Cyber Security in Smart Grid Technology: A Systematic Review

A Smart Grid (SG) is an electrical infrastructure that functions similarly to a traditional power grid but includes scalable and ubiquitous two-way communications, timely control capabilities, large-scale integration of dispersed resources


Introduction
A Smart Grid is a development of the electric power grid based on a layered IT-driven design.SG can improve efficiency, resilience, reliability, and interoperability by integrating communication and physical systems [1].In the interoperability of the electric grid, smart meters, sensors, and other communicating components of SG offer efficient distributed computing power.Demand response systems, distributed energy sources, remote-controlled components with fault checks, the capacity to self-heal during faults or bugs, and security against physical and cyber-attacks are all benefits of two-way communication between consumers and power service systems in smart grids.The intelligent grid automatically provides a stable power source to handle demand and response cycles to avoid overload tripping and power outages.Cyber security in intelligent grids aims to protect communication and operational data in line with the CIA concept of Confidentiality, Integrity, and Availability [2].
■ 48 • A CIA-approved assessment of a variety of existing cyber-attacks.
• Suggestions and methods for delivering adequate intelligent grid security measures are presented.• A list of smart grid requirements and objectives.
• Providing a comprehensive overview of blockchain-based security solutions.
• Providing background information on IoT-based intelligent grids and security issues.
• Identifying a research gap that has to be filled in order to protect against unknown cyber-attacks.

Findings
The SG architecture is based on the National Institute of Standards and Technology's (NIST) reference model.The seven logical domains are bulk generation, HV transmission, distribution, consumers, selling and purchasing markets, operations, and electrical service providers.Distinct sorts of consumers are characterized by different networks, such as home area networks (HANs), building area networks (BANs), and industrial area networks (IANs).Advanced metering infrastructure (AMI) is implemented to track energy and communication for all inbound and outbound electrical energy flows [4].The advanced metering infrastructure (AMI), SCADA (supervisory control and data acquisition), and communication standards and protocols are the three fundamental components of the smart grid.AMI is an intelligent link between service providers and consumers that is enabled by integrated technology.It is used for measuring consumers' energy on a real-time energy pricing system with enhanced features to help them save money on their energy bills.
SCADA is an energy management and distribution system that automates the control and monitoring of electrical systems.Significant bodies like IEEE, International Electro-technical Commission, and Distributed Network Protocol govern communication and protocol standards for power systems.To investigate intelligent grid security vulnerabilities to protect them from high-risk cyber-attacks and resulting failures.This review study assesses the numerous security concerns in the smart grid that have been explored by researchers in their research work and potential solutions.

Literature
According to the literature on smart grid cyber security, a significant number of assaults have occurred and are becoming increasingly likely on SGs [4].Compliance is not the same as security when it comes to risk management.The goal of security is to develop a risk-managed process approach that successfully mitigates threats' vulnerabilities and reduces their potential effect to a manageable level.We must recognize that there is always danger present; it is never zero.The remaining risk must be managed.A robust security system decreases the total effect of an attack by reducing risk.The goal is to have a balanced approach; having too many security countermeasures qualifies for robust security while having too few raises weaknesses and leaves it susceptible to attackers.The correct mix of security is required.The security platform can minimize the risk and manage the danger by selecting the proper security measures in the context of the threat, vulnerability, and consequence.Countermeasures are only used when they are essential to reduce the threat.Everyone is responsible for security, just as everyone is responsible for safety.To protect the smart grid, the security program relies on the work of all components.Smart grids are also known as intelligent grids since they can interact in both directions between their units and have increased grid interoperability.The sufficient flow of data between metering equipment and substation, generation and distribution, and transmission substations with greater resilience, effective monitoring and control, and physical security are among the elements that have transformed the power system [5].A processor provides the intelligent grid's intelligence in each system unit that runs on a stable operating system.Furthermore, components with intelligent sensors are coupled to create a vast computer platform [6].Each unit has access to its operating system and a communication channel to a nearby unit for accessing circuit breaker functioning conditions, processor com port, and so on.The integration of large-scale dispersed infrastructure has resulted in susceptibility to physical attacks, natural disasters, and cyber-attacks, becoming a serious worry.The assaults cause significant financial loss, infrastructure failure, energy theft, privacy theft, and confusion in operating protocols, all of which impair the SGs' efficiency and dependability.
Because of the infrastructure loss it may have on sensitive national infrastructure, intelligent grid resilience against cyber-attacks is becoming critical.It must have auto-healing capabilities and superior sensing and detecting capabilities.The smart grid's cyber security is the most pressing worry, given its role in defending vital national infrastructure and hackers' expanding understanding of the cyber realm.It has been shown that some components are more vulnerable to cyber-attacks than others.Examples of more

Cyber Security in Smart Grid…
■ 50 vulnerable components include AMIs [7], exposed wireless mesh structure networks, and other attackable components.[8] discusses the threats that have increased due to the addition of new technology to smart According to the literature smart grid cyber security, a significant number of assaults have occurred and are becoming increasingly likely on SGs.Attacks against SGs are divided into attacker type and attack type.In Smart Grids, there are two sorts of attackers: The attacker's strike to inflict damage on many levels might be either conscious or unconscious.Some assaults are carried out to lower power bills, and they target their AMI or billing system.The reason for the assault and the objective of the attack may be used to categorize the attackers.Some attempt to generate conflict, while others are linked to terrorism and attempt to disrupt government operations by causing harm to critical national infrastructure.Some are unhappy personnel who aim to sabotage the utility's progress by exploiting flaws, while others do it for industrial espionage or commercial gain.Attackers can also be classified based on their knowledge of the network and infrastructure devices that are likely to be targeted by a professional attacker or an amateur attacker with no or limited knowledge of the system, and some are terrorists looking to disrupt law and order, competitors, employees, or customers [9].Non-malicious attackers are individuals that attack only for the joy of it, without any personal or financial motivations in mind.Malicious attackers carry out assaults with a specific goal in mind.
Physical, environmental, and cyber-attacks are all types of attacks.By gaining illegal access to physical infrastructure and causing harm to the system, a physical assault poses a hazard.Cyber-attacks are attacks that manipulate calculations and readings, sabotage, and espionage the controlling and normal functioning of the system.Environment threats deal with natural threats such as natural calamities, floods, fire, extreme heat and cold, and cyber-attacks are attacks that manipulate calculations and readings, sabotage, and espionage the controlling and normal functioning of the system.
Attacks are also divided into two types based on their severity: passive and aggressive.Passive attacks breach the security concept of secrecy.Eavesdropping and network traffic analysis are two examples of such assaults.Active attacks attempt to alter existing data in the system or insert malicious material into the system to breach the security principles of availability, confidentiality, and integrity.
Stuxnet was one of the most significant assaults of 2011.Stuxnet was a one-of-a-kind cyber-attack.A zero-day assault goes undetected until it has completed its infectious task [10].The Stuxnet assault was carried out against Iran's Bushehr power facilities to cause harm.It was one of the weapons employed in cyber warfare.Since this was the first malware attack on a critical infrastructure control system, it was thought to be the first of its kind.Existing cyber security systems determine that electrical energy is still vulnerable to cyber-attacks [11].

Classification Of Cyber-Attacks Usually Carried On Smart Grids
As the smart grid's communication system uses an Internet-like data network that transmits data across infrastructure overlaid on the power system using the standards of 802.15.4,802.11, and WiMAX, it is subject to external agents' assaults.In their paper, the authors suggest a Smart Grid Distributed Intrusion Detection System [12].Modules Analysis Security is enhanced by utilizing techniques like support vector machine (SVM) and Artificial Immune System (AIS) for identifying malicious traffic in AMs implemented at various tiers such as Home Area Networks (HANs), Wide Area Networks (WANs), and Neighborhood Area Networks (NANs) [26].This technique has demonstrated promising

Cyber Security in Smart Grid…
■ 51 e-ISSN: 2808-554X results in increasing security by detecting harmful data and determining the best communication paths.
Rather than initiating a physical attack on the power system, hackers inject erroneous data or data.Its main goal to change the data presented by electric power sensors rather than the actual electric power flow [13].Because it overcomes the standard, flawed data detection approach, a severe data assault leverages system error tolerance to avoid data attack detection [14].To counter such assaults, NIST has created a framework (see fig. 3) that is specifically tailored for cross-validating cyber and physical defensive system tactics.Picture 2. NIST Architecture Domain Energy Internet (EI), also known as the Internet of Energy (IoE), is the next in the of the smart grid and is referred to as intelligent Grid 2.0.It is a more flexible intelligent grid integration using Internet technologies.The authors of the paper [15] EI-based Internet of Things (IoT) applications in smart grids (IoT is an emerging technology with numerous advantages such as supporting heterogeneous network structures with broad application areas, the ability to communicate among various devices, and higher security features) and other innovative environments such as smart cities, smart and intelligent energy management infrastructures.Furthermore, [16] identifies outstanding issues and future research possibilities in EI concepts based on IoT Infrastructures.

Conclusion
As hackers and cybercriminals employ new technologies to infiltrate networks and gain control of the network, or at the very least the data sent via it, threats and vulnerabilities are constantly increasing.As a result, researchers are also encouraged to improve their security approaches.The threat to intelligent grids will continue to develop as intelligent grid components (energy Internet or industrial Internet of Things) become more interconnected.From the beginning, including security in smart Grids' hardware, software, procedures, information, and media.Use the "defense in depth" approach to create mutually reinforcing controls; a single weakness will rarely be the "death chain" for hostile agents; instead, it will be a cascade of vulnerabilities and gaps in controls that will cause harm to the entire system.The most basic hack is frequently the most successful, as the human factor is both the strongest and weakest connection.This review examines and assesses the many high-potential assaults that have been carried out and are becoming more likely on Smart grids.Cyber-attacks in smart grids have risen due to the usage of new technologies with characteristics such as two-way communication between customers and the grid.It is claimed that the CIA trinity of the system has to be improved

Cyber Security in Smart Grid…
■ 52