Вы находитесь на странице: 1из 16

This article has been accepted for inclusion in a future issue of this journal.

Content is final as presented, with the exception of pagination.

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS 1

A Survey on Security Communication and Control


for Smart Grids Under Malicious Cyber Attacks
Chen Peng , Senior Member, IEEE, Hongtao Sun, Mingjin Yang, and Yu-Long Wang , Member, IEEE

Abstract—Smart grids (SGs), which can be classified into a developed urgently [3], [4]. Smart grids (SGs), as the typi-
class of networked distributed control systems, are designed to cal representative of next-generation energy Internet, capture
deliver electricity from various plants through a communication a complex infrastructure of delivering their power through
network to serve individual consumers. Due to the complexity of
environments, the distribution of the spatial locations and vulner- advancing information and control methodologies which inte-
ability of the communication networks, cyber security emerges grated with communication and electric flows. Because of
to be a critical issue because millions of electronic devices are inherent requirements of decarbonization, operation efficiency,
interconnected via communication networks throughout critical and clean distribution, SGs have drawn more and more atten-
power facilities. This paper addresses a comprehensive security tion from both governments and the engineering communities
understanding of the SGs framework, attacks scenarios, detec-
tion/protection methods, estimation and control strategies from in recent years [5], [6].
both communication and control viewpoints. Also, some poten- By tracing back to the original concept of SGs, it is first
tial challenges and solution approaches are discussed to deal with proposed by the Electric Power Research Institute which is
the threat issues of SGs. At last, some conclusions and highlight the form of “IntelliGrid” in 2001, and the USA Government
future research directions are presented. officially started the construction of SGs in 2003. The defini-
Index Terms—Attacks detection, cyber security, cyber-physical tions of SGs may be slightly different from country to country,
systems, security control, smart grids (SGs). for example, “E-Energy” in Germany, “FREEDM” in USA.,
and “Digital Power Grid” in Japan. However, the most pop-
ular framework of SGs was provided by the USA. National
Institute of Standards and Technology in 2010. In order to sup-
I. I NTRODUCTION
port the development of SGs, some policies from state-level
NERGY and its delivery infrastructure play a very impor-
E tant role in the human activities. Under the ground of
global energy shortage and environmental damage, a large
which including, just mention a few, USA, Europe, Japan,
and China, have been launched for facilitating further develop-
ment and implementation of SGs [7]. Nowadays, applications
number of renewable energies will be incorporated into the of SGs can be found everywhere, such as Internet of Things,
grids in order to supply for homes, offices, and factories. It is Industry 4.0, new energy automobile, etc. [2], [8], [9].
predicted that average annual electricity demand is expected With the ever-increasing availability of advanced meter-
to increase from 1.3% per year in 2015 to about 2.8% by ing infrastructure (AMI), various information communication
2020 (Smart Grid Top Markets Report 2017) [1], and the technologies (ICTs), and intelligent demand-side management
electricity demand will increase 150% around worldwide by (DSM) techniques, the flexibility, resilience, and robustness
2050 (International Energy Agency, 2010) [2]. Since the tra- for monitoring and control of SGs have been greatly improved.
ditional power exploitation is heavily depended on fossil fuels Just because of the integration of such methods, the current
which may bring severe degradation of the environment, the dilemma in SGs is that we have difficulties in trading-off
fundamental energy management paradigm is expected to be the factors between efficiency, reliability, security, and opti-
mization when facing such a large scale complex networked
Manuscript received August 27, 2018; accepted November 17, 2018. This
work was supported in part by the National Natural Science Foundation of systems. In fact, such large scale automated and widely dis-
China under Grant 61833011, Grant 61673255, Grant 61633016, and Grant tributed supervisory control and data acquisition (SCADA)
61873335, in part by the Key Project of Science and Technology Commission systems are potential to suffer from many uncertain factors and
of Shanghai Municipality under Grant 10JC1405000, in part by 111 Project
under Grant D18003, in part by the Outstanding Academic Leader Project of vulnerable to various malicious attacks. Also, SCADA systems
Shanghai Science and Technology Commission under Grant 18XD1401600, can be typically characterized by cyber-physical systems with
and in part by the Program for Professor of Special Appointment (Eastern the deep integration between cyberspace and physical systems.
Scholar) at Shanghai Institutions of Higher Learning, China. This paper
was recommended by Associate Editor D. Yue. (Corresponding author: The strong dependence on ICT and Internet in SGs leads to
Chen Peng.) new security concerns which differ from traditional IT security.
The authors are with the Shanghai Key Laboratory of Power Station Numerous security threats range from the thefts, cyber-attacks
Automation Technology, Shanghai University, Shanghai 200444, China, and
also with the Department of Automation, School of Mechatronic Engineering or natural disasters will result in power supply failures, false
and Automation, Shanghai University, Shanghai 200444, China (e-mail: visualizations, cascade failures, damaged consumer devices,
c.peng@shu.edu.cn). energy market disorders, endangered human safety, etc. As
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. for security in SGs, representative accidents are highlighted
Digital Object Identifier 10.1109/TSMC.2018.2884952 as reports on multiple power blackouts in Brazil, the SQL
2168-2216 c 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

2 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

Slammer worm attack on the Davis–Bessel nuclear plant, the


StuxNet computer worm and various industrial security inci-
dents [10]. According to the 2014 McAfee report, 80% of
the surveyed electric utilities went through at least one large-
scale Denial of Service (DoS) attack to their communication
networks [11], and 85% of the utilities suffered from network
infiltrations. World Bank reported that electricity theft reaches
up to 50% in some jurisdictions in developing countries. The
feature of these attacks is that they launched on information
networks, but the physical infrastructure is seriously damaged. Fig. 1. Basic structure of SGs.
It thus appears that the security of the communication network
plays a very important role in protecting the reliability of SGs.
SGs. In Section V, some security control strategies are summa-
Since wired or wireless networks are applied in SGs commu-
rized for SGs under DoS attacks. In Section VI, some detection
nication, the unreliability and complexity of data transmission
and estimation approaches are surveyed for malicious cyber
impose a real threat on power systems. Thus, SGs are sensitive
attacks. The last section concludes this paper by identifying
to the unpredicted transmission, such as noises, interferences,
some potential research directions.
even various attacks. On the one hand, traditional IT security
strategies supply an effective protection for communication.
However, due to the development of various intelligent attacks, II. S ECURITY I SSUES OF SG S
traditional IT protections are far from enough for securing In this section, we will start our literature reviews from the
SGs which highlighted in the feedback control characteristic security framework of SGs. A typical SG is shown in Fig. 1. It
via communication channels. When such IT safety guarding is portrays a scenario that the SGs fill the gap between traditional
invalid, serious results will be induced. Moreover, some mali- power systems and communication networks which allows
cious attackers not only focus on communication networks but remote access by a large number of consumers. Through this
also on AMI, controllers, etc. This leads to extra vulnerability integration of communication and control layers, local data
of SGs which differs from traditional IT security. In addition, processing, distributed control, and reliability-based driven
traditional IT protections merely concern the confidentiality, response should be realized. Resort to advanced control and
integrity, and availability (CIA), some common attacks from optimization strategies, SGs will distribute power energy auto-
physical systems are often neglected. These attacks may be matically by engaging and empowering customers in utility
demonstrated as concealed disturbances and uncertainties in management. Then, SGs will give a comprehensive informa-
the physical world. Although the disturbances or uncertain- tion regarding the energy consumption to all consumers in
ties attenuation can be handled by using the control-theoretic real time when delivering electricity to them. Also, it will
method, it is not applicable for the covert attacks when they expose customers’ fine-grained electricity utilization informa-
make some differences on physical systems in a sneaking way. tion to utilities through the AMIs. It shows that the utilities
Therefore, the interconnection between cyberspace and are used by power suppliers to apply different prices for power
physical power systems implies that the critical security issues consumption according to a certain time duration.
are not independent. The drawback of current studies is shown By considering the interaction between the cyberspace and
as the separation design between IT security tools and con- physical world, communication and control issues, threats exist
trol implementations. In this survey, we will mainly focus on all aspects of SGs but not limited to security problems. For
review of the security problems for SGs from different per- examples, besides time delay, packet dropouts, or bandwidth
spectives. We attempt to summarize the recent studies on such limitation of their own challenges for communication net-
promising topics on the security of SGs in order to identify the works [12], a security transmission manner is required so as to
current technologies, the research gaps and the future research avoid malicious jamming or tamper [13]; besides the accuracy
trends for attaining reliable, efficient, and intelligent power or intelligence requirements, fabricating smart meter readings
systems. For the purpose of better understanding of security and manipulating energy costs will impose extra limitations
problems in SGs, this paper attempts to summarize related for AMIs which are wildly used in SGs [14]. In addition,
works which include the following. DSM techniques will increase the management complexity
1) The comprehensive theories, strategies, technologies while bringing some flexibilities; harmonics injection by a
on the security framework of SGs are reviewed and large number of electronic devices will lead to the voltage
analyzed from both IT protection and secure control- distortion problems [15]; communication and computing bur-
theoretic viewpoints. den of big data in SGs is on the rise due to the limitations of
2) Some challenging directions, especially in security conventional data management technique [9], etc.
strategies from control-theoretic solutions, are presented Based on the framework of SGs which including generation,
in this survey. transmission, distribution, and consumption, the intelligence of
The rest of this paper is organized as follows. Section II distribution, the flexibility of communication and the resilience
gives the preliminaries on security framework of SGs. In of control are of the main three SGs connotations [16].
Section III, IT-based attacks and security schemes are summa- However, it is not easy to achieve such goals, especially in
rized. Section IV discusses the effects of malicious attacks on unsafe environments. Different cyber threats and challenges
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 3

