Review

Cybersecurity in smart grids, challenges and solutions

  • Received: 16 October 2020 Accepted: 27 November 2020 Published: 12 January 2021
  • Smart Grid technology will revolutionize modern industries providing powerful solutions to increase the efficiency of traditional Electric Grids. Smart Grid is an energy supply network that uses digital communications technology. The increasing load and consumption demands increase electricity complications, for instance, the demand has increased, along with problems like blackouts, overloads, and voltage sags as well as current electrical network growing critical carbon emissions and foremost dealing with cyber-attacks. However, the Smart Grid technology originates with vulnerabilities and complications especially for securing information which is the most vital concern. This article analyzes the threats and potential solutions of smart grids based on the Internet of Things. We focus on the types of cyber attacks and provide in-depth information The cyber security status of the smart grid.

    Citation: Dharmesh Faquir, Nestoras Chouliaras, Vlachou Sofia, Kalopoulou Olga, Leandros Maglaras. Cybersecurity in smart grids, challenges and solutions[J]. AIMS Electronics and Electrical Engineering, 2021, 5(1): 24-37. doi: 10.3934/electreng.2021002

    Related Papers:

  • Smart Grid technology will revolutionize modern industries providing powerful solutions to increase the efficiency of traditional Electric Grids. Smart Grid is an energy supply network that uses digital communications technology. The increasing load and consumption demands increase electricity complications, for instance, the demand has increased, along with problems like blackouts, overloads, and voltage sags as well as current electrical network growing critical carbon emissions and foremost dealing with cyber-attacks. However, the Smart Grid technology originates with vulnerabilities and complications especially for securing information which is the most vital concern. This article analyzes the threats and potential solutions of smart grids based on the Internet of Things. We focus on the types of cyber attacks and provide in-depth information The cyber security status of the smart grid.


    加载中


    [1] Liu J, Xiao Y, Li S, et al. (2012) Cyber security and privacy issues in smart grids. IEEE Commun Surv Tut 14: 981–997.
    [2] Dileep G (2020) A survey on smart grid technologies and applications. Renew Energ 146: 2589–2625.
    [3] Maglaras LA, Kim KH, Janicke H, et al. (2018) Cyber security of critical infrastructures. Ict Express 4: 42–45.
    [4] Ferrag MA, Maglaras LA, Janicke H, et al. (2018) A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain Cities Soc 38: 806–835.
    [5] Clark A, Pavlovski CJ (2010) Wireless networks for the smart energy grid: application aware networks. Proceedings of the International MultiConference of Engineers and Computer Scientists 2: 98.
    [6] Wei C (2010) A conceptual framework for smart grid. 2010 Asia-Pacific Power and Energy Engineering Conference, 1–4.
    [7] Metke AR, Ekl RL (2010) Smart grid security technology. 2010 Innovative Smart Grid Technologies (ISGT), 1–7.
    [8] Greer C, Wollman DA, Prochaska DE, et al. (2014) Nist framework and roadmap for smart grid interoperability standards, release 3.0, No. Special Publication (NIST SP)-1108r3.
    [9] Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grid. Comput Netw 55: 3604–3629.
    [10] El Mrabet Z, Kaabouch N, El Ghazi H, et al. (2018) Cyber-security in smart grid: Survey and challenges. Comput Electr Eng 67: 469–482.
    [11] Al-Shaer E, Rahman MA (2016) Security and resiliency analytics for smart grids. Advances in Information Security.
    [12] Kimani K, Oduol V, Langat K (2019) Cyber security challenges for iot-based smart grid networks. Int J Crit Infr Prot 25: 36–49.
    [13] Khurana H, Hadley M, Lu N, et al. (2010) Smart-grid security issues. IEEE Secur Priv 8: 81–85.
    [14] Gunduz MZ, Das R (2020) Cyber-security on smart grid: Threats and potential solutions. Comput Netw 169: 107094.
    [15] Lopez C, Sargolzaei A, Santana H, et al. (2015) Smart grid cyber security: An overview of threats and countermeasures. Journal of Energy and Power Engineering 9: 632–647.
    [16] Procopiou A, Komninos N (2015) Current and future threats framework in smart grid domain. 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 1852–1857.
    [17] Sanjab A, Saad W, Guvenc I, et al. (2016) Smart grid security: Threats, challenges, and solutions. arXiv preprint arXiv: 1606.06992.
    [18] Khan R, Maynard P, McLaughlin K, et al. (2016) Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid. 4th International Symposium for ICS & SCADA Cyber Security Research 2016 4, 53–63.
    [19] Lewis N (2015) What's the best defense against blackenergy malware? Available from: https://searchsecurity.techtarget.com/answer/Whats-the-best-defense-against-BlackEnergy-malware.
    [20] Denning DE (2012) Stuxnet: What has changed? Future Internet 4: 672–687.
    [21] Li X, Liang X, Lu R, et al. (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50: 38–45.
    [22] Aloul F, Al-Ali A, Al-Dalky R, et al. (2012) Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy 1: 1–6.
    [23] Maglaras LA, Jiang J (2014) Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems. 10th International conference on heterogeneous networking for quality, reliability, security and robustness, 133–134.
    [24] Sutherland BR (2020) Securing smart grids with machine learning. Joule 4: 521–522.
    [25] Maglaras LA, Jiang J (2014) A real time ocsvm intrusion detection module with low overhead for scada systems. International Journal of Advanced Research in Artificial Intelligence (IJARAI) 3.
    [26] Ferrag MA, Maglaras L, Moschoyiannis S, et al. (2020) Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J Inf Secur Appl 50: 102419.
    [27] Dewa Z, Maglaras LA (2016) Data mining and intrusion detection systems. International Journal of Advanced Computer Science and Applications 7: 62–71.
    [28] Martins N, Cruz JM, Cruz T, et al. (2020) Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8: 35403–35419.
    [29] Cook A, Janicke H, Smith R, et al. (2017) The industrial control system cyber defence triage process. Comput Secur 70: 467–481.
    [30] Drivas G, Chatzopoulou A, Maglaras L, et al. (2020) A nis directive compliant cybersecurity maturity assessment framework. arXiv preprint arXiv: 2004.10411.
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(26527) PDF downloads(2370) Cited by(0)

Article outline

Figures and Tables

Figures(2)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog