CPS Attacks Mitigation Approaches on Power Electronic Systems With Security Challenges for Smart Grid Applications: A Review

被引:37
作者
Amin, Mahmoud [1 ,3 ]
El-Sousy, Fayez F. M. [2 ]
Aziz, Ghada A. Abdel [3 ]
Gaber, Khaled [4 ]
Mohammed, Osama A. [5 ]
机构
[1] Manhattan Coll, Elect & Comp Engn Dept, Riverdale, NY 10471 USA
[2] Prince Sattam Bin Abdulaziz Univ, Dept Elect Engn, Coll Engn, Al Kharj 11942, Saudi Arabia
[3] Elect Res Inst, Power Elect & Energy Convers Dept, Cairo 12611, Egypt
[4] Al Azhar Univ, Dept Elect Engn, Fac Engn, Cairo 11771, Egypt
[5] Florida Int Univ, Elect & Comp Engn Dept, Miami, FL 33174 USA
关键词
Power electronics; Security; Smart grids; Reliability; Real-time systems; Market research; Hardware; Cyber-security; cyber-attacks; cyber-physical system; voltage source converter; smart grid; security attacks mitigation; CYBER-PHYSICAL SYSTEMS; DATA INJECTION ATTACKS; GAME-THEORETIC APPROACH; OF-SERVICE ATTACKS; STATE ESTIMATION; RELIABILITY EVALUATION; ENERGY; DEEP; PROTECTION; PRIVACY;
D O I
10.1109/ACCESS.2021.3063229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an inclusive review of the cyber-physical (CP) attacks, vulnerabilities, mitigation approaches on the power electronics and the security challenges for the smart grid applications. With the rapid evolution of the physical systems in the power electronics applications for interfacing renewable energy sources that incorporate with cyber frameworks, the cyber threats have a critical impact on the smart grid performance. Due to the existence of electronic devices in the smart grid applications, which are interconnected through communication networks, these networks may be subjected to severe cyber-attacks by hackers. If this occurs, the digital controllers can be physically isolated from the control loop. Therefore, the cyber-physical systems (CPSs) in the power electronic systems employed in the smart grid need special treatment and security. In this paper, an overview of the power electronics systems security on the networked smart grid from the CP perception, as well as then emphases on prominent CP attack patterns with substantial influence on the power electronics components operation along with analogous defense solutions. Furthermore, appraisal of the CPS threats attacks mitigation approaches, and encounters along the smart grid applications are discussed. Finally, the paper concludes with upcoming trends and challenges in CP security in the smart grid applications.
引用
收藏
页码:38571 / 38601
页数:31
相关论文
共 214 条
[1]   A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT [J].
Aboelwafa, Mariam M. N. ;
Seddik, Karim G. ;
Eldefrawy, Mohamed H. ;
Gadallah, Yasser ;
Gidlund, Mikael .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :8462-8471
[2]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[3]   Stability and Control Aspects of Microgrid Architectures-A Comprehensive Review [J].
Ahmed, Moudud ;
Meegahapola, Lasantha ;
Vahidnia, Arash ;
Datta, Manoj .
IEEE ACCESS, 2020, 8 :144730-144766
[4]   Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest [J].
Ahmed, Saeed ;
Lee, YoungDoo ;
Hyun, Seung-Ho ;
Koo, Insoo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) :2765-2777
[5]   The Weather Impact on Heating and Air Conditioning With Smart Thermostats [J].
Aibin, Michal .
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2020, 43 (03) :190-194
[6]   CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid [J].
Akaber, Parisa ;
Moussa, Bassam ;
Ghafouri, Mohsen ;
Atallah, Ribal ;
Agba, Basile L. ;
Assi, Chadi ;
Debbabi, Mourad .
IEEE TRANSACTIONS ON SMART GRID, 2020, 11 (03) :2676-2687
[7]   An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System [J].
Al-Abassi, Abdulrahman ;
Karimipour, Hadis ;
Dehghantanha, Ali ;
Parizi, Reza M. .
IEEE ACCESS, 2020, 8 :83965-83973
[8]   Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment [J].
Ali, Md Iman ;
Kaur, Sukhkirandeep ;
Khamparia, Aditya ;
Gupta, Deepak ;
Kumar, Sachin ;
Khanna, Ashish ;
Al-Turjman, Fadi .
IEEE ACCESS, 2020, 8 :172770-172782
[9]   Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices [J].
Altawy, Ham ;
Youssef, Amr M. .
IEEE ACCESS, 2016, 4 :959-979
[10]   Opacity Enforcement for Confidential Robust Control in Linear Cyber-Physical Systems [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (03) :1234-1241