Abstract
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and challenges. The timely detection and defense are of crucial importance for safe and reliable operation of cyber-physical power systems (CPPSs). This paper presents a comprehensive review of some of the latest attack detection and defense strategies. Firstly, the vulnerabilities brought by some new information and communication technologies (ICTs) are analyzed, and their impacts on the security of CPPSs are discussed. Various malicious cyber-attacks on cyber and physical layers are then analyzed within CPPSs framework, and their features and negative impacts are discussed. Secondly, two current mainstream attack detection methods including state estimation based and machine learning based methods are analyzed, and their benefits and drawbacks are discussed. Moreover, two current mainstream attack defense methods including active defense and passive defense methods are comprehensively discussed. Finally, the trends and challenges in attack detection and defense strategies in CPPSs are provided.
WITH the accelerated development of information and communication technologies (ICTs), a critical mass of instruments and devices with communication functions have been widely deployed in power systems to enhance the state observability, control responsiveness, and operation flexibility in the face of increased penetration of renewable generations at all voltage levels and mass roll-out of electrification plans across many end user sectors. This trend is transforming power systems to cyber-physical power systems (CPPSs), allowing seamless integration and interaction between power system assets covering physical infrastructure, information sensing and mining as well as system operation and control in cyber space [
It is evident that CPPSs would profoundly change the operation method of conventional power systems, yet the integration of communication and computation technologies will also bring new cybersecurity challenges to CPPSs. Firstly, the control equipment in conventional power systems is often designed without considering cybersecurity issues since conventional power systems have been working in an isolated physical environment for a long period of time in the history. Secondly, when communication and computation devices are coupled with conventional control systems of power system infrastructure, the existing security technologies cannot be directly extended to almost defenseless control devices, leading to inherent cybersecurity vulnerabilities. Further, due to multi-point, multi-type, and multi-layer features of CPPSs, the attackers may easily identify these cybersecurity vulnerabilities and hence launch malicious cyber-attacks. As a consequence, new cybersecurity issues may emerge from time to time as a price of the increasing digitalization of power systems and continual development of CPPSs.
As illustrated in

Fig. 1 Timeline of major attack events.
Cybersecurity methods of CPPSs have been intensively studied in the past decade, and review papers on these methods are summarized in
Characteristic | Conventional power system | CPPS |
---|---|---|
Measurement | Electromagnetic meters | More two-way communication smart meters |
Communication | One-way communication between power systems and users | Two-way communication between power systems and users |
Power flow mode | Unidirectional power flow | Bi-directional power flow |
Control | Centralized control | Centralized and distributed control |
Topic | Reference | Content |
---|---|---|
Attack detection |
[ | Analysis of false data injection attack and corresponding detection methods |
[ | Analysis of physics-based anomaly detection | |
[ | Analysis of attack detection methods | |
[ | Analysis of centralized and distributed attack detection methods | |
[ | Analysis of attack detection, estimation, and control for industrial CPPSs | |
[ | Analysis of attack detection based on deep learning | |
Attack defense |
[ | Analysis of prominent attack methods |
[ | Analysis of power systems against malicious attacks | |
[ | Security threats for smart metering infrastructure | |
[ | Security issues of advanced metering infrastructure | |
[ | Analysis of security requirements and attack defense methods | |
[ | Analysis of secure control for CPPSs |
This paper presents an overview of attack analysis, attack detection, and attack defense methods for CPPSs, and their challenges are elaborated in detail. The research framework of cyber-attacks on CPPSs is illustrated in

Fig. 2 Research framework of cyber-attacks on CPPSs.
The main ideas are as follows. When a system suffers from cyber-attacks, the impacts of cyber-attacks on CPPSs are firstly discussed. The characteristics of cyber-attacks are then analyzed, and the attack detection is implemented to diagnose and identify cyber-attacks. After the detection, different defense methods are proposed to guarantee safe operation of CPPSs. Different from the existing review papers, this paper focuses on the attack detection and cybersecurity defense of CPPSs.
Specifically, the rest of this paper is organized as follows.Section II presents the development and security risks of CPPSs. Section III presents the characteristics and impacts of cyber-attacks on CPPSs. The cyber-attack detection is presented in Section IV. For cyber-attack defense, a survey is conducted on the popular methods including active defense and passive defense methods in Section V. The conclusion and challenging issues are given in Section VI.
This section firstly analyzes the key factors that drive the rapid development of CPPSs, and compares CPPSs with conventional power systems. The evolution of CPPSs involves the deployment of new technologies, which also brings a number of security vulnerabilities.
There exist many factors that drive the rapid development of CPPSs, while the most influential ones include the rapid deployment of renewable generation technologies, the growing number of prosumers, and the mass roll-out of demand-side management technologies.
First of all, the biggest challenge facing sustainable development is climate change which is the most important drive for the transformational change of conventional energy structure to a low-carbon energy structure [
Further, considering the consumers’ expectations of increased power supply while meeting more strict legislations on both pollutant and carbon emissions. Utility grids are moving progressively to connect renewable generations as much as possible, so as to reduce the carbon footprint of power generation while meeting the growing public demands for both generation sustainability and more generation capacity. However, traditional solutions are difficult to cope with the increased complexities of the utility grid under the transition to a low-carbon system, the concept of CPPSs have then been proposed to offer a potential better framework to operate and control such a complex system. As the aggregation of advanced monitoring systems, home area networks, two-way communication, and remote control technology, CPPSs can enable the intelligent demand-side management (DSM) and offer a seemly integrated platform for the consumers to actively participate in the ancillary services of power systems through two-way interaction [
The emergence of CPPSs is to meet the needs for power system digitalization as well as more sustainable low-carbon power supply. In fact, CPPSs are power systems that can intelligently integrate the behavior of all stakeholders in the energy supply chain, so as to provide satisfactory power supply to the consumers [
Conventionally, power system is an one-way centralized system delivering the power from the generator set to the end users [

Fig. 3 Framework of CPPSs under multi-type attacks.
In general, CPPSs can maximize the reliability, availability, and efficiency of grid operation, bringing tangible benefits to the economy and the society as a while. A comprehensive comparison of two systems is presented in [
CPPSs are expected to bring a number of benefits to the operation and control of power systems with significant penetration of renewable generations at different voltage levels and to support the decarbonization of different sectors.
Many technical challenges, which are related not only to control and communication but also to real-time monitoring and management, need to be tackled such as real-time monitoring of demand-side power consumption changes, microgrid management, charging support of electric vehicles [
1) New CPPS technologies: in recent years, some new CPPS technologies [
To achieve efficient grid management, it is necessary to apply advanced smart meters and control technologies in smart grids at all levels. DSM is one of the efficient grid management technologies, which aims to lower the power demand by taking effective incentive and inducement measures and appropriate operation mode. It in turn avoids the cost of building new generators and transmission lines, saves customers’ money, and lowers the pollution from electric generators [
Furthermore, distributed energy resources (DERs) can be flexibly connected to smart grids, so that the power suppliers and the users can effectively manage energy utilization. For example, a current-controlled voltage-mode control method for dispatchable electronically coupled DER units is proposed, which can quickly stabilize the terminal voltage and frequency [
2) New features of CPPSs: the incorporation of these technologies into CPPSs brings many new features. As summarized in

Fig. 4 New features of CPPSs.
The first three are the basic features of CPPSs, “applicability” is the purpose of CPPSs, and “security” is the key step to ensure the reliable operation of CPPSs. These new features are vital for interacting with power consumers, meeting power quality requirements, and supporting modern electricity markets.
The large-scale structure and complex networked environment of CPPSs increase their complexities and vulnerabilities, giving the attackers new opportunities to launch malicious cyber-attacks. Therefore, security assessment can enable the defenders to better identify security vulnerabilities of CPPSs, thereby improving defense strategies.
Firstly, there are loopholes in CPPSs. For example, [
Secondly, the vulnerabilities of CPPSs will be greatly aggravated under malicious cyber-attacks. Therefore, the security assessment of CPPSs under cyber-attacks is also extremely important. An intrusion and defense model based on markov decision process (MDP) is proposed to evaluate the security of substations in the harsh network environment [
As cyber-attacks could pose a huge threat to CPPSs, it is essential to analyze these attacks in much more details. In this section, we firstly discuss the structure of CPPSs, and comprehensively analyze possible cyber-attacks to each network layer and extract their features. Then, we further analyze the specific impacts of different cyber-attacks on CPPSs.
According to propagation methods of cyber-attacks [

Fig. 5 Analysis of cyber-attack features.
