overhead. In order to ensure the optimal performance of the grid, it is necessary to integrate ML and IDS into existing legacy systems. However, it is important to be cautious and avoid any negative impact on the grid’s performance. This integration will include analyzing all traffic on the grid, which may require some adjustments to enhance the grid’s efficiency. One potential option could be to occasionally utilize existing buses as honeypots while also operating them as ordinary buses at other times. This will enable the integration of honeypots into network operations without incurring any additional expenses for network operators or communication costs. Implementing a distributed approach at the data plan layer for ML and IDS solutions has the potential to decrease communication latency and limitations. By implementing the necessary adjustments, these methods could be applied in SD-SG defense frameworks.

8.3. Controller Impersonation Attacks

Controller impersonation attacks targeting SDN controllers pose a major threat to current SD-SG networks. During these attacks, a malicious entity pretends to be the SDN controller. The attacker can manipulate the SD-SG communication network by impersonating the SDN controller, issuing false commands, altering network traffic, and compromising the network’s security and availability. This form of attack has the potential to result in unauthorized entry, data breaches, and disruptions in service [184,185]. The dynamic and centralized nature of SDN increases its susceptibility to vulnerabilities, as the controller’s function is crucial for managing network operations. Therefore, safeguarding the SDN controller from impersonation is crucial for maintaining the overall security of the network. This involves deploying robust authentication techniques, ongoing surveillance, and the utilization of anomaly detection to promptly detect and address such threats.
In order to tackle this problem, researchers have suggested authentication models to validate controller communications [184] or have suggested employing IDSs and ML algorithms to identify these assaults [186]. Controller impersonation attacks warrant additional research in SD-SG network security due to the potential for an impostor controller to disrupt the network topology and consequently compromise the power grid layer. This would result in the disruption of QoS for enterprises, service providers, and end users, potentially leading to significant financial losses for providers as they endeavor to mitigate the danger. A challenge that may develop when transferring the solution to SD-SG is the positioning of the authentication service. The distance between controllers may be significant, resulting in increased latency and overhead while transmitting authentication codes to the authentication or ML module. One such approach is determining the most efficient position for the authentication module, taking into account both the minimum distance and latency between all controllers. Additionally, the security of this module against prospective attackers should be considered.

8.4. Black Hole Attacks

A black hole attack is a type of cyberattack where a hostile node, such as an SDN-enabled router or switch, intentionally discards or absorbs all incoming packets, resulting in a network disruption referred to as a “black hole” [187,188]. Black hole attacks are highly destructive attacks that pose a significant threat to wireless sensor networks (WSNs) [189]. Wireless sensor networks (WSNs) have been created and suggested in the current SD-SG paradigm [9]. There is a possibility that an assailant may seize control of these nodes in order to manipulate their behavior in this manner. In addition, the attacker can enhance this attack by taking control of a controller and manipulating the flow tables of the forwarding devices to redirect network communications to a black hole, causing them to be dropped. This would eventually lead to network disruptions and the disruption of QoS for businesses, service providers, and end users.
The potential costs associated with addressing the consequences of this attack may vary depending on factors such as the ability to identify the attacker and the specific switches that have been compromised. Various detection methods for black hole attacks have been suggested in research, including IDs [190,191], clustering [192,193], cryptography [194,195], and trust-based voting schemes [196,197]. These strategies are designed to reduce, identify, and/or stop these techniques. While black hole attacks are more prevalent in wireless networks compared to wired networks, SD-SG systems can utilize both wired and wireless connections. Therefore, it is imperative to build security measures for these attacks, as a black hole attack can lead to data loss and the disruption of quality of service. One possible challenge that could occur when transferring these solutions to SD-SGs is the potential complexity of managing keys or trust-based voting schemes, which may be particularly challenging for larger systems like grids and could result in delays while waiting for authentication. Clustering has demonstrated effectiveness in MANETS. A possible solution could involve employing a distributed SDN approach, where the controllers themselves implement anti-black hole attack methods for their section of the grid. This approach would enhance the performance of these techniques by assigning each controller a smaller portion of the grid to monitor.

8.5. Summary and Lessons Learned

It is recommended that future research on network security in the context of SD-SGs concentrate on the development of countermeasures against the attacks that have been stated previously. Localized software-defined networking (SDN) networks, mobile ad hoc networks (MANETs), and software-defined data centers (SDDCs) are some examples of the SDN applications and research disciplines that have developed specialized security frameworks to combat these attacks [78]. The solutions include trust-based voting mechanisms, filtering, network monitoring, intrusion detection systems (IDSs), and machine learning. Within this particular area of research, the strategies for defending against these attacks are undergoing significant progress and development, as new methods are being introduced to safeguard these networks.
On the other hand, there is a lack of comprehensive research and ongoing exploration in these areas of SD-SG research. It is problematic that existing specialized solutions for other applications do not take into account the design or behavior of the communication layer of SD-SG. This is the reason why this situation is problematic. Consequently, the specialized solutions that are now available for various domains will not be suitable for SD-SG security applications. If these vulnerabilities are discovered in the security of SD-SG, hackers may take advantage of them in order to disrupt the quality of service that SD-SG users receive. It is vital to develop security strategies that are unique to SD-SGs in order to safeguard the grid from the intrusions that these threats provide.

9. Open Challenges

The importance of SD-SG as a vital infrastructure for providing electricity and energy to clients will continue to increase. In this section, new emerging challenges are outlined, including network resiliency, the privacy of network data, the reliability of network defense mechanisms, and the adaptability of network solutions.

9.1. Network Resilience after Cyberattack

An important challenge in network security is the notion of resiliency, which pertains to the network’s capacity to quickly restore compromised nodes and restore connectivity for end users after a cyberattack. According to [198], the robustness of communication networks has a significant influence on society. This is especially clear in the context of SD-SG infrastructure, where the presence of communications is vital. The SD-SG infrastructure, which is highly dependent on a robust communication network, has a crucial function in ensuring uninterrupted and dependable energy supplies. Given the presence of external dangers, it is crucial to promptly reinstate network functionality and guarantee the smooth functioning of the SD-SG. This resilience not only ensures the continuation of operations during cyberattacks but also serves as a vital protective measure against major disruptions in energy services for both public and private enterprises. Thus, it is crucial to improve the resilience of communication networks in order to safeguard important infrastructure and maintain the stability of essential services.
As mentioned in Section 4, DoS attacks provide a substantial threat to the robustness of SD-SG networks. Research has primarily concentrated on utilizing the characteristics of SDN, such as the controller’s comprehensive understanding of the network, to identify and counteract attacks. Although these strategies are successful in identifying and minimizing these assaults, they are incapable of restoring nodes that have malfunctioned as a result of DDoS/DoS attacks or have been hijacked and utilized to initiate DDoS/DoS attacks. There is still a need for an SD-SG controller solution that can recover nodes that have failed. Alternative approaches have employed dynamic defensive methods that prioritize the randomization of link paths in order to achieve success in DDoS/DoS attacks. Nevertheless, there is currently no solution that has been devised to enable both mobile target protection and node recovery. The unresolved challenge of recovering nodes that have failed and restoring them with minimum impact on the SD-SG network infrastructure persists. Previous methods would fail in future SD-SG security applications because they would be unable to recover fallen nodes, resulting in a drop in the quality of service. An inherent technical challenge that may occur in an MTD system with node recovery is the determination of whether the node is successfully recovered to a secure state and is no longer compromised. One possible solution is to implement a probationary period for the node, during which it is closely watched by the “probationary module” in a local controller under the supervision of the network operator for a predetermined amount of time. The duration should be sufficiently long to observe traffic patterns and employ machine learning techniques to assess the probability of the node being still compromised. An efficient method is required to monitor the node without significantly burdening the controller. As previously stated, a probationary period could be established to oversee the nodes that have been identified as compromised and have regained access. Another potential solution is to create a history-based voting scheme that keeps track of nodes that are successfully attacked and feeds that information to an ML model that can use that information as a feature for future ML classifications to identify if a compromised node is compromised again faster than before, reducing the time of data leakage.

9.2. Privacy of Network Data

Ensuring the confidentiality of data transported within the SD-SG is a significant challenge, necessitating enhanced data privacy measures [113]. Controller attacks significantly amplify the privacy concerns of these networks. As stated before, these attacks can lead to the unauthorized takeover of the SDN controller, which has complete control over the whole network. Malicious individuals that exploit the SDN controller have the ability to observe data traffic and perhaps reroute it to harmful servers, so compromising the confidentiality and security of the data. Furthermore, the existing state of security technology lacks a dependable approach for detecting both a compromised controller and accurately identifying the criminal accountable for the attack. The lack of security capabilities creates a challenge in immediately and effectively addressing these intrusions. An effective mitigation approach involves dynamically modifying the network’s structure to perplex attackers. This can be accomplished by employing software-defined ways to consistently modify the ports of the controllers and relocate the controllers. By regularly adjusting these network parameters, it becomes more difficult for attackers to establish a strong position or sustain long-term control, thereby improving the overall security and resilience of the SD-SG against controller-based attacks.
However, this would require regular synchronization of routing logic across the network to ensure proper communication delivery, as the communication links are constantly changing. Moreover, there is currently a lack of awareness regarding the capability of a moving target defense to identify a compromised controller and/or the attacker. The major objective of these solutions is to prevent the issue; however, the problem of determining which controller(s) are compromised and identifying the attacker remains unanswered. Previous methods would fail in future privacy strategies because they fail to identify which controllers or forwarding devices are affected and instead focus solely on the detection of attacks. As a result, infected devices may still be present on the network, posing additional security threats like leaking the private data of users.

