Submitted:
01 May 2025
Posted:
05 May 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Overview of Power CPS and Integration with Modern Technologies
1.2. False Data Injection Attacks in Power Systems: Types and Impact
- 1)
- Measurement Manipulation: Attackers inject false data into measurement points, such as sensors or meters, to mislead system operators about the state of the grid. These manipulations can cause incorrect estimations of system parameters like voltage angles or power flows, leading to improper grid control actions, such as wrong load dispatching, unnecessary power rerouting, or incorrect fault isolation [26,27].
- 2)
- Control Manipulation: In more sophisticated attacks, FDIAs target control systems directly, causing incorrect actions in the grid's operational commands [28,29]. For example, attackers could manipulate state estimation results to mislead the automatic control systems into making erroneous decisions, such as triggering circuit breaker operations or rescheduling generation units, which could destabilize the entire grid.
1.3. FDIA Impact on Power Grid Security and Stability
- 1)
- Grid Instability: FDIAs can disrupt the grid’s balance between supply and demand. If the state estimation is compromised, operators might make incorrect decisions that could overload certain sections of the grid, leading to voltage instability, system congestion, or even widespread blackouts [37,38].
- 2)
- Cascading Failures: Once FDIAs manipulate key grid parameters, the effects can propagate across the system, causing cascading failures [39,40]. For example, incorrect load shedding or generator rescheduling could trigger further system instability, affecting interconnected systems and causing larger outages [41]. These cascading failures can be difficult to control or reverse, especially if the attack is not detected promptly.
- 3)
- Loss of Data Integrity: In Power CPS, accurate real-time data is essential for ensuring the reliable operation of the grid. FDIAs undermine this data integrity, making it difficult for operators to assess the actual state of the system. This results in incorrect operational decisions, potentially leading to equipment damage or poor resource allocation [42].
- 4)
- Economic Impact: Beyond technical consequences, FDIAs also carry significant economic risks. Extended outages or grid instability can disrupt industrial operations, leading to production losses and financial damage [43,44,45]. Additionally, the costs associated with restoring grid stability, including repairs, operational downtime, and regulatory penalties, can be substantial [46].
1.4. Motivation for the Review: Identifying Gaps and Future Directions
- 1)
- Detection Accuracy and Speed: Existing detection methods often suffer from high false-positive rates or long processing times, making it difficult to respond to attacks in real time. More research is needed to develop adaptive, real-time detection systems that can quickly identify and respond to FDIA threats.
- 2)
- Comprehensive Defense Strategies: Although several mitigation methods have been proposed, many of them are either reactive or only address specific types of FDIAs. A more comprehensive defense approach that combines detection, recovery, and proactive prevention measures is essential.
- 3)
- Integration of Emerging Technologies: As technologies such as AI, machine learning, and quantum computing evolve, they offer new opportunities for FDIA detection and defense. However, integrating these technologies with existing systems remains a challenge and requires further exploration.
- 4)
- Cross-Domain Security: Power CPS are highly interconnected with other critical infrastructure, such as communication networks and data centers. Ensuring the security of these interdependent systems is a complex task that requires coordinated research across multiple domains.
2. FDIA Background and Evolution
2.1. Early Detection and Historical Incidents
2.2. Types of FDIAs: Manipulation of Measurement Data, State Estimation, and Control Actions
- 1)
- Manipulation of Measurement Data: The most straightforward form of FDIA involves directly manipulating measurement data obtained from various sensors or devices such as PMUs, Remote Terminal Units (RTUs), and smart meters. These devices continuously collect real-time data from the power grid, including voltage, current, and frequency [57]. By injecting false data into these measurements, attackers can mislead system operators about the actual state of the grid, thereby preventing them from making informed decisions about system operation. Since many bad data detection algorithms rely on discrepancies in the measurements to detect anomalies, attackers can manipulate the measurements in a way that satisfies system constraints, making the false data nearly indistinguishable from legitimate data [58].
- 2)
- State Estimation: State estimation refers to the process by which grid operators use available measurements to estimate unmeasured states of the system, such as voltage angles and magnitudes [59,60]. Since power system operations are largely governed by these state estimations, manipulating the estimated state of the system can have far-reaching consequences [61]. FDIAs can target state estimation algorithms by injecting false data that causes the estimated states to deviate from their true values. These manipulations can lead to incorrect decisions, such as unnecessary generator rescheduling, misallocation of power, or improper fault isolation. State estimation manipulation is particularly dangerous because it can affect large areas of the grid while remaining undetected [62,63,64].
- 3)
- Control Actions: In more advanced FDIA scenarios, attackers target the control actions executed by the grid’s supervisory systems. By manipulating state estimation data, attackers can influence automated control systems that rely on the system’s state information to make real-time decisions, such as load shedding, generation dispatch, or the opening and closing of circuit breakers. These attacks can cause disruptions, such as overloading transformers or generators, unnecessarily isolating parts of the grid, or causing power quality issues. The long-term consequences can be severe, including cascading failures and widespread blackouts, especially if the attacks are left undetected for extended periods [65].
2.3. FDIA Evolution: From Basic Attacks to Sophisticated, Multi-Stage Strategies
- 1)
- Basic Attacks: Early FDIAs were mostly focused on the direct injection of false data into the system’s measurement devices. These attacks targeted weak points in the system where traditional detection algorithms, based on residual analysis, could not identify malicious alterations. The attacks were often limited to small-scale disturbances, such as misreporting voltage or power flows, which could go unnoticed in a system with high levels of data noise or error [69,70].
- 2)
- Advanced Multi-Stage Attacks: As the grid's security and detection mechanisms have become more sophisticated, attackers have shifted towards more elaborate multi-stage attacks. These attacks may begin with network infiltration, followed by the manipulation of critical control system components [70]. For example, attackers may first gain unauthorized access to communication networks or control centers, then inject false data into sensors or manipulate data exchanges between devices. Following this, they may exploit vulnerabilities in the Supervisory Control and Data Acquisition (SCADA) systems to alter system behavior, leading to larger-scale failures or cascading blackouts [71,72].
