Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future DirectionsShow others and affiliations
2022 (English)In: Energies, E-ISSN 1996-1073, Vol. 15, no 18, article id 6799Article, review/survey (Refereed) Published
Abstract [en]
Smart Grids (SGs) are governed by advanced computing, control technologies, and networking infrastructure. However, compromised cybersecurity of the smart grid not only affects the security of existing energy systems but also directly impacts national security. The increasing number of cyberattacks against the smart grid urgently necessitates more robust security protection technologies to maintain the security of the grid system and its operations. The purpose of this review paper is to provide a thorough understanding of the incumbent cyberattacks' influence on the entire smart grid ecosystem. In this paper, we review the various threats in the smart grid, which have two core domains: the intrinsic vulnerability of the system and the external cyberattacks. Similarly, we analyze the vulnerabilities of all components of the smart grid (hardware, software, and data communication), data management, services and applications, running environment, and evolving and complex smart grids. A structured smart grid architecture and global smart grid cyberattacks with their impact from 2010 to July 2022 are presented. Then, we investigated the the thematic taxonomy of cyberattacks on smart grids to highlight the attack strategies, consequences, and related studies analyzed. In addition, potential cybersecurity solutions to smart grids are explained in the context of the implementation of blockchain and Artificial Intelligence (AI) techniques. Finally, technical future directions based on the analysis are provided against cyberattacks on SGs.
Place, publisher, year, edition, pages
MDPI, 2022. Vol. 15, no 18, article id 6799
Keywords [en]
smart grids, cybersecurity, vulnerabilities, cyberattacks, blockchain, artificial intelligence
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-23730DOI: 10.3390/en15186799ISI: 000858224500001Scopus ID: 2-s2.0-85138763990OAI: oai:DiVA.org:bth-23730DiVA, id: diva2:1701813
Note
open access
These materials are a result of research supported by The European Union-The Internal Security Fund (ISF), A431.678/2016.
2022-10-072022-10-072023-08-28Bibliographically approved