Securing modern power systems: Implementing comprehensive strategies to enhance resilience and reliability against cyber-attacks

被引:34
作者
Abdelkader, Sobhy [1 ,2 ]
Amissah, Jeremiah [1 ]
Kinga, Sammy [1 ]
Mugerwa, Geofrey [1 ]
Emmanuel, Ebinyu [1 ]
Mansour, Diaa-Eldin A. [1 ,3 ]
Bajaj, Mohit [4 ,5 ,6 ]
Blazek, Vojtech [7 ]
Prokop, Lukas [7 ]
机构
[1] Egypt Japan Univ Sci & Technol, Dept Elect Power Engn, New Borg El Arab City, Egypt
[2] Mansoura Univ, Elect Engn Dept, Mansoura 35516, Egypt
[3] Tanta Univ, Elect Power & Machines Engn Dept, Tanta, Egypt
[4] Graph Era Deemed Univ, Dept Elect Engn, Dehra Dun 248002, India
[5] Al Ahliyya Amman Univ, Hourani Ctr Appl Sci Res, Amman, Jordan
[6] Graph Era Hill Univ, Dehra Dun 248002, India
[7] VSB Tech Univ Ostrava, ENET Ctr, Ostrava 70800, Czech Republic
关键词
Cyber-threats; Cybersecurity; Cyber-attack vectors; Defense mechanisms; Infrastructure security; Modern power systems; Reliability; Resilience; And smart grids; FRAMEWORK; STANDARDS; NETWORK; SCHEME;
D O I
10.1016/j.rineng.2024.102647
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Recent technological advancements in the energy sector, such as the proliferation of electric vehicles, and smart power electronic devices, have substantially increased the demand for reliable and quality power supply. This surge in energy consumption has posed significant concerns for traditional power systems regarding the systems' resilience and reliability. To address these challenges, power system engineers and researchers have proposed the digitalization of power systems, resulting in remotely controlled and operated smart grids. However, the transition towards smart grids has introduced new vulnerabilities, specifically in the form of cyber-attacks. One notable example is the recent malicious attack on the Ukrainian power system, which left three distribution networks destroyed, causing losses and damage to thousands of customers. In an era marked by rapid technological advancement, the security of modern power infrastructure against malicious cyber-attackers has emerged as a paramount concern for power system operators. This paper presents a comprehensive examination of cybersecurity strategies aimed at strengthening the resilience and reliability of modern power systems. By thoroughly analyzing the various cyber-attacks and effective defence strategies, it is evident that cybersecurity plays a crucial role in maintaining a continuous power supply and reducing the impact of potential contingencies. The study further provides valuable perspectives on the changing landscape of cyber threats faced by power infrastructure by combining insights from advanced research and industry expertise. By combining conventional techniques and cutting-edge technologies, valuable recommendations are provided for improving the cybersecurity of the power system and protecting vital grid assets, such as substations. This paper serves as an essential resource for policymakers, industry practitioners, and researchers seeking to understand the complex relationship between cybersecurity and modern power systems.
引用
收藏
页数:22
相关论文
共 166 条
[1]   Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network [J].
Abdallah, Abdallah Elhigazi ;
Hamdan, Mosab ;
Abd Razak, Shukor ;
Ghalib, Fuad A. ;
Hamzah, Muzaffar ;
Khan, Suleman ;
Ali, Siddiq Ahmed Babikir ;
Khairi, Mutaz H. H. ;
Salih, Sayeed .
CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (03) :5607-5623
[2]   ZION: A Scalable W3C Web of Things Directory [J].
Aguzzi, Cristiano ;
Gigli, Lorenzo ;
Zyrianoff, Ivan ;
Roffia, Luca .
2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2024,
[3]   An Overview of Cyber-Resilient Smart Inverters Based on Practical Attack Models [J].
Ahn, Bohyun ;
Kim, Taesic ;
Ahmad, Seerin ;
Mazumder, Sudip Kumar ;
Johnson, Jay ;
Mantooth, H. Alan ;
Farnell, Chris .
IEEE TRANSACTIONS ON POWER ELECTRONICS, 2024, 39 (04) :4657-4673
[4]   A novel approach for detecting advanced persistent threats [J].
Al-Saraireh, Jaafer ;
Masarweh, Ala' .
EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) :45-55
[5]  
Aless Y.D., TRITON: the First ICS Cyberattack on Safety Instrument Systems
[6]   Federated Learning for Decentralized DDoS Attack Detection in IoT Networks [J].
Alhasawi, Yaser ;
Alghamdi, Salem .
IEEE ACCESS, 2024, 12 :42357-42368
[7]  
Aljohani TM, 2022, Arxiv, DOI [arXiv:2208.14225, 10.48550/arXiv.2208.14225]
[8]  
Amissah J., 2023, 2023 11 INT JAP AFR, P171, DOI [10.1109/JAC-ECC61002.2023.10479627, DOI 10.1109/JAC-ECC61002.2023.10479627]
[9]   Developing a three stage coordinated approach to enhance efficiency and reliability of virtual power plants [J].
Amissah, Jeremiah ;
Abdel-Rahim, Omar ;
Mansour, Diaa-Eldin A. ;
Bajaj, Mohit ;
Zaitsev, Ievgen ;
Abdelkader, Sobhy .
SCIENTIFIC REPORTS, 2024, 14 (01)
[10]   Data Integrity Attack in Dynamic State Estimation of Smart Grid: Attack Model and Countermeasures [J].
An, Dou ;
Zhang, Feiye ;
Yang, Qingyu ;
Zhang, Chengwei .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 19 (03) :1631-1644