- 3)
- Targeted and Coordinated Attacks: The evolution of FDIAs has also seen the rise of coordinated attacks targeting multiple parts of the grid simultaneously. These attacks often leverage collaborative strategies that involve compromising various components of the system, such as attacking both the communication network and the control systems, or manipulating the physical infrastructure to mislead grid operators. In these scenarios, the attacks are not isolated to one component but are distributed across several layers of the system, making them much harder to detect and mitigate [74].
2.4. The Stealthy Nature of FDIAs: Challenges in Detection
- 1)
- Data Conformance to System Constraints: Attackers often design FDIAs to inject data that conforms to the physical constraints of the system [77,78]. For example, they might manipulate voltage measurements in such a way that they appear valid according to the system's power flow equations. This makes traditional bad data detection techniques, which rely on finding inconsistencies in the data, ineffective against sophisticated FDIAs.
- 2)
- Use of Encryption and Secure Communication Channels: The increasing use of secure communication protocols, such as encryption, in power CPS further complicates the detection of FDIAs. While encryption enhances the security of data transmission, it also makes it more difficult to inspect and verify the data being exchanged between devices [79]. This presents a challenge for security systems that aim to detect false data or malicious commands within encrypted data streams.
- 3)
- Long Detection Time: Because FDIAs are typically low-profile and occur over extended periods, detection systems often struggle to identify them in real time. The time window for detecting such attacks is crucial, as even minor delays in detection can allow an attacker to achieve their objectives [80,81]. Moreover, the complexity of modern power systems means that detecting abnormal patterns or inconsistencies requires sophisticated analysis, often involving machine learning and AI-based techniques [82,83,84].
3. Challenges in FDIA Detection
3.1. Current Detection Techniques: Model-Driven vs. Data-Driven Approaches
- 1)
- Model-Driven Approaches: Model-driven detection techniques rely on system models and mathematical formulations to compare measured data against expected data [85]. These approaches typically use state estimation methods, where the system's state is inferred from a set of measurements, and any significant deviation from expected values is flagged as an anomaly. The most common model-driven approach is based on bad data detection (BDD) algorithms, such as Weighted Least Squares (WLS), which checks for discrepancies between measured data and the state estimation model [86,87].
- 2)
- Data-Driven Approaches: Data-driven detection techniques, on the other hand, utilize machine learning (ML) and statistical models to identify anomalies in the system without relying on a pre-existing system model [88]. These methods focus on learning patterns from large datasets to predict normal system behavior, and any deviation from these patterns can indicate an attack. Commonly used data-driven techniques include Support Vector Machines (SVM), Decision Trees, Random Forests, and Neural Networks [89,90,91].
- 3)
- Hybrid Approaches: In recent years, hybrid approaches that combine both model-driven and data-driven methods have gained attention [92]. These methods seek to leverage the strengths of both approaches, using state estimation to provide initial detection and machine learning algorithms to refine the results and improve accuracy. Hybrid methods can potentially improve the robustness and adaptability of FDIA detection, particularly in large and complex systems [93].
3.2. Limitations of Existing Methods: Accuracy, Cost, Adaptability
- 1)
- Accuracy: One of the biggest challenges with existing detection methods is accuracy. Both model-driven and data-driven approaches can suffer from high false-positive rates, where legitimate system variations are flagged as attacks. This is particularly problematic in large-scale systems where normal fluctuations in system performance (e.g., due to load changes or renewable generation variability [94]) can be mistaken for anomalies. Inaccurate detection can lead to unnecessary corrective actions, such as load shedding or rescheduling generation, which could negatively impact grid stability and efficiency [95].
- 2)
- Cost: Many detection methods, particularly those based on state estimation and machine learning, require significant computational resources. Model-driven methods, such as WLS, may involve solving complex optimization problems in real-time, which can be computationally expensive, especially for large-scale power grids. Similarly, data-driven approaches, particularly those based on deep learning, require substantial training data and computing power, which may not be available in all settings [97].
- 3)
- Adaptability: The adaptability of detection systems is another critical issue. Power systems are constantly evolving, with new technologies like smart meters, DERs, and electric vehicles being integrated into the grid. As the grid evolves, the patterns of normal behavior also change, and FDIA detection systems must be able to adapt to these changes [98].
3.3. Real-Time Detection and Large-Scale Grid Challenges
- 1)
- Real-Time Detection: The ability to detect FDIAs in real-time is crucial for minimizing the impact of an attack [100]. Many current detection methods, particularly those based on machine learning, require significant processing time to analyze large datasets and make predictions. This can be a problem in a fast-moving environment like a power grid, where decisions need to be made within seconds to avoid grid instability [101].
- 2)
- Large-Scale Grid Challenges: Large-scale grids, especially those with high levels of distributed generation and renewable energy integration, pose unique challenges for FDIA detection [104,105,106]. These systems generate vast amounts of data, and the interconnectivity between different grid components makes it difficult to identify the source of an attack. Attackers can target multiple points within the grid, injecting false data in ways that affect different parts of the system, making detection and localization [107].
4. Recent Advances in FDIA Detection Techniques
4.1. Machine Learning and AI Approaches: Deep Learning, Ensemble Methods
- 1)
- Deep Learning: Deep learning has emerged as one of the most promising approaches for FDIA detection due to its ability to automatically learn hierarchical features from raw data [111]. In particular, Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs) have been successfully applied in FDIA detection. CNNs, for example, are excellent at processing temporal data, such as the time-series data from PMUs and smart meters, allowing them to detect subtle anomalies indicative of FDIAs. RNNs, especially Long Short-Term Memory (LSTM) networks, are effective for modeling the temporal dependencies inherent in power grid measurements, allowing the detection of time-sensitive attacks that evolve gradually [112].
- 2)
- Ensemble Methods: Ensemble learning methods, such as Random Forests and Gradient Boosting Machines (GBM), are another significant advancement in FDIA detection [115]. These methods aggregate the predictions from multiple machine learning models to improve the robustness and accuracy of detection. By combining the outputs of several classifiers, ensemble methods reduce the likelihood of errors caused by individual models and can better capture the diversity of attacks [116].
4.2. State Estimation Improvements: Robustness and Accuracy
- 1)
- Robust State Estimation: One major area of improvement is the development of robust state estimation techniques. These methods are designed to be less sensitive to outliers and anomalies, which are common when FDIAs are present [120]. Huber M-estimators and least absolute deviation (LAD) techniques are examples of robust estimators that prioritize minimizing the impact of large deviations in data, such as those caused by FDIA, while maintaining the accuracy of the overall estimation process [121].
- 2)
- Dynamic and Extended State Estimation: Modern power systems are dynamic, and state estimation must also account for time-varying conditions [123]. Dynamic state estimation (DSE) methods, which track the state of the system over time, have become more widely used to detect FDIAs in real-time [124]. These techniques consider the grid's operational state as a dynamic process, updating system states and measurements at frequent intervals. The ability to continuously track and update states allows DSE to detect evolving FDIA attacks that span longer durations [125,126].
4.3. Hybrid Detection Methods: Combining Model-Based and Data-Driven Approaches
- 1)
- Model-Based and Data-Driven Integration: One promising approach is the integration of state estimation (model-based) with machine learning algorithms (data-driven). For example, residual analysis, commonly used in state estimation, can be combined with machine learning classifiers such as Support Vector Machines (SVMs) or Artificial Neural Networks (ANNs) to improve detection accuracy. In this setup, the state estimation algorithm identifies possible discrepancies, while the machine learning model is used to classify whether those discrepancies are caused by FDIAs or legitimate operational deviations [131].
- 2)
- Ensemble Hybrid Approaches: In some cases, ensemble learning techniques are applied in a hybrid manner, where multiple state estimation models and machine learning classifiers are combined to create a more robust detection system [133,134]. This approach uses ensemble learning to combine the outputs of different models, each of which may be suited to detecting specific types of FDIA, thereby enhancing the overall system's ability to detect a wider variety of attack strategies [135].
4.4. Case Studies and Real-World Applications
- 1)
- Case Study: FDIA Detection in a Smart Grid: In a recent study, researchers deployed an ensemble machine learning model combined with state estimation techniques to detect FDIAs in a smart grid testbed. The system was designed to handle data from both traditional grid components (e.g., transformers and substations) and emerging technologies such as solar panels and electric vehicle charging stations. The ensemble model was able to accurately identify false data injected into the grid by comparing expected measurements with those reported by sensors in real-time [140].
- 2)
- Case Study: Hybrid Detection in an Urban Distribution Network: Another case study focused on the integration of hybrid detection systems in an urban distribution network. By combining residual-based detection with machine learning algorithms, the system demonstrated a significant improvement in detecting small, targeted attacks that traditional methods failed to identify. This hybrid system was able to identify FDIA events in under 5 seconds, enabling quick corrective actions that prevented grid instability [141].
- 3)
- Real-World Application: Ukraine Power Grid Attack: The 2015 Ukraine power grid attack provided an opportunity to test the effectiveness of FDIA detection and response strategies in a real-world scenario. Researchers used data from the attack to develop detection methods that could have identified the compromised state estimation systems before widespread power outages occurred. The use of real-time state estimation combined with machine learning algorithms could have significantly reduced the time it took to respond to the attack and isolated the damage to a smaller portion of the grid [142].
5. FDIA Evolution and Impact
5.1. Temporal and Spatial Evolution of FDIAs
- 1)
- Temporal Evolution: Initially, FDIAs were relatively simple and focused on injecting false data into the system to cause short-term disruptions or mislead operators. These attacks were typically reactive, designed to exploit weaknesses in data integrity by introducing false readings from sensors. As detection methods improved, attackers adapted their tactics to evolve into more advanced, long-term attacks [144].
- 2)
- Spatial Evolution: The spatial evolution of FDIAs refers to how attacks spread across the power grid, potentially affecting multiple components in different areas. Initially, attacks would focus on a limited set of measurements or devices, such as transformers or transmission lines. However, as Power CPS have become more interconnected, attackers have shifted to more distributed strategies, injecting false data into various regions of the grid simultaneously [147].
5.2. Influence of Cyber and Physical Components on Attack Outcomes
- 1)
- Cyber Components: The cyber components of Power CPS, such as communication networks, control centers, and SCADA systems, are crucial for the operation and monitoring of the grid. FDIAs can target these cyber components by disrupting data transmission or manipulating control signals. For example, an attacker might gain access to the control systems, modify state estimation data, or inject false measurements that mislead operators into making incorrect decisions, such as shutting down power plants or rerouting power flows. These attacks can introduce significant errors into the system's operational parameters, leading to performance degradation or catastrophic failures if left unaddressed [151].
- 2)
- Physical Components: The physical components of the power grid, such as power generators, transformers, circuit breakers, and distribution lines, are directly impacted by the control decisions made based on manipulated data. Once attackers compromise the cyber components and manipulate state estimations, these erroneous signals can result in incorrect control actions, such as triggering the opening or closing of circuit breakers, adjusting generation schedules, or shifting loads. These misjudgments can lead to overloading, overheating, or even physical damage to critical equipment [153].
5.3. Impact on System Reliability, Security, and Economic Stability
- 1)
- System Reliability: The reliability of a power grid is highly dependent on accurate data and correct decision-making by grid operators. FDIAs undermine this by introducing false data that leads to faulty decisions, such as improper power flow control or failure to recognize faults. These incorrect decisions can lead to outages, equipment damage, and reduced system resilience [156,157]. In the worst cases, FDIAs can cause system-wide blackouts that take significant time and resources to restore [158].
- 2)
- Security: The safety implications of FDIAs in power systems cannot be overstated. False data injected into the system can trigger incorrect control actions, such as misoperation of circuit breakers or incorrect load shedding, which can overload critical equipment or lead to unsafe operating conditions [161,162]. For example, failure to isolate a fault or excessive power fluctuations can result in dangerous conditions such as fires, electrical shocks, or explosions. In power plants or substations, these issues can have catastrophic consequences, not only for grid operators but also for surrounding communities.
- 3)
- Economic consequences: FDIAs can have significant economic impact for utilities, consumers, and industries. The immediate costs of responding to an FDIA, including identifying the attack, isolating compromised components, and recovering from grid instability, can be substantial. Additionally, long-term disruptions to the grid, such as prolonged outages or system inefficiencies, can result in lost productivity, increased operating costs, and decreased confidence in the stability of the energy supply [164].