9.3. Reliability of Network Defense Mechanisms

SD-SG systems must prioritize the establishment of a reliable communication infrastructure by minimizing the success rate of cyberattacks. Furthermore, the attacks that do succeed should have little to no impact. Efficient, quick recovery strategies should be explored to ensure the uninterrupted and ongoing provision of services. Additional effort is needed to not only identify intricate cyberattacks but also effectively address these attacks within an ideal timeframe to ensure reliability in time-sensitive SD-SGs. Considering the machine learning techniques for detection or identification, a common challenge is the unavailability and imbalance of SD-SG datasets for implementation and evaluation. This makes it difficult to ensure that model designs will be robust in real systems. There is a further requirement to investigate methods that alleviate the limitations associated with the availability or imbalance of training data, such as transfer learning, federated learning, and data augmentation. Another concern involves the characterization of communication network traffic that exhibits dynamic patterns, which may indicate alterations in the network’s structure or the demands of its users. The ongoing process of training data in machine learning and/or deep learning approaches requires regular updates to ensure that the training can effectively adapt to the changing network traffic. Researching innovative online training algorithms and automated updates based on network traffic patterns is crucial for ensuring reliability in SD-SG systems. One technical challenge when creating a dependable solution for SD-SGs that can respond quickly to attacks and enable recovery is that disabling forwarding agents (i.e., switches and routers) might result in service disruptions; another challenge is the need to educate customers about the quality of service (QoS). Hence, the accuracy and effectiveness of these predictions must be appropriately elevated, which poses a challenge owing to the constantly changing cyberattack landscape. Therefore, an optimal resolution requires a synthesis of machine learning solutions and models that can cross-validate each other’s decisions rather than depending solely on a single detection and mitigation solution.
In addition, research that has been evaluated primarily focuses on using a single SDN controller to update flow rules. This creates vulnerabilities where a single point of failure can lead to a complete shutdown of the communication network. However, employing multiple SDN controllers enhances the dependability of the SD-SG. Nevertheless, this approach introduces fresh obstacles, including the need to minimize SDN controller signaling and management overhead, strategically position SDN controllers, efficiently allocate resources to SDN controllers, synchronize network states across SDN controllers, and designate a cluster head from a cluster of SDN controllers. The effectiveness of previous solutions in ensuring the reliability of future SD-SGs is likely to diminish due to the presence of singular controller frameworks. These frameworks introduce vulnerabilities by creating single points of failure and bottlenecks that might negatively impact network performance. To address these challenges, it is imperative for upcoming solutions to incorporate evenly distributed SDN control layers. One potential technical challenge is determining the segmentation of the SD-SG and finding the most optimal location for SDN controllers throughout the process of replacing legacy systems. An interim approach could be to create a cloud-based, evenly dispersed SDN controller architecture that can be quickly implemented until the ideal physical locations for the controllers are determined.

9.4. Adaptability of Network Solutions

Providing the adaptability of network solutions is an essential challenge for researchers as they work to develop novel models and defense strategies for SD-SG networks against cyberattacks [71]. Adaptability, in this sense, pertains to the ability to design defense mechanisms that are flexible and can adapt to changing threats. In order to provide thorough safeguarding against cyberattackers, researchers must assess the adaptability of their remedies to various attack types, varied quantities of attackers, and diverse assault scenarios. A significant amount of current research is focused on building specialized strategies to protect against particular sorts of attacks in the SD-SG domain. Nevertheless, these models frequently rely significantly on pre-collected data and necessitate regular updates with meticulously monitored information from numerous sources. To implement effective security methods, it is essential to consistently gather and analyze data from both the power grid and network layers. The collection of data in two separate layers is essential for ensuring a precise and current comprehension of the threat environment. Nevertheless, this method also generates more responsibilities and possible delays to SD-SG operations. The requirement for instantaneous data gathering and processing might exert pressure on network resources and affect the overall efficiency of the smart grid. Researchers must strike a balance between the necessity for thorough security and the operational requirements of the SD-SG. They must ensure that the protective measures do not unintentionally undermine the efficiency and dependability of the grid. The continued objective of protecting smart grid systems from increasingly complex cyber threats requires the development of flexible, efficient, and fast security solutions.
A comprehensive defense mechanism that can effectively identify and respond to new or unexpected cyberattacks has not been developed yet. The efficacy of previous solutions in addressing future smart grid security challenges may be limited due to their exclusive focus on specific attack types. The previous solutions have been tailored to address specific attacks, and the effectiveness of combining these solutions has not been fully explored or evaluated. There exist various alternative solutions for a given attack. An ongoing technical challenge is the dynamic nature of cyberattacks, which constantly evolve and often exhibit unique behavioral patterns. In order to tackle this challenge, future research endeavors should focus on developing a framework that can anticipate the intended actions of the communication nodes, rather than relying solely on pre-existing training data, as demonstrated in a recent study [199] that utilized communication state estimation to forecast the states of the communication layer. This framework could be efficiently included in the SDN architecture, allowing machine learning solutions to compare the expected communication metrics with the obtained metrics to detect attacks.

10. Conclusions

Current smart grid systems require time-consuming manual network management and are vulnerable to both physical and network security issues due to hardware and software anomalies. Mirroring other modern networks, SDN has been proposed as a way to automate the monitoring and control of SG communication networks, resulting in a software-defined smart grid (SD-SG) to improve network administration, visibility, control, and security. However, just as with other modern networks, cyberattacks are constantly evolving, requiring evolving defense and security techniques. This survey provides a comprehensive analysis of different cyberattacks that impact SD-SG cybersecurity, including distributed denial-of-service (DDoS)/denial-of-service (DoS), SDN controller, multi-pronged, and grid balancing cyberattacks. We provided an overview of the existing attack vulnerabilities, strategies for defense, and methods for mitigating the impact of each attack. We reviewed the lessons learned from the literature for each cyberattack defense. In addition, we offered an analysis of the unresolved challenges of existing solutions in the literature, including the ability of networks to recover from cyberattacks, the protection of network data privacy, the dependability of defense systems, and the flexibility of network solutions. We provided an analysis of upcoming risks and possible strategies to counter them in future research on SD-SG security. These threats include the possibility of low-rate denial of service (LDoS), attacks by controller botnets, controller impersonation attacks, and black hole attacks. This manuscript enhances state-of-the-art research by providing a thorough and up-to-date survey that examines the literature on network security for software-defined smart grids. It also highlights emerging threats and identifies the limitations of current approaches. In contrast to other surveys that only briefly touch on SD-SG security or focus on specific types of attacks or defenses, this survey comprehensively covers the research on security for SD-SG, including discussions on emerging threats and current limitations.

Author Contributions

Conceptualization, D.A. and J.M.; methodology, D.A. and S.B.; formal analysis, D.A., S.B. and A.B.; investigation, D.A. and S.B.; resources, D.A. and S.B.; writing—original draft preparation, D.A. and S.B.; writing—review and editing, D.A., S.B. and J.M.; visualization, D.A. and S.B.; supervision, A.B. and J.M.; project administration, A.B. and J.M.; funding acquisition, A.B. and J.M. All authors have read and agreed to the published version of the manuscript.

Funding

This material is based upon work supported by the National Science Foundation under Grant Number 1809739 and L3 Harris.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Acknowledgments

