Milad Beikbabaei, Ali Mehrizi-Sani, Chen-Ching Liu
{"title":"State-of-the-art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps","authors":"Milad Beikbabaei, Ali Mehrizi-Sani, Chen-Ching Liu","doi":"10.1049/gtd2.70006","DOIUrl":null,"url":null,"abstract":"<p>In a power system, the communication link can be compromised by intruders who can launch cyberattacks by capturing data packets, sending falsified packets, or stopping data packets from reaching their destination. Moreover, intruders can compromise control devices using supply chain attacks, firmware patching attacks, and insider attackers. Numerous cyberattacks have been reported previously, and cyberattacks are becoming more frequent since attackers are aware of their socioeconomic impacts. Extensive research has been conducted on developing platforms to simulate cyberattacks, studying different types of cyberattacks, investigating the adverse effects of a successful cyberattack on different components of the power system, designing ways to detect anomalies in the power system using electrical measurements, and proposing ways to mitigate the adverse effects of the detected cyberattack. This paper presents a review of state-of-the-art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying components of the power system vulnerable to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system. Furthermore, different types of cyberattacks and detection and mitigation methods are classified. Research gaps in the cybersecurity of the power system are also discussed.</p>","PeriodicalId":13261,"journal":{"name":"Iet Generation Transmission & Distribution","volume":"19 1","pages":""},"PeriodicalIF":2.0000,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/gtd2.70006","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Iet Generation Transmission & Distribution","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/gtd2.70006","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
In a power system, the communication link can be compromised by intruders who can launch cyberattacks by capturing data packets, sending falsified packets, or stopping data packets from reaching their destination. Moreover, intruders can compromise control devices using supply chain attacks, firmware patching attacks, and insider attackers. Numerous cyberattacks have been reported previously, and cyberattacks are becoming more frequent since attackers are aware of their socioeconomic impacts. Extensive research has been conducted on developing platforms to simulate cyberattacks, studying different types of cyberattacks, investigating the adverse effects of a successful cyberattack on different components of the power system, designing ways to detect anomalies in the power system using electrical measurements, and proposing ways to mitigate the adverse effects of the detected cyberattack. This paper presents a review of state-of-the-art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying components of the power system vulnerable to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system. Furthermore, different types of cyberattacks and detection and mitigation methods are classified. Research gaps in the cybersecurity of the power system are also discussed.
期刊介绍:
IET Generation, Transmission & Distribution is intended as a forum for the publication and discussion of current practice and future developments in electric power generation, transmission and distribution. Practical papers in which examples of good present practice can be described and disseminated are particularly sought. Papers of high technical merit relying on mathematical arguments and computation will be considered, but authors are asked to relegate, as far as possible, the details of analysis to an appendix.
The scope of IET Generation, Transmission & Distribution includes the following:
Design of transmission and distribution systems
Operation and control of power generation
Power system management, planning and economics
Power system operation, protection and control
Power system measurement and modelling
Computer applications and computational intelligence in power flexible AC or DC transmission systems
Special Issues. Current Call for papers:
Next Generation of Synchrophasor-based Power System Monitoring, Operation and Control - https://digital-library.theiet.org/files/IET_GTD_CFP_NGSPSMOC.pdf