6. Mitigation Strategies for FDIAs
6.1. Data Reconstruction Approaches: State-Aware vs. Action-Control Methods
- 1)
- State-Aware Data Reconstruction: State-aware reconstruction focuses on estimating the grid’s state after an FDIA is detected by using available data from unaffected sensors and components. This method relies on the system model, where the state of the grid (such as voltage levels, power flow, and generation schedules) is reconstructed by combining available measurements and the known grid topology. The system uses state estimation algorithms, such as Kalman filtering or Extended Kalman Filters (EKF), to generate the most likely true state of the grid based on the available measurements [171].
- 2)
- Action-Control Data Reconstruction: Action-control reconstruction, on the other hand, focuses on restoring the control actions based on the corrupted state information. Once an FDIA is detected, the attack is isolated, and the system's control actions—such as generator dispatch, load shedding, or power flow adjustment—are corrected. This method does not just estimate the system's state but also corrects the operational decisions made based on the manipulated data [173].
6.2. Attack Localization and Minimizing Damage
- 1)
- Localization Techniques: Various localization algorithms are employed to trace the origin of a malicious attack within a power grid. These algorithms typically use residual analysis, graph-based methods, and fault detection techniques to pinpoint discrepancies between expected and actual system states. The grid’s topology is modeled as a graph, with nodes representing the grid’s components (generators, transformers, transmission lines, etc.) and edges representing the connections between them [178]. Anomalies detected in the system can be traced back to specific components by analyzing the residuals or errors introduced by the FDIA [179].
- 2)
- Minimizing Damage: Once the affected components are identified, operators can take localized corrective actions to prevent the attack from spreading across the grid. For example, operators can isolate the compromised parts of the grid, reroute power, or adjust load shedding strategies to reduce the impact on grid stability. By containing the attack to a specific region, damage to other parts of the system can be minimized, preserving the overall functionality of the grid [182].
6.3. Developing Robust Countermeasures for Power CPS
- 1)
- Data Validation and Integrity Checks: One of the primary countermeasures for FDIAs is the use of data validation techniques. By constantly validating data from sensors and control systems, any discrepancies between expected and received data can be quickly flagged as potential FDIAs. Redundant data sources, such as backup sensors or data from neighboring systems, can be used to cross-check the integrity of the data and detect any inconsistencies [187]. Additionally, secure communication protocols, such as encryption and authentication, can prevent attackers from injecting false data into the system in the first place.
- 2)
- Multi-Layered Defense Systems: Another effective countermeasure is the use of multi-layered defense systems. These systems combine various techniques at different levels of the power grid, including physical security, cybersecurity, and system-level monitoring. For instance, at the cyber level, intrusion detection systems (IDS) can monitor network traffic for signs of abnormal activity, while at the physical level, power flow monitoring and automated control systems can be used to detect and isolate faults caused by false data. By applying defense mechanisms at multiple layers, power CPS can better withstand and respond to FDIAs [188].
- 3)
- Resilience and Recovery: Countermeasures should also include resilience strategies that allow the system to recover quickly from an attack. This can involve the use of automated recovery protocols that restore grid operations after an FDIA has been detected and mitigated. These protocols can automatically reconfigure the grid, reroute power, and restore normal operations without human intervention, reducing recovery times and minimizing the economic impact of an attack [189].
6.4. Advancements in Real-Time Decision Support Systems
- 1)
- Real-Time Monitoring and Control: Real-time monitoring and control systems are designed to provide continuous, up-to-date information about the grid’s state. These systems integrate data from various sensors, control devices, and communication networks, allowing operators to monitor system performance and detect any anomalies that may indicate an FDIA. By providing a comprehensive view of the grid’s operations, these systems enable operators to make quicker, more accurate decisions during an attack [191].
- 2)
- Automated Response Systems: In addition to providing real-time data, automated decision-making capabilities are increasingly being integrated into decision support systems. These systems use machine learning algorithms to analyze data and make real-time decisions about how to respond to FDIAs. For example, if an attack is detected, the system can automatically isolate the compromised areas, adjust power flows, and trigger corrective actions without operator intervention, reducing response time and preventing further damage to the grid [192].
- 3)
- Predictive Analytics for Preemptive Action: Predictive analytics is another key feature of modern decision support systems. By analyzing historical data and learning from past attacks, predictive models can forecast potential threats and recommend preemptive actions to mitigate the risk of FDIAs. For instance, if a particular area of the grid is identified as vulnerable to attacks, the system can suggest additional security measures or deploy countermeasures to strengthen that area before an attack occurs [193].
7. Integration of Cyber and Physical Security in Power CPS
7.1. Unified Defense Mechanisms: Cyber and Physical Security Integration
- 1)
- Cyber-Physical Security Frameworks: A unified defense strategy integrates cybersecurity and physical security measures, ensuring that both digital and physical assets are protected in a coordinated manner. This framework takes into account the interactions between cyber systems (such as SCADA systems, communication networks, and data storage) and physical systems (such as sensors, generators, and grid controllers). By employing a holistic approach to security, a unified defense mechanism reduces the risk of attack vectors that can exploit vulnerabilities in both domains [196].
- 2)
- Collaborative Defense Systems: Collaborative defense systems are gaining traction as a way to integrate cyber and physical security. These systems involve close collaboration between IT and operational technology (OT) teams to ensure that security measures are synchronized across all levels. By sharing threat intelligence, incident reports, and recovery protocols, these teams can act quickly and efficiently when a threat emerges, preventing it from escalating across the grid. Furthermore, collaboration ensures that cybersecurity protocols do not interfere with the safe and reliable operation of the physical infrastructure, and vice versa [197].
7.2. Role of Communication Protocols and Advanced Architectures
- 1)
- Secure Communication Protocols: One of the primary methods to protect communication in Power CPS is the adoption of secure communication protocols. These protocols help safeguard the integrity, confidentiality, and authenticity of data transmitted between grid components, reducing the risk of Man-in-the-Middle (MitM) attacks, data manipulation, and unauthorized access. Transport Layer Security (TLS) and Secure Socket Layer (SSL) encryption protocols, as well as Virtual Private Networks (VPNs) and Public Key Infrastructure (PKI), are commonly used to secure data exchanges in power CPS [199].