We thank the National Science Foundation and L3 Harris/University of Florida partnership for enabling and funding the production of this work.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Rehmani, M.H.; Davy, A.; Jennings, B.; Assi, C. Software defined networks-based smart grid communication: A comprehensive survey. IEEE Commun. Surv. Tutor. 2019, 21, 2637–2670. [Google Scholar] [CrossRef]
  2. Aggarwal, S.; Kumar, N.; Tanwar, S.; Alazab, M. A survey on energy trading in the smart grid: Taxonomy, research challenges and solutions. IEEE Access 2022, 9, 116231–116253. [Google Scholar] [CrossRef]
  3. Maleh, Y.; Qasmaoui, Y.; El Gholami, K.; Sadqi, Y.; Mounir, S. A comprehensive survey on SDN security: Threats, mitigations, and future directions. J. Reliab. Intell. Environ. 2023, 9, 201–239. [Google Scholar] [CrossRef]
  4. Kabbara, N.; Nait Belaid, M.O.; Gibescu, M.; Camargo, L.R.; Cantenot, J.; Coste, T.; Audebert, V.; Morais, H. Towards Software-Defined Protection, Automation, and Control in Power Systems: Concepts, State of the Art, and Future Challenges. Energies 2022, 15, 9362. [Google Scholar] [CrossRef]
  5. Agnew, D.; Aljohani, N.; Mathieu, R.; Boamah, S.; Nagaraj, K.; McNair, J.; Bretas, A. Implementation Aspects of Smart Grids Cyber-Security Cross-Layered Framework for Critical Infrastructure Operation. Appl. Sci. 2022, 12, 6868. [Google Scholar] [CrossRef]
  6. Singh, S.K.; Bose, R.; Joshi, A. Entropy-based electricity theft detection in AMI network. IET Cyber-Phys. Syst. Theory Appl. 2018, 3, 99–105. [Google Scholar] [CrossRef]
  7. Ibdah, D.; Kanani, M.; Lachtar, N.; Allan, N.; Al-Duwairi, B. On the security of SDN-enabled smartgrid systems. In Proceedings of the 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, United Arab Emirates, 21–23 November 2017; pp. 1–5. [Google Scholar]
  8. Akkaya, K.; Uluagac, A.S.; Aydeger, A. Software defined networking for wireless local networks in smart grid. In Proceedings of the 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), Clearwater Beach, FL, USA, 26–29 October 2015; pp. 826–831. [Google Scholar]
  9. Abujubbeh, M.; Al-Turjman, F.; Fahrioglu, M. Software-defined wireless sensor networks in smart grids: An overview. Sustain. Cities Soc. 2019, 51, 101754. [Google Scholar] [CrossRef]
  10. Demirci, S.; Sagiroglu, S. Software-defined networking for improving security in smart grid systems. In Proceedings of the 2018 7th International Conference on Renewable Energy Research and Applications (ICRERA), Paris, France, 14–17 October 2018; pp. 1021–1026. [Google Scholar]
  11. Kim, J.; Filali, F.; Ko, Y.B. Trends and potentials of the smart grid infrastructure: From ICT sub-system to SDN-enabled smart grid architecture. Appl. Sci. 2015, 5, 706–727. [Google Scholar] [CrossRef]
  12. Priyadarshini, I.; Kumar, R.; Sharma, R.; Singh, P.K.; Satapathy, S.C. Identifying cyber insecurities in trustworthy space and energy sector for smart grids. Comput. Electr. Eng. 2021, 93, 107204. [Google Scholar] [CrossRef]
  13. Kong, P.Y. A review of quantum key distribution protocols in the perspective of smart grid communication security. IEEE Syst. J. 2020, 16, 41–54. [Google Scholar] [CrossRef]
  14. Butt, O.M.; Zulqarnain, M.; Butt, T.M. Recent advancement in smart grid technology: Future prospects in the electrical power network. Ain Shams Eng. J. 2021, 12, 687–695. [Google Scholar] [CrossRef]
  15. Sirojan, T.; Lu, S.; Phung, B.T.; Ambikairajah, E. Embedded edge computing for real-time smart meter data analytics. In Proceedings of the 2019 International Conference on Smart Energy Systems and Technologies (SEST), Porto, Portugal, 9–11 September 2019; pp. 1–5. [Google Scholar]
  16. Kong, P.Y. Routing in communication networks with interdependent power grid. IEEE/ACM Trans. Netw. 2020, 28, 1899–1911. [Google Scholar] [CrossRef]
  17. Aljohani, N.; Agnew, D.; Nagaraj, K.; Boamah, S.A.; Mathieu, R.; Bretas, A.S.; McNair, J.; Zare, A. Cross-Layered Cyber-Physical Power System State Estimation towards a Secure Grid Operation. In Proceedings of the 2022 IEEE Power & Energy Society General Meeting (PESGM), Denver, CO, USA, 17–21 July 2022; pp. 1–5. [Google Scholar]
  18. Fan, D.; Ren, Y.; Feng, Q.; Liu, Y.; Wang, Z.; Lin, J. Restoration of smart grids: Current status, challenges, and opportunities. Renew. Sustain. Energy Rev. 2021, 143, 110909. [Google Scholar] [CrossRef]
  19. Kumari, A.; Tanwar, S.; Tyagi, S.; Kumar, N.; Obaidat, M.S.; Rodrigues, J.J. Fog computing for smart grid systems in the 5G environment: Challenges and solutions. IEEE Wirel. Commun. 2019, 26, 47–53. [Google Scholar] [CrossRef]
  20. Sun, S.; Fu, X.; Luo, B.; Du, X. Detecting and mitigating ARP attacks in SDN-based cloud environment. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 659–664. [Google Scholar]
  21. McKeown, N.; Anderson, T.; Balakrishnan, H.; Parulkar, G.; Peterson, L.; Rexford, J.; Shenker, S.; Turner, J. OpenFlow: Enabling innovation in campus networks. ACM Sigcomm Comput. Commun. Rev. 2008, 38, 69–74. [Google Scholar] [CrossRef]
  22. Nisar, K.; Jimson, E.R.; Hijazi, M.; Memon, S.K. A survey: Architecture, security threats and application of SDN. J. Ind. Electron. Technol. Appl. 2019, 2, 64–69. [Google Scholar]
  23. Zhang, Y.; Chen, M. Performance evaluation of Software-Defined Network (SDN) controllers using Dijkstra’s algorithm. Wirel. Netw. 2022, 28, 3787–3800. [Google Scholar] [CrossRef]
  24. Kreutz, D.; Ramos, F.M.; Verissimo, P.E.; Rothenberg, C.E.; Azodolmolky, S.; Uhlig, S. Software-defined networking: A comprehensive survey. Proc. IEEE 2014, 103, 14–76. [Google Scholar] [CrossRef]
  25. Haleplidis, E.; Salim, J.H.; Halpern, J.M.; Hares, S.; Pentikousis, K.; Ogawa, K.; Wang, W.; Denazis, S.; Koufopavlou, O. Network programmability with ForCES. IEEE Commun. Surv. Tutor. 2015, 17, 1423–1440. [Google Scholar] [CrossRef]
  26. Vasseur, J.P.; Le Roux, J.L. Path Computation Element (PCE) Communication Protocol (PCEP); Technical Report; Cisco Systems, France Telecom, Paris, France, 2009.
  27. Enns, R. NETCONF Configuration Protocol; Technical Report; Juniper Networks, Sunnyvale, CA, USA, 2006.
  28. Hares, S.; White, R. Software-defined networks and the interface to the routing system (I2RS). IEEE Internet Comput. 2013, 17, 84–88. [Google Scholar] [CrossRef]
  29. Zhou, W.; Li, L.; Luo, M.; Chou, W. REST API design patterns for SDN northbound API. In Proceedings of the 2014 28th International Conference on Advanced Information Networking and Applications Workshops, Victoria, BC, Canada, 13–16 May 2014; pp. 358–365. [Google Scholar]
  30. Tootoonchian, A.; Ganjali, Y. Hyperflow: A distributed control plane for openflow. In Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, San Jose, CA, USA, 27 April 2010; Volume 3, pp. 10–5555. [Google Scholar]
  31. Hinrichs, T.L.; Gude, N.S.; Casado, M.; Mitchell, J.C.; Shenker, S. Practical declarative network management. In Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, Barcelona, Spain, 21 August 2009; pp. 1–10. [Google Scholar]
  32. Voellmy, A.; Kim, H.; Feamster, N. Procera: A language for high-level reactive network control. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland, 13 August 2012; pp. 43–48. [Google Scholar]
  33. Foster, N.; Harrison, R.; Freedman, M.J.; Monsanto, C.; Rexford, J.; Story, A.; Walker, D. Frenetic: A network programming language. ACM Sigplan Not. 2011, 46, 279–291. [Google Scholar] [CrossRef]
  34. Ahmed, Z.; Afaqui, N.; Humayan, O. Detection and prevention of DDoS attacks on software defined networks controllers for smart grid. Int. J. Comput. Appl. 2019, 975, 8887. [Google Scholar] [CrossRef]
  35. Santos, R.; Souza, D.; Santo, W.; Ribeiro, A.; Moreno, E. Machine learning algorithms to detect DDoS attacks in SDN. Concurr. Comput. Pract. Exp. 2020, 32, e5402. [Google Scholar]
  36. Starke, A.; Nagaraj, K.; Ruben, C.; Aljohani, N.; Zou, S.; Bretas, A.; McNair, J.; Zare, A. Cross-layered distributed data-driven framework for enhanced smart grid cyber-physical security. IET Smart Grid 2022, 5, 398–416. [Google Scholar] [CrossRef]
  37. Xiong, A.; Tian, H.; He, W.; Zhang, J.; Meng, H.; Guo, S.; Wang, X.; Wu, X.; Kadoch, M. A distributed security SDN cluster architecture for smart grid based on blockchain technology. Secur. Commun. Netw. 2021, 2021, 1–9. [Google Scholar] [CrossRef]
  38. Polat, H.; Türkoğlu, M.; Polat, O.; Şengür, A. A novel approach for accurate detection of the DDoS attacks in SDN-based SCADA systems based on deep recurrent neural networks. Expert Syst. Appl. 2022, 197, 116748. [Google Scholar] [CrossRef]