TABLE I
C LASSIFICATION OF T HREATS IN SG S issues, data availability for securing a control system is much
important than that for traditional IT requirements. In addi-
tion, SGs highly restrict on transmission delay or failures while
these uncertainties will be tolerated by IT systems [23]. Thus,
security concerns of SGs will focus on different ways to IT
protection.
Second, we will discuss the effects of cyber security on con-
trol systems. Still, for a distributed and networked SGs, the
relationship between cyberspace and physical grids are often
considered as a direct graph with every node has associated
state information which is governed by dynamical differential
equations or functionalities [10]. These graph-based models
couple the states of physical grids and information dynamics of
SGs. The information availability will affect both a single area
power system and all power grids due to their connections.
Based on the reliability and security considerations of the dis-
tributed SGs, the following three questions raised by [24] are
TABLE II stated.
ACTIVITIES OF ATTACK IN D IFFERENT S TEPS
1) Which cyber components, if compromised, can lead to
significant power delivery disruption.
2) What grids are topologies inherently robust to classes of
the cyber attack.
3) Is the information available through advanced cyber
infrastructure worth the increased security risk.
According to the above questions, it is necessary to further
address the potential impacts of physical grids from cyber
attacks. This mainly includes analysis of cascading failure
within and between cyber and physical subsystems. In order
have been discussed in [10], [14], and [17]–[19] and the refer- to quantize the effects of cyber threats, a series of activi-
ences therein. In general, these threat sources from generation ties are initiated by the Department of Energy Infrastructure
to the customers which is depicted by Table I. Assurance Outreach Program. These activities are composed
In general, four steps, which include reconnaissance, scan- of the following aspects [25].
ning, exploitation, and access should be conducted when 1) Characterization of cyber security threats with different
an attacker wants to get over SGs [20]. In different steps quantized nations, such as finance lost, assets damages,
for attacks, different activities for attackers can be given by environmental harms, etc.
Table II. Taking security requirements into consideration, the 2) Communication analysis and design to identify cyber
basics security requirements (CIA) should also be satisfied in assurances.
SGs which are similar to traditional IT security requirements. 3) Penetration testing to identify network vulnerabilities
First of all, we will focus on the security issues from the per- associated with different network architectures.
spective of network protocols in SGs. Commonly, ZigBee or 4) Physical system operations effects analysis due to unau-
Z-wave protocols are often used in home area network; IEEE thorized access to cyberspace.
802.11, IEEE 802.15.4, and IEEE 802.16 standards are often That means cyber attacks impose real threats on SGs which
adopted in neighborhood area network, and distributed net- will lead to more serious losses than Internet security acci-
working protocol 3.0 and Modbus are often founded in a wide dents. As an example, when the attacker deliberate hack into
area network and SCADA systems. Also, cognitive radio based the power grids and launch a false data injection (FDI) attacks,
on IEEE 802.22 is advised to be used in SGs [21]. However, the energy management system at the remote control center
these protocols are very vulnerable to attacks because of the may be misled by these fake meter data and make wrong
deficiency of the protection schemes. In industrial architecture, decisions on power dispatch, or even fake billing without any
these protocols are designed without restriction of authen- perceived. For this case, the objective of an adversary may not
tication, encryption, or any excessive overhead due to ease be just gaining unauthorized but crippling the power system
of use and ease of exploitation of these protocols by vari- from physical meter units which are originated from estimation
ous attackers [22]. In fact, contemporary security strategies, or control perspectives.
such as virtual private networks (VPNs), intrusion detection Moreover, the requirements for securing SGs should be pre-
systems (IDSs), public key infrastructure (PKI), anti-virus sented in view of both communication security and control
software, firewalls, etc., have been widely used in commu- resilience. However, we refer to these security requirements
nication protection in order to protect the IT infrastructure. of SGs as that the restrictions on communication for con-
However, they may be not applicable to SGs due to their trol requirements rather than the single information protection.
different requirements. Different from traditional IT security Progressively, we discussed such restrictions for information
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

4 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

protection in networks to communication constraints in control its control input in time without feedback measurements.
requirements for SGs [26]. Similarly, devices cannot communicate under such attacks due
1) Information Security: As the first line of defense, one to the changed routing protocol [34]. Also, distributed DoS
must secure the information exchanges between every (DDoS) attacks act on many malicious sources to spread mul-
unit of SGs. Therefore, the security scheme of data pro- tiple hosts while DoS attack is a single source of attacks in
tection should be well designed in order to avoid data a distributed network environment of SGs. For example, the
jamming and tamper which may give rise to the grids attacker wastes the bandwidth and system power of smart
misoperation. Related encryption algorithm can be seen meters in the AMI network for several hours, days or even
MD-5, SHA-1, Compliance Checks [27], [28]. weeks [35]. These result in a harmful impact on the perfor-
2) Communication Reliability: Data transmission schemes mance of the power system. Another type of DoS attack in SGs
must be designed with a reliable fashion. When com- is the so-called intermittent DoS (IDoS) attack. When IDoS
munication failures occur, retransmitting or discarding attack starts, the attacker adjusts the request number dynam-
schemes will be decided to cope with communica- ically. At the same time, the arrival rate of burst sequence is
tion unreliable cases. For example, TCP/IP, UDP, TOD changed with the ineffective requests and a fixed time period
protocols [29], [30]. impulse (Generally, IDoS impulse is considered as Dirac sig-
3) Transmission Delay: Different from the IT infrastruc- nal). Then the arrival request is overloaded in the short time of
ture, control of SGs may be sensitive to transmission a period while the actual admission speed is decreased dramat-
time delay which requires that there is a maximum ically, where IDoS attack is initiated in the microgrid system.
allowable time delay in which a particular message Consequently, the admission controller shuts off the legiti-
should reach its destination. Alternatively, the physical mate request for a long time. Attacker repeats this process
grids may face corruption or de-stabilization [31]. to reduce the system stability. As a result, the communication
Through the above analysis, one should tradeoff between channel is blocked [36]. However, the aforementioned works
information security and control performance for SGs. In fact, on DoS attacks are result-oriented. In order to characterize the
some encryption solutions will introduce an extra time delay in dynamics of the attack sides and defense sides, game theory
the control loop which usually degrades control performance. framework supplies an effective way to model this interactive
Therefore, defense-in-depth-like security strategies are only decision-making process between the two sides as well as FDI
partial solutions for SGs. How to deal with the security con- attacks [37], [38].
trol issues when the defensive line is invalid should be also DoS detection is the premise of applying appropriate migra-
highlighted in SGs. tion countermeasures. From IT security level, some detection
methods which include flow entropy, signal strength, sens-
III. IT-BASED ATTACKS AND S ECURITY S CHEMES ing time measurement, transmission failure count, etc., have
been exploited to identify DoS attacks. Accordingly, pushback,
Tradition IT security schemes devote themselves to keep-
rate limiting, filter, reconfiguration, and clean center are the
ing the security of cyberspace or device data which include
common countermeasures to migrate DoS attacks [39].
encryption, secure communication, sensor data protection, and
cryptographic algorithms [32]. Considering the inherent weak-
ness of IT infrastructure and distributed phasor measurement B. Prevention From FDI Attacks
unit (PMUs), several attack scenarios with their attack schemes
Devices like PLCs, remote terminal units (RTUs), and IEDs
and countermeasures will be illustrated from the perspective
are widely distributed in power delivery systems for facil-
of cyberspace.
itating regulation of dispatch functionalities from a remote
location [40]. As a class of attacks from devices, FDI attacks
A. Network Detection of DoS Attacks can modify the data exchanged among different SGs’ com-
Most security problems will focus their targets on the ponents which can cause cascading effects. Intuitively, FDI
Internet, wireless networks, and sensor networks. As a attackers inject malicious packets to smash network services
representative of cyber attacks, DoS attacks launch their and compromise the sensor nodes or hijack the communica-
attacks from communication networks with exhausting net- tion channel between the sensor networks and the physical
work resources. DoS attacks may block network transmission power system [41]. For instance, an attacker will send any
with a large volume of useless data to deliberately consume the false signal after hacking the RTUs, such as sensors in SG
limited resources, such as CPU cycles, network bandwidth, or systems. As a smart attacker, the following two knowledge
packet buffers. Several methods are often used to implement should be well understood in order to make successful attack
these attacks, for example, SYN attacks, teardrop attacks pup- implements. One is that the attacker can access the current
pet attacks or smurf attacks. It is reported that Modbus/TCP power system configuration information and manipulate the
is vulnerable to SYN DoS attacks and 10%∼20% packet measurements of meters at physically protected locations; and
dropouts are caused by puppet attacks [33]. the other one is that attackers will try his best to tamper the
In SGs, because DoS attackers always try to send the fake data of SGs without detection. Therefore, FDI attacks impose a
request to server or network against various grid components real threat on state estimation which is difficult to be detected.
including smart meters, electric utilities, communication links, Just take the ac state estimation for example, attackers decrease
and service providers, the control center is unable to update real power flow measurement to damage system stability [42].
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 5

Actually, the smart attacker should systematically know about


system knowledge and effectively construct their attack vectors
to escape detection, or they will be found out very quickly.
Although IEEE 1686-2007 standard proposes some security
requirements for these devices, statistics show that typical
IEDs are much far from complying with this standard [23].
In contrast, state estimation is used in SG system monitor-
ing to get the best estimate of the power grid state which
analyzes meter measurements and power system typologies.
Hence, FDI attacks can affect monitoring and state estimation
integrity by tampering measurement and/or control data and
either of them, which will lead to instability of the power Fig. 2. Load frequency control in SGs.
system [43]. Form IT security level, several data aggrega-
tion algorithms have been proposed for securing data from
being compromised. Per-hop and end-to-end communication systems (NCSs) in which the control loops are closed via com-
protocols are designed for the tradeoff between security and munication networks [46]–[48]. When representing generators
efficiency in [44]. Also, AES and DES encryption algorithms in one control area by an equivalent single-machine-single-
are exploited to protect local devices [27]. load system, one can establish the power system dynamics by
the following state-space form [49]:
C. Identification of Replay Attacks x(k + 1) = Ax(k) + B
u(k) + Ew(k)
Generally speaking, steal energy and physical damage are 
y(k) = Cx(k) + Fv(k) (1)
the main reasons for the replay attack. Similar to FDI attacks, a
replay attack is a type of FDI which repeats the stealthy data in where x(k) ∈ Rn represents the state of SGs at time k, while
the sensor within a certain time. In order to implement replay u(k) ∈ Rp and 
 y(k) ∈ Rq indicate the actual output and con-
attacks in SGs, one must hijack PMUs at first. Then observe trol input, respectively, which may be polluted by malicious
and record their readings within a certain time duration. At attacks. Moreover, w(k) ∈ Rn , v(k) ∈ Rq indicate the noise,
last, attackers will repeat them afterward when they carry out disturbance/fault, or attacks. All the constant matrices are of
attacks such that they can deceive the control center. In fact, it appropriate dimensions. To achieve great generality, the above
is difficult to detect this attack due to the capability of passing model is used to represent generalized control issues of SGs
the examination of cryptographic keys [34]. For this reason, in this survey. For a controller, it is assumed that the feedback
attackers can create a wormhole tunnel or communication link input is y(k) and the output of controller is u(k). Similarly,
between the two SGs’ terminals in order to launch their replay the sensor output and actual input for a power plant are  u(k)
attacks [34]. This attack acts as a time-varying delay which and y(k), respectively. More detailed information on modeling
may exist in the absence of system’s real information for the of cyber-physical security scenarios in network environments
control center. Then routing protocol is interrupted and false can be seen in [34] and [50]–[52]. In general, all malicious
representation of the recorded data may be created to fool attacks can be classified by the following two categories and
control center. For instance, an attacker can record and analyze further discussions are presented as follows.
the smart meter data in order to inject a false control signal
to the system in a repeated display style [45]. A. Data Absence Attacks
Data absence attacks are mainly referred to as DoS attacks.
IV. E FFECTS OF M ALICIOUS ATTACKS ON SG S For convenience, denote the controller input from sensor mea-
Without loss of generality and for purpose of clear expres- surements as y(k) and its output as u(k). Similarly, the actual
sions, load frequency control (LFC), which characterize a sensor output is y(k) and the actual control input is 
u(k). Under
typical representative of networked control framework in SGs, the perfect condition, the following equations are satisfied:
is selected to illustrate the attack and defense schemes due u(k) = 
u(k) (2)
to various threats from both cyber and physical systems.
Generalized cases are valid to other control problems in SGs. y(k) = 
y(k). (3)
As well known, a large-scale power system usually consists However, DoS attacks may lead to (2) or/and (3) being vio-
of several control areas interconnected through tie-lines. LFC lated, which indicates that the system is abnormal. Especially,
in a power system is used to sustain the system nominal fre- these DoS attacks have the direct manifestation as that the
quency (for example, 60 Hz in North America and China) controller cannot receive the sensor data y(k) or the actuator
and tie-line power by modifying power generation references cannot receive the control data u(k). It is mainly embodied
to generators when loads change. Generally, the closed-loop in time delay and packet dropouts. Denote the DoS attack
structure of LFC for the ith control area is shown in Fig. 2. fashions as the following:
Notice that the measurement signals are transmitted from
a remote telemetry unit to the controller over networks for u(k) = u(k) + auk

y
LFC system. Thus, LFC system is a typical networked control 
y(k) = y(k) + ak (4)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