- 2)
- Advanced Architectures for Grid Security: The architecture of the communication network plays a crucial role in securing power CPS. Traditional centralized architectures, where data is routed through a central control unit, are vulnerable to single points of failure, which can be exploited by attackers. To mitigate this, distributed architectures such as Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are being explored for power CPS. These technologies allow for more flexible and dynamic management of the communication network, enabling quicker detection of attacks and more resilient data routing [201].
7.3. Future Trends: Leveraging AI, Blockchain, and IoT for Enhanced Security
- 1)
- AI: Artificial intelligence, and particularly ML and deep learning (DL), can significantly enhance the detection and mitigation of FDIAs by automating the analysis of large volumes of data. Machine learning models can be trained to identify subtle patterns of malicious activity in real-time, allowing for quicker detection and response to attacks. Furthermore, reinforcement learning (RL) and adversarial AI can be used to simulate potential attack scenarios, test defense systems, and continuously improve grid resilience [203].
- 2)
- Blockchain for Secure Data Sharing: Blockchain technology, known for its decentralized and immutable nature, offers a promising solution for securing data exchanges in Power CPS. By using blockchain to verify the authenticity and integrity of data exchanged between different grid components, attackers would be unable to alter or manipulate the data without detection. Smart contracts, which are self-executing contracts with the terms directly written into code, can also be used to automate decision-making processes in grid operations, ensuring that predefined security protocols are followed in response to detected anomalies or attacks [205].
- 3)
- IoT for Enhanced Monitoring and Control: IoT devices, such as smart meters, PMUs, and smart sensors, are increasingly being integrated into power grids to collect real-time data and improve grid management. While IoT devices offer numerous benefits in terms of data collection and operational efficiency, they also introduce new security risks, as these devices can be vulnerable to cyber-attacks.
8. Future Directions in FDIA Research
8.1. Identifying Research Gaps: Attack Modeling, Enhanced Detection, and Efficient Defenses
- 1)
- Advanced Attack Modeling: One of the critical gaps in FDIA research is the need for advanced attack models that capture the complexities and dynamics of real-world cyber-attacks. Current models tend to simplify the attack scenarios or focus on a limited number of attack types, often overlooking the multi-stage, adaptive nature of modern FDIAs. Future research should focus on developing dynamic, multi-phase attack models that reflect the interactions between cyber and physical components, as well as the evolving tactics of attackers [207].
- 2)
- Enhanced Detection Techniques: Existing detection systems often struggle to balance accuracy and real-time processing in large-scale power CPS. Research should focus on improving detection accuracy while minimizing the computational cost of detection algorithms. Deep learning and reinforcement learning can play a critical role in this, as these techniques can adapt to new attack patterns and improve detection in real-time environments [208,209,210]. However, these models also require large amounts of data for training, which can be challenging to obtain in power grids.
- 3)
- Efficient Defense Mechanisms: While several defense techniques have been proposed, there is a need for more efficient defense mechanisms that can quickly detect and mitigate FDIAs without compromising grid performance. Research into multi-layered defense systems, which integrate detection, recovery, and preventive measures, will be key to achieving resilience in the face of complex and evolving attacks. Furthermore, developing adaptive defense mechanisms that can dynamically respond to new threats in real time will be essential as the grid continues to evolve [211].
8.2. Federated Learning and Decentralized Approaches
- 1)
- Federated Learning: Federated learning (FL) allows multiple devices or systems to collaborate on training a machine learning model without sharing their local data [212]. This decentralized approach can be particularly useful for Power CPS, where data privacy and security are paramount. In federated learning, each device or grid component computes local models based on its data, and only model updates are shared with a central server. This method ensures that sensitive data, such as consumer usage patterns or generation profiles, remains local, reducing the risk of data breaches or privacy violations [213].
- 2)
- Decentralized Approaches: Decentralization is increasingly seen as a way to improve the resilience and robustness of Power CPS. In a decentralized system, the grid’s components can operate autonomously, making local decisions based on localized data, without needing to communicate with a central controller. This reduces the risk of a single point of failure and ensures that localized attacks cannot easily propagate throughout the entire system.
8.3. Emerging Technologies: Quantum Computing and Beyond
- 1)
- Quantum Computing: Quantum computing has the potential to revolutionize FDIA detection and mitigation by providing computational power far beyond that of classical computers. Quantum algorithms, such as Shor's algorithm for factoring and Grover's algorithm for searching, could enable faster and more efficient detection of malicious patterns in large datasets. Additionally, quantum-enhanced cryptographic protocols can provide a higher level of security for communications between grid components, making it harder for attackers to manipulate data or gain unauthorized access [216].
- 2)
- Blockchain for Security and Transparency: Blockchain technology can play a key role in securing communication within Power CPS. By providing an immutable and transparent ledger for data transactions, blockchain can help ensure that data exchanges between components are genuine and unaltered. Smart contracts, which automatically execute predefined actions based on conditions met, can also be used to enforce security policies across the grid. For example, smart contracts could automatically initiate recovery procedures in the event of an FDIA, improving response times and minimizing damage.
- 3)
- IoT: The integration of IoT devices in Power CPS—such as smart meters, sensors, and control devices—has greatly enhanced the ability to monitor and control grid operations in real time. However, IoT also introduces new vulnerabilities, as these devices can be targeted by cyber-attacks to manipulate data or disrupt operations. Research into IoT security frameworks will be essential to protect these devices and ensure that they are secure and resilient to FDIAs.
8.4. Policy and Regulatory Frameworks for Securing Power CPS
- 1)
- Cybersecurity Standards and Regulations: National and international regulatory bodies, such as the National Institute of Standards and Technology (NIST) and the International Electrotechnical Commission (IEC), have developed cybersecurity frameworks for critical infrastructure, including power systems. These frameworks outline best practices for protecting systems against cyber threats, including FDIAs. Future regulatory frameworks should evolve to address the growing complexity of modern Power CPS and the integration of new technologies such as IoT and AI [217].