  39. Nagaraj, K.; Starke, A.; McNair, J. GLASS: A Graph Learning Approach for Software Defined Network Based Smart Grid DDoS Security. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
  40. Jung, O.; Smith, P.; Magin, J.; Reuter, L. Anomaly Detection in Smart Grids based on Software Defined Networks. In Proceedings of the SMARTGREENS, Heraklion, Greece, 3–5 May 2019; pp. 157–164. [Google Scholar]
  41. Starke, A.; McNair, J.; Trevizan, R.; Bretas, A.; Peeples, J.; Zare, A. Toward Resilient Smart Grid Communications Using Distributed SDN with ML-Based Anomaly Detection. In Proceedings of the Wired/Wireless Internet Communications; Chowdhury, K.R., Di Felice, M., Matta, I., Sheng, B., Eds.; Springer: Cham, Switzerland, 2018; pp. 83–94. [Google Scholar]
  42. Presekal, A.; Ştefanov, A.; Rajkumar, V.S.; Palensky, P. Attack Graph Model for Cyber-Physical Power Systems using Hybrid Deep Learning. IEEE Trans. Smart Grid 2023, 14, 4007–4020. [Google Scholar] [CrossRef]
  43. Mahmood, H.; Mahmood, D.; Shaheen, Q.; Akhtar, R.; Changda, W. S-DPs: An SDN-based DDoS protection system for smart grids. Secur. Commun. Netw. 2021, 2021, 1–19. [Google Scholar] [CrossRef]
  44. Abdelkhalek, M.; Hyder, B.; Govindarasu, M.; Rieger, C.G. Moving target defense routing for SDN-enabled smart grid. In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 215–220. [Google Scholar]
  45. Zhao, J.; Gómez-Expósito, A.; Netto, M.; Mili, L.; Abur, A.; Terzija, V.; Kamwa, I.; Pal, B.; Singh, A.K.; Qi, J.; et al. Power System Dynamic State Estimation: Motivations, Definitions, Methodologies, and Future Work. IEEE Trans. Power Syst. 2019, 34, 3188–3198. [Google Scholar] [CrossRef]
  46. Zhao, J.; Singh, A.K.; Mir, A.S.; Taha, A.; Rouhani, A.; Gomez-Exposito, A.; Meliopoulos, A.; Pal, B.; Kamwa, I.; Qi, J.; et al. Power System Dynamic State and Parameter Estimation-Transition to Power Electronics-Dominated Clean Energy Systems: IEEE Task Force on Power System Dynamic State and Parameter Estimation; IEEE Power and Energy Society Resource Center: New Yor, NY, USA, 2021. [Google Scholar]
  47. Liu, Y.; Singh, A.K.; Zhao, J.; Meliopoulos, A.P.S.; Pal, B.; Ariff, M.A.b.M.; Van Cutsem, T.; Glavic, M.; Huang, Z.; Kamwa, I.; et al. Dynamic State Estimation for Power System Control and Protection. IEEE Trans. Power Syst. 2021, 36, 5909–5921. [Google Scholar] [CrossRef]
  48. Bretas, N. An iterative dynamic state estimation and bad data processing. Int. J. Electr. Power Energy Syst. 1989, 11, 70–74. [Google Scholar] [CrossRef]
  49. Bretas, A.S.; Bretas, N.G.; Massignan, J.A.D.; London Junior, J.B.A. Hybrid Physics-Based Adaptive Kalman Filter State Estimation Framework. Energies 2021, 14, 6787. [Google Scholar] [CrossRef]
  50. Jin, Z.; Zhao, J.; Ding, L.; Chakrabarti, S.; Gryazina, E.; Terzija, V. Power system anomaly detection using innovation reduction properties of iterated extended kalman filter. Int. J. Electr. Power Energy Syst. 2022, 136, 107613. [Google Scholar] [CrossRef]
  51. Lin, G.; Dong, M.; Ota, K.; Li, J.; Yang, W.; Wu, J. Security function virtualization based moving target defense of SDN-enabled smart grid. In Proceedings of the ICC 2019–2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
  52. Azab, M.; Samir, M.; Samir, E. “MystifY”: A proactive Moving-Target Defense for a resilient SDN controller in Software Defined CPS. Comput. Commun. 2022, 189, 205–220. [Google Scholar] [CrossRef]
  53. Sivaraman, V.; Sikdar, B. A game-theoretic approach for enhancing data privacy in sdn-based smart grids. IEEE Internet Things J. 2020, 8, 10583–10595. [Google Scholar] [CrossRef]
  54. Samir, M.; Azab, M.; Samir, E. SD-CPC: SDN controller placement camouflage based on stochastic game for moving-target defense. Comput. Commun. 2021, 168, 75–92. [Google Scholar] [CrossRef]
  55. Niazi, R.A.; Faheem, Y. A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based Software Defined Networks in Smart Grids. IEEE Access 2019, 7, 88656–88672. [Google Scholar] [CrossRef]
  56. Nagaraj, K.; Zou, S.; Ruben, C.; Dhulipala, S.; Starke, A.; Bretas, A.; Zare, A.; McNair, J. Ensemble CorrDet with adaptive statistics for bad data detection. IET Smart Grid 2020, 3, 572–580. [Google Scholar] [CrossRef]
  57. Trevizan, R.D.; Ruben, C.; Nagaraj, K.; Ibukun, L.L.; Starke, A.C.; Bretas, A.S.; McNair, J.; Zare, A. Data-driven physics-based solution for false data injection diagnosis in smart grids. In Proceedings of the 2019 IEEE Power & Energy Society General Meeting (PESGM, Denver, CO, USA, 17–21 July 2022; pp. 1–5. [Google Scholar]
  58. Ruben, C.; Dhulipala, S.; Nagaraj, K.; Zou, S.; Starke, A.; Bretas, A.; Zare, A.; McNair, J. Hybrid data-driven physics model-based framework for enhanced cyber-physical smart grid security. IET Smart Grid 2020, 3, 445–453. [Google Scholar] [CrossRef]
  59. El Houda, Z.A.; Brik, B.; Khoukhi, L. Ensemble Learning for Intrusion Detection in SDN-Based Zero Touch Smart Grid Systems. In Proceedings of the 2022 IEEE 47th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 26–29 September 2022; pp. 149–156. [Google Scholar] [CrossRef]
  60. Pengpeng, D.; Jinguo, L.; Liangliang, W.; Mi Wen, Y.G. HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. In Proceedings of the Security and Communication Networks, Xi’an, China, 21–23 August 2020; p. 20. [Google Scholar] [CrossRef]
  61. Yang, S.; Lao, K.W.; Hui, H.; Chen, Y. Secure distributed control for demand response in power systems against deception cyber-attacks with arbitrary patterns. IEEE Trans. Power Syst. 2024. [Google Scholar] [CrossRef]
  62. Yang, S.; Lao, K.W.; Chen, Y.; Hui, H. Resilient distributed control against false data injection attacks for demand response. IEEE Trans. Power Syst. 2023, 39, 2837–2853. [Google Scholar] [CrossRef]
  63. Su, J.; Zhang, H.; Liu, H.; Yu, L.; Tan, Z. Membership-function-based secondary frequency regulation for distributed energy resources in islanded microgrids with communication delay compensation. IEEE Trans. Sustain. Energy 2023, 39, 2837–2853. [Google Scholar] [CrossRef]
  64. Yang, S.; Lao, K.W.; Hui, H.; Chen, Y. A robustness-enhanced frequency regulation scheme for power system against multiple cyber and physical emergency events. Appl. Energy 2023, 350, 121725. [Google Scholar] [CrossRef]
  65. Su, J.; Zhang, H.; Wong, C.K.; Yu, L.; Tan, Z. Hierarchical Control of Inverter Air Conditioners for Frequency Regulation Service of Islanded Microgrids With Fair Power Participation. IEEE Trans. Smart Grid 2024. [Google Scholar] [CrossRef]
  66. Cahn, A.; Hoyos, J.; Hulse, M.; Keller, E. Software-defined energy communication networks: From substation automation to future smart grids. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 558–563. [Google Scholar]
  67. Goodney, A.; Kumar, S.; Ravi, A.; Cho, Y.H. Efficient PMU networking with software defined networks. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 378–383. [Google Scholar]
  68. Kim, Y.J.; He, K.; Thottan, M.; Deshpande, J.G. Virtualized and self-configurable utility communications enabled by software-defined networks. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2014; pp. 416–421. [Google Scholar]
  69. Molina, E.; Jacob, E.; Matias, J.; Moreira, N.; Astarloa, A. Using software defined networking to manage and control IEC 61850-based systems. Comput. Electr. Eng. 2015, 43, 142–154. [Google Scholar] [CrossRef]
  70. Zhang, J.; Seet, B.C.; Lie, T.T.; Foh, C.H. Opportunities for software-defined networking in smart grid. In Proceedings of the 2013 9th International Conference on Information, Communications & Signal Processing, Tainan, Taiwan, 10–13 December 2013; pp. 1–5. [Google Scholar]
  71. Dong, X.; Lin, H.; Tan, R.; Iyer, R.K.; Kalbarczyk, Z. Software-defined networking for smart grid resilience: Opportunities and challenges. In Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, Singapore, 14–17 April 2015; pp. 61–68. [Google Scholar]
  72. Jakaria, A.; Rahman, M.A.; Gokhale, A. Resiliency-aware deployment of SDN in smart grid SCADA: A formal synthesis model. IEEE Trans. Netw. Serv. Manag. 2021, 18, 1430–1444. [Google Scholar] [CrossRef]
  73. Ghosh, U.; Chatterjee, P.; Shetty, S. A security framework for SDN-enabled smart power grids. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW), Atlanta, GA, USA, 5–8 June 2017; pp. 113–118. [Google Scholar]
