A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid

被引:0
作者
Huang, Hao [1 ]
Chen, Wentao [2 ]
Fang, Weidong [3 ,4 ,5 ]
Chen, Wei [6 ]
Ip, Wai-Hung [7 ]
Yung, Kai-Leung [7 ]
机构
[1] Hubei Univ, Fac Microelect, Hubei Key Lab Micronanoelect Mat & Devices, Wuhan 430062, Peoples R China
[2] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[3] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[4] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[5] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[6] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[7] Hong Kong Polytech Univ, Dept Ind & Syst Engn, Hong Kong 100872, Peoples R China
来源
ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024 | 2024年 / 14870卷
关键词
Smart Grid; Artificial Intelligence; Cyber Security; Security Attack;
D O I
10.1007/978-981-97-5606-3_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many intelligent power devices in smart grid are deployed in unattended area. The operation of smart gird faces various security threats. The artificial intelligence-enabled security schemes could mitigate these threats, including data tampering, side channel attack and DDoS. In this paper, we collect and select some related works proposed in the recent years, considering both attack and security measures. Subsequently, we conduct a comprehensive study and analysis of these related works. Additionally, we compare them in terms of physical protection measures, firewalls and intrusion detection systems, vulnerability management, encryption, multifactor validation, secure training and emergency response mechanism and policies and regulations. Finally, we analyze the existing challenges and open issues and suggest some insightful future research directions.
引用
收藏
页码:38 / 48
页数:11
相关论文
共 20 条
[1]   A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications [J].
Anajemba, Joseph Henry ;
Iwendi, Celestine ;
Razzak, Imran ;
Ansere, James Adu ;
Okpalaoguchi, Izuchukwu Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6445-6454
[2]   Computational-Intelligence-Inspired Adaptive Opportunistic Clustering Approach for Industrial IoT Networks [J].
Chithaluru, Premkumar ;
Al-Turjman, Fadi ;
Kumar, Manoj ;
Stephan, Thompson .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) :7884-7892
[3]   HC-TUS: Human Cognition-Based Trust Update Scheme for AI-Enabled VANET [J].
Fang, Weidong ;
Zhu, Chunsheng ;
Guizani, Mohsen ;
Rodrigues, Joel J. P. C. ;
Zhang, Wuxiong .
IEEE NETWORK, 2023, 37 (05) :247-252
[4]   Toward Secure and Lightweight Data Transmission for Cloud-Edge-Terminal Collaboration in Artificial Intelligence of Things [J].
Fang, Weidong ;
Zhu, Chunsheng ;
Zhang, Wuxiong .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) :105-113
[5]   Towards Energy-Efficient and Secure Data Transmission in AI-Enabled Software Defined Industrial Networks [J].
Fang, Weidong ;
Zhu, Chunsheng ;
Yu, F. Richard ;
Wang, Kun ;
Zhang, Wuxiong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) :4265-4274
[6]   Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks [J].
Fang, Weidong ;
Zhang, Wuxiong ;
Yang, Wei ;
Li, Zhannan ;
Gao, Weiwei ;
Yang, Yinxuan .
DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (04) :470-478
[7]   A Trust-Based Security System for Data Collection in Smart City [J].
Fang, Weidong ;
Cui, Ningning ;
Chen, Wei ;
Zhang, Wuxiong ;
Chen, Yunliang .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (06) :4131-4140
[8]  
He H., 2014, Coal Technology., V33, P279
[9]   Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures [J].
Iwendi, Celestine ;
Rehman, Saif Ur ;
Javed, Abdul Rehman ;
Khan, Suleman ;
Srivastava, Gautam .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2021, 21 (03)
[10]  
Li W., 2017, Electric Power ICT, V15, P105