6 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

y
where auk and ak are the attack sequence for the controller From the viewpoint of systems’ dynamics, these FDI attacks
and sensors, respectively. Then the mathematic model of DoS can be regarded as a special type of disturbance. However, the
y y
attacks can be given as auk = −Sku u(k), ak = −Sk y(k) where Sku special “disturbances” will hide themselves bypassing detec-
y
and Sk are Boolean diagonal matrices which take values from tion more intelligently. In fact, a smart attacker always tries his
(·)
{0, 1}. [Sk ]ii = 1 means that there exists DoS attack, and best to destroy the system stability without being perceived.
(·) Different from FDI attacks, replay attacks inject their
[Sk ]ii = 0 means that there is no DoS attack. Suppose that
there are DoS attacks imposed on the system (1), the deficiency false data in a periodic fashion. Assume that the replay
of control or/and sensor data will induce the open-loop process attack records the measurements of PMUs from time inter-
operation. val [T0 , T0 + T], where T is a fixed time period. Then the
(·) false measurements are received by the control center as
It is worth mentioning that [Sk ]ii plays an important role

in characterizing the behaviors of DoS attacks. On one hand, y(k) T ≤ k ≤ T0 + T − 1
y(k) = (6)
it can represent various features of DoS attacks, such as phys- y(kT ) T0 + T ≤ k ≤ T0 + 2T − 1.
ical limitations or scheduling strategy for the kth step. Similar
to [53], denote the set composed of the values of various sen- Therefore, the real measurements are replaced by these
(·) recorded measurements which can drive the power system
sors and actuators as S = {[Sk ]ii |i ∈ N, i ≤ m + p}. Due
to the physical limitations, not all sensors and actuators data to the unsafe region. As to zero-dynamics attacks, they aim
can be neutralized at the same time. If the cardinality of S at designing an attack signal so that the residue r(k) = 0
is small, we can define these types of DoS attacks as sparse always holds by 0−stealthy attacks. It is readily seen that
(·) the zero-dynamics attacks will fool the detector and make it
DoS attacks. On the other hand, the subscript k ∈ N in Sk
invalid.
can also imply the DoS attack with energy constraints. Denote
As we all know, DoS attacks can be easily implemented
Ij = [k, k + m] ⊆ N, j, m ∈ N as the jth DoS attack interval,
which only need to block networks or deplete computation
then m ≤ M indicates the energy constraints of the DoS attack.
resources. Different from data absence type attacks, the false
However, they can choose any time instant to start their attack
data disruption type attacks need more system knowledge
which is independent on external terms. By taking into account
which has more elaborate behaviors than the DoS attacks.
the above factors, a smart attacker will launch an attack in an
optional form without limitations of time-and-space restriction
except for energy constraint. V. S ECURITY C ONTROL S TRATEGIES FOR SG S
Considering the packet-type transmission in TCP-based net- U NDER D O S ATTACKS
works, if the packet is attacked, all data packeted at the kth The data absence attacks, which are named as DoS attacks,
(·)
instant will be lost. So, the [Sk ]ii often takes the same value imply that the measurements or control signal can neither be
from {0, 1} simultaneously for all i. Then, variables γk and νk sent nor be received [54]. In fact, there are several DoS attacks
can be used to model the actual control behavior of the NCSs, categories, such as periodic, stochastic, and arbitrary styles.
i.e., In SGs, the power states are measured by RTU and sent to
the control center through communication networks. When an
x(k + 1) = Ax(k) + γk Bu(k)
adversary jams the communication channels, attacks network-
y(k) = νk Cx(k). (5) ing protocols, or floods the network traffic, these data will be
Here, γk ∈ {0, 1} and νk ∈ {0, 1} are independent and may not lost. These will lead to the open-loop SGs, even instability.
follow any rules. It should be noted that if and only if, γk = 1 In the following, we will investigate the security control for
and νk = 1, the NCSs are in closed-loop style. Otherwise, the the SGs under periodic DoS attack, stochastic DoS attack and
feedback model will be destroyed. In addition, if C = In×n , a arbitrary DoS attack.
state-art-feedback controller can be designed.
A. Security Control Under Periodic DoS Attack
B. False Data Disruption Attacks Consider another form of (1) for a class of sample-data
In a sense, all FDI attacks, replay attacks, and zero- system with state feedback controller under an event-triggered
dynamics attacks belong to the type of false data disruption communication scheme
attacks. The essence of these attacks is that the false sam- ẋ(t) = Ax(t) + Bu(t) (7)
pled data and/or control input will be applied to measurement
and operation for SGs. Generally speaking, if there are FDI u(t) = Kx(tk ) ∀t ∈ [tk , tk+1 ]. (8)
attacks on the PMUs, the output of (1) can be chosen as For periodic DoS attack, attackers can always jam the chan-
y(t) = Cx(k) + Fv(k) + ay (k). nels in energy-constrained and periodic fashions, and they
y
More generally, if Sku and Sk in (4) take any values except often follow the forms of
{0, 1} for a nonzero attack sequence auk and akk , then the fol- 
1 (n − 1)T ≤ t ≤ (n − 1)T + Toff
lowing criteria u(k) =  u(k) and y(k) =  y(k) hold which ujam = (9)
0 (n − 1)T + Toff ≤ t ≤ nT
indicates that FDI attacks occur in power systems (1). The
above inequalities imply that the state and operation data can where T is the action-period of the attacker and n ∈ N is
be received by controllers and/or actuators but these data are the period number. Obviously, communication is possible for
false. t ∈ [0, Toff ] when the jammer is sleeping and communication
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 7

is impossible for t ∈ [Toff , T] when the jammer is activated. independent identically distributed Bernoulli distribution and
The question is how to find an appropriate control strat- the controller uses the most recently successfully transmitted
egy (8) to guarantee the stability of networked power systems. packets as a compensation strategy, the available data can be
Since the communication is interrupted during the time inter- represented as x(k) = γ x(k) + (1 − γ ) x(k). In [59], the net-
val [Toff , T], we hope that a more frequent control action will work reliability threshold for stability is derived based on the
be implemented during [0, Toff ]. Foroush and Martínez [55] proposed method. The left problem of this paper is that the
studied the single input system with such periodic DoS attack. NCSs will become instable even with smaller percentages of
They first stabilize the controlled system with controller Kλ packet dropouts when the closed loop poles are far from the
by pole-assignment method. Similar to the most studies of imaginary axis with faster response times. Zhang et al. [60]
event-triggered control scheme [56], let provided an error function for the NCSs, where the DoS
attacks are well considered. As the discrete time form of (10),
e(t) = x(tk ) − x(t) (10) e(k) = x(si ) − x(k) are defined to derive the uniform ultimate
represents the error between the value of the process state at bound for the studied NCSs, where si represents the last suc-
the last control update and the value of the process state at the cessful control update. Consider a more sophisticated attack,
current time. Then, the closed-loop dynamics can be written Ding et al. [61] defined the output error as e(k) = y(si ) − y(k)
as and construct the following output-feedback-based attacked
model:
ẋλ (t) = (A + BKλ )x(t) + BKλ e(t) (11)
 y(k) + νk ξ(k)) + (1 − γk )
y(k) = γk ( y(k − 1) (14)
where A + BKλ has only one linearly independent eigenvector.
In what follows, Jordan decomposition and triggering strategy where γk and νk are Bernoulli stochastic variables. ξ(k) is
are used to achieve input-to-state stability (ISS)-stability for the false data injected into the outputs. It is easy to see that
the transferred system the stochastic DoS attack and FDI attack can be well charac-
terized by the parameters γk , νk and ξ(k) by (14). However,
the above studies fail to depict this energy-constraint key fea-
ẋλ (t) = Jλ xλ (t) + Tλ−1 BKλ Tλ eλ . (12)
ture. In paper [62], they provide a probability characterization
Let x(t) = Tλ xλ and e(t) = Tλ eλ , the following event- for random packet dropouts due to unreliable link as well
triggering condition: as those caused by the DoS attack under event-based con-
trol scheme. For the above mentioned case, denote si as the
σ (2λ − 1 − 2||N||
|eλ (t)|2 ≤ |xλ (t)|2 (13) time instants at which the packets exchanges between the plant
Tλ−1 BKλ Tλ and the controller are attempted. The authors characterized the
is exploited to guarantee the asymptotic stability. Here, σ ∈ event-triggering condition by quadratic Lyapunov-like function
(0, 1) is a triggering parameter and λ is a positive scalar V : Rn → [0, ∞] given by V(x) = xT Px. Then, the details
related to the place of eigenvalue. The result shows that the can be represented as
event-triggering condition is related to the eigenvalue λ and
si+1 = min{t ∈ {si + 1, si + 2, . . .}|t ≥ si + θ
its Jordan decomposition. The joint control and identifica-
tion algorithm for guaranteeing the stability under unknown or V(Ax(t) + Bu(si ) > σ V(x(si ))} (15)
DoS attack are presented in [57]. However, the above-studied u(t) = (1 − γi )Kx(si )
system should be narrowed down to standard controllable t ∈ {si , si + 1, . . . , si+1 − 1} (16)
form.
It is shown that the event-triggered control scheme is more for i ∈ N, where σ ∈ (0, 1) is event-triggering parameter
resilient to DoS attacks. Moreover, since the energy constraint which is the same as the corresponding item in (13) and
and periodic characteristics of periodic DoS attacks, they are γi takes value from {0, 1} as a binary-valued process which
easy to be tackled. implies success or failure of attempted packets exchanges. In
order to describe the fact that energy constraint of DoS attack,
B. Security Control Under Stochastic DoS Attack the following non-negative integer-valued process is given by
Recalling (5), packet dropouts due to the DoS attack can 
k−1
also be modeled as a stochastic process, such as a Bernoulli L(k) = γi k∈N (17)
process and queueing process for γk and νk when packets are i=0
jammed by attackers.
where L(k) represents the total number of failed packets
In paper [58], two queueing models are used to simulate
exchanges attempted. By almost surely meaning such that
the stochastic process of packets delay jitter and dropouts.
In order to identify local network attack and remote network P[L(k) > ρ] ≤ k (18)
attack, the average service time μ is used to indicate the 
γk < ∞ (19)
lumped effects of DoS attack. Their experiments show that
k∈N
the worst performance occurs when the NCSs traffic exhibits
a strong autocorrelation of packet dropouts and delay jitter. where k ∈ [0, 1] and ρ ∈ [0, ∞), the energy constraint of a
Suppose that the packet dropouts due to DoS attack follow DoS attack is well addressed. In fact, conditions (18) and (19)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

