A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

Smart grids (SGs), which can be classified into a class of networked distributed control systems, are designed to deliver electricity from various plants through a communication network to serve individual consumers. Due to the complexity of environments, the distribution of the spatial locations and vulnerability of the communication networks, cyber security emerges to be a critical issue because millions of electronic devices are interconnected via communication networks throughout critical power facilities. This paper addresses a comprehensive security understanding of the SGs framework, attacks scenarios, detection/protection methods, estimation and control strategies from both communication and control viewpoints. Also, some potential challenges and solution approaches are discussed to deal with the threat issues of SGs. At last, some conclusions and highlight future research directions are presented.

[1]  James Lam,et al.  Stabilization of linear systems over networks with bounded packet loss , 2007, Autom..

[2]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[3]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[4]  Qing Pan,et al.  The Internet of things and Smart Grid , 2018 .

[5]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[6]  Raafat Aburukba,et al.  Smart grid cyber security: Challenges and solutions , 2015, 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).

[7]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[8]  Khaled Salah,et al.  A Modbus traffic generator for evaluating the security of SCADA systems , 2014, 2014 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP).

[9]  Xiangpeng Xie,et al.  Observer-Based Non-PDC Control for Networked T–S Fuzzy Systems With an Event-Triggered Communication , 2017, IEEE Transactions on Cybernetics.

[10]  Jun Sun,et al.  Stability Analysis of the Cyber Physical Microgrid System under the Intermittent DoS Attacks , 2017 .

[11]  Felix F. Wu,et al.  Smart Grids with Intelligent Periphery: An Architecture for the Energy Internet , 2015 .

[12]  Xiaojiang Du,et al.  Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.

[13]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[14]  Hamed Shisheh Foroush,et al.  On Single-Input Controllable Linear Systems Under Periodic DoS Jamming Attacks , 2012, 1209.4101.

[15]  Cheng-Chew Lim,et al.  Adaptively Adjusted Event-Triggering Mechanism on Fault Detection for Networked Control Systems , 2017, IEEE Transactions on Cybernetics.

[16]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[17]  Rui Cao,et al.  Stability analysis for networked control systems under denial-of-service attacks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[18]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[19]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[20]  Deepa Kundur,et al.  Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[21]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[22]  Ling Shi,et al.  A multi-channel transmission schedule for remote state estimation under DoS attacks , 2017, Autom..

[23]  José M. F. Moura,et al.  Distributing the Kalman Filter for Large-Scale Systems , 2007, IEEE Transactions on Signal Processing.

[24]  Ling Shi,et al.  How Can Online Schedules Improve Communication and Estimation Tradeoff? , 2013, IEEE Transactions on Signal Processing.

[25]  Xinghuo Yu,et al.  Beyond Smart Grid - Cyber-Physical-Social System in Energy Future , 2017, Proc. IEEE.

[26]  J.J. Gertler,et al.  Survey of model-based failure detection and isolation in complex plants , 1988, IEEE Control Systems Magazine.

[27]  Eric D. Knapp,et al.  Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems , 2011 .

[28]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[29]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[30]  Eric D. Knapp,et al.  Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure , 2013 .

[31]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[32]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.

[33]  Sonia Martínez,et al.  On Triggering Control of Single-Input Linear Systems Under Pulse-Width Modulated DoS Signals , 2016, SIAM J. Control. Optim..

[34]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[35]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[36]  Radha Poovendran,et al.  A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.

[37]  Sanjay Goel,et al.  Security Challenges in Smart Grid Implementation , 2015 .

[38]  Seref Sagiroglu,et al.  A survey on the critical issues in smart grid technologies , 2016 .

[39]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.

[40]  Subhashish Bhattacharya,et al.  Energy router: Architectures and functionalities toward Energy Internet , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[41]  Emmanuel J. Candès,et al.  Decoding by linear programming , 2005, IEEE Transactions on Information Theory.

[42]  Francesco Bullo,et al.  Control-Theoretic Methods for Cyberphysical Security: Geometric Principles for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[43]  Xiangpeng Xie,et al.  Event-Triggered Predictive Control for Networked Nonlinear Systems With Imperfect Premise Matching , 2018, IEEE Transactions on Fuzzy Systems.

[44]  Mathias Ekstedt,et al.  Enterprise architecture models for cyber security analysis , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[45]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[46]  Ying Jun Zhang,et al.  Graph-based Cyber Security Analysis of State Estimation in Smart Power Grid , 2017, IEEE Communications Magazine.

[47]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[48]  Zidong Wang,et al.  Event-based security control for discrete-time stochastic systems , 2016 .

[49]  Tayeb Sadiki,et al.  A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing , 2015, UNet.

[50]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[51]  Hongtao Sun,et al.  A brief overview on secure control of networked systems , 2017 .

[52]  Hyungbo Shim,et al.  Secure and robust state estimation under sensor attacks, measurement noises, and process disturbances: Observer-based combinatorial approach , 2015, 2015 European Control Conference (ECC).

[53]  Pietro Tesi,et al.  Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.

[54]  Shan Zhou,et al.  Smart grid governance: An international review of evolving policy issues and innovations , 2018 .