Due to physical isolation of CPPSs from the external environment, the attackers need to break through the physical isolation and enter into the internal network firstly, before they can launch any cyber-attacks. At this stage, a popular method taken by the attackers is to use phishing emails to plant a back door in the system and breaks through physical isolation with an unintentional click by the operator. Another method is to search for vulnerabilities of physical isolation technology such as firewall security vulnerabilities, to break the protection barrier between the internal and external networks by using password cracking. Once having gained an access to the internal network, the attackers can attack physical devices and communication devices connected with the internal network in the smart grid. Then, the key features of cyber-attacks are summarized below.
1) Multi-point: multi-point means that the attacker can launch cyber-attacks by weakly protected/unprotected devices or nodes in power generation, transmission, distribution and consumption. For example, PMU is usually deployed in the 330 kV and above backbone network, and important power plants and substations. RTU is installed in power plant or substation, and IED is necessary for substation automation system. These smart measuring meters and devices with communication are connected to each other [
2) Multi-layer: multi-layer means that cyber-attacks can spread across different layers due to the high coupling among physical, cyber, and control layers. The above smart measuring meters and devices in physical layer are interconnected through wired/wireless networks, e.g., Ethernet [
3) Multi-type: multi-type means that the types of attacks against different devices are also heterogeneous. In the physical layer, the attackers can launch different cyber-attacks aiming at destructing physical devices such as measuring meters, protection devices, and so on [
4) Cross: it should be noted that the above three features are coupled with each other in
Therefore, extensive research works on the security of CPPSs have been conducted to hedge against attacks by analyzing the vulnerabilities and exploring reliable solutions, which are reviewed in Sections IV and V.
To better illustrate the characters of multi-type of cyber-attacks, we list several popular attack models such as FDIAs, replay attacks (RAs), and DoS.
The following linear discrete model of CPPSs [
(1) |
where and are the system state and measurement output vectors at the sampling instant, respectively; is the state transition matrix; is the Jacobian matrix; and and are the independent process and measurement noise, respectively. For system model in (1), three cyber-attacks are analyzed as follows.
1) FDIAs [
(2) |
where , represents the measuring meter is attacked, otherwise, ; and is the attack vector designed by the attackers.
2) RAs [
Sept 1: the attackers record the measured output for enough time without giving the system desired attacked control commands .
Sept 2: the attackers inject the desired attacked control commands into the system while replaying previously recorded data to eliminate the effects of the attack, which makes it difficult to detect.
The attack model is described as:
(3) |
where the subscript denote a large enough replaying period.
3) DoS: DoS means that the attackers continuously send forged packets on communication network channel, which makes the communication unavailable and the information cannot be exchanged normally. In this case, once the attackers successfully block the communication channel, will be lost. The corresponding model is usually described as:
(4) |
where is a diagonal matrix with elements 0 or 1, i.e., represents that the corresponding measurements are successfully transmitted, otherwise, .
The above three attack models are popular, and some literatures had done detailed research on these attack models, attack scenario, and specific detection methods, e.g., FDIA [
In summary, the diversity of attack methods is due to different vulnerabilities of CPPSs considered by the attackers. However, the essence of the attack method is the malicious manipulation of data on different devices with security vulnerabilities in CPPSs, including data tampering, e.g., FDIA and RA, and interruption of transmission, e.g., DoS.
As mentioned above, cyber-attacks pose a huge security threat to CPPSs. Recent research on cyber-attacks clearly indicates that the impact of cyber-attacks on CPPSs is increasing. Generally, the impacts of cyber-attacks include systems stability, i.e., the destructive behavior induced by the attackers can affect system stability such as cascading failure, and the economy, i.e., the profit-making of the attackers.
Cyber and physical layers of CPPSs are highly coupled, i.e., the control of power systems depends on communication networks, and the power supply of communication networks also relies on power systems, which brings unprecedented improvement and functionalities to power systems. However, such interdependent systems are also vulnerable to the failures, natural disasters, and especially cyber-attacks with the above features. When an attack occurs in an interdependent system, a failure caused by cyber-attacks in one network may cascade down to a dependent node in another network [
The cascading failures caused by cyber-attacks can affect the stable operation of power systems. The impacts on stable operation are related to misleading data and information after cyber-attacks successfully hack into CPPSs. For example, the attackers may implement unnecessary generation operation and load shedding by injecting false data [
The cascading failures caused by cyber-attacks can lead to wide-area blackouts, hence affecting the economy, which is also a major concern. Most of the attackers pursue some economic goals such as seeking for personal interests or being employed by hostile countries to influence the economic development of other countries. The economic impact of cyber-attacks can be summarized as follows.
Firstly, energy theft is a major target for many attackers. The attackers can modify the data in CPPSs or modify their own smart meter readings directly to pursue economic benefits. Both situations will bring illegal profits to the attackers [
Secondly, cyber-attacks may change grid topology and even generation plans, which eventually have a significant impact on grid operational cost. For example, the failures caused by cyber-attacks may cascade down interdependent systems, leading to large-scale outage [
In response to potential threats induced by cyber-attacks, many methods have been proposed for cyber-attack detection, and these can be categorized into two groups, e.g., model-based and machine learning based detection methods. Model-based detection method aims to quantify the changes of the internal state of the system under cyber-attacks, so as to achieve the purpose of attack detection. For the latter, machine learning based detection method is utilized to train the classifier for attack detection.
Model-based state estimation of power systems uses measurement sets and system models to estimate internal states, and they can be categorized as static and dynamic state estimation models. Traditional state estimation of power systems usually adopts static estimation methods [
State estimation based detection methods often have two steps: ① estimating or predicting the internal states of the system; and ② processing the measured state information, and comparing the differences based on various similarity tests.
Weighted least square (WLS) estimation is perhaps the most popular static state estimation method. It has been widely used in attack detection. For FDIA detection, WLS-based detection method is utilized to detect FDIA [
Compared with traditional static state estimation methods, dynamic state estimation methods are gaining more popularity in power systems. Kalman filter (KF) and its variants such as extended Kalman filter (EKF) and unscented Kalman filter (UKF) are among the most popular methods. The specific process of KF can be described as:
(5) |
(6) |
where the prior estimation state vector is the estimation at time instant by using the measurements up to time instant ; the posterior estimation state vector is the estimation at time instant by using measurements up to time instant ; and are the prior and posterior covariances of the estimation error, respectively; is the process noise covariance matrix; is the measurement noise covariance matrix; and is the Kalman gain.
The operation of KF includes the following two steps: ① a state prediction is built upon time update; and ② the updated measurement is used to modify the state prediction.
A number of extend detection methods have been proposed based on KF. For FDIA detection, a FDIA detection method is proposed by using KF [
Next, considering the error caused by the linearization of CPPS model, EKF and UKF are also proposed to achieve attack detection. For FDIA detection, according to successive batch-mode regression representation of EKF, a statistical outlier method based on S-estimator is implemented to detect FDIA [
To reduce the communication burden and computational complexity, a distributed Kalman filter (DKF) is proposed to achieve global accurate estimation. It has been widely used in attack detection. For FDIA detection, DKF is combined with blockchain technology to protect network databases and network communication channels from FDIA [
For FDIA detection, interval state estimation (ISE) is employed to carry out attack detection. An ISE combined with deep learning method is proposed to improve the detection accuracy for FDIA [
Moreover, KF selects the minimum linear variance gain as Kalman gain, while the optimal gain of unknown input observer (UIO) is obtained by pole configuration. In addition, UIO can take attack signals as unknown inputs and detect it by estimating attack signal [
Detection test is to detect cyber-attacks by processing the estimated state and comparing its similarity against actual measured value. The popular detection schemes can be grouped into the following categories [
Euclidean distance ( norm) detection test [
(7) |
where is the Euclidean distance detector, and means that the attacks are detected, otherwise; is the estimated value; is the norm of the difference; and is a prior threshold value, which is generally given by the experienced operators according to practical situations.
The largest normalized residual (LNR) detection test [
(8) |
where is covariance matrix of residual .
-detection test [
(9) |
where is the -detector; and is the objective function.
Cumulative sum (CUSUM) detection test [
(10) |
where is the collected measurement at time instant . This method is usually used to monitor the variations in the collected measurements.
Kullback-Leibler distance (KLD) detection test [
(11) |
where is the probability distribution of historical state changes; and is the probability distribution of the state changes at previous moment and current moment. This method uses probability distribution functions to detect cyber-attacks.