8 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

provide the characterization of the evolution of the total num- where γ ∈ represents attack strategy to be designed. The
ber of attempts failure in probabilistic. It is worth noting that, optimization problem from an attacker can be transformed into
corresponding
 to the average dwell time in switched systems

T
theory, P[ k−1 γ
i=0 i
D ≤ κ + (k/τ )] gives the average duration
max Tr (23) subject to || γ || = n. (24)
of DoS attack in probabilistic. Similar constraints for packet γ ∈
k=0
dropout in multihop channels can also refer to [63].
Optimal control/estimation approaches are applicable to In addition, they study also how to schedule the attacks to
evaluate the performance of the NCSs under DoS attack in bypass a given IDS. In [66], the optimal DoS attack strategy
regard of both defender and attacker. On one hand, as a which is expected to maximize the linear quadratic Gaussian
defender, one always wishes to minimize the DoS effects on control cost function under an energy constraint is considered.
the NCSs. As a pioneering work, AminAlvaro et al. [64] con- In this paper, the assumption that the DoS attacker can jam
sidered the optimal control problem with security constraint the communication channel at most n times during the action
for the system (5) with C = I whose control and measurement period T is still given. Different from [57], the DoS attacker
packets are transmitted over a communication network. Then, can take his choice, drop or not drop arbitrarily, to schedule
a causal feedback controller will be synthesized to minimize attack actions during [nT, nT + Toff ]. With the packet dropout
the following finite horizon objective function: probability P(γk = 0) = γ , the expected DoS attack schedule
strategy is designed to maximize the cost function
   
  xk T  In
N−1
1 T

0 x N
JN = E xN PxN +
T
Q k (20)
uk 0 νk Im uk Jγ = E x (k)Qx(k) + uT (k)Qu(k) (25)
k=0 N
k=1
 

Q 0 where
Q and Q are the same as the items (20). In fact, (25) is
where P ≥ 0, Q = ∈ R(n+m)×(n+m) .
0 Q identified to (20) when the terminal constraint is removed.
In fact, if there are no other limitations for Bernoulli Similar to [65], the above optimization problem can be
stochastic variables γk and νk , the asymptotic stability has transformed into
been solved in [59]. The attacked state, different from com-
pensator strategy with the latest successful control update, 
T
max Tr (25) subject to || γ || ≤ n. (26)
is estimated by a Kalman filter. Actually, they impose the γ ∈
k=0
following constraints on the NCSs.
1) Energy Constraint: The state and the control input in an From (24) and (26), it is clear that the separation principle is
expected sense proved once again that estimation and control are independent.
   From the perspectives of both attack and defense, the
T   
xk In 0 x choices of attack and defense strategies in the studies [64]–[66]
E H k ≤ i (21) are all based on the results of competition between the attacker
uk 0 νk Im i uk
and defender, and they fail to describe this interactive decision-
with Hi > 0 for i = 1, 2, . . . , L and k = 1, 2, . . . , N − 1. making process between the two sides. Subsequently, game
Here, i is of the same meaning as the corresponding theory is a good choice for characterizing the dynamic behav-
item in (18). iors between the defender and the attacker. A framework of a
2) Safety Constraint: The state and the control input in a DDos attack with evolution game theory is presented by [67].
probabilistic sense Suppose there is a cooperative network model, where the M
   defenders can collectively enhance their signal to inference
T In 0 plus noise ratio, while the N attackers are launching an attack
P ti ≥ (1 − ε) (22)
0 νk Im to degrade it. Then, an evolutionary game between attack-
ers and defenders in a monomorphic population is defined
with ti ∈ Rm+n satisfied for i = 1, 2, . . . , T and k = over a finite pure strategies set A = {a1 , a2 , . . . , ar , . . .} with
1, 2, . . . , N − 1. r = 1, 2, . . . , |A|, a mixed strategies set S = {ρs : ρs ∈ [0, 1]}
Based on the viewpoint of optimization in (20), Zhang et al. which is the combination of A with its weights being assigned
consider arbitrary attacks schedule with an energy constraint to the pure strategies by the player, and a utility function U(·)
to maximize the cost function for both estimation [65] and is used to indicate the utility of game results. The evolution-
control [66]. Zhang et al. [65] constructed an optimal attack ary stable strategy is achieved by the following conditions:
schedule strategy to maximize the expected average estimation if U(ρ ∗ , ρ ∗ ) ≥ U(ρ ∗ , ρ) or U(ρ ∗ , ρ ∗ ) ≥ U(ρ, ρ ∗ ), then
error at the remote estimator. With a given finite horizon T and U(ρ ∗ , ρ ∗ ) ≥ U(ρ ∗ , ρ ∗ ) for all ρ ∗ = ρ. The replicator dynam-
assumption of packet attacked probability P(γk = 0) = γ , ics are used to show that how players in their population start
 n times attack from k = 1 to k = n can be launched, i.e.,
only to change their strategies over a time period until they reach
|| Tk=0 γ || = n. By defining the average expected estimation a stable state. In this context, each player compares its utility
error covariance matrix with the average utility of the population each time to make a
decision on whether to keep using the current strategy or not.
1
T
Jγ = E[Pk (γk )] (23) However, their study only relates to the network model while
T control or estimation issues are excluded. Ding et al. [37]
k=1
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 9

investigated the scenario that the sensor measurements are and the collection of strategies of all controllers except
transmitted to a remote estimator over a multichannel network controller i can be obtained by
which may suffer from a DoS attacker. The iterative process  
between the sensor and the attacker is modeled as a two-player u−i
k  ui
0 , . . . , ui−1 i+1
1 , u1 , . . . , uN−1 .
i
(29)
zero-sum stochastic game. The remote estimator obtains the
Then, the optimal control problem under such a unified
state estimation follows the form as in [68], i.e.,
 s game framework is to find the solution of
x (k), if data is received successfully

x(k) = min (20) subject to (27). (30)
x(k − 1), otherwise.
A ui
Accordingly, the error covariance matrix ρk is given as Therefore, the solution of the optimal defense strategies for
 the MTOC structure can be obtained by
ρ, if data is received successfully
ρk =
h(ρk−1 ), otherwise. min |JG∗ 1 /JG∗ 0 − 1| (31)
D
The two-player stochastic game scenario exhibits opposite
goals that the sensor should make sure that the estimator is where G0 = {γk = 0}N k=1 , G1 = {0 < γk < 1}k=1 and the solu-
N

well-informed of the process without wasting energy, while tion of the optimal defense strategies for the MTOC structure
the attacker will disrupt the reliable communication between can be obtained by
sensor and estimator without expending more efforts. By min γ 1 subject to (31) > S0 , γ 1 = ρ 2 γ 2 = · · · = ρ N γ N
simplifying the game framework of DDos attack in [67], A
one can define a stochastic game of the six-element set
where S0 implies the safety zone and ρ k is weighting fac-
G = {A, D, S, M, P, F}. Here, A and D represent attacker
tor. Also, the central-tasking optimal control problems can be
and sensor, respectively; S = {A, D} is the action set of
solved by a similar method.
A and D; M denote the state space of the game; the tran-
The above analysis shows that the Bernoulli-type variables
sition probability P(mk+1 |mk , s) ∈ P : Mk × S → Mk+1
are significantly exploited to indicate the DoS attack. But, in
implies the probability of the next state being mk+1 for a
order to distinguish from the conventional packet dropouts,
given current state mk and current action strategy S, and
some other constraints, such as conditional probabilities,
F : M × S → RA◦D denotes the payoff of each player
energy constraints, will be taken into consideration.
A and D. At the instant k, an action pair Sk = (Ak , Dk ) is
chosen by the attacker and the sensor according to a mixed
strategy pair. For the purpose of performance improvement, the C. Security Control Under Arbitrary DoS Attacks
dynamic cost-effective strategies based on the real-time infor- In practice, communication failures induced by DoS attacks
mation of the process is perceived as more meaningful than do not follow a given class of periodic dynamics or probabil-
a static fashion. The strategy-design is equivalent to finding ity distributions. This raises a new theoretical challenge for
the Nash equilibrium of the stochastic game and it is solved security control of SGs.
by Q-learning method [69]. Yuan et al. [70] investigated the Moreover, time delay or packet dropout may be introduced
resilient control problem for the NCSs under DoS attack via by uncertainties of a network itself or by a malicious adversary.
a unified game approach. They consider the dynamics in the For example, in [71], the power systems subject to DoS attacks
delta domain as the form of are modeled as time delay systems following the form of:

N
ẋ(t) = Ax(t) + Ad x(t − η(t))
δxk = Aδ xk + γi Biδ uik (27)
i=1 where Ad = BK and η(t) ∈ [η1 , η2 ] represents the limitation of
where xk = xkTs with the sampling interval being Ts . Aδ and the energy of adversaries. By using a Wirtinger-based integral
Biδ are matrices in the delta domain with appropriate dimen- inequality, a less conservative attack-based delay-dependent
sions. The stochastic variable γ i , i ∈ {1, 2, . . . , N} indicate the criterion is obtained. Note that the stability of the NCSs can
effect of DoS attack on control system with P(γki = 0) = γ i be guaranteed for all η(t) ≤ η2 and it does not depend on the
and P(γki = 1) = 1 − γ i for all i ∈ {1, 2, . . . , N}. In fact, distribution of η(t) which is manipulated by a DoS attacker.
the system (27) in a delta domain is equivalent to the discrete However, these systems are difficult to find applications sub-
time style (5) which is widely used in [60], [64], and [66]. ject to sample limitation. For a class of sample data system
Within the framework of the noncooperative dynamic game ẋ(t) = Ax(t) + BKx(kh) for all k ∈ N with ZOH fashion (h
for multitasking optimal control MTOC in delta domain, each is the sampling period of sensor), an input delay approach
controller falls to minimize the cost-to-go function as the def- proposed by Fridman et al. [72] can be used to model such
inition (20) in a discrete time domain. However, Q in (20) is delay and packet dropouts by defining η(t) = t − kh. Then the
replaced by Qi in this cost function according to the game sample data system can be transformed into the time delay
dynamics between controllers. Define the admissible control system.
set as uik = uik (Ik ), where Ik is a set related to xk and γk , Recently, an event triggered control (ETC) gives a novel
while way to model such sample-data-based ETC system as a time-
  delay system [73]. Peng et al. [13] investigates a resilient
uik  ui0 , ui1 , . . . , uiN−1 (28) event-triggering H∞ LFC for multiarea power systems with
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

10 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

energy-limited DoS attacks by introducing the following event- designed based on the RNPC, to construct a new closed-loop
triggered communication scheme: system when Li packets are attacked for the ith subsystem.
  However, the switching scheme is depended on a supervisor.
tk+1 h = tk h + min h|eTik h eik h ≥ σr xT (tk h)x(tk h) Generally speaking, the DoS attacks are energy-limited and
∈N
do not follow any specific rules or distributions [54]. In some
where eik h and σr are the sampling error in (10) and the trig-
cases, the number of data dropouts induced DoS attacks is
gering parameter in (13), respectively. Then one can model the
larger than the maximum allowable delay bound, which will
DoS attacks as energy constraint with η(t) ≤ η2 . Obviously,
affect the stability of SGs [49]. To tackle this case, model
the communication sequence will be destroyed when the event
or model-free prediction methods are developed in [75] to
triggered packets are dropped by DoS attackers. In order
compensate for data dropouts induced by DoS attacks. More
to realize the resilient control under DoS attacks, one can
recently, the distribution of SGs is also received more and
adjust parameter σ to change the sampling logic. Generally,
more attention. For example, the risk of SGs is evaluated
the smaller σr is, the more frequency sampling actions are
in [36] and [76] to analyze the control performance induced by
achieved while the longer DoS duration can be tolerated.
DoS attacks. When limited communication resources are avail-
Hence, the triggering parameter σr should be attack-awareness
able, Peng et al. [13], [77] proposed a method to tradeoff the
when we implement the resilient sampling logic. More sig-
security performance and communication efficiency in SGs.
nificantly, by using this model, it is convenient to design
event-triggered control parameters and event-triggered con-
ditions in a unified framework. De Persis and Tesi [54] VI. D ETECTION AND E STIMATION FOR
characterized the frequency and duration conditions of DoS D ECEPTION ATTACKS
attacks when the ISS of the closed-loop system can be pre-
served. In order to address the arbitrariness of DoS attacks, To the malicious cyber attacks in LFC, there are two basic
the following DoS sequence is given: considerations for security design. One is attack detection
which focuses on the perception of malicious attacks, and the
Hn = {hn } ∪ [hn , hn + ηn (t)] (32) other one is state estimation which focuses on the recovery
of polluted signals. Different DoS attacks on communication,
which represents the nth DoS time-interval with duration ηn (t).
false data disruption attacks will launch their disruptions on
If ηn (t) = 0, DoS takes the form of a single pulse at time
PMUs in SGs. This attack type aims at compromising the
instant hn . Thus, all communication possible duration (t)
state estimator of power grids without detection. Attackers’
and interrupted duration (t) can be obtained by
  goal is often characterized by compromising measurements or
(t0 , t) = Hn [t0 , t] (33) (and) control data while an effective attack strategy should
n∈N be designed carefully so that it can damage a healthy system
(t0 , t) = [t0 , t]\(t0 , t). (34) and cannot be detected. Because of the disturbances and errors
in the control system, the attack strategies should hide them-
As a special case, the NCSs with DoS attacks can be
selves as this normal margin of error and should not trigger the
modeled as switched systems between normal systems and
false alarm. Otherwise, a valid detection strategy will devote
attacked systems consist of (t0 , t) and (t0 , t). Especially,
itself to distinguishing the attack behaviors from these normal
it is required that the DoS frequency satisfies the following
disturbances and errors intelligently.
assumption:
t − t0
n(t0 , t) ≤ κ1 + (35) A. Detection of Malicious Cyber Attacks
Tf
where κ1 ≥ 0, Tf > 0 with t ≥ t0 , and DoS duration satisfies It is well-known that the output of state estimation is usu-
the following assumption: ally used for contingency analysis and then transmitted to
the control center to implement regulations for power grid
t − t0
(t0 , t) ≤ κ2 + (36) components. In general, the state estimator demonstrates three
Td typical functions, that is, observability analysis, state estima-
where κ2 ≥ 0, Td > 0 with t ≥ t0 . In order to implement tion, and “bad data” processing in SGs. Since the estimation
the resilient control, periodic sampling logic, self-triggering state can be tempered by an adversary with bad data, it
sampling logic, and event-based sampling logic can also be will mislead the power grid control performance, and pos-
used to tradeoff performance and communication resources. It sibly results in catastrophic consequences, such as blackouts
is easy to see that the communication scheme in [13] is only in large geographic areas [78], [79]. In order to deal with
a special case of conditions in [54]. these cases, some effective techniques have been developed,
In addition, Pang et al. [74] classified DoS attack into two such as enhanced static state estimation, hypothesis testing
types, that is, weak attack and strong attack, where the weak identification, combinatorial optimization methods, etc.
attack is seen as communication constraint, such as random In the literature, there are some physical-model-based attack
delay, packet dropouts, and a recursive networked predictive detection methods. For example, Mo et al. [80] considered
control (RNPC) method is exploited to compensate for their the scenario that the FDI attack carried over a sensor network
adverse effects. For the strong attack, a multicontroller CLi monitoring the discrete-time LTI Gaussian system. The critical
switching scheme is presented, in which each controller is thing to the attack designer is to hijack the measurement of a
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 11

subset sensors without being detected by the χ 2 failure detec- least squares, minimum mean square error, mixture Gaussian
tor. Commonly, the χ 2 failure detector calculates the following distribution learning, Kalman filter [43], [86]–[88], etc. Hence,
condition: one can define a residue vector as r(k) = y(k) − C x(k).
Many system-behavior-based detection methods rely on this
gk = rkT P−1 rk (37)
defined residue vector r(k) which is called χ 2 detector with
where P is the covariance matrix of the residue rk . When {g(k) = rT (k)Pr(k) ≥ threshold}. Obviously, χ 2 detection is
a class of event-based method.
gk > threshold Replay attacks will record a sequence of PMU’s measure-
the detector will trigger an alarm. So the gk should be inge- ments and replay the recorded sequence afterward [90]. While
niously designed. Similar to [80], Kwon et al. [81] discussed acting on the power grids, the actual control input sequence
also the condition that the deception attack fails the estimators is generated by malware with old measurements rather than
while successfully bypass the monitoring system with com- the real measurements from PMUs. These attacks belong to a
pound scalar testing [82]. On the basis of (37), the following class of FDI attacks and it can remain undiscovered for sev-
condition is used to the χ 2 detector: eral months after its release [91]. The detection of such type
 of attacks can also be detected by a χ 2 detector. Different
Accept H0 , if gk ≤ threshold from FDI and replay attacks, zero-dynamics attacks will adjust
Accept H1 , if gk > threshold. their target on the χ 2 detector. The key idea of zero-dynamics
An adversary who wants to be undetectable should avoid attacks is to regulate their attack policy ay (k) such that the
a large increase in the power of residuals. These detection residue r(k) remains a constant [92].
methods can be used in SG [79], [83].
Besides, with the aim to fully utilize the acquired data flex- B. Recovery Polluted States
ibly, sequential detection theory is considered in [84]. The Due to the arbitrariness of attacks, the conventional estima-
sequential detection’s goal is to minimize the number of obser- tion methods are not applicable under attack scenario. In the
vations and it is required to make a decision with a given literature, there are some good results on security state estima-
probability of false alarm and a given probability of detec- tion. For example, Fawzi et al. [93] considered the following
tion. Suppose the observation zk on the condition of Hj are system dynamics:
generated with a probability distribution pj , the sequential
probability ratio test algorithm [85] is described by x(t + 1) = Ax(t) (38)
p1 (zk ) y(t) = Cx(t) + r(t). (39)
S(k + 1) = log + S(k)
p0 (zk ) By reconstructing the initial state x(0) and using the dynam-
N = inf{n : S(n) ∈/ [L, U]} ics of the system, l0 optimal decoder is proposed to estimate
n
system state. For this case, under the first M measurements
starting with S(0) = 0. The decision rule dN can be defined y0 , . . . , yM−1 , the initial state x(0) is estimated by
as
 y(t) = CAt x(0) + r(t). (40)
Accept H0 , if S(N) ≥ U
dN =
Accept H1 , if S(N) ≤ L Moreover, consider the decoder D0 : (Rp )T → Rn defined
where L ≈ ln(b/1 − a) and U ≈ ln(1 − b/a), a is the desired by D0 (y0 , . . . , yM−1 ) which can be obtained by solving the
probability of false alarm and b is the desired probability of following optimization problem:
missed detection. min ϒ̂ (41)
It should be mentioned that the above methods are based x̂∈Rn ,ϒ̂⊂1,...,p
 
on the same assumption, that is, the “bad measurements” must s. t. supp y(t) − CAt x̂ ⊂ ϒ
have taken place. However, this assumption does not always
for t ∈ {0, . . . , M − 1} (42)
hold for stochastic attack scenarios. With the knowledge of
the power system configuration, an intelligent attacker can where ϒ is a set of attacked sensors. If the number of maxi-
systematically generate bad measurements which can bypass mum attacked sensors is less than half, the system state can be
detection. Therefore, how to estimate the real state and identify detected and corrected from the pair (A, C). However, the opti-
these bad data is significant. The objective of the defender is to mization problem (41) is not easy to tackle since it is NP-hard
reliably detect an injection attack with respect to ay (k) in the in general. As an improvement, Lee et al. [94] designed the
event of an attack. But for the attackers, they will hide them- individual Luenberger observer for each sensor to estimate
selves through disclosure resources of SGs. If ay (k) = Cs(k), the state correctly by sensing redundancy data under sensor
then y(t) = C[x(k)+s(k)]+Fv(k) and the traditional statistical attacks.
test is invalid. Hence, such attacks will not be detected [78]. The compressive sensing technique has been used to recon-
As a matter of fact, statistical test methods only draw their struct the real state from the sparse sensing data. For example,
attention to statistics rather than physical dynamics. From the Shoukry and Tabuada [53] proposed a state reconstruction
perspective of the controlled power system, one can always method when sensors are destroyed by sparse attacks. This
establish the relationship between measurements y(k) and esti- paper can be regarded as the extension of [93] and [96].
mated state value  x(k). Related estimation methods refer to The attack model is similar to (38) through constructing
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

12 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

a delayed version for state x(t − τ + 1), attack vectors of data and improves the robustness of the estimation by dis-
a(t − τ + 1), a(t − τ + 2), . . . , a(t) and measurements y(t − tributed processing. The DSE can be sketched that each area
τ + 1), y(t − τ + 2), . . . , y(t). Then, the state model with has local measurements formulated by
s-sparse attack is written as
ym = Cm (xm ) + nm , m = 1, . . . , M (48)
Y(t) = Ox(t − τ + 1) + E(t) (43)
where xm = [xam T xT ]T is the local state vector of area m,
bm
where E(t) is the attack vector. Then, by using the event- T
which is further partitioned into internal state variables xam
triggered technique [89], [95], [97] to improve the computa- T . As another example for state
and border state variables xbm
tional efficiency for the proposed algorithms, the triggering estimation of distributed power systems [103], DSE is formu-
(k,m+1) (k)
condition is given by V(ẑ ) ≥ (1 − ν)V(ẑ ), where lated as a constrained optimization problem which assumes an
V(ẑ) = (1/2)Y − Qẑ22 . Thus, the estimated state is updated initial set of DG outputs as the equality constraints
by the following rules:  
1 1
  argmin rT Cr−1 r + (x − x)T P−1 (x − x) (49)
ẑ+ := ẑ + ηQT Y − Qẑ . (44) x 2 2
such that rm = ym − δm (x), δos (x) = 0 (50)
In fact, the event-triggered projected gradient descent algo-
rithm is exploited only one step while scarifying computation where the vectors with subscript m represent those subvectors
efficiency. This motivates the subsequent study [98] to improve that result from measurements, δos (x) denotes the operational
the estimation efficiency by adjusting the estimation step and structural constraints.
adaptively. Furthermore, the matrix-based analysis methods are effec-
The above methods suppose that attackers have little tive to solve the security space when conduct state estimation.
knowledge of the system. But for an intelligent attacker, But it may be ineffective in handling some complex and
attack processes and results may be various case to case. distributed problems especially for those with combinato-
Mo and Sinopoli [99] assumed that the attackers have full rial features [104]. Recently, graphs are used to characterize
knowledge about the true values of system states and mea- the relationships of such large-scale distributed cyber-physical
surements. Also, the attacker has limited resources and only power systems [105]. However, purely graph-based approaches
manipulated partial measurements. Then, the problem is are not capable of modeling the state evolutions within the
expressed as a minimax optimization problem physical systems [106]. Fortunately, physical power dynamics
  can be captured by each node in graphs and this provides
minimize E max c(x − ϕK (y)) . (45) a convenient way to model the cause-effect relationships
{ϕK } |K|=2l
between the cyber data and the grid state signals [52], [107].
The goal is to design the optimal estimator against all pos- Then, the cascading effects due to attacks can be represented
sible attackers strategies. Consider the case l > m/2. Namely, which will give a risk characterization of SGs. For example,
the attacker can manipulate at least half of the measurements. graph-based cyber security analysis of state estimation has
In such scenario, the optimal worst-case estimators should been discussed in [105], which provides intuitive visualiza-
ignore all m measurements which only the prior distribution tion of some complex problem structures and enables efficient
of x is considered. The result is that the optimal estimator f ∗ graphical solution algorithms for both defending and attacking
is given by solving the following optimization problem: the ICT system in SGs.
To sum up, the security of SGs is a combination of the phys-
f ∗ = minimize E[c(x − δ)] (46) ical grids security and communication security. Different from
δ∈R
matrix-based analysis methods, the support vector machine
where δ ∗ is the solution of (46). For the case l < m/2 which
and artificial immune system are being used to detect mali-
implies that the attacker can manipulate less than half of the
cious data and possible cyber attacks [108]. With revealing of
sensors, they provide the explicit form of the optimal estimator
the above attacks with respect to control of power system in
based on (m/2l) local estimators. Therefore, the search space
SGs, the following issues should be well addressed.
of the optimal estimator is reduced from all possible functions
1) How to characterize fundamental attack detection and
to a special class of functions. The optimal estimator f ∗ has
identification with its limitations.
the following form:
  2) How to design an estimator/monitors which are capable
of locating attacks and recovery real state timely and
f ∗ (y) = min max ϕI∗ ∪J (y) (47)
|I |=l |J |=l,J ∩I =∅ accurately [10].
{ϕ ∗
where the K } is a set of (m/2l) local estimators.
For a large scale power system, a centralized solution to VII. C ONCLUSION AND C HALLENGES
the associated state estimation problem presents tremendous A number of detection approaches and countermea-
computational complexity. Generally, distributed state estima- sures have been proposed to deal with attacks on
tion (DSE) [100]–[103] will supply an efficient way to reduce SGs [17]–[19], [109]. Because of the variability, complicity,
the computational complexity by applying a local processor and intelligence of network attacks, the existing security solu-
to provide a local state estimation solution. Compared with tions cannot be achieved through one specific solution. In view
a centralized estimation approach, DSE reduces the amount of control-theoretic-methods, attacks side always tries their
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 13

best to maximize their damages on control performance while framework of security control and communication protection
defenses side will spare no effort to minimize the impacts of should be well-developed in the future.
the corresponding attacks [66], [110]. Therefore, we believe
that cyber-physical security of SGs should be considered
R EFERENCES
from both cyber-security and physical-security. In detail, the
following issues should be further addressed in securing SGs. [1] Smart Grid Top Markets Report 2017. A Market Assessment
Tool for U.S. Exporters. Accessed: Jan. 2017. [Online]. Available:
1) Security Detection Combined With Advanced Methods: http://trade.gov/topmarkets/pdf/Smart-Grid-Top-Markets-Report.pdf
A huge amount of data generated by AMIs, power dis- [2] M. A. Brown, S. Zhou, and M. Ahmadi, “Smart grid governance: An
tribution devices, and other intelligent devices impose international review of evolving policy issues and innovations,” Wiley
Interdiscipl. Rev. Energy Environ., vol. 7, no. 5, pp. 1–26, 2018.
lots of difficulties on security analysis and detection in [3] C. Dou, D. Yue, J. M. Guerrero, X. Xie, and S. Hu, “Multiagent
SGs. On one hand, it is very important to develop some system-based distributed coordinated control for radial DC microgrid
advanced transmission scheme to improve communica- considering transmission time delays,” IEEE Trans. Smart Grid, vol. 8,
no. 5, pp. 2370–2381, Sep. 2017.
tion efficiency; on the other hand, big data and clouding [4] Y. Xue and X. Yu, “Beyond smart grid—Cyber-physical-social sys-
computing method can provide a new opportunity for tem in energy future,” Proc. IEEE, vol. 105, no. 12, pp. 2290–2292,
electric load forecasting, anomaly detection, and DSM. Dec. 2017.
[5] F. F. Wu, P. P. Varaiya, and R. S. Y. Hui, “Smart grids with intelligent
Therefore, security detection combined with advanced periphery: An architecture for the energy Internet,” Engineering, vol. 1,
analysis methods is an interesting topic in the future. no. 4, pp. 436–446, 2015.
2) Modeling the Attacks With More Practical Conditions: [6] S. Kakran and S. Chanana, “Smart operations of smart grids integrated
with distributed generation: A review,” Renew. Sustain. Energy Rev.,
In the existing results, some specific assumptions, such vol. 81, pp. 524–535, Jan. 2018.
as periodic, probability distribution are often introduced [7] V. Gomez, C. Hernandez, and F. Martinez, “Energy policies in smart
in many SGs’ studies. However, these assumptions vio- grids,” Contemp. Eng. Sci., vol. 10, no. 20, pp. 987–999, 2017.
[8] B. Li, S. Lv, and Q. Pan, “The Internet of Things and smart grid,” in
late the fact that the attacks are usually arbitrary and Proc. IOP Conf. Earth Environ. Sci., vol. 113, 2018, pp. 12–38.
stealthy. For example, packet dropouts induced by DoS [9] H. Jiang, K. Wang, Y. Wang, M. Gao, and Y. Zhang, “Energy big data:
attacks may not follow Bernoulli distribution in SGs. A survey,” IEEE Access, vol. 4, pp. 3844–3861, 2017.
Some existing results based on such impractical assump- [10] F. Pasqualetti, F. Dorfler, and F. Bullo, “Control-theoretic methods for
cyberphysical security: Geometric principles for optimal cross-layer
tions are far from real applications. Therefore, modeling resilient control systems,” IEEE Control Syst. Mag., vol. 35, no. 1,
these attacks in a more realistic way needs to be further pp. 110–127, Feb. 2015.
studied. [11] N. F. S. Baker and K. Timlin, In the Dark: Crucial Industries Confront
Cyber Attacks, McAfee, Santa Clara, CA, USA, 2012.
3) Distributed Detection and Estimation of Attacks: The [12] C.-K. Zhang, Y. He, L. Jiang, and M. Wu, “Notes on stability of
complexity and spatial distribution of SGs which time-delay systems: Bounding inequalities and augmented Lyapunov–
are integrated with cyber-physical-control dramatically Krasovskii functionals,” IEEE Trans. Autom. Control, vol. 62, no. 10,
pp. 5331–5336, Oct. 2017.
increase the difficulties of detection and estimation, [13] C. Peng, J. Li, and M. Fei, “Resilient event-triggering H∞ load fre-
especially in the distributed environment. Additionally, quency control for multi-area power systems with energy-limited DoS
there may be multiple attacks at the same time for such attacks,” IEEE Trans. Power Syst., vol. 32, no. 5, pp. 4110–4118,
Sep. 2017.
a large scale of SGs. So, how to locate and estimate [14] Z. Elmrabet, H. Elghazi, T. Sadiki, and H. Elghazi, “A new secure
different attacks in a distributed way is of paramount network architecture to increase security among virtual machines in
significance. cloud computing,” in Proc. Adv. Ubiquitous Netw., 2016, pp. 105–116.
[15] I. Colak, S. Sagiroglu, G. Fulli, M. Yesilbudak, and C.-F. Covrig, “A
4) Resilient Control Strategies: As a complement of IT pro- survey on the critical issues in smart grid technologies,” Renew. Sustain.
tection method, security control strategies’ design plays Energy Rev., vol. 54, pp. 396–405, Feb. 2016.
a very important role in securing SGs. When traditional [16] M. Hashmi, S. Hänninen, and K. Mäki, “Survey of smart grid con-
cepts, architectures, and technological demonstrations worldwide,” in
IT protections are invalid, the control implementations Proc. IEEE PES Conf. Innov. Smart Grid Technol., Medellín, Colombia,
will lead to a significant improvement in guarantee- 2011, pp. 1–7.
ing the performance of SGs. On one hand, the control [17] S. Goel and H. Yuan, Security Challenges in Smart Grid
Implementation. London, U.K.: Springer, 2015.
design should satisfy general requirements when there [18] A. O. Otuoze, M. W. Mustafa, and R. M. Larik, “Smart grids security
are no attacks. On the other hand, it is still valid for challenges: Classification by sources of threats,” J. Elect. Syst. Inf.
attacks rather than redesigning or changing controller. Technol., vol. 5, no. 3, pp. 468–483, Dec. 2018.
[19] E. D. Knapp, Industrial Network Security: Securing Critical
Therefore, how to design such a security controller in a Infrastructure Networks for Smart Grid, SCADA, and Other Industrial
resilient way is a promising direction in the future. Control Systems. Boston, MA, USA: Syngress, 2014.
To the end, we have reviewed cyber-physical security issues [20] P. Engebretson, The Basics of Hacking and Penetration Testing: Ethical
which include attacks strategies, detection methods, and con- Hacking and Penetration Testing Made Easy. Waltham, MA, USA:
Syngress, 2011.
trol design for SGs from both cyber layer and physical power [21] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Data-stream-
grids layer. Although traditional IT security strategies, such as based intrusion detection system for advanced metering infrastructure
VPNs, PKI, IDS, and firewall play an important role in protect- in smart grid: A feasibility study,” IEEE Syst. J., vol. 9, no. 1,
pp. 31–44, Mar. 2015.
ing communication networks, there are many limitations for [22] E. D. Knapp and R. Samani, Applied Cyber Security and the
securing physical power systems and may be not appropriate Smart Grid: Implementing Security Controls into the Modern Power
for some control scenarios. Moreover, traditional IT security Infrastructure. Amsterdam, The Netherlands: Elsevier, 2013.
[23] J. Liu, Y. Xiao, S. Li, W. Liang, and C. L. P. Chen, “Cyber security and
strategies may be invalid when attacks are becoming more privacy issues in smart grids,” IEEE Commun. Surveys Tuts., vol. 14,
blended, sophisticated, and complex. Therefore, co-design no. 4, pp. 981–997, 4th Quart., 2012.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

14 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

[24] D. Kundur, X. Feng, S. Liu, T. Zourntos, and K. L. Butler-Purry, [47] Y.-L. Wang and Q.-L. Han, “Network-based modelling and dynamic
“Towards a framework for cyber attack impact analysis of the electric output feedback control for unmanned marine vehicles,” Automatica,
smart grid,” in Proc. 1st Int. Conf. Smart Grid Commun., Gaithersburg, vol. 91, pp. 43–53, May 2018.
MD, USA, 2010, pp. 244–249. [48] H.-B. Zeng, K. L. Teo, and Y. He, “A new looped-functional for
[25] J. Dagle, “Vulnerability assessment activities [for electric utilities],” stability analysis of sampled-data systems,” Automatica, vol. 82,
in Proc. Power Eng. Soc. Win. Meeting, Columbus, OH, USA, 2001, pp. 328–331, Aug. 2017.
pp. 108–113. [49] S. Liu, X. P. Liu, and A. El Saddik, “Denial-of-service (DoS) attacks
[26] Y. Xu, J. Zhang, W. Wang, A. Juneja, and S. Bhattacharya, “Energy on load frequency control in smart grids,” in Proc. IEEE PES Innov.
router: Architectures and functionalities toward energy Internet,” in Smart Grid Technol., Washington, DC, USA, 2013, pp. 1–6.
Proc. Int. Conf. Smart Grid Commun., Brussels, Belgium, 2011, [50] A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure
pp. 31–36. control framework for resource-limited adversaries,” Automatica,
[27] S. Shitharth and D. P. Winston, “A novel IDS technique to detect DDoS vol. 51, pp. 135–148, Jan. 2015.
and sniffers in smart grid,” in Proc. World Conf. Futuristic Trends [51] H. T. Sun, C. Peng, P. Zhou, Z.-W. Wang, “A brief overview on secure
Res. Innov. Soc. Welfare (Startup Conclave), Coimbatore, India, 2016, control of networked systems,” Adv. Manuf., vol. 5, no. 3, pp. 243–250,
pp. 1–6. 2017.
[28] M. Kammerstetter, L. Langer, F. Skopik, and W. Kastner, “Architecture- [52] X. Ge, F. Yang, and Q.-L. Han, “Distributed networked control systems:
driven smart grid security management,” in Proc. 2nd Workshop Inf. A brief overview,” Inf. Sci., vol. 380, pp. 117–131, Feb. 2017.
Hiding Multimedia Security, Salzburg, Austria, 2014, pp. 153–158.
[53] Y. Shoukry and P. Tabuada, “Event-triggered state observers for sparse
[29] R. Al-Dalky, O. Abduljaleel, K. Salah, H. Otrok, and M. Al-Qutayri,
sensor noise/attacks,” IEEE Trans. Autom. Control, vol. 61, no. 8,
“A modbus traffic generator for evaluating the security of SCADA sys-
pp. 2079–2091, Aug. 2016.
tems,” in Proc. Int. Symp. Commun. Syst. Netw. Digit. Signal Process.,
Manchester, U.K., 2014, pp. 809–814. [54] C. De Persis and P. Tesi, “Input-to-state stabilizing control under
[30] G. C. Walsh, O. Beldiman, and L. Bushnell, “Asymptotic behavior of denial-of-service,” IEEE Trans. Autom. Control, vol. 60, no. 11,
networked control systems,” in Proc. Int. Conf. Control Appl., 2002, pp. 2930–2944, Nov. 2015.
pp. 1448–1453. [55] H. Shisheh-Foroush and S. Martínez, “On single-input controllable lin-
[31] A. Sargolzaei, K. K. Yen, and M. N. Abdelghani, “Preventing time- ear systems under periodic DoS jamming attacks,” in Proc. SIAM Conf.
delay switch attack on load frequency control in distributed power Control Appl., San Diego, CA, USA, 2013, pp. 222–229.
systems,” IEEE Trans. Smart Grid, vol. 7, no. 2, pp. 1176–1185, [56] Y.-L. Wang, C.-C. Lim, and P. Shi, “Adaptively adjusted event-
Mar. 2016. triggering mechanism on fault detection for networked control sys-
[32] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: tems,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 2299–2311, Aug. 2017.
A review,” in Proc. Int. Conf. Comput. Sci. Electron. Eng., vol. 3. [57] H. S. Foroush and S. Martinez, “On triggering control of single-input
Hangzhou, China, 2012, pp. 648–651. linear systems under pulse-width modulated DoS signals,” SIAM J.
[33] Z. E. Mrabet, N. Kaabouch, H. E. Ghazi, and H. ElGhazi, “Cyber- Control Optim., vol. 54, no. 6, pp. 3084–3105, 2016.
security in smart grid: Survey and challenges,” Comput. Elect. Eng., [58] M. Long, C.-H. Wu, and J. Y. Hung, “Denial of service attacks on
vol. 67, pp. 469–482, Apr. 2018. network-based control systems: Impact and mitigation,” IEEE Trans.
[34] D. Ding, Q.-L. Han, Y. Xiang, X. Ge, and X.-M. Zhang, “A survey Ind. Informat., vol. 1, no. 2, pp. 85–96, May 2005.
on security control and attack detection for industrial cyber-physical [59] J. Xiong and J. Lam, “Stabilization of linear systems over networks
systems,” Neurocomputing, vol. 275, pp. 1674–1683, Jan. 2018. with bounded packet loss,” Automatica, vol. 43, no. 1, pp. 80–87, 2007.
[35] R. C. Diovu and J. T. Agee, “A cloud-based OpenFlow firewall for [60] J. Zhang, C. Peng, S. Masroor, H. Sun, and L. Chai, “Stability analysis
mitigation against DDoS attacks in smart grid AMI networks,” in Proc. of networked control systems with denial-of-service attacks,” in Proc.
PES PowerAfrica, Accra, Ghana, 2017, pp. 28–33. UKACC 11th Int. Conf. Control, Belfast, Ireland, 2016, pp. 1–6.
[36] R. Fu et al., “Stability analysis of the cyber physical microgrid system [61] D. Ding, Z. Wang, G. Wei, and F. E. Alsaadi, “Event-based security
under the intermittent DoS attacks,” Energies, vol. 5, no. 5, p. 680, control for discrete-time stochastic systems,” IET Control Theory Appl.,
2017, doi: 10.3390/en10050680. vol. 10, no. 15, pp. 1808–1815, Nov. 2016.
[37] K. Ding, Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “A multi-channel [62] A. Cetinkaya, H. Ishii, and T. Hayakawa, “Event-triggered control over
transmission schedule for remote state estimation under DoS attacks,” unreliable networks subject to jamming attacks,” in Proc. 54th Annu.
Automatica, vol. 78, pp. 194–201, Apr. 2017. Conf. Decis. Control, Osaka, Japan, 2015, pp. 4818–4823.
[38] Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “SINR-based DoS attack [63] A. Cetinkaya, H. Ishii, and T. Hayakawa, “Random and malicious
on remote state estimation: A game-theoretic approach,” IEEE Trans. packet transmission failures on multi-hop channels in networked
Control Netw. Syst., vol. 43, no. 2, pp. 632–642, Sep. 2017. control systems,” IFAC PapersOnLine, vol. 49, no. 22, pp. 49–54, 2016.
[39] S. Shapsough, F. Qatan, R. Aburukba, F. Aloul, and A. R. Al Ali, [64] S. AminAlvaro, A. Cárdenas, and S. S. Sastry, “Safe and secure net-
“Smart grid cyber security: Challenges and solutions,” in Proc. Int. worked control systems under denial-of-service attacks,” in Proc. Int.
Conf. Smart Grid Clean Energy Technol., Offenburg, Germany, 2015, Conf. Hybrid Syst. Comput. Control, San Francisco, CA, USA, 2009,
pp. 170–175. pp. 31–45.
[40] D. Wei, Y. Lu, M. Jafari, P. Skare, and K. Rohde, “An integrated secu-
[65] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal denial-of-service
rity system of protecting smart grid against cyber attacks,” in Proc.
attack scheduling with energy constraint,” IEEE Trans. Autom. Control,
Innov. Smart Grid Technol., 2010, pp. 1–7.
vol. 60, no. 11, pp. 3023–3028, Nov. 2015.
[41] R. Xu et al., “Achieving efficient detection against false data injection
attacks in smart grid,” IEEE Access, vol. 5, pp. 13787–13798, 2017. [66] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack schedul-
[42] T. Lan, W. Wang, and G. M. Huang, “False data injection attack in ing in wireless networked control system,” IEEE Trans. Control Syst.
smart grid topology control: Vulnerability and countermeasure,” in Technol., vol. 24, no. 3, pp. 843–852, May 2016.
Proc. IEEE Power Energy Soc. Gen. Meeting, Chicago, IL, USA, 2017, [67] A. A. A. Abass, M. Hajimirsadeghi, N. B. Mandayam, and Z. Gajic,
pp. 1–5. “Evolutionary game theoretic analysis of distributed denial of service
[43] S. A. Foroutan and F. R. Salmasi, “Detection of false data injection attacks in a wireless network,” in Proc. Annu. Conf. Inf. Sci. Syst.,
attacks against state estimation in smart grids based on a mixture Princeton, NJ, USA, 2016, pp. 36–41.
Gaussian distribution learning method,” IET Cyber Phys. Syst. Theory [68] J. Wu, Y. Yuan, H. Zhang, and L. Shi, “How can online schedules
Appl., vol. 2, no. 4, pp. 161–171, Dec. 2017. improve communication and estimation tradeoff?” IEEE Trans. Signal
[44] A. Bartoli et al., “Secure lossless aggregation for smart grid M2M Process., vol. 61, no. 7, pp. 1625–1631, Apr. 2013.
networks,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., [69] J. Hu and M. P. Wellman, “Nash Q-learning for general-sum stochastic
Gaithersburg, MD, USA, 2010, pp. 333–338. games,” J. Mach. Learn. Res., vol. 4, no. 11, pp. 1039–1069, 2003.
[45] J. Vijayan, Stuxnet Renews Power Grid Security Concerns, [70] Y. Yuan, H. Yuan, L. Guo, H. Yang, and S. Sun, “Resilient con-
Computerworld, Framingham, MA, USA, Jul. 2010. [Online]. trol of networked control system under DoS attacks: A unified game
Available: https://www.computerworld.com/article/2519574/security/ approach,” IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1786–1794,
stuxnet-renews-power-grid-security-concerns.html Oct. 2016.
[46] Y.-L. Wang, Q.-L. Han, M. Fei, and C. Peng, “Network-based T–S [71] R. Cao, J. Wu, C. Long, and S. Li, “Stability analysis for networked
fuzzy dynamic positioning controller design for unmanned marine vehi- control systems under denial-of-service attacks,” in Proc. 54th IEEE
cles,” IEEE Trans. Cybern., vol. 48, no. 9, pp. 2750–2763, Sep. 2018. Conf. Decis. Control, Osaka, Japan, 2015, pp. 7476–7481.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

PENG et al.: SURVEY ON SECURITY COMMUNICATION AND CONTROL FOR SGs UNDER MALICIOUS CYBER ATTACKS 15

[72] E. Fridman, A. Seuret, and J.-P. Richard, “Robust sampled-data sta- [97] C. Peng, S. Ma, and X. Xie, “Observer-based non-PDC control for
bilization of linear systems: An input delay approach,” Automatica, networked T–S fuzzy systems with an event-triggered communication,”
vol. 40, no. 8, pp. 1441–1446, 2004. IEEE Trans. Cybern., vol. 47, no. 8, pp. 2279–2287, Aug. 2017.
[73] X.-M. Zhang, Q.-L. Han, and B.-L. Zhang, “An overview and deep [98] H. Zhang, C. Peng, H. Sun, and D. Du, “Adaptive state estimation
investigation on sampled-data-based event-triggered control and filter- for cyber physical systems under sparse attacks,” Trans. Inst. Meas.
ing for networked systems,” IEEE Trans. Ind. Informat., vol. 13, no. 1, Control, pp. 1–9, Feb. 2018, doi: 10.1177/0142331217730123.
pp. 4–16, Feb. 2017. [99] Y. Mo and B. Sinopoli, “Secure estimation in the presence of integrity
[74] Z. H. Pang, G. P. Liu, and Z. Dong, “Secure networked control sys- attacks,” IEEE Trans. Autom. Control, vol. 60, no. 4, pp. 1145–1151,
tems under denial of service attacks,” IFAC Proc. Vol., vol. 44, no. 1, Apr. 2015.
pp. 8908–8913, 2011. [100] U. A. Khan and J. M. F. Moura, “Distributing the Kalman filter for
[75] Z. Cheng, D. Yue, X. Lan, C. Huang, and S. Hu, “H∞ prediction large-scale systems,” IEEE Trans. Signal Process., vol. 56, no. 10,
triggering control of multi-area power systems load frequency control pp. 4919–4935, Oct. 2008.
under DoS attacks,” in Proc. Int. Conf. Intell. Comput. Sustain. Energy [101] V. Kekatos and G. B. Giannakis, “Distributed robust power system state
Environ., Nanjing, China, 2017, pp. 477–487. estimation,” IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1617–1626,
[76] G. K. Befekadu, V. Gupta, and P. J. Antsaklis, “Risk-sensitive con- May 2013.
trol under Markov modulated denial-of-service (DoS) attack strate- [102] Y. Hu, A. Kuh, T. Yang, and A. Kavcic, “A belief propagation based
gies,” IEEE Trans. Autom. Control, vol. 60, no. 12, pp. 3299–3304, power distribution system state estimator,” IEEE Comput. Intell. Mag.,
Dec. 2015. vol. 6, no. 3, pp. 36–46, Aug. 2011.
[77] C. Peng, D. Yue, and M.-R. Fei, “A higher energy-efficient sampling [103] A. Souza, E. M. Lourenço, and A. S. Costa, “Real-time monitoring
scheme for networked control systems over IEEE 802.15.4 wireless of distributed generation through state estimation and geometrically-
networks,” IEEE Trans. Ind. Informat., vol. 12, no. 5, pp. 1766–1774, based tests,” in Proc. IREP Symp. Bulk Power Syst. Dyn. Control VIII
Oct. 2016. (IREP), Rio de Janeiro, Brazil, 2010, pp. 1–8.
[78] A. Abur and A. G. Exposito, Power System State Estimation: Theory [104] S. Bi and Y. J. Zhang, “Defending mechanisms against false-data injec-
and Implementation. Boca Raton, FL, USA: CRC, 2004. tion attacks in the power system state estimation,” in Proc. IEEE
[79] Y. Liu, P. Ning, and M. K. Reiter, “False data injection attacks against GLOBECOM Workshops, 2011, pp. 1162–1167.
state estimation in electric power grids,” ACM Trans. Inf. Syst. Security, [105] S. Bi and Y. J. A. Zhang, “Graph-based cyber security analysis of state
vol. 14, no. 1, pp. 21–32, 2011. estimation in smart power grid,” IEEE Commun. Mag., to be published,
[80] Y. Mo, E. Garone, A. Casavola, and B. Sinopoli, “False data injec- doi: 10.1109/MCOM.2017.1600210CM.
tion attacks against state estimation in wireless sensor networks,” in [106] M. Ekstedt and T. Sommestad, “Enterprise architecture models for
Proc. 49th IEEE Conf. Decis. Control, Atlanta, GA, USA, 2010, cyber security analysis,” in Proc. IEEE/PES Power Syst. Conf. Expo.,
pp. 5967–5972. Seattle, WA, USA, 2009, pp. 1–6.
[81] C. Kwon, W. Liu, and I. Hwang, “Security analysis for cyber-physical [107] L. Ding, Q.-L. Han, X. Ge, and X.-M. Zhang, “An overview of recent
systems against stealthy deception attacks,” in Proc. Amer. Control advances in event-triggered consensus of multiagent systems,” IEEE
Conf., Washington, DC, USA, 2013, pp. 3344–3349. Trans. Cybern., vol. 48, no. 4, pp. 1110–1123, Apr. 2018.
[82] J. J. Gertler, “Survey of model-based failure detection and isolation [108] Y. Zhang, L. Wang, W. Sun, R. C. Green, II, and M. Alam, “Distributed
in complex plants,” IEEE Control Syst. Mag., vol. 8, no. 6, pp. 3–11, intrusion detection system in a multi-layer network architecture of
Dec. 1988. smart grids,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 796–808,
[83] K. Manandhar, X. Cao, F. Hu, and Y. Liu, “Detection of faults and Dec. 2011.
attacks including false data injection attack in smart grid using Kalman [109] P. Lee, A. Clark, L. Bushnell, and R. Poovendran, “A passivity
filter,” IEEE Trans. Control Netw. Syst., vol. 1, no. 4, pp. 370–379, framework for modeling and mitigating wormhole attacks on net-
Dec. 2014. worked control systems,” IEEE Trans. Autom. Control, vol. 59, no. 12,
[84] A. A. Cárdenas et al., “Attacks against process control systems: Risk pp. 3224–3237, Dec. 2014.
assessment, detection, and response,” in Proc. 6th ACM Symp. Inf. [110] Q. Yang et al., “On false data-injection attacks against power system
Comput. Commun. Security, Hong Kong, 2011, pp. 355–366. state estimation: Modeling and countermeasures,” IEEE Trans. Parallel
[85] A. Wald, Sequential Analysis. New York, NY, USA: Dover, 1973. Distrib. Syst., vol. 25, no. 3, pp. 717–729, Mar. 2014.
[86] F. F. Wu and W.-H. E. Liu, “Detection of topology errors by state
estimation (power systems),” IEEE Trans. Power Syst., vol. 4, no. 1,
pp. 176–183, Feb. 1989.
[87] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, “Malicious data attacks
on smart grid state estimation: Attack strategies and countermeasures,”
in Proc. IEEE Int. Conf. Smart Grid Commun., 2010, pp. 220–225. Chen Peng (M’13–SM’15) received the B.Sc. and
[88] Y. Mo, R. Chabukswar, and B. Sinopoli, “Detecting integrity attacks on the M.Sc. degrees in coal preparation and the
SCADA systems,” IEEE Trans. Control Syst. Technol., vol. 22, no. 4, Ph.D. degree in control theory and control engi-
pp. 1396–1407, Jul. 2014. neering from the Chinese University of Mining
[89] C. Peng, J. Zhang, and Q.-L. Han, “Consensus of multiagent systems Technology, Xuzhou, China, in 1996, 1999, and
with nonlinear dynamics using an integrated sampled-data-based event- 2002, respectively.
triggered communication scheme,” IEEE Trans. Syst., Man, Cybern., From 2004 to 2005, he was a Research Associate
Syst., to be published, doi: 10.1109/TSMC.2018.2814572. with the University of Hong Kong, Hong Kong.
[90] J. P. Farwell and R. Rohozinski, “Stuxnet and the future of cyber war,” From 2006 to 2007, he was a Visiting Scholar with
Survival, vol. 53, no. 1, pp. 23–40, 2011. the Queensland University of Technology, Brisbane,
[91] Y. Mo et al., “Cyber–physical security of a smart grid infrastructure,” QLD, Australia. From 2011 to 2012, he was a
Proc. IEEE, vol. 100, no. 1, pp. 195–209, Jan. 2012. Post-Doctoral Research Fellow with the Central Queensland University,
[92] K. Zhou, J. C. Doyle, and K. Glover, Robust and Optimal Control. Rockhampton, QLD, Australia. From 2009 to 2012, he was the Department
Upper Saddle River, NJ, USA: Prentice-Hall, 1996. Head with the Department of Automation and a Professor with the School of
[93] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and con- Electrical and Automation Engineering, Nanjing Normal University, Nanjing,
trol for cyber-physical systems under adversarial attacks,” IEEE Trans. China. In 2012, he was appointed as an Eastern Scholar by the Municipal
Autom. Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014. Commission of Education, Shanghai, China, and joined Shanghai University,
[94] C. Lee, H. Shim, and Y. Eun, “Secure and robust state estimation Shanghai, where he is currently the Director of the Centre of Networked
under sensor attacks, measurement noises, and process disturbances: Control Systems and a Distinguished Professor. In 2018, he was appointed as
Observer-based combinatorial approach,” in Proc. Eur. Control Conf., an Outstanding Academic Leader by the Municipal Commission of Science
Linz, Austria, 2015, pp. 1872–1877. and Technology, Shanghai. His current research interests include networked
[95] C. Peng, M. Wu, X. P. Xie, and Y.-L. Wang, “Event-triggered predic- control systems, distributed control systems, smart grid, and intelligent con-
tive control for networked nonlinear systems with imperfect premise trol systems.
matching,” IEEE Trans. Fuzzy Syst., vol. 26, no. 5, pp. 2797–2806, Prof. Peng was a recipient of one of the Most Cited Chinese Researchers
Oct. 2018. in Computer Science by Elsevier from 2014 to 2017. He is an Associate
[96] E. J. Candes and T. Tao, “Decoding by linear programming,” IEEE Editor of a number of international journals, including Information Sciences
Trans. Inf. Theory, vol. 51, no. 12, pp. 4203–4215, Dec. 2005. and Transactions of the Institute of Measurement and Control.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

16 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS

Hongtao Sun received the B.Sc. degree in electronic Yu-Long Wang (M’14) received the B.S. degree in
information science and technology from Binzhou computer science and technology from Liaocheng
University, Binzhou, China, in 2010 and the M.Sc. University, Liaocheng, China, in 2000 and the M.S.
degree in control engineering from the Lanzhou and Ph.D. degrees in control science and engineer-
University of Technology, Lanzhou, China in 2013. ing from Northeastern University, Shenyang, China,
He is currently pursuing the Ph.D. degree with the in 2006 and 2008, respectively.
School of Mechatronic Engineering and Automation, He was a Post-Doctoral Research Fellow and
Shanghai University, Shanghai, China. a Research Fellow with Central Queensland
His current research interest includes stability and University, Rockhampton, QLD, Australia, and an
security of networked control systems. Academic Visitor with the University of Adelaide,
Adelaide, SA, Australia. He is currently a Professor
with Shanghai University, Shanghai, China. His current research interests
include networked control systems, fault detection, and the motion control
for marine vehicles.
Mingjin Yang received the B.Sc. degree in elec-
trical engineering and automation from Xuzhou
Normal University, Xuzhou, China, in 2011 and the
M.Sc. degree in control engineering from Shanxi
University, Taiyuan, China, in 2016. He is cur-
rently pursuing the Ph.D. degree with the School of
Mechatronic Engineering and Automation, Shanghai
University, Shanghai, China.
His current research interests include fault diagno-
sis, power system, and networked control systems.

Вам также может понравиться