- 2)
- Incentives for Cybersecurity Research: Governments should encourage research funding and public-private partnerships to drive innovations in cybersecurity for Power CPS. By supporting academic and industry-led research on new detection techniques, defense strategies, and resilience frameworks, policymakers can ensure that the security measures implemented are up-to-date and effective in countering the latest threats [218].
- 3)
- International Collaboration: Since Power CPS often span multiple regions and countries, international collaboration will be essential in securing global energy grids. Shared standards, threat intelligence exchange, and coordinated incident response efforts can help mitigate the risks posed by FDIAs that target interconnected systems. Establishing global cybersecurity policies for Power CPS will enhance overall resilience and ensure a more secure energy future.
9. Conclusions
References
- Li, B.; Lu, R.; Xiao, G. Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Springer, 2020.
- Seshasai, B.; Koley, E.; Jena, P.K.; et al. Design of Real-Time False Data Injection Attack on Electricity Market With Limited Sensor Accessibility. IEEE Systems Journal 2024. [Google Scholar] [CrossRef]
- Yang, H.; Zhang, W.; Liang, Z.; et al. Parameter-Free False Data Injection Attack Against AC State Estimation: A Canonical Polyadic Decomposition Based Approach. IEEE Transactions on Power Systems 2024. [Google Scholar] [CrossRef]
- Qu, Z.; Zhao, T.; Zhang, Y.; et al. Determination Method of Network Risk Propagation Threshold in Power CPS Based on Percolation Theory. Automation of Electric Power Systems 2020, 44, 16–23. [Google Scholar]
- Wang, L.; Qu, Z.; Li, Y.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal-Topological Correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Qin, B.; Liu, D. Research Progress and Prospects on Analysis and Control of Power Grid Cyber-Physical Systems. Proceedings of the CSEE 2020, 40, 5816–5826. [Google Scholar]
- Li, Y.; Han, M.; Yang, Z.; et al. Coordinating Flexible Demand Response and Renewable Uncertainties for Scheduling of Community Integrated Energy Systems with an Electric Vehicle Charging Station: A Bi-Level Approach. IEEE Transactions on Sustainable Energy 2021, 12, 2321–2331. [Google Scholar] [CrossRef]
- Chang, Z.; Wu, J.; Liang, H.; et al. A review of Power System False data attack Detection Technology based on Big data. Information 2024, 15, 439. [Google Scholar] [CrossRef]
- Shang, Y.; et al. Explainable spatiotemporal multi-task learning for electric vehicle charging demand prediction. Applied Energy 2025, 384, 125460. [Google Scholar] [CrossRef]
- Paul, B.; Sarker, A.; Abhi, S.H.; et al. Potential smart grid vulnerabilities to cyber attacks: Current threats and existing mitigation strategies. Heliyon 2024, 10, e37980. [Google Scholar] [CrossRef]
- Cao, J.; Wang, Q.; Qu, Z.; et al. Method for identifying false data injection attacks in power grid based on improved CNN-LSTM. Electrical Engineering 2025, 1–26. [Google Scholar] [CrossRef]
- Li, Y.; Wang, C.; Li, G.; et al. Improving operational flexibility of integrated energy system with uncertain renewable generations considering thermal inertia of buildings. Energy Conversion and Management 2020, 207, 112526. [Google Scholar] [CrossRef]
- Pannerselvam, K.; Rajiakodi, S. Towards Smarter, Interconnected Futures: The Crucial Role of Data in Cyber-Physical Systems. In Intelligent Cyber-Physical Systems. In Intelligent Cyber-Physical Systems for Healthcare Solutions; Springer: Singapore, 2024; pp. 181–194. [Google Scholar]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation. Mathematical Problems in Engineering 2019, 2019, 2817586. [Google Scholar] [CrossRef]
- Li, Y.; Cao, J.; Xu, Y.; et al. Deep learning based on Transformer architecture for power system short-term voltage stability assessment with class imbalance. Renewable and Sustainable Energy Reviews 2024, 189, 113913. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Quantitative Assessment of Survivability of Power CPS Considering Load Optimization and Reconfiguration. Automation of Electric Power Systems 2019, 43, 15–24. [Google Scholar]
- Bo, X.; Chen, X.; Li, H.; et al. Modeling Method for the Coupling Relations of Microgrid Cyber-Physical Systems Driven by Hybrid Spatiotemporal Events. IEEE Access 2021, 9, 19619–19631. [Google Scholar] [CrossRef]
- Das, S.; Wang, Z. Enhancing Microgrid Resilience to False Data Injection. In Proceedings of the 2024 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). IEEE 2024, 147-152.
- Wang, L.; Xu, P.; Qu, Z.; et al. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. Frontiers in Energy Research 2021, 9, 666130. [Google Scholar] [CrossRef]
- Li, T.; Zhang, L.; Wang, W. Enhancing Security in Power CPS: Hybrid Solutions for Attack Detection. Journal of Cyber Physical Systems 2023, 18, 1221–1233. [Google Scholar]
- Qu, Z.; Xie, Q.; Liu, Y.; et al. Power Cyber-Physical System Risk Area Prediction Using Dependent Markov Chain and Improved Grey Wolf Optimization. IEEE Access 2020, 8, 82844–82854. [Google Scholar] [CrossRef]
- Wang, T.; Sun, C.; Gu, X.; et al. Modeling of Power Communication Coupled Networks and Their Vulnerability Analysis. Proceedings of the CSEE 2018, 38, 3556–3567. [Google Scholar]
- Zhao, J.; An, K.; Wang, X. Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network. Journal of Cyber Security and Mobility, 2024; 1331–1356. [Google Scholar]
- Chattopadhyay, A.; Prakash, A.; Shafique, M. Secure Cyber-Physical Systems: Current trends, tools and open research problems. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE 2017, 1104-1109.
- Bo, X.; Qu, Z.; Liu, Y.; et al. Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective. Energy Reports 2022, 8, 11235–11248. [Google Scholar] [CrossRef]
- Jiang, Q.; Li, B.; Liu, T.; et al. Study of cyber attack’s impact on LCC-HVDC system with false data injection. IEEE Transactions on Smart Grid 2023, 14, 3220–3231. [Google Scholar] [CrossRef]
- Liu, Y.; Wen, M.; Wen, H.; et al. False Data Injection Attacks in Power Distribution Systems Considering the Characteristics of Distributed Photovoltaic. IEEE Transactions on Industrial Informatics 2024. [Google Scholar] [CrossRef]
- Guo, Q.; Xin, S.; Wang, J.; et al. Comprehensive Security Assessment of Information-Energy Systems from the Ukraine Blackout Incident. Automation of Electric Power Systems 2016, 40, 145–147. [Google Scholar]
- Parizad, A.; Hatziadoniu, C. False data detection in power system under state variables' cyber attacks using information theory. In Proceedings of the 2021 IEEE Power and Energy Conference at Illinois (PECI). IEEE 2021; 1-8. [Google Scholar]
- Kumar, R.; et al. Schemes and Security Attacks on the Integrity of Cyber-Physical Systems in Energy Systems. Cyber Physical Energy Systems 2024, 415–444. [Google Scholar]
- Hua, D.; Huang, H.; Yan, P.; et al. A Multi-Stage NSGA-III Optimization Model for False Data Injection Attacks in Integrated Power-Hydrogen Cyber-Physical Systems. IET Renewable Power Generation 2025, 19, e70022. [Google Scholar] [CrossRef]
- Liu, Y.; Ning, P.; Reiter, M. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Transactions on Information and System Security (TISSEC) 2011, 14, 1–16. [Google Scholar] [CrossRef]
- Qu, Z.; Zhang, Y.; Qu, N.; et al. Method for Quantitative Estimation of the Risk Propagation Threshold in Electric Power CPS Based on Seepage Probability. IEEE Access 2018, 6, 68813–68823. [Google Scholar] [CrossRef]
- Jafari, M.; Rahman, M.A.; Paudyal, S. Optimal false data injection attack against load-frequency control in power systems. IEEE Transactions on Information Forensics and Security 2023, 18, 5200–5212. [Google Scholar] [CrossRef]
- Padhan, S.; Turuk, A.K. Design of false data injection attacks and their detection and mitigation in cyber-physical systems. In Proceedings of the 27th International Conference on Advanced Computing and Communications (ADCOM 2022). IET 2023, 2023, 41–45. [Google Scholar] [CrossRef]
- Li, Y.; Li, Z.; Chen, L. Dynamic State Estimation of Generators Under Cyber Attacks. IEEE Access 2019, 7, 125252–125267. [Google Scholar] [CrossRef]
- Zhou, T.; Xiahou, K.; Zhang, L.L.; et al. Real-time detection of cyber-physical false data injection attacks on power systems. IEEE Transactions on Industrial Informatics 2020, 17, 6810–6819. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, S.; Li, Y. AI-enhanced resilience in power systems: Adversarial deep learning for robust short-term voltage stability assessment under cyber-attacks. Chaos, Solitons & Fractals 2025, 196, 116406. [Google Scholar]
- Wu, Z.; Zhang, W. Microgrid Attack Detection Based on ARO-MKELM. Journal of Metrology 2024, 45, 1444–1452. [Google Scholar]
- Weng, P.; Chen, B.; Yu, L. Fusion Estimation of False Data Injection Attack Signals. Acta Automatica Sinica 2021, 47, 2292–2300. [Google Scholar]
- Zhang, S.; et al. A critical review of data-driven transient stability assessment of power systems: Principles, prospects and challenges. Energies 2021, 14, 7238. [Google Scholar] [CrossRef]
- Krawczyk, B.; Bellinger, C.; Corizzo, B.; et al. Undersampling with Support Vectors for Multi-Class Imbalanced Data Classification. In Proceedings of the 2021 International Joint Conference on Neural Networks (IJCNN), Shenzhen, China, 18-22 July 2021; pp. 1–7. [Google Scholar]
- Feng, Y.; Jia, W. Research Status and Prospect of Smart Microgrids Under Network Attack Models. Smart Grid 2022, 12, 119–125. [Google Scholar] [CrossRef]
- Li, Y.; Li, Z.; Chen, L.; et al. A false data injection attack method for generator dynamic state estimation. Transactions of China Electrotechnical Society 2019, 34, 3651–3660. [Google Scholar]
- Luo, X.; He, J.; Wang, X.; et al. Topology Optimization for Resilient Defense Strategies Against False Data Injection Attacks in Smart Grids. Acta Automatica Sinica 2023, 49, 1326–1338. [Google Scholar]
- Dong, Y.; et al. Identification of False Data Injection Attacks in Power Grid Based on Oversampling and Cascade Machine Learning. Power System Automation 2023, 47, 179–188. [Google Scholar]
- Zeng, R.; Li, Y.; Cao, Y.; et al. Network Attack Detection and Protection Control Technology for Smart Distribution and Consumption Systems: Development and Challenges. Journal of Electrical Engineering 2023, 18, 125–141. [Google Scholar]
- Kurt, M.; Yılmaz, Y.; Wang, X.; et al. Distributed Quickest Detection of Cyber-Attacks in Smart Grid. IEEE Transactions on Information Forensics and Security 2018, 13, 2015–2030. [Google Scholar] [CrossRef]
- Zhu, J.; Huang, L.; Chen, Y. Post-Attack Security Control Strategy for Power Systems Based on Agent Gradient Deep Reinforcement Learning. Power Grid Technology 2024, 48, 4041–4049. [Google Scholar]
- Li, Y.; Li, J.; Chen, L. Dynamic state estimation of synchronous machines based on robust cubature Kalman filter under complex measurement noise conditions. Transactions of china electrotechnical society 2019, 34, 3651–3660. [Google Scholar]
- Le, J.; Lang, H.; Tan, T.; et al. A Review of Information Security Issues in Distributed Economic Dispatch of New Distribution Systems. Power System Automation 2024, 48, 177–191. [Google Scholar]