Cosine similarity detection test [
(12) |
where the numerator in (12) is dot product of vectors and ; and the denominator denotes the product of their euclidean lengths. When there are no cyber-attacks, is equal to ; and the prior thresholds is discussed in [
Different from the aforementioned state estimation based detection method, machine learning based detection method does not need mathematical model of physical system, and it completely depends on historical data of the system under test. Machine learning is an interdisciplinary field of statistics, artificial intelligence, and computer science, which can be used to extract the knowledge from data. Machine learning methods can be utilized for classification and regression. The essence of regression is to realize numerical prediction, which has been widely applied to power system load forecasting. The classification is to divide the predicted values into specific categories, and cyber-attack detection is a typical classification task. For example, we can use historical data to train a machine learning based classifier, which is then utilized to detect abnormal changes in the data for identifying potential cyber-attacks in CPPSs. In general, machine learning based detection methods include the following three categories: supervised, unsupervised, and semi-supervised learning methods.
Generally, the users provide paired input and expected output, i.e., , to train the method, so that the method will give the expected output according to the given input. For attack detection, the expected output describes whether there is an attack or not. For FDIA detection, linear regression (LR) is employed to detect FDIA by comparing the difference between the measurement vector and model predictions based on historical data [
In addition to the aforementioned methods, as an extremely popular tool, artificial neural network (ANN) has also been widely used for classification and prediction. The ANN model could be a simple feedforward neural network (FNN) or a deep neural network (DNN). Their model can be obtained by the optimization problem, which can be solved by different local and global methods such as gradient based search techniques [
UL refers to learning some useful patterns from unlabeled data, i.e., learning valuable information such as effective features, categories, and structures directly from the original data without any manual guidance such as tags or feedback. For cyber-attacks, the classes of abnormal data are different from normal data. For FDIA detection, K-means clustering (KMC) is employed to achieve FDIA detection [
SSL is also an important branch of machine learning. It falls between supervised learning and UL and uses both labeled and unlabeled data to fit the model. This method is also widely utilized in attack detection. For FDIA detection, a semi-supervised adversarial autoencoder (SSAA) based method is proposed to detect FDIA [
Finally, state estimation based detection method versus machine learning based detection method is shown in

Fig. 6 State estimation based detection method versus machine learning based detection method. (a) State estimation based detection method. (b) Machine learning based detection method.
Category | Method | Advantage | Disadvantage |
---|---|---|---|
Static |
WLS [ |
① Low time complexity ② High implementation |
① Low estimation accuracy ② Low suitability for large system |
Dynamic |
Centralized: KF [ UKF [ |
① High estimation accuracy ② High applicability to nonlinear models ③ High detection rate |
① High time complexity ② Easy divergence |
Distributed: DKF [ UIO [ |
① High estimation accuracy ② High suitability for large systems ③ High detection rate |
① High time complexity ② Easy local optimization |
Category | Method | Advantage | Disadvantage |
---|---|---|---|
Supervised |
LR [ |
① System models are not required ② Known attack detection is fast |
① Data set with label is required ② New attack detection is not applicable |
Unsupervised |
KMC [ |
① System models are not required ② New attack detection is applicable | Large number of training is required |
Semi-supervised |
SSAA [ RSSPN [ |
① System models are not required ② Known attack detection is fast ③ New attack detection is applicable | Unlabeled data are extensively trained |
To further improve the security of CPPSs and reduce the threat of cyber-attacks, many corresponding defense strategies have been developed based on the aforementioned attack detection methods. Similar to the aforementioned detection methods, the defense methods can be grouped into two categories: ① active defense methods, aiming at eliminating the possibility of any successful cyber-attacks; and ② passive defense methods, quickly locating and isolating the attacked locations and taking appropriate measures to ensure the normal operation of CPPSs when cyber-attacks are successfully launched.
From the previous analysis of cyber-attacks, it is evident that three features of cyber-attacks, including multi-point, multi-type, and multi-layer, bring challenges to attack defense. Moreover, due to the limited defense resources, the common active defense strategies often select a limited number of specific facilities for protection to achieve the best defense effect.
For FDIA defense, a hidden moving target defense (HMTD) method is proposed to maintain power flow, which prevents FDIA intrusion by changing the susceptance of transmission lines [
Different from active defense methods, the primary goal of passive defense methods is to locate and isolate the attacked nodes as quickly as possible, and to take the corresponding attack-tolerant measures for reducing the damage caused by cyber-attacks.
In general, attack detection can be performed simultaneously with isolation. For FDIA defense, a prediction-based attack isolation method is proposed [
Based on the above cyber-attack location and isolation methods, certain attack tolerant technologies also need to be utilized to ensure the stable operation of CPPSs. Attack tolerant technologies are quite similar to the fault tolerant control. In general, the fault tolerant control adopts the corresponding control measures for different fault sources to ensure normal operation of the equipment before or after the equipment failure, or the equipment can still perform basic functions within the specified time at the cost of sacrificing the performance loss. Similar to the fault tolerant control described above, attack tolerance technologies also have the similar features. However, this research work is still at its infancy, and only a very limited results have been reported so far, hence deserving further exploration.
For FDIA defense, a parametric feedback linearization (PFL) control is proposed to achieve the stability of power systems under FDIA [
Finally, Table V is a summary of the aforementioned cyber-attack defense methods, including their advantages and disadvantages.
Category | Reference | Advantage | Disadvantage |
---|---|---|---|
Active defense |
HMDT [ GT-based [ DAD model-based [ |
① Low utilization of defense resources ② Simple operation for defender |
① Inconsistency between attacked and protected objects ② Imbalance between attack resources and defense resources on the same target |
Passive defense |
VAR [ ETM [ PFL [ ADMM [ |
① Fast location of attacked nodes ② Normal operation of system under attack |
① Easy to incorrectly isolate safe nodes ② Prone to attack-tolerance delay ③ Easy to exacerbate the instability of system |
Due to the landscape change of power systems and the increased utilization of new ICTs, attack detection and defense for CPPSs have become a research hotspot in the recent years. This paper presents a comprehensive literature review in regards to cybersecurity of CPPSs and three key methods, including attack analysis, attack detection, and attack defense, are discussed in detail. The attack defense has gained substantial attention in the academic community, and a range of detection and defense methods have been proposed. However, there still exist several unsolved open problems in this area, which are summarized as follows.
1) Holistic design of CPPSs: with the support of modern communication resources and technology, CPPSs integrate various physically dispersed computing and control resources to provide system support for core tasks, resulting in significantly improved capacity to solve more complex problems than ever before. Compared with the conventional power systems, CPPSs promote the goals such as intelligent resource allocation and energy management through the integration of communication, computation, and control. Based on this, ICTs can quickly and effectively provide supports for control tasks at a global scale, guaranteeing the feasibility and effectiveness of the global optimization and regulation of CPPSs. However, it also brings more challenges and difficulties to its security control and defense. Therefore, the design and planning of CPPSs should not only consider the development of resource strategic plans, the characteristics of consumers, and the dynamic operation characteristics of power systems, but also the holistic design of security defense mechanism to further strengthen the distributed, interactive, and dynamic features of CPPSs.
2) The gaming between attackers and defenders: the relationship between the attackers and defenders is also worth exploring. For the defenders, it is necessary to ensure the security of CPPSs as much as possible by analyzing and evaluating the vulnerability of CPPSs and configuring the limited defense resources. For the attackers, identifying the weakest point in power systems is the main target. From the perspective of GT, the above behaviors of the attackers and defenders can be modeled by a static zero-sum game. However, in actual situations, the attackers may not know the defense strategies partially or fully, and the defenders may also know nothing about the attack strategies. Therefore, in the case of information asymmetry, investigating the interactions of the attackers and defenders is an interesting topic. Moreover, multiple defenders and multiple attackers may be involved. Thus, it is necessary to investigate dynamic gaming such as Markov games, to describe the process of dynamic interactions between the attackers and defenders.
3) Analysis of new attacks mechanism: with the significantly increasing intelligence of CPPSs, more security vulnerabilities are also identified, offering new opportunities for attackers. Meanwhile, with the continuous update of cyber-attacks means, novel cyber-attacks against CPPSs emerge endlessly. By analyzing the vulnerability of system detection mechanisms, the attackers can build covert attacks to bypass common detection mechanism such as the popular FDIA. Moreover, due to the high coupling between cyber layer and physical layer of CPPSs, any small fault caused by the attacks may propagate rapidly due to the strong coupling of dual networks and may result in more frequent large-scale blackouts, seriously endangering the security, stability, and economic operation of CPPSs. Therefore, the analysis of the attack mechanism and cascading failure is one of the research trends that deserve further investigation.