  74. Sydney, A.; Nutaro, J.; Scoglio, C.; Gruenbacher, D.; Schulz, N. Simulative comparison of multiprotocol label switching and openflow network technologies for transmission operations. IEEE Trans. Smart Grid 2013, 4, 763–770. [Google Scholar] [CrossRef]
  75. Rehmani, M.H.; Akhtar, F.; Davy, A.; Jennings, B. Achieving resilience in sdn-based smart grid: A multi-armed bandit approach. In Proceedings of the 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada, 25–29 June 2018; pp. 366–371. [Google Scholar]
  76. Agnew, D.; Boamah, S.; Mathieu, R.; Cooper, A.; McNair, J.; Bretas, A. Distributed software-defined network architecture for smart grid resilience to denial-of-service attacks. In Proceedings of the 2023 IEEE Power & Energy Society General Meeting (PESGM), Orlando, FL, USA, 16–20 July 2023; pp. 1–5. [Google Scholar]
  77. Qu, Y.; Chen, G.; Liu, X.; Yan, J.; Chen, B.; Jin, D. Cyber-resilience enhancement of PMU networks using software-defined networking. In Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 11–13 November 2020; pp. 1–7. [Google Scholar]
  78. Chica, J.C.C.; Imbachi, J.C.; Vega, J.F.B. Security in SDN: A comprehensive survey. J. Netw. Comput. Appl. 2020, 159, 1–23. [Google Scholar]
  79. Khorsandroo, S.; Sánchez, A.G.; Tosun, A.S.; Arco, J.M.; Doriguzzi-Corin, R. Hybrid SDN evolution: A comprehensive survey of the state-of-the-art. Comput. Netw. 2021, 192, 107981. [Google Scholar] [CrossRef]
  80. Dorsch, N.; Kurtz, F.; Georg, H.; Hägerling, C.; Wietfeld, C. Software-defined networking for smart grid communications: Applications, challenges and advantages. In Proceedings of the 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, Italy, 3–6 November 2014; pp. 422–427. [Google Scholar]
  81. Nafi, N.S.; Ahmed, K.; Gregory, M.A.; Datta, M. Software defined neighborhood area network for smart grid applications. Future Gener. Comput. Syst. 2018, 79, 500–513. [Google Scholar]
  82. Hahn, A.; Govindarasu, M. Cyber attack exposure evaluation framework for the smart grid. IEEE Trans. Smart Grid 2011, 2, 835–843. [Google Scholar] [CrossRef]
  83. Pedramnia, K.; Rahmani, M. Survey of DoS Attacks on LTE infrastructure used in AMI System and Countermeasures. In Proceedings of the 2018 Smart Grid Conference (SGC), Sanandaj, Iran, 28–29 November 2018; pp. 1–6. [Google Scholar]
  84. Lee, S.; Shin, M.; Jang, H.s. A Study on the Application of Cross-Certification Technology for the Automatic Authentication of Charging Users in ISO 15118 Standard. J. Soc. -Bus. Stud. 2020, 25, 1–14. [Google Scholar]
  85. Fehér, M.; Yazdani, N.; Hansen, M.T.; Vester, F.E.; Lucani, D.E. Smart meter data compression using generalized deduplication. In Proceedings of the GLOBECOM 2020–2020 IEEE Global Communications Conference, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  86. Wang, Y.; Ruan, D.; Gu, D.; Gao, J.; Liu, D.; Xu, J.; Chen, F.; Dai, F.; Yang, J. Analysis of smart grid security standards. In Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering, Shanghai, China, 10–12 June 2011; Volume 4, pp. 697–701. [Google Scholar]
  87. Ali, M.Q.; Al-Shaer, E.; Duan, Q. Randomizing AMI configuration for proactive defense in smart grid. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 618–623. [Google Scholar]
  88. Rajkumar, V.S.; Tealane, M.; Ştefanov, A.; Presekal, A.; Palensky, P. Cyber attacks on power system automation and protection and impact analysis. In Proceedings of the 2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), The Hague, The Netherlands, 26–28 October 2020; pp. 247–254. [Google Scholar]
  89. Mohan, S.N.; Ravikumar, G.; Govindarasu, M. Distributed intrusion detection system using semantic-based rules for SCADA in smart grid. In Proceedings of the 2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Chicago, IL, USA, 12–15 October 2020; pp. 1–5. [Google Scholar]
  90. Baig, Z.A.; Amoudi, A.R. An Analysis of Smart Grid Attacks and Countermeasures. J. Commun. 2013, 8, 473–479. [Google Scholar] [CrossRef]
  91. Fritz, J.J.; Sagisi, J.; James, J.; Leger, A.S.; King, K.; Duncan, K.J. Simulation of man in the middle attack on smart grid testbed. In Proceedings of the 2019 SoutheastCon, Huntsville, AL, USA, 11–14 April 2019; pp. 1–6. [Google Scholar]
  92. Wlazlo, P.; Sahu, A.; Mao, Z.; Huang, H.; Goulart, A.; Davis, K.; Zonouz, S. Man-in-the-middle attacks and defence in a power system cyber-physical testbed. IET Cyber-Phys. Syst. Theory Appl. 2021, 6, 164–177. [Google Scholar] [CrossRef]
  93. Khan, A.A.; Kumar, V.; Ahmad, M. An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach. J. King Saud-Univ.-Comput. Inf. Sci. 2022, 34, 698–705. [Google Scholar]
  94. El Mrabet, Z.; Kaabouch, N.; El Ghazi, H.; El Ghazi, H. Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 2018, 67, 469–482. [Google Scholar] [CrossRef]
  95. Farokhi, F. Review of results on smart-meter privacy by data manipulation, demand shaping, and load scheduling. IET Smart Grid 2020, 3, 605–613. [Google Scholar] [CrossRef]
  96. Kim, J.Y.; Hwang, Y.M.; Sun, Y.G.; Sim, I.; Kim, D.I.; Wang, X. Detection for non-technical loss by smart energy theft with intermediate monitor meter in smart grid. IEEE Access 2019, 7, 129043–129053. [Google Scholar] [CrossRef]
  97. Singh, P.; Masud, M.; Hossain, M.S.; Kaur, A. Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Comput. Electr. Eng. 2021, 93, 107209. [Google Scholar] [CrossRef]
  98. Han, W.; Xiao, Y. FNFD: A fast scheme to detect and verify non-technical loss fraud in smart grid. In Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity, Xi’an, China, 30 May 2016; pp. 24–34. [Google Scholar]
  99. Musleh, A.S.; Chen, G.; Dong, Z.Y. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 2019, 11, 2218–2234. [Google Scholar] [CrossRef]
  100. Duan, J.; Zeng, W.; Chow, M.Y. Resilient distributed DC optimal power flow against data integrity attack. IEEE Trans. Smart Grid 2016, 9, 3543–3552. [Google Scholar] [CrossRef]
  101. Chung, H.M.; Li, W.T.; Yuen, C.; Chung, W.H.; Wen, C.K. Local cyber-physical attack with leveraging detection in smart grid. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 23–27 October 2017; pp. 461–466. [Google Scholar]
  102. Jiang, Q.; Chen, H.; Xie, L.; Wang, K. Real-time detection of false data injection attack using residual prewhitening in smart grid network. In Proceedings of the 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, Germany, 23–27 October 2017; pp. 83–88. [Google Scholar]
  103. Srivastava, A.; Agarwal, A. Emerging technology IoT and OT: Overview, security threats, attacks and countermeasures. IJERT 2021, 10, 86–93. [Google Scholar]
  104. Wu, L.; Wang, J.; Zeadally, S.; He, D. Anonymous and efficient message authentication scheme for smart grid. Secur. Commun. Netw. 2019, 2019. [Google Scholar] [CrossRef]
  105. Chaudhry, S.A.; Yahya, K.; Garg, S.; Kaddoum, G.; Hassan, M.M.; Zikria, Y.B. LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments. IEEE Trans. Ind. Inform. 2022, 19, 1504–1511. [Google Scholar] [CrossRef]
  106. Ebrahimabadi, M.; Younis, M.; Karimi, N. Hardware assisted smart grid authentication. In Proceedings of the ICC 2021-IEEE International Conference on Communications, Montreal, QC, Canada, 14–23 June 2021; pp. 1–6. [Google Scholar]
  107. Chen, T.; Cheng, Q.; Li, X. An anonymous key agreement protocol with robust authentication for smart grid infrastructure. Sci. China Inf. Sci. 2022, 65, 1–3. [Google Scholar] [CrossRef]
  108. Shereen, E.; Dán, G. Model-based and data-driven detectors for time synchronization attacks against PMUs. IEEE J. Sel. Areas Commun. 2019, 38, 169–179. [Google Scholar] [CrossRef]
  109. Bogdanoski, M.; Suminoski, T.; Risteski, A. Analysis of the SYN flood DoS attack. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 2013, 5, 1–11. [Google Scholar] [CrossRef]
  110. Holik, F.; Flå, L.H.; Jaatun, M.G.; Yayilgan, S.Y.; Foros, J. Threat modeling of a smart grid secondary substation. Electronics 2022, 11, 850. [Google Scholar] [CrossRef]
  111. Ansilla, J.; Vasudevan, N.; JayachandraBensam, J.; Anunciya, J. Data security in Smart Grid with hardware implementation against DoS attacks. In Proceedings of the 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, India, 19–20 March 2015; pp. 1–7. [Google Scholar]
  112. Kwon, Y.; Kim, H.K.; Lim, Y.H.; Lim, J.I. A behavior-based intrusion detection technique for smart grid infrastructure. In Proceedings of the 2015 IEEE Eindhoven PowerTech, Eindhoven, The Netherlands, 29 June–2 July 2015; pp. 1–6. [Google Scholar]
  113. Gunduz, M.Z.; Das, R. Cyber-security on smart grid: Threats and potential solutions. Comput. Netw. 2020, 169, 107094. [Google Scholar] [CrossRef]
  114. Gai, K.; Qiu, M.; Ming, Z.; Zhao, H.; Qiu, L. Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 2017, 8, 2431–2439. [Google Scholar] [CrossRef]
  115. Ma, J.; Liu, Y.; Song, L.; Han, Z. Multiact dynamic game strategy for jamming attack in electricity market. IEEE Trans. Smart Grid 2015, 6, 2273–2282. [Google Scholar] [CrossRef]
  116. Lu, Z.; Wang, W.; Wang, C. Camouflage traffic: Minimizing message delay for smart grid applications under jamming. IEEE Trans. Dependable Secur. Comput. 2014, 12, 31–44. [Google Scholar] [CrossRef]
  117. Zhang, T.; Ji, X.; Xu, W. Jamming-resilient backup nodes selection for RPL-based routing in smart grid AMI networks. Mob. Netw. Appl. 2022, 27, 329–342. [Google Scholar] [CrossRef]
  118. Xu, H.; Jin, X.; Jin, Q.; Luo, K.; Han, W. Cooperative Jamming Attack Strategy against Power Balance of Wireless Smart Grid Networks. In Proceedings of the 2021 22nd IEEE International Conference on Industrial Technology (ICIT), Valencia, Spain, 10–12 March 2021; Volume 1, pp. 1042–1047. [Google Scholar]
  119. Chen, P.Y.; Cheng, S.M.; Chen, K.C. Smart attacks in smart grid communication networks. IEEE Commun. Mag. 2012, 50, 24–29. [Google Scholar] [CrossRef]
  120. Sun, C.C.; Cardenas, D.J.S.; Hahn, A.; Liu, C.C. Intrusion detection for cybersecurity of smart meters. IEEE Trans. Smart Grid 2020, 12, 612–622. [Google Scholar] [CrossRef]
  121. Fadlullah, Z.M.; Fouda, M.M.; Kato, N.; Shen, X.; Nozaki, Y. An early warning system against malicious activities for smart grid communications. IEEE Netw. 2011, 25, 50–55. [Google Scholar] [CrossRef]
  122. Cairns, K.; Hauser, C.; Gamage, T. Flexible data authentication evaluated for the smart grid. In Proceedings of the 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm), Vancouver, BC, Canada, 21–24 October 2013; pp. 492–497. [Google Scholar]
  123. Nge, C.L.; Ranaweera, I.U.; Midtgård, O.M.; Norum, L. A real-time energy management system for smart grid integrated photovoltaic generation with battery storage. Renew. Energy 2019, 130, 774–785. [Google Scholar] [CrossRef]
  124. Nicanfar, H.; Jokar, P.; Leung, V.C. Smart grid authentication and key management for unicast and multicast communications. In Proceedings of the 2011 IEEE PES Innovative Smart Grid Technologies, Perth, Australia, 13–16 November 2011; pp. 1–8. [Google Scholar]
  125. Sha, K.; Alatrash, N.; Wang, Z. A secure and efficient framework to read isolated smart grid devices. IEEE Trans. Smart Grid 2016, 8, 2519–2531. [Google Scholar] [CrossRef]
  126. Tran, T.T.; Shin, O.S.; Lee, J.H. Detection of replay attacks in smart grid systems. In Proceedings of the 2013 International Conference on Computing, Management and Telecommunications (ComManTel), Ho Chi Minh City, Vietnam, 21–24 January 2013; pp. 298–302. [Google Scholar]
  127. Farraj, A.; Hammad, E.; Kundur, D. A distributed control paradigm for smart grid to address attacks on data integrity and availability. IEEE Trans. Signal Inf. Process. Over Netw. 2017, 4, 70–81. [Google Scholar] [CrossRef]
  128. Pavithra, L.; Rekha, D. Prevention of replay attack for isolated smart grid. In Proceedings of the Next Generation Information Processing System: Proceedings of ICCET 2020; Springer: Berlin/Heidelberg, Germany, 2021; Volume 2, pp. 251–258. [Google Scholar]
  129. Li, H.; Lu, R.; Zhou, L.; Yang, B.; Shen, X. An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 2013, 8, 655–663. [Google Scholar] [CrossRef]
  130. Tanveer, M.; Kumar, N.; Naushad, A.; Chaudhry, S.A. A robust access control protocol for the smart grid systems. IEEE Internet Things J. 2021, 9, 6855–6865. [Google Scholar] [CrossRef]
  131. Ahmed, S.; Lee, Y.; Hyun, S.H.; Koo, I. Feature selection–based detection of covert cyber deception assaults in smart grid communications networks using machine learning. IEEE Access 2018, 6, 27518–27529. [Google Scholar] [CrossRef]
  132. Wei, D.; Lu, Y.; Jafari, M.; Skare, P.M.; Rohde, K. Protecting smart grid automation systems against cyberattacks. IEEE Trans. Smart Grid 2011, 2, 782–795. [Google Scholar] [CrossRef]
  133. Najafabadi, S.G.; Naji, H.R.; Mahani, A. Sybil attack Detection: Improving security of WSNs for smart power grid application. In Proceedings of the 2013 Smart Grid Conference (SGC), Tehran, Iran, 17–18 December 2013; pp. 273–278. [Google Scholar]
  134. Sriranjani, R.; Hemavathi, N.; Parvathy, A.; Salini, B.; Nandhini, L. Received Signal Strength and Optimized Support Vector Machine based Sybil Attack Detection Scheme in Smart Grid. In Proceedings of the 2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 19–20 January 2023; pp. 1–5. [Google Scholar]
  135. Kumari, D.; Singh, K.; Matnjul, M. Performance evaluation of sybil attack in cyber physical system. Procedia Comput. Sci. 2020, 167, 1013–1027. [Google Scholar] [CrossRef]
  136. Fehér, M.; Yazdani, N.; Aranha, D.F.; Lucani, D.E.; Hansen, M.T.; Vester, F.E. Side channel security of smart meter data compression techniques. In Proceedings of the 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Tempe, AZ, USA, 11–13 November 2020; pp. 1–6. [Google Scholar]
  137. Ali, M.Q.; Yousefian, R.; Al-Shaer, E.; Kamalasadan, S.; Zhu, Q. Two-tier data-driven intrusion detection for automatic generation control in smart grid. In Proceedings of the 2014 IEEE Conference on Communications and Network Security, San Francisco, CA, USA, 29–31 October 2014; pp. 292–300. [Google Scholar]
  138. Gayathri, B.; Yammani, C. Multi-Attacking Strategy on Smart Grid with Incomplete Network Information. In Proceedings of the 2019 8th International Conference on Power Systems (ICPS), Jaipur, India, 20–22 December 2019; pp. 1–5. [Google Scholar]
  139. Sakhnini, J.; Karimipour, H.; Dehghantanha, A.; Parizi, R.M. Physical layer attack identification and localization in cyber–physical grid: An ensemble deep learning based approach. Phys. Commun. 2021, 47, 101394. [Google Scholar] [CrossRef]
  140. Riley, G.F.; Henderson, T.R. The ns-3 network simulator. In Modeling and Tools for Network Simulation; Springer: Berlin/Heidelberg, Germany, 2010; pp. 15–34. [Google Scholar]
  141. De Oliveira, R.L.S.; Schweitzer, C.M.; Shinoda, A.A.; Prete, L.R. Using mininet for emulation and prototyping software-defined networks. In Proceedings of the 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), Bogota, Colombia, 4–6 June 2014; pp. 1–6. [Google Scholar]
  142. Dantas Silva, F.S.; Silva, E.; Neto, E.P.; Lemos, M.; Venancio Neto, A.J.; Esposito, F. A taxonomy of DDoS attack mitigation approaches featured by SDN technologies in IoT scenarios. Sensors 2020, 20, 3078. [Google Scholar] [CrossRef]
  143. Rahman, A.; Montieri, A.; Kundu, D.; Karim, M.R.; Islam, M.J.; Umme, S.; Nascita, A.; Pescapé, A. On the Integration of Blockchain and SDN: Overview, Applications, and Future Perspectives. J. Netw. Syst. Manag. 2022, 30, 73. [Google Scholar] [CrossRef]
  144. Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [Google Scholar] [CrossRef]
  145. Xie, J.; Yu, F.R.; Huang, T.; Xie, R.; Liu, J.; Wang, C.; Liu, Y. A survey of machine learning techniques applied to software defined networking (SDN): Research issues and challenges. IEEE Commun. Surv. Tutor. 2018, 21, 393–430. [Google Scholar] [CrossRef]
  146. Gao, J.; Chai, S.; Zhang, B.; Xia, Y. Research about DoS Attack against ICPS. Sensors 2019, 19, 1542. [Google Scholar] [CrossRef]
  147. Özgür, A.; Erdem, H. A Review of KDD99 Dataset Usage in Intrusion Detection and Machine Learning between 2010 and 2015; Baskent University: Ankara, Türkiye, 2016; Available online: https://peerj.com/preprints/1954/ (accessed on 1 March 2024)Technical Report.
  148. Rohith, R.; Moharir, M.; Shobha, G. SCAPY-A powerful interactive packet manipulation program. In Proceedings of the 2018 International Conference on Networking, Embedded and Wireless Systems (ICNEWS), Bangalore, India, 27–28 December 2018; pp. 1–5. [Google Scholar]
  149. Cho, J.H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; Kim, D.S.; Lim, H.; Nelson, F.F. Toward proactive, adaptive defense: A survey on moving target defense. IEEE Commun. Surv. Tutor. 2020, 22, 709–745. [Google Scholar] [CrossRef]
  150. Kalman, R.E.; Bucy, R.S. New Results in Linear Filtering and Prediction Theory. J. Basic Eng. 1961, 83, 95–108. [Google Scholar] [CrossRef]
  151. Phadke, A. Synchronized phasor measurements-a historical overview. In Proceedings of the IEEE/PES Transmission and Distribution Conference and Exhibition, Yokohama, Japan, 6–10 October 2002; Volume 1, pp. 476–479. [Google Scholar] [CrossRef]
  152. Debs, A.S.; Larson, R.E. A Dynamic Estimator for Tracking the State of a Power System. IEEE Trans. Power Appar. Syst. 1970, PAS-89, 1670–1678. [Google Scholar] [CrossRef]
  153. Nishiya, K.I.; Takagi, H.; Hasegawa, J.; Koike, T. Dynamic state estimation for electric power systems—introduction of a trend factor and detection of innovation processes. Electr. Eng. Jpn. 1976, 96, 79–87. [Google Scholar] [CrossRef]
  154. Nishiya, K.; Hasegawa, J.; Koike, T. Dynamic state estimation including anomaly detection and identification for power systems. IEE Proc. Gener. Transm. Distrib. 1982, 129, 192–198. [Google Scholar] [CrossRef]
  155. Zainudin, A.; Akter, R.; Kim, D.S.; Lee, J.M. Towards Lightweight Intrusion Identification in SDN-based Industrial Cyber-Physical Systems. In Proceedings of the 2022 27th Asia Pacific Conference on Communications (APCC), Jeju Island, Republic of Korea, 19–21 October 2022; pp. 610–614. [Google Scholar]
  156. Samir, M.; Azab, M.; Rizk, M.R.; Sadek, N. PYGRID: A software development and assessment framework for grid-aware software defined networking. Int. J. Netw. Manag. 2018, 28, e2033. [Google Scholar] [CrossRef]
  157. Laverty, D.M.; O’Raw, J.; Morrow, D.J.; Cregan, M.; Best, R. Practical evaluation of telecoms for smart grid measurements, control and protection. In Proceedings of the 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, Manchester, UK, 5–7 December 2011; pp. 1–5. [Google Scholar]
  158. Rathore, S.; Bhandari, A. Review of game theory approaches for DDoS mitigation by SDN. Proc. Indian Natl. Sci. Acad. 2022, 88, 634–650. [Google Scholar] [CrossRef]
  159. Daskalakis, C.; Goldberg, P.W.; Papadimitriou, C.H. The complexity of computing a Nash equilibrium. Commun. ACM 2009, 52, 89–97. [Google Scholar] [CrossRef]
  160. Power Systems Test Case Archive. 2018. Available online: http://labs.ece.uw.edu/pstca/ (accessed on 4 June 2024).
  161. Alvey, B.; Zare, A.; Cook, M.; Ho, D.K. Adaptive coherence estimator (ace) for explosive hazard detection using wideband electromagnetic induction (wemi). In Proceedings of the Detection and Sensing of Mines, Explosive Objects, and Obscured Targets XXI. International Society for Optics and Photonics, Baltimore, MD, USA, 18–21 April 2016; Volume 9823, p. 982309. [Google Scholar]
  162. Dabbagchi, I.; Christie, R. Power Systems Test Case Archive; University of Washington: Washington, DC, USA, 1993. [Google Scholar]
  163. Berde, P.; Gerola, M.; Hart, J.; Higuchi, Y.; Kobayashi, M.; Koide, T.; Lantz, B.; O’Connor, B.; Radoslavov, P.; Snow, W.; et al. ONOS: Towards an open, distributed SDN OS. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, Chicago, IL, USA, 22 August 2014; pp. 1–6. [Google Scholar]
  164. Kaur, S.; Singh, J.; Ghumman, N.S. Network programmability using POX controller. In Proceedings of the ICCCS International Conference on Communication, Computing & Systems, Punjab, India, 8–9 August 2014; Volume 138, p. 70. [Google Scholar]
  165. Cokic, M.; Seskar, I. Software defined network management for dynamic smart GRID traffic. Future Gener. Comput. Syst. 2019, 96, 270–282. [Google Scholar] [CrossRef]
  166. Zhijun, W.; Wenjing, L.; Liang, L.; Meng, Y. Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE access 2020, 8, 43920–43943. [Google Scholar] [CrossRef]
  167. Tang, D.; Tang, L.; Dai, R.; Chen, J.; Li, X.; Rodrigues, J.J. MF-Adaboost: LDoS attack detection based on multi-features and improved Adaboost. Future Gener. Comput. Syst. 2020, 106, 347–359. [Google Scholar] [CrossRef]
  168. Hameed, S.; Ahmed Khan, H. SDN based collaborative scheme for mitigation of DDoS attacks. Future Internet 2018, 10, 23. [Google Scholar] [CrossRef]
  169. Wu, Z.; Wang, M.; Yan, C.; Yue, M. Low-rate DoS attack flows filtering based on frequency spectral analysis. China Commun. 2017, 14, 98–112. [Google Scholar]
  170. Zhang, C.; Yin, J.; Cai, Z.; Chen, W. RRED: Robust RED algorithm to counter low-rate denial-of-service attacks. IEEE Commun. Lett. 2010, 14, 489–491. [Google Scholar] [CrossRef]
  171. Kuzmanovic, A.; Knightly, E.W. Low-rate TCP-targeted denial of service attacks: The shrew vs. the mice and elephants. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, 25–29 August 2003; pp. 75–86. [Google Scholar]
  172. Liu, T.; He, Y.; Xiong, Q. A Q-learning based real-time mitigating mechanism against LDoS attack and its modeling and simulation with CPN. J. Comput. Res. Develop. 2011, 48, 432–439. [Google Scholar]
  173. Shinan, K.; Alsubhi, K.; Alzahrani, A.; Ashraf, M.U. Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review. Symmetry 2021, 13, 866. [Google Scholar] [CrossRef]
  174. Luo, X.; Yan, Q.; Wang, M.; Huang, W. Using MTD and SDN-based honeypots to defend DDoS attacks in IoT. In Proceedings of the 2019 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, 26–28 October 2019; pp. 392–395. [Google Scholar]
  175. Ja’fari, F.; Mostafavi, S.; Mizanian, K.; Jafari, E. An intelligent botnet blocking approach in software defined networks using honeypots. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 2993–3016. [Google Scholar] [CrossRef]
  176. Shafi, Q.; Basit, A. DDoS botnet prevention using blockchain in software defined internet of things. In Proceedings of the 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST), Islamabad, Pakistan, 8–12 January 2019; pp. 624–628. [Google Scholar]
  177. Wang, H.; Wu, B. SDN-based hybrid honeypot for attack capture. In Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China, 15–17 March 2019; pp. 1602–1606. [Google Scholar]
  178. Sanjeetha, R.; Raj, A.; Saivenu, K.; Ahmed, M.I.; Sathvik, B.; Kanavalli, A. Detection and mitigation of botnet based DDoS attacks using catboost machine learning algorithm in SDN environment. Int. J. Adv. Technol. Eng. Explor. 2021, 8, 445. [Google Scholar]
  179. Zafar, M.J.; Zubair, M. Botnet Detection and Prevention in Software Defined Networks (SDN) using DNS Protocol. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 2019, 17, 23–65. [Google Scholar]
  180. Zha, Z.; Wang, A.; Guo, Y.; Montgomery, D.; Chen, S. BotSifter: An SDN-based online bot detection framework in data centers. In Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA, 10–12 June 2019; pp. 142–150. [Google Scholar]
  181. Ieracitano, C.; Adeel, A.; Morabito, F.C.; Hussain, A. A novel statistical analysis and autoencoder driven intelligent intrusion detection approach. Neurocomputing 2020, 387, 51–62. [Google Scholar] [CrossRef]
  182. Nguyen, M.T.; Kim, K. Genetic convolutional neural network for intrusion detection systems. Future Gener. Comput. Syst. 2020, 113, 418–427. [Google Scholar] [CrossRef]
  183. Ashraf, J.; Moustafa, N.; Bukhshi, A.D.; Javed, A. Intrusion Detection System for SDN-enabled IoT Networks using Machine Learning Techniques. In Proceedings of the 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), Gold Coast, Australia, 25–29 October 2021; pp. 46–52. [Google Scholar]
  184. Mutaher, H.; Kumar, P. Security-enhanced SDN controller based Kerberos authentication protocol. In Proceedings of the 2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India, 28–29 January 2021; pp. 672–677. [Google Scholar]
  185. Li, W.; Meng, W.; Kwok, L.F. A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures. J. Netw. Comput. Appl. 2016, 68, 126–139. [Google Scholar] [CrossRef]
  186. Derhab, A.; Guerroumi, M.; Gumaei, A.; Maglaras, L.; Ferrag, M.A.; Mukherjee, M.; Khan, F.A. Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 2019, 19, 3119. [Google Scholar] [CrossRef] [PubMed]
  187. Hsieh, Y.T.; Ku, C.Y. Detection of gray hole attack in software defined networks. In Proceedings of the ICEB 2018 Proceedings, Guilin, China, 2–6 December 2018. [Google Scholar]
  188. Gurung, S.; Chauhan, S. A survey of black-hole attack mitigation techniques in MANET: Merits, drawbacks, and suitability. Wirel. Netw. 2020, 26, 1981–2011. [Google Scholar] [CrossRef]
  189. Kalkha, H.; Satori, H.; Satori, K. Preventing black hole attack in wireless sensor network using HMM. Procedia Comput. Sci. 2019, 148, 552–561. [Google Scholar] [CrossRef]
