A survey on the security of communication networks used in power distribution networks

Document Type : Review Article

Authors

Faculty of Electrical and Computer Engineering, Department of Electrical Engineering, University of Kashan, Kashan, Iran

Abstract

The power industry is facing significant challenges, such as fossil fuel reduction, greenhouse gas emissions, and the lack of automated analysis of the power grid. To tackle these challenges, it is crucial to create new infrastructure. The concept of smart grids aims to update existing power grids by integrating advanced communication infrastructure with the existing grid, making power grids more reliable, efficient, and environmentally friendly. Integration of power networks and communication networks, while it has many benefits, it has disadvantages in system security and protection. In this paper, after introducing the smart grid communication infrastructures and their features and applications, the existing threats against the security of communication networks are identified, and suitable actions to prevent, detect, and counteract security risks are discussed. In the security risks prevention stage, solutions such as encryption and blockchain have been studied and reviewed with the purpose of maintaining access to network information for authorized users. To identify attacks on smart grids and due to the need for a smart and fast solution, deep learning has been investigated as one of the smart, dynamic, and powerful tools along with its applications in improving smart grid security.

Keywords


[1] Abrahamsen F. E., Ai Y., and Cheffena M., "Communication Technologies for Smart Grid: A Comprehensive Survey", arXiv preprint arXiv: 11657, 2021.
[2] Gungor V. C., Sahin D., Kocak T., Ergut S., Buccella C., Cecati C., and Hancke G. P., "Smart Grid Technologies: Communication Technologies and Standards", IEEE Transactions on Industrial informatics, 7(4): 529-539, 2011.
[3] Isa N. B. M., Wei T. C., and Yatim A. H. M., "Smart Grid Technology: Communications, Power Electronics and Control System", in 2015 International Conference on Sustainable Energy Engineering and Application (ICSEEA), pp. 10-14, IEEE, 2015.
[4] Wang W. and Lu Z., "Cyber Security in the Smart Grid: Survey and Challenges", Computer Networks, 57(5): 1344-1371, 2013.
[5] Gunduz M. Z. and Das R., "Cyber-Security on Smart Grid: Threats and Potential Solutions", Computer Networks, 169:107094, 2020.
[6] Serban I., Céspedes S., Marinescu C., Azurdia-Meza C. A., Gomez J. S., and Hueichapan D. S., "Communication Requirements in Microgrids: A Practical Survey", IEEE Access, 8: 47694-47712, 2020.
[7] Kong P.-Y., "A Review of Quantum Key Distribution Protocols in the Perspective of Smart Grid Communication Security", IEEE Systems Journal, 16(1): 41-54, 2020.
[8] Le T. N., Chin W.-L., and Chen H.-H., "Standardization and Security for Smart Grid Communications Based on Cognitive Radio Technologies—a Comprehensive Survey", IEEE Communications Surveys & Tutorials, 19(1): 423-445, 2016.
[9] گروه‌ اقتصاد و انرژی، آغاز فاز دوم طرح ملی فهام با هدف هوشمندسازی شبکه برق، تیر 1398. (آنلاین) قابل دسترس در: https://www.yjc.ir/00TPF5.
[10] Kabalci E. and Kabalci Y., Smart Grids and Their Communication Systems. Springer Singapore, 2018.
[11] Li Y., Cheng X., Cao Y., Wang D., and Yang L., "Smart Choice for the Smart Grid: Narrowband Internet of Things (Nb-Iot)", IEEE Internet of Things Journal, 5(3): 1505-1515, 2018.
[12] Refaat S. S., Ellabban O., Bayhan S., Abu-Rub H., Blaabjerg F., and Begovic M. M., "Smart Grid Communication Infrastructures", in Smart Grid and Enabling Technologies: John Wiley & Sons, 2021.
[13] Shaukat N., Ali S.M., Mehmood C.A., Khan B., Jawad M., Farid U., Ullah Z., Anwar S.M., and Majid M., "A Survey on Consumers Empowerment, Communication Technologies, and Renewable Generation Penetration within Smart Grid", Renewable and Sustainable Energy Reviews, 81(1): 1453-1475, 2018.
[14] Khan F., ur Rehman A., Arif M., Aftab M., and Jadoon B. K., "A Survey of Communication Technologies for Smart Grid Connectivity", in 2016 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), pp. 256-261, IEEE, 2016.
[15] Yaacoub J. P. A., Fernandez J. H., Noura H. N., and Chehab A., "Security of Power Line Communication Systems: Issues, Limitations and Existing Solutions", Computer Science Review, 39: 100331, 2021.
[16] Sharma K. and Saini L. M., "Power-Line Communications for Smart Grid: Progress, Challenges, Opportunities and Status", Renewable and Sustainable Energy Reviews, 67: 704-751, 2017.
[17] Anzar M., Nadeem J., and Sohail R., "A Review of Wireless Communications for Smart Grid", Renewable and Sustainable Energy Reviews, 41: 248-260, 2015.
[18] Mulla A., Baviskar J., Khare S., and Kazi F., "The Wireless Technologies for Smart Grid Communication: A Review", in 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT), pp. 442-447, IEEE, 2015.
[19] Cheng Y., Saputra H., Goh L. M., and Wu Y., "Secure Smart Metering Based on Lora Technology", in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), pp. 1-8, IEEE, 2018.
[20] Lora Module Application for Remote Meter Reading Solution (online), 2016. Available: https://www.fourfaith.com/smartgrid/lora-module-application-for-remote-meter-reading-solution.html.
[21] تکنولوژی‌های مخابراتی در سیستم‌های اندازه‌گیری هوشمند، سلسله گزارشات تخصصی شبکه هوشمند انرژی ایران، اردیبهشت 1392، شماره 11.
[22] Zhang H., Liu B., and Wu H., "Smart Grid Cyber-Physical Attack and Defense: A Review", IEEE Access, 9: 29641-29659, 2021.
[23] Acharya S., Dvorkin Y., Pandzic H., and Karri R., "Cybersecurity of Smart Electric Vehicle Charging: A Power Grid Perspective", IEEE Access, 8: 214434-214453, 2020.
[24] Kapourchali M. H., Sepehry M., and Aravinthan V., "Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network", IEEE Transactions on Smart Grid, 9(2): 980-992, 2016.
[25] Elbez G., Keller H. B., and Hagenmeyer V., "A New Classification of Attacks against the Cyber-Physical Security of Smart Grids", in Proceedings of the 13th International Conference on Availability, Reliability and Security, ACM, 2018.
[26] Rawat D. B. and Bajracharya C., "Cyber Security for Smart Grid Systems: Status, Challenges and Perspectives", in SoutheastCon 2015, pp. 1-6, IEEE, 2015.
[27] Coffey K., Maglaras L. A., Smith R., Janicke H., Ferrag M.A., Derhab A., Mukherjee M., Rallis S., and  Yousaf A., "Vulnerability Assessment of Cyber Security for Scada Systems", in Guide to Vulnerability Analysis for Computer Networks and Systems: Springer, pp. 59-80, 2018.
[28] Reed J. H. and Gonzalez C. R. A., "Enhancing Smart Grid Cyber Security Using Power Fingerprinting: Integrity Assessment and Intrusion Detection", in Future of Instrumentation International Workshop (FIIW) Proceedings, pp. 1-3, IEEE, 2012.
[29] شیخان م. و عباسی ع.، «راهکار ترکیبی نوین برای تشخیص نفوذ در شبکه‌های کامپیوتری با استفاده از الگوریتم‌های هوش محاسباتی»، مجله محاسبات نرم، جلد 6، شماره 1، ص. 65-48، 1396.
[30] بابامیر ف. و اسلامی ز.، «بهینه‌سازی پایداری داده‌های مفید و قابل اعتماد در شبکه‌های حسگر بی‌سیم بی‌ملازم»، مجله محاسبات نرم، جلد 1، شماره 1، ص. 23-16، 1391.
[31] Viega J., Messier M., and Chandra P., Network Security with Openssl: Cryptography for Secure Communications. O'Reilly Media, Inc, 2002.
[32] Andoni M., Robu V., Flynn D., Abram S., Geach D., Jenkins D., McCallum P., and Peacock A., "Blockchain Technology in the Energy Sector: A Systematic Review of Challenges and Opportunities", Renewable and Sustainable Energy Reviews, 100: 143-174, 2019.
[33] برنگی ح.، راجی ف. و خاصه ع.، «تحلیل تحقیقات امنیت و حریم خصوصی حوزه بلاک‌چین: یک مطالعه علم سنجی»، مجله محاسبات نرم، جلد 9، شماره 1، ص. 55-40، 1399.
[34] Kamal M. and Tariq M., "Light-Weight Security and Blockchain Based Provenance for Advanced Metering Infrastructure", IEEE Access, 7: 87345-87356, 2019.
[35] Wang W., Huang H., Zhang L., and Su C., "Secure and Efficient Mutual Authentication Protocol for Smart Grid under Blockchain", Peer-to-Peer Networking Applications, 14(5): 2681-2693, 2021.
[36] Hasan M. K., Alkhalifah A., Islam S., Babiker N. B. M., Habib A. K. M. A., Aman A. H. M., and Hossain Md. A., "Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations", Wireless Communications Mobile Computing, 2022.
[37] Aklilu Y. T. and Ding J., "Survey on Blockchain for Smart Grid Management, Control, and Operation", Energies, 15(1): 193, 2022.
[38] Zhou L., Ouyang X., Ying H., Han L., Cheng Y., and Zhang T., "Cyber-Attack Classification in Smart Grid Via Deep Neural Network", in Proceedings of the 2nd International Conference on Computer Science and Application Engineering, ACM, 2018.
[39] Dogaru D. I. and Dumitrache I., "Cyber Attacks of a Power Grid Analysis Using a Deep Neural Network Approach", Journal of Control Engineering and Applied Informatics, 21(1): 42-50, 2019.
[40] Kim F., MATLAB Deep Learning With Machine Learning, Neural Networks and Artificial Intelligence, Apress, 2017.
[41] Farhoumandi M., Zhou Q., and Shahidehpour M., "A Review of Machine Learning Applications in Iot-Integrated Modern Power Systems", the Electricity Journal, 34(1): 106879, 2021.
[42] Kotsiopoulos T., Sarigiannidis P., Ioannidis D., and Tzovaras D., "Machine Learning and Deep Learning in Smart Manufacturing: The Smart Grid Paradigm", Computer Science Review, 40: 100341, 2021.
[43] Omitaomu O. A. and Niu H., "Artificial Intelligence Techniques in Smart Grid: A Survey", Smart Cities, 4(2): 548-568, 2021.
[44] Berman D. S., Buczak A. L., Chavis J. S., and Corbett C. L., "A Survey of Deep Learning Methods for Cyber Security", Information, 10(4), 2019.
[45] لطیف م. و باطنی ز.، «بررسی و مقایسه روش‌های تشخیص نفوذ در شبکه‌های کامپیوتری»، همایش ملی فناوری در مهندسی کاربردی باشگاه پژوهشگران جوان و نخبگان دانشگاه آزاد اسلامی تهران، 21 بهمن، 1395.
[46] Massaoudi M., Abu-Rub H., Refaat S. S., Chihi I., and Oueslati F. S., "Deep Learning in Smart Grid Technology: A Review of Recent Advancements and Future Prospects", IEEE Access, 9: 54558-54578, 2021.
[47] Cordonsky I., Rosenberg I., Sicard G., and David E. O., "Deeporigin: End-to-End Deep Learning for Detection of New Malware Families", in 2018 International Joint Conference on Neural Networks (IJCNN), pp. 1-7, IEEE, 2018.
[48] Yuan Z., Lu Y., Wang Z., and Xue Y., "Droid-Sec: Deep Learning in Android Malware Detection", in ACM SIGCOMM Computer Communication Review, 44(4): 371-372, ACM, 2014.
[49] Ullah A., Javaid N., Samuel O., Imran M., and Shoaib M., "Cnn and Gru Based Deep Neural Network for Electricity Theft Detection to Secure Smart Grid", in 2020 International Wireless Communications and Mobile Computing (IWCMC), 2020, pp. 1598-1602, IEEE.
[50] Shukla S., Thakur S., and Breslin J. G., "Secure Data Transmission in Smart Meters Using Q-Learning in Fog Computing Environment", in Proceedings of Sixth International Congress on Information and Communication Technology, 2022, pp. 667-678, Springer.
[51] Ding Y., Ma K., Pu T., Wang X., Li R., and Zhang D., "A Deep Learning-Based Classification Scheme for Cyber-Attack Detection in Power System", IET Energy Systems Integration, 3(3): 274-284, 2021.
[52] Farrukh Y. A., Ahmad Z., Khan I., and Elavarasan R. M., "A Sequential Supervised Machine Learning Approach for Cyber Attack Detection in a Smart Grid System", in 2021 North American Power Symposium (NAPS), 2021, pp. 1-6.