A review on machine learning techniques for secured cyber-physical systems in smart grid networks

被引:8
作者
Hasan, Mohammad Kamrul [1 ]
Abdulkadir, Rabiu Aliyu [1 ]
Islam, Shayla [2 ]
Gadekallu, Thippa Reddy [3 ,4 ,5 ]
Safie, Nurhizam [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Bangi, Malaysia
[2] UCSI Univ, Inst Comp Sci & Digital Innovat, Cheras, Malaysia
[3] Zhongda Grp, 1 Baibu Ave, Jiaxing 314312, Zhejiang, Peoples R China
[4] Lovely Profess Univ, Div Res & Dev, Phagwara, India
[5] Lebanese Amer Univ, India Dept Elect & Comp Engn, Byblos, Peoples R China
关键词
Smart grid; Cyber-physical system; Cyberattacks; Cybersecurity countermeasures; Machine learning; ARTIFICIAL-INTELLIGENCE TECHNIQUES; ATTACK DETECTION; VULNERABILITY ASSESSMENT; INTRUSION DETECTION; PROTECTION; DEEP;
D O I
10.1016/j.egyr.2023.12.040
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
The smart grid (SG) is an advanced cyber-physical system (CPS) that integrates power grid infrastructure with information and communication technologies (ICT). This integration enables real-time monitoring, control, and optimization of electricity demand and supply. However, the increasing reliance on ICT infrastructures has made the SG-CPS more vulnerable to cyberattacks. Hence, securing the SG-CPS from these threats is crucial for its reliable operation. In recent literature, machine learning (ML) techniques and, more recently, deep learning (DL) techniques have been used by several studies to implement cybersecurity countermeasures against cyberattacks in SG-CPS. Nevertheless, the achieving high performance of these state-of-the-art techniques is constrained by certain challenges, including hyperparameter optimization, feature extraction and selection, lack of models' transparency, data privacy, and lack of real-time attack data. This paper reviews the advancement in using ML and DL techniques for cybersecurity countermeasures in SG-CPS. It analyzes the constraints that need to be addressed to improve performance and achieve real-time implementation. The various types of cyberattacks, cybersecurity requirements, and security standards and protocols are also discussed to establish a comprehensive understanding of the cybersecurity context in SG-CPS. This paper will serve as a comprehensive guide for new and experienced researchers.
引用
收藏
页码:1268 / 1290
页数:23
相关论文
共 128 条
  • [21] Cardenas A., 2021, Cyber-Physical Systems Security Knowledge Area Version 1.0.1
  • [22] Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control
    Chen, Ying
    Huang, Shaowei
    Liu, Feng
    Wang, Zhisheng
    Sun, Xinwei
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2019, 10 (02) : 2158 - 2169
  • [23] Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5
    Cremers, Cas
    Dehnel-Wild, Martin
    Milner, Kevin
    [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 389 - 407
  • [24] Detecting false data attacks using machine learning techniques in smart grid: A survey
    Cui, Lei
    Qu, Youyang
    Gao, Longxiang
    Xie, Gang
    Yu, Shui
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 170
  • [25] Dearden Lizzie, 2017, Ukraine cyber attack: Chaos as national bank, state power provider and airport hit by hackers
  • [26] Defending Against False Data Injection Attacks on Power System State Estimation
    Deng, Ruilong
    Xiao, Gaoxi
    Lu, Rongxing
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) : 198 - 207
  • [27] Department of Energy, 2023, Cyber Security Programs for Nuclear Power Reactors
  • [28] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257
  • [29] Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions
    Ding, Jianguo
    Qammar, Attia
    Zhang, Zhimin
    Karim, Ahmad
    Ning, Huansheng
    [J]. ENERGIES, 2022, 15 (18)
  • [30] Privacy-Preserving Deep Learning With Homomorphic Encryption: An Introduction
    Falcetta, Alessandro
    Roveri, Manuel
    [J]. IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, 2022, 17 (03) : 14 - 25