  190. Gruebler, A.; McDonald-Maier, K.D.; Alheeti, K.M.A. An intrusion detection system against black hole attacks on the communication network of self-driving cars. In Proceedings of the 2015 Sixth International Conference on Emerging Security Technologies (EST), Braunschweig, Germany, 3–5 September 2015; pp. 86–91. [Google Scholar]
  191. Gite, P.; Chouhan, K.; Krishna, K.M.; Nayak, C.K.; Soni, M.; Shrivastava, A. ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4. 5 and CART classifiers. Mater. Today Proc. 2021, 80, 3769–3776. [Google Scholar] [CrossRef]
  192. Shi, F.; Liu, W.; Jin, D.; Song, J. A cluster-based countermeasure against blackhole attacks in MANETs. Telecommun. Syst. 2014, 57, 119–136. [Google Scholar] [CrossRef]
  193. Katal, A.; Wazid, M.; Goudar, R.; Singh, D. A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission. In Proceedings of the 2013 IEEE Conference on Information & Communication Technologies, Thuckalay, India, 11–12 April 2013; pp. 479–484. [Google Scholar]
  194. Shukla, M.; Joshi, B.K.; Singh, U. Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wirel. Pers. Commun. 2021, 121, 503–526. [Google Scholar] [CrossRef] [PubMed]
  195. Kumar, A.; Varadarajan, V.; Kumar, A.; Dadheech, P.; Choudhary, S.S.; Kumar, V.A.; Panigrahi, B.K.; Veluvolu, K.C. Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess. Microsystems 2021, 80, 103352. [Google Scholar] [CrossRef]
  196. Keerthika, V.; Malarvizhi, N. Mitigate black hole attack using hybrid bee optimized weighted trust with 2-Opt AODV in MANET. Wirel. Pers. Commun. 2019, 106, 621–632. [Google Scholar] [CrossRef]
  197. Naveena, S.; Senthilkumar, C.; Manikandan, T. Analysis and countermeasures of black-hole attack in manet by employing trust-based routing. In Proceedings of the 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 March 2020; pp. 1222–1227. [Google Scholar]
  198. Galasso, C.; McNair, J.; Fujii, M.; Dong, Z. Resilient infrastructure. Commun. Eng. 2022, 1, 27. [Google Scholar] [CrossRef]
  199. Mathieu, R.; Boamah, S.; Cooper, A.; Agnew, D.; Mcnair, J.; Bretas, A. Communication Network Layer State Estimation Measurement Model for a Cyber-Secure Smart Grid. In Proceedings of the ISGT NA 2024, Washington, DC, USA, 19–22 February 2024. [Google Scholar]
Figure 1. A software-defined smart grid (SD-SG) architecture.
Figure 1. A software-defined smart grid (SD-SG) architecture.
Smartcities 07 00085 g001
Figure 2. Overall structure of this survey.
Figure 2. Overall structure of this survey.
Smartcities 07 00085 g002
Figure 3. General SDN architecture.
Figure 3. General SDN architecture.
Smartcities 07 00085 g003
Figure 5. Proposed SDN-integrated IEEE-14 bus system [77].
Figure 5. Proposed SDN-integrated IEEE-14 bus system [77].
Smartcities 07 00085 g005
Figure 6. ClusterBlock design presented in [37].
Figure 6. ClusterBlock design presented in [37].
Smartcities 07 00085 g006
Figure 7. Moving target defense example architecture.
Figure 7. Moving target defense example architecture.
Smartcities 07 00085 g007
Figure 8. Software-defined smart grid (SD-SG) moving target defense (MTD) game example.
Figure 8. Software-defined smart grid (SD-SG) moving target defense (MTD) game example.
Smartcities 07 00085 g008
Figure 9. Strategic interaction scenarios between a hypervisor and an attacker [55] (a)—( m i , a j ): H monitors the controller k i & D attacks k i , where i j ; (b)—( m i = j , a j ): H monitors k i & detects an instruction by D which attacks the same controller; (c)—( m 0 , a j ): H does not monitor any controller and an intrusion occurs on a controller k i by D; (d)—( m b , a 0 ): H monitors a controller k i and D takes the action non-attack.
Figure 9. Strategic interaction scenarios between a hypervisor and an attacker [55] (a)—( m i , a j ): H monitors the controller k i & D attacks k i , where i j ; (b)—( m i = j , a j ): H monitors k i & detects an instruction by D which attacks the same controller; (c)—( m 0 , a j ): H does not monitor any controller and an intrusion occurs on a controller k i by D; (d)—( m b , a 0 ): H monitors a controller k i and D takes the action non-attack.
Smartcities 07 00085 g009
Figure 10. Cross-layer cyber–physical security architecture presented in [36].
Figure 10. Cross-layer cyber–physical security architecture presented in [36].
Smartcities 07 00085 g010
Figure 11. Flatly distributed SDN controller architecture.
Figure 11. Flatly distributed SDN controller architecture.
Smartcities 07 00085 g011
Figure 12. Botnet life cycle presented in [173].
Figure 12. Botnet life cycle presented in [173].
Smartcities 07 00085 g012
Table 1. List of acronyms and definitions.
Table 1. List of acronyms and definitions.
AcronymsDefinitions
SGSmart Grid
SD-SGSoftware-Defined Smart Grid
SDNSoftware-Defined Networking
DDoSDistributed Denial of Service
LDoSLow-Rate Denial of Service
ICTInformation and Communication Technologies
SDWSNsSoftware-Defined Wireless Sensor Networks
HANsHome Area Networks
NANsNeighborhood Area Networks
WANsWide Area Networks
APIApplication Programming Interface
ForCESForwarding and Control Element Separation
PCEPPath Computation Element Communication Protocol
NetConfNetwork Configuration Protocol
I2RSInterface to Routing System
FMLFlow-Based Management Language
RESTfulRepresentational State Transfer
ALTOApplication-Layer Traffic Optimization
NVPNicira Network Virtualization Platform
QoSQuality of Service
OVSDBOpen vSwitch Database Management
BCBlockchain
POFProtocol Oblivious Forwarding
P2PPeer-to-Peer Communication
RNNsDeep Recurrent Neural Networks
BiLSTMBidirectional Long Short RNN
SCADASupervisory Control and Data Acquisition
MTDMoving Target Defense
IDSIntrusion Detection System
HIDSHost IDS
SIDSSignature-Based IDS
AIDSAnomaly-Based IDS
MLMachine Learning
SD-CPCSoftware-Defined Controller Placement Camouflage
VSFsVirtual Security Functions
REDRandom Early Detection
TCPTransmission Control Protocol
AQMActive Queue Management
C&CCommand and Control Channel
DNSDomain Name System
DDNSDynamic DNS
WSNsWireless Sensor Networks
MANETsMobile Ad Hoc Networks
SDDCsSoftware-Defined Data Centers
CECD-ASCross-Layer Ensemble CorrDet with Adaptive Statistics
FDIFalse Data Injection
TCP-SYNTransmission Control Protocol—Synchronize
TSATime Synchronization Attack
MITMMan in the Middle
DR Demand Response
FS Frequency Stability
Table 2. Comparison of survey articles on SD-SG network security: ✓ indicates that the topic is covered, * indicates that the topic is partially covered, and — indicates that the topic is not covered.
Table 2. Comparison of survey articles on SD-SG network security: ✓ indicates that the topic is covered, * indicates that the topic is partially covered, and — indicates that the topic is not covered.
ReferencesPublication YearDDoS/DoS AttacksController AttacksDefense Techniques for Each CyberattackDefense System Considers Multi-Pronged AttacksEmerging Threats
[1]2019**
[7]2017*
[8]2015**
[9]2019**
[10]2018*
[11]2015—-*
This Survey2023
Table 3. Topics explored in this software-defined smart grid security survey.
Table 3. Topics explored in this software-defined smart grid security survey.
Main DomainSub-Topic: CyberattackReferences
DDoS/DoS[37,38,39,40,41,42,43,44,45,46,47,48,49,50]
SD-Smart Grid SecuritySDN Controller[51,52,53,54,55]
Multi-Attack[5,17,36,56,57,58,59,60]
Grid Balancing [61,62,63,64,65]
DDoS/DoS/PhysicalDoS (PDoS)[82,83,84,85]
Spoofing, Sniffing, and Message Relay[86,87,88,89]
MITM, Eavesdropping, and Homograph[90,91,92,93,94]
Meter Manipulation and Theft[95,96,97,98]
FDI[99,100,101,102]
Impersonation, Session Key Exposure, and TSA[103,104,105,106,107,108]
Smart Grid SecurityTCP-SYN Flooding[109,110,111,112]
Jamming[113,114,115,116,117,118]
RAM Exhaustion/CPU Overload[119,120,121]
Brute Force[122,123,124,125]
Message Replay, Covert[126,127,128,129,130,131]
Sybil[132,133,134,135]
Multi-Attack[136,137,138,139]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Agnew, D.; Boamah, S.; Bretas, A.; McNair, J. Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey. Smart Cities 2024, 7, 2131-2181. https://doi.org/10.3390/smartcities7040085

AMA Style

Agnew D, Boamah S, Bretas A, McNair J. Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey. Smart Cities. 2024; 7(4):2131-2181. https://doi.org/10.3390/smartcities7040085

Chicago/Turabian Style

Agnew, Dennis, Sharon Boamah, Arturo Bretas, and Janise McNair. 2024. "Network Security Challenges and Countermeasures for Software-Defined Smart Grids: A Survey" Smart Cities 7, no. 4: 2131-2181. https://doi.org/10.3390/smartcities7040085

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop