Citation: Dharmesh Faquir, Nestoras Chouliaras, Vlachou Sofia, Kalopoulou Olga, Leandros Maglaras. Cybersecurity in smart grids, challenges and solutions[J]. AIMS Electronics and Electrical Engineering, 2021, 5(1): 24-37. doi: 10.3934/electreng.2021002
[1] | Liu J, Xiao Y, Li S, et al. (2012) Cyber security and privacy issues in smart grids. IEEE Commun Surv Tut 14: 981–997. |
[2] | Dileep G (2020) A survey on smart grid technologies and applications. Renew Energ 146: 2589–2625. |
[3] | Maglaras LA, Kim KH, Janicke H, et al. (2018) Cyber security of critical infrastructures. Ict Express 4: 42–45. |
[4] | Ferrag MA, Maglaras LA, Janicke H, et al. (2018) A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustain Cities Soc 38: 806–835. |
[5] | Clark A, Pavlovski CJ (2010) Wireless networks for the smart energy grid: application aware networks. Proceedings of the International MultiConference of Engineers and Computer Scientists 2: 98. |
[6] | Wei C (2010) A conceptual framework for smart grid. 2010 Asia-Pacific Power and Energy Engineering Conference, 1–4. |
[7] | Metke AR, Ekl RL (2010) Smart grid security technology. 2010 Innovative Smart Grid Technologies (ISGT), 1–7. |
[8] | Greer C, Wollman DA, Prochaska DE, et al. (2014) Nist framework and roadmap for smart grid interoperability standards, release 3.0, No. Special Publication (NIST SP)-1108r3. |
[9] | Wang W, Xu Y, Khanna M (2011) A survey on the communication architectures in smart grid. Comput Netw 55: 3604–3629. |
[10] | El Mrabet Z, Kaabouch N, El Ghazi H, et al. (2018) Cyber-security in smart grid: Survey and challenges. Comput Electr Eng 67: 469–482. |
[11] | Al-Shaer E, Rahman MA (2016) Security and resiliency analytics for smart grids. Advances in Information Security. |
[12] | Kimani K, Oduol V, Langat K (2019) Cyber security challenges for iot-based smart grid networks. Int J Crit Infr Prot 25: 36–49. |
[13] | Khurana H, Hadley M, Lu N, et al. (2010) Smart-grid security issues. IEEE Secur Priv 8: 81–85. |
[14] | Gunduz MZ, Das R (2020) Cyber-security on smart grid: Threats and potential solutions. Comput Netw 169: 107094. |
[15] | Lopez C, Sargolzaei A, Santana H, et al. (2015) Smart grid cyber security: An overview of threats and countermeasures. Journal of Energy and Power Engineering 9: 632–647. |
[16] | Procopiou A, Komninos N (2015) Current and future threats framework in smart grid domain. 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 1852–1857. |
[17] | Sanjab A, Saad W, Guvenc I, et al. (2016) Smart grid security: Threats, challenges, and solutions. arXiv preprint arXiv: 1606.06992. |
[18] | Khan R, Maynard P, McLaughlin K, et al. (2016) Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid. 4th International Symposium for ICS & SCADA Cyber Security Research 2016 4, 53–63. |
[19] | Lewis N (2015) What's the best defense against blackenergy malware? Available from: https://searchsecurity.techtarget.com/answer/Whats-the-best-defense-against-BlackEnergy-malware. |
[20] | Denning DE (2012) Stuxnet: What has changed? Future Internet 4: 672–687. |
[21] | Li X, Liang X, Lu R, et al. (2012) Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Commun Mag 50: 38–45. |
[22] | Aloul F, Al-Ali A, Al-Dalky R, et al. (2012) Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy 1: 1–6. |
[23] | Maglaras LA, Jiang J (2014) Ocsvm model combined with k-means recursive clustering for intrusion detection in scada systems. 10th International conference on heterogeneous networking for quality, reliability, security and robustness, 133–134. |
[24] | Sutherland BR (2020) Securing smart grids with machine learning. Joule 4: 521–522. |
[25] | Maglaras LA, Jiang J (2014) A real time ocsvm intrusion detection module with low overhead for scada systems. International Journal of Advanced Research in Artificial Intelligence (IJARAI) 3. |
[26] | Ferrag MA, Maglaras L, Moschoyiannis S, et al. (2020) Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J Inf Secur Appl 50: 102419. |
[27] | Dewa Z, Maglaras LA (2016) Data mining and intrusion detection systems. International Journal of Advanced Computer Science and Applications 7: 62–71. |
[28] | Martins N, Cruz JM, Cruz T, et al. (2020) Adversarial machine learning applied to intrusion and malware scenarios: a systematic review. IEEE Access 8: 35403–35419. |
[29] | Cook A, Janicke H, Smith R, et al. (2017) The industrial control system cyber defence triage process. Comput Secur 70: 467–481. |
[30] | Drivas G, Chatzopoulou A, Maglaras L, et al. (2020) A nis directive compliant cybersecurity maturity assessment framework. arXiv preprint arXiv: 2004.10411. |