4) Detection and defense based on physical mechanism: the current attack detection methods are still limited. The state estimation based detection methods can only detect specific cyber-attacks, and their generalization is poor. In practical applications, it is desirable to develop the detection methods independent of system models and parameters. The machine learning based detection methods can only detect the existing cyber-attacks, but they have difficulties in meeting the needs against the endless novel cyber-attacks. However, multi-type cyber-attacks designed by the attackers always directly or indirectly affect physical properties of power systems. Therefore, it is necessary to analyze physical properties based on physical mechanism of the systems, and to develop the detection methods that can be easily scaled up. Further, most research works only focus on attack detection, while there are limited preventive measures. In general, whether an attacker can compromise a device in reality depends on the level of protection that the defender has deployed on the device. Therefore, it is worth considering which devices shall be protected and how many layers of protection shall be deployed so that no state variables can be altered by the attackers. Besides, a limited number of research works have studied attack location and isolation, which is very important for the defenders to take the corresponding attack-tolerance methods for ensuring the normal operation of the system under cyber-attacks. CPPSs are required to have fault-tolerance and attack-tolerance, which can ensure that it can still operate normally in extreme cases. Therefore, it is important for the defenders to utilize the fault-tolerant control to enhance the robustness of CPPSs.
5) Verification and application of attack/defense strategies: most of the existing literatures primarily focus on theoretical investigation. However, the practical applications are limited. To investigate the practicality of these methods, microgrid has attracted much attention. Through the PCC, microgrid is connected with the distribution system as a complementary controllable subsystem to the main grid. Microgrids therefore can enhance the overall control performance of the system during grid-connected mode, achieving the coordinated operation of microgrid and the main grid. When microgrid is in islanded operation mode, it can also meet the power quality requirements of local users, ensure the reliable operation of loads, avoid the negative impact of distributed generation on power systems, and thus play an important role in supporting the distribution network.
References
R. He, H. Xie, J. Deng et al., “Reliability modeling and assessment of cyber space in cyber-physical power systems,” IEEE Transactions on Smart Grid, vol. 11, no. 5, pp. 3763-3773, Sept. 2020. [Baidu Scholar]
A. Nawaz and H. Wang, “Risk-aware distributed optimal power flow in coordinated transmission and distribution system,” Journal of Modern Power Systems and Clean Energy, vol. 9, no. 3, pp. 502-515, Jan. 2021. [Baidu Scholar]
Y. Lin, X. Zhang, J. Wang et al., “Voltage stability constrained optimal power flow for unbalanced distribution system based on semidefinite programming,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 6, pp. 1614-1624, Apr. 2022. [Baidu Scholar]
S. Wang, D. Yu, J. Yu et al., “Optimal generation scheduling of interconnected wind-coal intensive power systems,” IET Generation, Transmission and Distribution, vol. 10, no. 13, pp. 3276-3287, Oct. 2016. [Baidu Scholar]
S. Wang, D. Yu, and J. Yu, “A coordinated dispatching strategy for wind power rapid ramp events in power systems with high wind power penetration,” Journal of Power Sources, vol. 478, pp. 1-16, Jan. 2020. [Baidu Scholar]
Y. Hua, S. Zhou, Y. Huang et al., “Sustainable value chain of retired lithium-ion batteries for electric vehicles,” Electrical Power and Energy Systems, vol. 64, pp. 986-995, Dec. 2015. [Baidu Scholar]
A. Burnham, E. Dufek, T. Stephens et al., “Enabling fast charging-infrastructure and economic considerations,” Journal of Power Sources, vol. 367, pp. 237-249, Nov. 2017. [Baidu Scholar]
X. Yu and Y. Xue, “Smart grids: a cyber-physical systems perspective,” Proceedings of the IEEE, vol. 104, no. 5, pp. 1058-1070, May 2016. [Baidu Scholar]
L. Das, S. Munikoti, B. Natarajan et al., “Measuring smart grid resilience: methods, challenges and opportunities,” Renewable and Sustainable Energy Reviews, vol. 130, pp. 1-16, Sept. 2021. [Baidu Scholar]
M. Chung, W. Ahn, B. Min et al., “An analytical method for developing appropriate protection profiles of instrumentation and control system for nuclear power plants,” Journal of Supercomputing, vol. 74, no. 3, pp. 1378-1393, Mar. 2018. [Baidu Scholar]
L. M. Robert, A. J. Michael, and C. Tim. (2016, Dec.). Analysis of the cyber attack on the ukrainian power grid. [Online]. Available: https://media.kasperskycontenthub.com/wp-content/uploads/sites/58/2016/12/21181126/E-ISAC_SANS_Ukraine_DUC_5.pdf [Baidu Scholar]
J. Condliffe. (2016, Dec.). Ukraines power grid gets hacked again, a worrying sign for infrastructure attacks. [Online]. Available: https://www.technologyreview.com/2016/12/22/5969/ukraines-power-grid-gets-hacked-again-a-worrying-sign-for-infrastructure-attacks/ [Baidu Scholar]
M. Cukier. (2021, Jan.). Study: hackers attack every 39 seconds. [Online]. Available: https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds [Baidu Scholar]
M. Miller. (2021, Jan.). 2021 must-know cyber attack statistics and trends. [Online]. Available: https://www.embroker.com/blog/cyber-attack-statistics [Baidu Scholar]
G. Liang, J. Zhao, F. Luo et al., “A review of false data injection attacks against modern power systems,” IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1630-1638, Jul. 2017. [Baidu Scholar]
J. Giraldo, D. Urbina, A. Cardensa et al., “A survey of physics-based attack detection in cyber-physical systems,” ACM Computing Survey, vol. 51, no. 4, pp. 1-36, Sept. 2018. [Baidu Scholar]
A. Musleh, G. Chen, and Z. Dong, “A survey on the detection algorithms for false data injection attacks in smart grids,” Journal of Hardware and Systems Security, vol. 11, no. 3, pp. 2218-2234, May 2020. [Baidu Scholar]
S. Tan, J. Guerrero, P. Xie et al., “Brief survey on attack detection methods for cyber-physical systems,” IEEE Systems Journal, vol. 14, no. 4, pp. 5329-5339, Dec. 2020. [Baidu Scholar]
D. Zhang, Q. Wang, G. Feng et al., “A survey on attack detection, estimation and control of industrial cyber physical systems,” ISA Transactions, vol. 116, pp. 1-16, Oct. 2021. [Baidu Scholar]
J. Zhang, L. Pan, Q. Han et al., “Deep learning based attack detection for cyber-physical system cybersecurity: a survey,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 3, pp. 377-391, Mar. 2022. [Baidu Scholar]
H. He and J. Yan, “Cyber-physical attacks and defences in the smart grid: A survey,” IET Cyber-Physical Systems: Theory & Applications, vol. 1, no. 1, pp. 13-27, Dec. 2016. [Baidu Scholar]
S. Mehrdad, S. Mousavian, G. Madraki et al., “Cyber-physical resilience of electrical power systems against malicious attacks: a review,” Current Sustainable/Renewable Energy Reports, vol. 5, pp. 14-22, Mar. 2018. [Baidu Scholar]
P. Kumar, Y. Lin, G. Bai et al., “Smart grid metering networks: a survey on security, privacy and open research issues,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2886-2927, Feb. 2019. [Baidu Scholar]
A. Ghosal and M. Conti, “Key management systems for smart grid advanced metering infrastructure: a survey,” IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp. 2831-2848, Mar. 2019. [Baidu Scholar]
Z. Muhammed and D. Resul, “Cyber-security on smart grid: threats and potential solutions,” Computer Networks, vol. 169, no. 14, pp. 1-14, Mar. 2020. [Baidu Scholar]
D. Ding, Q. Han, X. Ge et al., “Secure state estimation and control of cyber-physical systems: a survey,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 1, pp. 176-190, Jan. 2021. [Baidu Scholar]
L. Zhang, X. Hu, Z. Wang et al., “Hybrid electrochemical energy storage systems: an overview for smart grid and electrified vehicle applications,” Renewable and Sustainable Energy Reviews, vol. 139, pp. 1-10, Apr. 2021. [Baidu Scholar]
S. Silva, M. Hejazi, G. Iyer et al., “Power sector investment implications of climate impacts on renewable resources in Latin America and the Caribbean,” Nature Communications, vol. 12, no. 1, pp. 1-12, Feb. 2021. [Baidu Scholar]
M. Daneshvar, I. Mohammadi, K. Zare et al., “Transactive energy management for optimal scheduling of interconnected microgrids with hydrogen energy storage,” International Journal of Hydrogen Energy, vol. 46, pp. 16267-16278, Apr. 2021. [Baidu Scholar]
Y. Chang, I. Kocar, J. Hu et al., “Coordinated control of DFIG converters to comply with reactive current requirements in emerging grid codes,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 2, pp. 502-514, Oct. 2022. [Baidu Scholar]
D. Geleta and M. Manshahia, “Gravitational search algorithm-based optimization of hybrid wind and solar renewable energy system,” Computational Intelligence. doi:10.1111/coin.12336 [Baidu Scholar]
L. Zhang, F. Wang, Y. Xu et al., “Evaluating and selecting renewable energy sources for a microgrid: a bi-capacity-based multicriteria decision making approach,” IEEE Transactions on Smart Grid, vol. 12, no. 2, pp. 921-931, Mar. 2021. [Baidu Scholar]
P. Kong, “Optimal configuration of interdependence between communication network and power grid,” IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4054-4065, Jul. 2019. [Baidu Scholar]
M. Tuballa and M. Abundo, “A review of the development of smart grid technologies,” Renewable and Sustainable Energy Reviews, vol. 59, pp. 710-725, Jun. 2016. [Baidu Scholar]
X. Fang, S. Misra, G. Xue et al., “Smart grid–the new and improved power grid: a survey,” IEEE Communications Surveys and Tutorials, vol. 14, pp. 944-980, Dec. 2012. [Baidu Scholar]
C. Tang, P. Chen, and J. He, “Bidirectional power flow control and hybrid charging strategies for three-phase PV power and energy storage systems,” IEEE Transactions on Power Electronics, vol. 36, no. 11, pp. 12710-12720, Nov. 2021. [Baidu Scholar]
A. Mohamed and O. Mohammed, “Bilayer predictive power flow controller for bidirectional operation of wirelessly connected electric vehicles,” IEEE Transactions on Industry Applications, vol. 55, no. 4, pp. 4258-4267, Aug. 2019. [Baidu Scholar]
Q. Hu, S. Bu, and V. Terzija, “A distributed P and Q provision based voltage regulation scheme by incentivized EV fleet charging for resistive distribution networks,” IEEE Transactions on Transportation Electrification, vol. 7, no. 4, pp. 2376-2389, Dec. 2021. [Baidu Scholar]
T. Wu, S. Bu, X. Wei et al., “Multitasking multi-objective operation optimization of integrated energy system considering biogas-solar-wind renewables,” Energy Conversion and Management, vol. 229, pp. 1-15, Feb. 2021. [Baidu Scholar]
R. Anderson, A. Boulanger, W. Powell et al., “Adaptive stochastic control for the smart grid,” Proceedings of the IEEE, vol. 99, no. 6, pp. 1098-1115, Jun. 2011. [Baidu Scholar]
K. Di-Santo, E. Kanashiro, S. Di-Santo et al., “A review on smart grids and experiences in Brazil,” Renewable and Sustainable Energy Reviews, vol. 52, pp. 1072-1082, Aug. 2015. [Baidu Scholar]
S. Zahurul, N. Mariun, I. Grozescu et al., “Future strategic plan analysis for integrating distributed renewable generation to smart grid through wireless sensor network: Malaysia prospect,” Renewable and Sustainable Energy Reviews, vol. 53, pp. 978-992, Jan. 2016. [Baidu Scholar]
T. Samad, E. Koch, and P. Stluka, “Automated demand response for smart buildings and microgrids: the state of the practice and research challenges,” Proceedings of the IEEE, vol. 104, no. 4, pp. 726-744, Apr. 2016. [Baidu Scholar]
N. Guo, Y. Wang, and G. Yan, “A double-sided non-cooperative game in electricity market with demand response and parameterization of supply functions,” International Journal of Electrical Power and Energy Systems, vol. 126, pp. 1-11, Mar. 2021. [Baidu Scholar]
K. Andras, “On the computational complexity of tariff optimization for demand response management,” IEEE Transactions on Power Systems, vol. 33, no. 3, pp. 3204-3206, May 2018. [Baidu Scholar]
V. S. K. Balijepalli, V. Pradhan, S. A. Khaparde et al., “Review of demand response under smart grid paradigm,” in Proceedings of 2011 IEEE PES Innovative Smart Grid Technologies, Kollam, India, Dec. 2011, pp. 1-8. [Baidu Scholar]
M. Alizadeh, X. Li, Z. Wang et al., “Demand-side management in the smart grid: information processing for the power switch,” IEEE Signal Processing Magazine, vol. 29, no. 5, pp. 55-67, Sept. 2012. [Baidu Scholar]
S. Yilmaz, X. Xu, D. Cabrera et al., “Analysis of demand-side response preferences regarding electricity tariffs and direct load control: key findings from a swiss survey,” Energy, vol. 212, pp. 1-12, Dec. 2020. [Baidu Scholar]
J. Ma, S. Zhang, L. Wu et al., “Probabilistic evaluations on marginal price and capacity adequacy of power systems with price-elastic demand,” Electric Power Systems Research, vol. 194, pp. 1-9, May 2021. [Baidu Scholar]
S. Koloushani, M. Nasri, and M. Rezaei, “Strategic management of stochastic power losses in smart transmission grids,” International Transactions on Electrical Energy Systems, vol. 29, no. 8, pp. 1-18, Aug. 2019. [Baidu Scholar]
M. Delghavi and A. Yazdani, “Sliding-mode control of AC voltages and currents of dispatchable distributed energy resources in master-slave-organized inverter-based microgrids,” IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 980-991, Jan. 2019. [Baidu Scholar]
H. Nazaripouya, H. Pota, C. Chu et al., “Real-time model-free coordination of active and reactive powers of distributed energy resources to improve voltage regulation in distribution systems,” IEEE Transactions on Sustainable Energy, vol. 11, no. 3, pp. 1483-1494, Jul. 2020. [Baidu Scholar]
L. Subramanian, V. Debusschere, H. Gooi et al., “A distributed model predictive control framework for grid-friendly distributed energy resources,” IEEE Transactions on Sustainable Energy, vol. 12, no. 1, pp. 727-738, Jan. 2020. [Baidu Scholar]
Z. Yi, Y. Xu, W. Gu et al., “Distributed model predictive control based secondary frequency regulation for a microgrid with massive distributed resources,” IEEE Transactions on Sustainable Energy, vol. 12, no. 2, pp. 1078-1089, Apr. 2021. [Baidu Scholar]
A. Joshi, A. Suresh, and S. Kamalasadan, “Grid frequency regulation based on point of common coupling angle deviation control of distributed energy resources with fully active hybrid energy storage system,” IEEE Transactions on Industry Applications, vol. 57, no. 5, pp. 4473-4485, Sept. 2021. [Baidu Scholar]
X. Han, H. Heussen, O. Gehrke et al., “Taxonomy for evaluation of distributed control strategies for distributed energy resources,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 5185-5195, Sept. 2018. [Baidu Scholar]
Y. Zhang, W. Chen, and W. Gao, “A survey on the development status and challenges of smart grids in main driver countries,” Renewable and Sustainable Energy Reviews, vol. 79, pp. 137-147, Nov. 2017. [Baidu Scholar]
V. Venkataramanan, A. Hahn, and A. Srivastava, “CP-SAM: cyber-physical security assessment metric for monitoring microgrid resiliency,” IEEE Transactions on Smart Grid, vol. 11, no. 2, pp. 1055-1065, Mar. 2020. [Baidu Scholar]
T. Huang, Q. Guo, H. Sun et al., “A deep spatial-temporal data-driven approach considering microclimates for power system security assessment,” Applied Energy, vol. 237, pp. 36-48, Mar. 2019. [Baidu Scholar]
R. Hassan, C. Li, and Y. Liu, “Online dynamic security assessment of wind integrated power system using SDAE with SVM ensemble boosting learner,” Electrical Power and Energy Systems, vol. 135, pp. 1-9, Feb. 2021. [Baidu Scholar]
X. Wei, S. Gao, T. Huang et al., “Complex network-based cascading faults graph for the analysis of transmission network vulnerability,” IEEE Transactions on Industrial Informatics, vol. 15, no. 3, pp. 1265-1276, Mar. 2019. [Baidu Scholar]
R. Leszczyna, “Standards on cyber security assessment of smart grid,” International Journal of Critical Infrastructure Protection, vol. 22, pp. 70-89, Sept. 2018. [Baidu Scholar]
Y. Chen, J. Hong, and C. Liu, “Modeling of intrusion and defense for assessment of cyber security at power substations,” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 2541-2552, Jul. 2018. [Baidu Scholar]
Q. Ai-Gburi and M. Ariff, “Dynamic security assessment for power system under cyber-attack,” Journal of Electrical Engineering & Technology, vol. 14, pp. 549-559, Mar. 2019. [Baidu Scholar]
K. Pan, A. Pan, M. Cvetkovic et al., “Cyber risk analysis of combined data attacks against power system state estimation,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 3044-3056, May 2019. [Baidu Scholar]
H. Maziku, S. Shetty, and D. Nicol, “Security risk assessment for SDN-enabled smart grids,” Computer Communications, vol. 133, pp. 1-11, Jan. 2019. [Baidu Scholar]
C. Sun, A. Hahn, and C. Liu, “Cyber security of a power grid: state-of-the-art,” Computer Communications, vol. 5, no. 3, pp. 45-56, Jul. 2018. [Baidu Scholar]
E. Padilla, K. Agbossou, and A. Cardenas, “Towards smart integration of distributed energy resources using distributed network protocol over ethernet,” IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1686-1695, Jul. 2014. [Baidu Scholar]
M. Urbina, A. Astarloa, J. Lazaro et al., “CPPS gateway: implementation of modbus and profibus on a programmable SoC platform,” IEEE Latin America Transactions, vol. 16, no. 2, pp. 335-341, Feb. 2018. [Baidu Scholar]
S. Khan, M. Alam, Y. Moullec et al., “An empirical modeling for the baseline energy consumption of an NB-IoT radio transceiver,” IEEE Internet of Things Journal, vol. 8, no. 19, pp. 14756-14772, Oct. 2021. [Baidu Scholar]
B. Hu and H. Gharavi, “A hybrid wired/wireless deterministic network for smart grid,” IEEE Wireless Communications, vol. 28, no. 3, pp. 138-143, Jun. 2021. [Baidu Scholar]
W. Li and X. Zhang, “Simulation of the smart grid communications: challenges, techniques, and future trends,” Computers and Electrical Engineering, vol. 40, no. 1, pp. 270-288, Jan. 2014. [Baidu Scholar]
S. Lyngaas. (2020, Jun.). Utah renewables company was hit by rare cyberattack in March. CyberScoop. [Online]. Available: https://www.cyberscoop.com/spower-power-grid-cyberattack-foia/ [Baidu Scholar]
Y. Song, X. Liu, Z. Li et al., “Intelligent data attacks against power systems using incomplete network information: a review,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 4, pp. 630-641, Jul. 2018. [Baidu Scholar]
C. Konstantinou and M. Maniatakos, “Hardware-layer intelligence collection for smart grid embedded systems,” Journal of Hardware and Systems Security, vol. 3, pp. 132-146, Jan. 2019. [Baidu Scholar]
A. Huseinovic, S. Mrdovic, and K. Bicakci, “A taxonomy of the emerging denial-of-service attacks in the smart grid and countermeasures,” in Proceeding of 2018 26th Telecommunications Forum, Belgrade, Serbia, Nov. 2018, pp. 285-288. [Baidu Scholar]
C. Ge, L. Zhou, G. Hancke et al., “A provenance-aware distributed trust model for resilient unmanned aerial vehicle networks,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12481-12489, Aug. 2021. [Baidu Scholar]
L. Song, A. Striegel, and A. Mohammed, “Sniffing only control packets: a lightweight client-side WiFi traffic characterization solution,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6536-6548, Apr. 2021. [Baidu Scholar]
R. Khan, K. McLaughlin, J. Hastings et al., “Demonstrating cyber-physical attacks and defense for synchrophasor technology in smart grid,” in Proceeding of 2018 16th Annual Conference on Privacy, Security and Trust, Belfast, Ireland, Aug. 2018, pp. 257-266. [Baidu Scholar]
L. Hu, Z. Wang, Q. Han et al., “State estimation under false data injection attacks: security analysis and system protection,” Automatica, vol. 87, pp. 176-183, Jan. 2018. [Baidu Scholar]
L. An and G. Yang, “Distributed secure state estimation for cyber-physical systems under sensor attacks,” Automatica, vol. 107, pp. 526-538, Jan. 2019. [Baidu Scholar]
F. Miao, M. Pajic, and G. Pappas, “Stochastic game approach for replay attack detection,” in Proceeding of 52nd IEEE Conference on Decision and Control, Firenze, Italy, Dec. 2013, pp. 1854-1859. [Baidu Scholar]
X. Li, C. Jiang, D. Du et al., “Optimization and control of cyber-physical power systems under dual-network interactive cascading failure,” Control Engineering Practice, vol. 111, p. 104789, Jun. 2021. [Baidu Scholar]
Y. Zhang and O. Yagan, “Robustness of interdependent cyber-physical systems against cascading failures,” IEEE Transactions on Automatic Control, vol. 65, no. 2, pp. 711-726, Feb. 2020. [Baidu Scholar]
Y. Cai, Y. Cao, Y. Li et al., “Cascading failure analysis considering interaction between power grids and communication networks,” IEEE Transactions on Smart Grid, vol. 7, no. 1, pp. 530-538, Jan. 2016. [Baidu Scholar]
J. Chen, G. Liang, Z. Cai et al., “Impact analysis of false data injection attacks on power system static security assessment,” Journal of Modern Power Systems and Clean Energy, vol. 4, no. 3, pp. 496-505, Jul. 2016. [Baidu Scholar]
X. Shangguan, Y. He, C. Zhang et al., “Switching system-based load frequency control for multi-area power system resilient to denial-of-service attacks,” Control Engineering Practice, vol. 107, p. 104678, Feb. 2021. [Baidu Scholar]
M. Rahman, M. Rana, and H. Pota, “Mitigation of frequency and voltage disruptions in smart grid during cyber-attack,” Journal of Control, Automation and Electrical Systems, vol. 31, no. 2, pp. 412-421, Apr. 2020. [Baidu Scholar]
Y. Liu, T. Liu, H. Sun et al., “Hidden electricity theft by exploiting multiple-pricing scheme in smart grids,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2453-2468, Jan. 2020. [Baidu Scholar]
A. Takiddin, M. Ismail, U. Zafar et al., “Robust electricity theft detection against data poisoning attacks in smart grids,” IEEE Transactions on Smart Grid, vol. 12, no. 3, pp. 2675-2684, May 2020. [Baidu Scholar]
A. Tajer, “False data injection attacks in electricity markets by limited adversaries: stochastic robustness,” IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 128-138, Jan. 2019. [Baidu Scholar]
J. Wu, B. Fang, J. Fang et al., “Sequential topology recovery of complex power systems based on reinforcement learning,” Physica A: Statistical Mechanics and its Applications, vol. 535, pp. 1-13, Dec. 2019. [Baidu Scholar]
L. Lee and P. Hu, “Vulnerability analysis of cascading dynamics in smart grids under load redistribution attacks,” Electrical Power and Energy Systems, vol. 111, pp. 182-190, Oct. 2019. [Baidu Scholar]
A. Rouhani and A. Abur, “Linear phasor estimator assisted dynamic state estimation,” IEEE Transactions on Smart Grid, vol. 9, no. 1, pp. 211-219, Jan. 2018. [Baidu Scholar]
J. Duan, W. Zeng, and M. Y. Chow, “Resilient distributed DC optimal power flow against data integrity attack,” IEEE Transactions on Smart Grid, vol. 9, no. 4, pp. 3543-3552, Jul. 2018. [Baidu Scholar]
L. Sun, T. Chen, X. Chen et al., “Optimum placement of phasor measurement units in power systems,” IEEE Transactions on Instrumentation and Measurement, vol. 68, no. 2, pp. 421-429, Feb. 2019. [Baidu Scholar]
I. Lukicheva, D. Pozo, and A. Kulikov, “Cyberattack detection in intelligent grids using non-linear filtering,” in proceeding of 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, Sarajevo, Bosnia and Herzegovina, Oct. 2018, pp. 257-262. [Baidu Scholar]
Y. Chen, F. Huang, F. Liu et al., “Evaluation of reinforcement learning-based false data injection attack to automatic voltage control,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2158-2169, Mar. 2019. [Baidu Scholar]
R. Moslemi, A. Mesbahi, and J. Velni, “A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids,” IEEE Transactions on Smart Grid, vol. 9, no. 5, pp. 4930-49419, Sept. 2018. [Baidu Scholar]
R. Chen, X. Li, H. Zhong et al., “A novel online detection method of data injection attack against dynamic state estimation in smart grid,” Neurocomputing, vol. 344, pp. 73-81, Jun. 2019. [Baidu Scholar]
H. Khalid and J. Peng, “Immunity toward data-injection attacks using multisensor track fusion-based model prediction,” IEEE Transactions on Smart Grid, vol. 8, no. 2, pp. 697-707, Mar. 2017. [Baidu Scholar]
M. Kurt, Y. Yilmaz, and X. Wang, “Real-time detection of hybrid and stealthy cyber-attacks in smart grid,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 498-513, Feb. 2019. [Baidu Scholar]
Y. Chakhchoukh, H. Lei, and B. Johnson, “Diagnosis of outliers and cyber attacks in dynamic PMU-based power state estimation,” IEEE Transactions on Power Systems, vol. 35, no. 2, pp. 1188-1197, Mar. 2020. [Baidu Scholar]
A. Abbaspour, A. Sargolzaei, P. Forouzannezhad et al., “Resilient control design for load frequency control system under false data injection attacks,” IEEE Transactions on Industrial Electronics, vol. 67, no. 9, pp. 7951-7962, Sept. 2020. [Baidu Scholar]
X. Li, Z. Wang, C. Zhang et al., “A novel dynamic watermarking-based EKF detection method for FDIAs in smart grid,” IEEE/CAA Journal of Automatica Sinica, vol. 9, pp. 1-4, Mar. 2022. [Baidu Scholar]
K. Miao, W. Zhang, and X. Qiu, “An adaptive unscented Kalman filter approach to secure state estimation for wireless sensor networks,” Asian Journal of Control. doi:10.1002/asjc.2783 [Baidu Scholar]
N. Zivkovic and A. Saric, “Detection of false data injection attacks using unscented Kalman filter,” Journal of Modern Power Systems and Clean Energy, vol. 6, no. 5, pp. 847-859, Sept. 2018. [Baidu Scholar]
M. Kurt, Y. Yilmaz, and X. Wang, “Secure distributed dynamic state estimation in wide-area smart grids,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 800-815, Jul. 2020. [Baidu Scholar]
C. Liang, F. Wen, and Z. Wang, “Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks,” Information Fusion, vol. 46, pp. 44-50, Mar. 2019. [Baidu Scholar]
F. Wen and Z. Wang, “Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks,” Digital Signal Processing, vol. 78, pp. 92-97, Jul. 2018. [Baidu Scholar]
M. Kurt, Y. Yilmaz, and X. Wang, “Distributed quickest detection of cyber-attacks in smart grid,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2015-2030, Aug. 2018. [Baidu Scholar]
H. Wang, G. Ruan, G. Wang et al., “Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks,” IEEE Transactions on Industrial Informatics, vol. 14, no. 11, pp. 4766-4778, Nov. 2018. [Baidu Scholar]
H. Wang, J. Ruan, Z. Ma et al., “Deep learning aided interval state prediction for improving cyber security in energy internet,” Energy, vol. 174, pp. 1292-1304, May 2019. [Baidu Scholar]
H. Wang, A. Meng, Y. Liu et al., “Unscented Kalman filter based interval state estimation of cyber physical energy system for detection of dynamic attack,” Energy, vol. 188, pp. 1-15, Dec. 2019. [Baidu Scholar]
H. Wang, J. Ruan, B. Zhou et al., “Dynamic data injection attack detection of cyber physical power systems with uncertainties,” IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5505-5518, Oct. 2019. [Baidu Scholar]
T. Yang, C. Murguia, M. Kuijper et al., “An unknown input multiobserver approach for estimation and control under adversarial attacks,” IEEE Transactions on Control of Network System, vol. 8, no. 1, pp. 475-486, Mar. 2021. [Baidu Scholar]
Y. Li, J. Li, X. Luo et al., “Cyber attack detection and isolation for smart grids via unknown input observer,” in Proceedings of 2018 37th Chinese Control Conference, Wuhan, China, Jul. 2018, pp. 6207-6212. [Baidu Scholar]
A. Ameli, A. Hooshyar, F. El-Saadany et al., “Attack detection and identification for automatic generation control systems,” IEEE Transactions on Power Systems, vol. 33, no. 5, pp. 4760-4774, Sept. 2018. [Baidu Scholar]
X. Wang, X. Luo, M. Zhang et al., “Distributed detection and isolation of false data injection attacks in smart grids via nonlinear unknown input observers,” International Journal of Electrical Power and Energy Systems, vol. 110, pp. 208-222, Sept. 2019. [Baidu Scholar]
Z. Wang, Y. Zhao, K. Yang et al., “UIO-based cyber attack detection and mitagation scheme for load frequency control system,” in Proceedings of 2019 3rd International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, Oct. 2019, pp. 1257-1262. [Baidu Scholar]
Z. Kazemi, A. Safavi, F. Naseri et al., “A secure hybrid dynamic-state estimation approach for power systems under false data injection attacks,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7275-7286, Dec. 2020. [Baidu Scholar]
A. Gallo, M. Turan, F. Boem et al., “A distributed cyber-attack detection scheme with application to DC microgrids,” IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3800-3815, Sept. 2020. [Baidu Scholar]
X. Wang, X. Luo, M. Zhang et al., “Detection of false data injection attack in smart grids via interval observer,” in Proceedings of 2019 Chinese Control and Decision Conference, Nanchang, China, Jun. 2019, pp. 3238-3243. [Baidu Scholar]
A. Ameli, A. Hooshyar, A. Yazdavar et al., “Attack detection for load frequency control systems using stochastic unknown input estimators,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 10, pp. 2575-2590, Oct. 2018. [Baidu Scholar]
X. Luo, X. Wang, M. Zhang et al., “Distributed detection and isolation of bias injection attack in smart energy grid via interval observer,” Applied Energy, vol. 256, pp. 1-19, Dec. 2019. [Baidu Scholar]
X. Wang, X. Luo, M. Zhang et al., “Detection and localization of biased load attacks in smart grids via interval observer,” Information Sciences, vol. 552, pp. 291-309, Apr. 2021. [Baidu Scholar]
M. Rahman and M. Alam, “Imperfect nonlinear false data injection attack against largest normalized residual test,” in Proceedings of 2019 IEEE PES General Meeting, Atlanta, USA, Aug. 2019, pp. 1-5. [Baidu Scholar]
B. Danda and B. Chandra, “Detection of false data injection attacks in smart grid communication systems,” IEEE Signal Processing Letters, vol. 22, no. 10, pp. 1652-1656, Oct. 2015. [Baidu Scholar]
H. Poor, An Introduction to Signal Detection and Estimation. New York: Springer-Verlag, 1994. [Baidu Scholar]
J. Zhang and X. Wang, “Low-complexity quickest change detection in linear systems with unknown time-varying pre- and post-change distributions,” IEEE Transactions on Information Theory, vol. 67, no. 3, pp. 1804-1824, Mar. 2021. [Baidu Scholar]
R. Nawaz, R. Akhtar, M. Shahid et al., “Machine learning based false data injection in smart grid,” International Journal of Electrical Power and Energy Systems, vol. 130, pp. 1-12, Sept. 2021. [Baidu Scholar]
D. Wang, X. Wang, Y. Zhang et al., “Detection of power grid disturbances and cyber-attacks based on machine learning,” Journal of Information Security and Applications, vol. 46, pp. 42-52, Jun. 2019. [Baidu Scholar]
R. Punmiya and S. Choe, “Energy theft detection using gradient boosting theft detector with feature engineering-based preprocessing,” IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 2326-2329, Mar. 2019. [Baidu Scholar]
R. Razavi, A. Gharipour, M. Fleury et al., “A practical feature-engineering framework for electricity theft detection in smart grids,” Applied Energy, vol. 238, pp. 481-494, Mar. 2019. [Baidu Scholar]
M. Cui, J. Wang and M. Yue, “Machine learning-based anomaly detection for load forecasting under cyber attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 5724-5734, Nov. 2019. [Baidu Scholar]
K. Vimalkumar and N. Radhika, “A big data framework for intrusion detection in smart grids using apache spark,” in Proceedings of 2017 International Conference on Advances in Computing, Communications and Informatics, Udupi, India, Sept. 2017, pp. 198-204. [Baidu Scholar]
J. Han, C. Moraga, and S. Sinne, “Optimization of feedforward neural networks,” Engineering Applications of Artificial Intelligence, vol. 9, no. 2, pp. 109-119, Apr. 1996. [Baidu Scholar]
S. Wang, M. Roger, J. Sarrazin et al., “Hyperparameter optimization of two-hidden-layer neural networks for power amplifiers behavioral modeling using genetic algorithms,” IEEE Microwave and Wireless Components Letters, vol. 29, no. 12, pp. 802-805, Dec. 2019. [Baidu Scholar]
M. Albahar and M. Binsawad, “Deep autoencoders and feedforward networks based on a new regularization for anomaly detection,” Security and Communication Networks, vol. 2020, pp. 1-9, Jul. 2020. [Baidu Scholar]
Y. Wang, W. Shi, Q. Jin et al., “An accurate false data detection in smart grid based on residual recurrent neural network and adaptive threshold,” in Proceedings of 2019 IEEE International Conference on Energy Internet, Nanjing, China, May 2019, pp. 1-6. [Baidu Scholar]
A. Ayad, H. Farag, A. Youssef et al., “Detection of false data injection attacks in smart grids using recurrent neural networks,” in Proceedings of 2018 IEEE PES Innovative Smart Grid Technologies Conference, Washington DC, USA, Feb. 2018, pp. 1-5. [Baidu Scholar]
M. Ismail, M. Shaaban, M. Naidu et al., “Deep learning detection of electricity theft cyber-attacks in renewable distributed generation,” IEEE Transactions on Smart Grid, vol. 11, no. 4, pp. 3428-3437, Jul. 2020. [Baidu Scholar]
J. Gao, L. Gan, F. Buschendorf et al., “Omni SCADA intrusion detection using deep learning algorithms,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 951-961, Jan. 2021. [Baidu Scholar]
R. SaiSindhuTheja and G. Shyam, “An efficient metaheuristic algorithm based feature selection and recurrent neural network for DoS attack detection in cloud computing environment,” Applied Soft Computing Journal, vol. 100, pp. 1-11, Mar. 2021. [Baidu Scholar]
S. Yoon and H. Yu, “Multiple points input for convolutional neural networks in replay attack detection,” in Proceedings of 2020 IEEE International Conference on Acoustics, Speech and Signal Processing, Barcelona, Spain, May 2020, pp. 6444-6448. [Baidu Scholar]
M. Zanetti, E. Jamhour, M. Pellenz et al., “A tunable fraud detection system for advanced metering infrastructure using short-lived patterns,” IEEE Transactions on Smart Grid, vol. 10, no. 1, pp. 830-840, Jan. 2019. [Baidu Scholar]
S. Ahmed, Y. Lee, S. Hyun et al., “Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 10, pp. 2765-2777, Oct. 2019. [Baidu Scholar]
J. Wang, D. Shi, Y. Li et al., “Distributed framework for detecting PMU data manipulation attacks with deep autoencoders,” IEEE Transactions on Smart Grid, vol. 10, no. 4, pp. 4401-4410, Jul. 2019. [Baidu Scholar]
M. Aboelwafa, K. Seddik, M. Eldefrawy et al., “A machine-learning-based technique for false data injection attacks detection in industrial IoT,” IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8462-8471, Sept. 2020. [Baidu Scholar]
K. Lu, G. Zeng, X. Luo et al., “Evolutionary deep belief network for cyber-attack detection in industrial automation and control system,” IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7618-7627, Nov. 2021. [Baidu Scholar]
I. Sohn, “Deep belief network based intrusion detection techniques: a survey,” Expert Systems with Applications, vol. 167, pp. 1-9, Apr. 2021. [Baidu Scholar]
Y. Zhang, J. Wang, and B. Chen, “Detecting false data injection attacks in smart grids: a semi-supervised deep learning approach,” IEEE Transactions on Smart Grid, vol. 12, no. 1, pp. 623-634, Jan. 2021. [Baidu Scholar]
M. Farajzadeh-Zanjani, E. Hallaji, R. Razavi-Far et al., “Adversarial semi-supervised learning for diagnosing faults and attacks in power grids,” IEEE Transactions on Smart Grid, vol. 12, no. 4, pp. 3468-3478, Jul. 2021. [Baidu Scholar]
M. Abdel-Basset, H. Hawash, R. Chakrabortty et al., “Semi-supervised spatiotemporal deep learning for intrusions detection in IoT networks,” IEEE Internet of Things Journal, vol. 8, no. 15, pp. 12251-12265, Aug. 2021. [Baidu Scholar]
T. Zheng, Y. Liu, Y. Yan et al., “RSSPN: robust semi-supervised prototypical network for fault root cause classification in power distribution systems,” IEEE Transactions on Power Delivery. doi:10.1109/TPWRD.2021.3125704. [Baidu Scholar]
J. Tian, R. Tan, X. Guan et al., “Enhanced hidden moving target defense in smart grids,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2208-2223, Mar. 2019. [Baidu Scholar]
C. Chen, M. Cui, X. Fang et al., “Load altering attack-tolerant defense strategy for load frequency control system,” Applied Energy, vol. 280, pp. 1-14, Dec. 2020. [Baidu Scholar]
A. Abusorrah, A. Alabdulwahab, Z. Li et al., “Minimax-regret robust defensive strategy against false data injection attacks,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2068-2079, Mar. 2019. [Baidu Scholar]
S. Hasan, A. Dubey, G. Dubey et al., “A game-theoretic approach for power systems defense against dynamic cyber-attacks,” International Journal of Electrical Power and Energy Systems, vol. 115, pp. 1-13, Feb. 2020. [Baidu Scholar]
A. Ferdowsi, W. Saad, and N. Mandayam, “Colonel blotto game for sensor protection in interdependent critical infrastructure,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2857-2874, Feb. 2021. [Baidu Scholar]
Z. Wang, D. Jiang, F. Wang et al., “A polymorphic heterogeneous security architecture for edge-enabled smart grids,” Sustainable Cities and Society, vol. 67, pp. 1-16, Apr. 2021. [Baidu Scholar]
Y. Xiang and L. Xiang, “An improved defender-attacker-defender model for transmission line defense considering offensive resource uncertainties,” IEEE Transactions on Smart Grid, vol. 10, no. 3, pp. 2534-2546, May 2019. [Baidu Scholar]
W. Shi, Y. Wang, Q. Jin et al., “PDL: an efficient prediction-based false data injection attack detection and location in smart grid,” in Proceedings of 2018 IEEE 42nd Annual Computer Software and Applications Conference, Tokyo, Japan, Jul. 2018, pp. 676-681. [Baidu Scholar]
X. Luo, X. Wang, X. Pan et al., “Detection and isolation of false data injection attack for smart grids via unknown input observers,” IET Generation Transmission and Distribution, vol. 13, no. 8, pp. 1277-1286, Apr. 2019. [Baidu Scholar]
X. Wang, X. Luo, M. Zhang et al., “Detection and isolation of false data injection attacks in smart grid via unknown input interval observer,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3214-3229, Apr. 2020. [Baidu Scholar]
X. Wang, X. Luo, M. Zhang et al., “Detection and isolation of false data injection attacks in smart grid via nonlinear interval observer,” IEEE Internet of Things Journal, vol. 6, no. 4, pp. 6498-6512, Aug. 2019. [Baidu Scholar]
J. Jiang, J. Wu, C. Long et al., “Location of false data injection attacks in power system,” in Proceedings of 2019 Chinese Control Conference, Guangzhou, China, Jul. 2019, pp. 7473-7478. [Baidu Scholar]
H. Wang, X. Wen, S. Huang et al., “Generalized attack separation scheme in cyber physical smart grid based on robust interval state estimation,” in Proceedings of International Journal of Electrical Power and Energy Systems, vol. 129, pp. 1-11, Jul. 2021. [Baidu Scholar]
A. Farraj, E. Hammad, and D. Kundur, “A distributed control paradigm for smart grid to address attacks on data integrity and availability,” IEEE Transactions on Signal and Information Processing over Network, vol. 4, no. 1, pp. 70-81, Mar. 2018. [Baidu Scholar]
M. Rahman, M. Rana, and H. Pota, “Mitigation of frequency and voltage disruptions in smart grid during cyber-attack,” Journal of Control, Automation and Electrical Systems, vol. 31, pp. 412-421, Apr. 2020. [Baidu Scholar]
F. Wei, Z. Wang, and H. He, “Cyber-attack recovery strategy for smart grid based on deep reinforcement learning,” IEEE Transactions on Smart Grid, vol. 11, no. 3, pp. 2476-2486, May 2020. [Baidu Scholar]
H. Wang, X. Wen, Y. Xu et al., “Operating state reconstruction in cyber physical smart grid for automatic attack filtering,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 2909-2922, May 2022. [Baidu Scholar]
M. Khalaf, A. Youssef, and E. El-Saadany, “Joint detection and mitigation of false data injection attacks in AGC systems,” IEEE Transactions on Smart Grid, vol. 10, no. 5, pp. 4985-4995, Sept. 2019. [Baidu Scholar]
D. Du, X. Li, W. Li et al., “ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1698-1711, Aug. 2019. [Baidu Scholar]
A. Tummala and R. Inapakurthi, “A two-stage Kalman filter for cyber-attack detection in automatic generation control system,” Journal of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50-59, Jan. 2022. [Baidu Scholar]