[55]  Qing-Long Han,et al.  An Overview of Recent Advances in Event-Triggered Consensus of Multiagent Systems , 2018, IEEE Transactions on Cybernetics.

[56]  Aline Souza,et al.  Real-time monitoring of Distributed Generation through state estimation and geometrically-based tests , 2010, 2010 IREP Symposium Bulk Power System Dynamics and Control - VIII (IREP).

[57]  S. Hanninen,et al.  Survey of smart grid concepts, architectures, and technological demonstrations worldwide , 2011, 2011 IEEE PES CONFERENCE ON INNOVATIVE SMART GRID TECHNOLOGIES LATIN AMERICA (ISGT LA).

[58]  O. Beldiman,et al.  Asymptotic behavior of networked control systems , 1999, Proceedings of the 1999 IEEE International Conference on Control Applications (Cat. No.99CH36328).

[59]  Qing-Long Han,et al.  Distributed networked control systems: A brief overview , 2017, Inf. Sci..

[60]  Tomohisa Hayakawa,et al.  Random and Malicious Packet Transmission Failures on Multi-Hop Channels in Networked Control Systems* , 2016 .

[61]  Yong He,et al.  Notes on Stability of Time-Delay Systems: Bounding Inequalities and Augmented Lyapunov-Krasovskii Functionals , 2017, IEEE Transactions on Automatic Control.

[62]  D. Prince Winston,et al.  A novel IDS technique to detect DDoS and sniffers in smart grid , 2016 .

[63]  Qing-Long Han,et al.  Network-Based T–S Fuzzy Dynamic Positioning Controller Design for Unmanned Marine Vehicles , 2018, IEEE Transactions on Cybernetics.

[64]  Peter Xiaoping Liu,et al.  Denial-of-Service (dos) attacks on load frequency control in smart grids , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[65]  R. C. Diovu,et al.  A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE PES PowerAfrica.

[66]  Kok Lay Teo,et al.  A new looped-functional for stability analysis of sampled-data systems , 2017, Autom..

[67]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[68]  Emilia Fridman,et al.  Robust sampled-data stabilization of linear systems: an input delay approach , 2004, Autom..

[69]  M. Dohler,et al.  Secure Lossless Aggregation for Smart Grid M2M Networks , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[70]  Farzad R. Salmasi,et al.  Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[71]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[72]  Michael P. Wellman,et al.  Nash Q-Learning for General-Sum Stochastic Games , 2003, J. Mach. Learn. Res..

[73]  Saurabh Chanana,et al.  Smart operations of smart grids integrated with distributed generation: A review , 2018 .

[74]  Cesar Hernández,et al.  Energy policies in smart grids , 2017 .

[75]  Wenzong Wang,et al.  False data injection attack in smart grid topology control: Vulnerability and countermeasure , 2017, 2017 IEEE Power & Energy Society General Meeting.

[76]  Josep M. Guerrero,et al.  Multiagent System-Based Distributed Coordinated Control for Radial DC Microgrid Considering Transmission Time Delays , 2017, IEEE Transactions on Smart Grid.

[77]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[78]  Tao Yang,et al.  A Belief Propagation Based Power Distribution System State Estimator , 2011, IEEE Computational Intelligence Magazine.

[79]  Narayan B. Mandayam,et al.  Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[80]  Tomohisa Hayakawa,et al.  Event-triggered control over unreliable networks subject to jamming attacks , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[81]  Mohd Wazir Mustafa,et al.  Smart grids security challenges: Classification by sources of threats , 2018, Journal of Electrical Systems and Information Technology.

[82]  Qing-Long Han,et al.  An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems , 2017, IEEE Transactions on Industrial Informatics.

[83]  Georgios B. Giannakis,et al.  Distributed Robust Power System State Estimation , 2012, IEEE Transactions on Power Systems.

[84]  Ying Jun Zhang,et al.  Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[85]  Mohsen Jafari,et al.  An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[86]  Hui Jiang,et al.  Energy big data: A survey , 2016, IEEE Access.

[87]  Hao Zhang,et al.  Adaptive state estimation for cyber physical systems under sparse attacks , 2019, Trans. Inst. Meas. Control.

[88]  Minrui Fei,et al.  Resilient Event-Triggering $H_{\infty }$ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks , 2017, IEEE Transactions on Power Systems.

[89]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.

[90]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[91]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[92]  J. Dagle,et al.  Vulnerability assessment activities [for electric utilities] , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[93]  Jin Zhang,et al.  Stability analysis of networked control systems with denial-of-service attacks , 2016, 2016 UKACC 11th International Conference on Control (CONTROL).

[94]  Felix F. Wu,et al.  Detection of topology errors by state estimation (power systems) , 1989 .

[95]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[96]  Dong Yue,et al.  A Higher Energy-Efficient Sampling Scheme for Networked Control Systems over IEEE 802.15.4 Wireless Networks , 2016, IEEE Transactions on Industrial Informatics.

[97]  Arman Sargolzaei,et al.  Preventing Time-Delay Switch Attack on Load Frequency Control in Distributed Power Systems , 2016, IEEE Transactions on Smart Grid.

[98]  Zhong-Hua Pang,et al.  Secure Networked Control Systems under Denial of Service Attacks , 2011 .