- Fan, Q.; Liu, D.; Wang, Y.; et al. Key Technologies and Progress in the Morphological Evolution of Power Cyber-Physical Systems. Proceedings of the CSEE 2023, 44, 8341–8352. [Google Scholar]
- Gong, L.; Wang, X.; Tian, M.; et al. Concept and Advancement of Resilience in Power Cyber-Physical Systems. Power System Protection and Control 2023, 51, 169–187. [Google Scholar]
- Liu, K.; Ma, S.; Ma, O.; et al. Security Control of Cyber-Physical Systems Based on Machine Learning. Acta Automatica Sinica 2021, 47, 1273–1283. [Google Scholar]
- Xia, Y.; Wang, Y.; Zhou, L.; et al. Detection Method for False Data Injection Attacks Based on Improved Generative Adversarial Networks. Electric Power Construction 2022, 43, 58–65. [Google Scholar]
- Wang, J.; Li, Y.; Xu, T. Modeling of False Data Injection Attacks and Rapid Screening of Vulnerable Lines under Attacks. Electric Power Construction 2022, 43, 104–112. [Google Scholar]
- Li, Y.; Zhang, S.; et al. PMU measurements-based short-term voltage stability assessment of power systems via deep transfer learning. IEEE Transactions on Instrumentation and Measurement 2023, 72, 1–11. [Google Scholar] [CrossRef]
- Shu, H.; Yang, Y.; Zhao, H.; et al. Detection of False Data Injection Attacks in Power Grids Based on Adaptive Weighted Hybrid Prediction. Power Grid Technology 2024, 49, 1246–1256. [Google Scholar]
- Yu, P.; Yang, D.; Alattas, K.A.; et al. An Observer-based Event Triggered Mechanism for the Detection and Mitigation of FDI Attacks in Deep Brain Stimulation Systems. IEEE Access 2025. [Google Scholar] [CrossRef]
- Wang, S.; Zhao, Y.; You, D.; et al. A Survey on Cyber-Physical Systems Attacks in the Framework of Discrete Event Systems. Control and Decision 2022, 37, 1934–1944. [Google Scholar]
- Yin, H.; Liu, D.; Chen, G.; et al. Collaborative Network Attack Model and Cross-Space Fault Propagation Mechanism for Virtual Power Plants. Power System Automation 2023, 47, 34–43. [Google Scholar]
- Luo, X.; Pan, X.; Wang, X.; et al. False Data Injection Attack Detection in Smart Grids Based on Adaptive Kalman Filtering. Acta Automatica Sinica 2022, 48, 2960–2971. [Google Scholar]
- Zhang, Y.; Cai, Z.; Li, X.; et al. Analytical Modeling of traffic Flow in the Substation Communication Network. IEEE Transactions on Power Delivery 2015, 30, 2119–2127. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Qi, J.; et al. Robust Cubature Kalman Filter for Dynamic State Estimation of Synchronous Machines Under Unknown Measurement Noise Statistics. IEEE Access 2019, 7, 29139–29148. [Google Scholar] [CrossRef]
- Zhang, L.; Xu, Y.; Wu, X.; et al. Distributed Resilient Control for AC Microgrids to Defend Against False Data Injection Attacks. Power System Automation 2023, 47, 44–52. [Google Scholar]
- Wang, W.; Ren, Z.; Sun, Y.; et al. Transmission Grid False Data Detection Method Based on Wavelet-Sparse Autoencoders. Electric Power New Technologies 2022, 41, 51–59. [Google Scholar]
- Qu, Z.; Bo, X.; Yu, T.; et al. Active and Passive Hybrid Detection Method for Power CPS False Data Injection Attacks with Improved AKF and GRU-CNN. IET Renewable Power Generation 2022, 16, 1490–1508. [Google Scholar] [CrossRef]
- Pang, Q.; Han, S.; Zhou, T.; et al. FDIA Detection in Power Cyber-Physical Systems Based on ASRUKF and IMC Algorithms. Smart Power 2024, 52, 111–118. [Google Scholar]
- Shu, H.; Yang, Y.; Zhao, H.; et al. Detection of False Data Injection Attacks in Power Grids Based on Adaptive Weighted Hybrid Prediction. Power Grid Technology 2024, 49, 1246–1256. [Google Scholar]
- Yin, H.; Liu, D.; Chen, G.; et al. Collaborative Network Attack Model and Cross-Space Fault Propagation Mechanism for Virtual Power Plants. Power System Automation 2023, 47, 34–43. [Google Scholar]
- Luo, X.; Pan, X.; Wang, X.; et al. False Data Injection Attack Detection in Smart Grids Based on Adaptive Kalman Filtering. Acta Automatica Sinica 2022, 48, 2960–2971. [Google Scholar]
- Li, Y.; Zhang, S.; Li, Y.; et al. PMU Measurements Based Short-Term Voltage Stability Assessment of Power Systems via Deep Transfer Learning. IEEE Transactions on Instrumentation and Measurement 2023, 72, 2526111. [Google Scholar] [CrossRef]
- Zhang, L.; Xu, Y.; Wu, X.; et al. Distributed Resilient Control for AC Microgrids to Defend Against False Data Injection Attacks. Power System Automation 2023, 47, 44–52. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proceedings of the IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Wang, W.; Ren, Z.; Sun, Y.; et al. Transmission Grid False Data Detection Method Based on Wavelet-Sparse Autoencoders. Electric Power New Technologies 2022, 41, 51–59. [Google Scholar]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM-GAB algorithm. Energy Reports 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Yang, F.; Wang, J.; Pan, Q.; et al. Resilient Event-Triggered Control for Cyber-Physical Integrated Power Systems Under Network Attacks. Acta Automatica Sinica 2019, 45, 110–119. [Google Scholar]
- Chen, L.; Liu, D. Detection Methods for False Data Injection Attacks in Interactive Demand Response. Power System Automation 2021, 45, 15–23. [Google Scholar]
- Kou, L.; Wu, J.; Zhang, F.; et al. Image encryption for Offshore wind power based on 2D-LCLM and Zhou Yi Eight Trigrams. International Journal of Bio-Inspired Computation 2023, 22, 53–64. [Google Scholar] [CrossRef]
- Peng, S.; Sun, M.; Zhang, Z.; et al. Applications of Machine Learning in Cybersecurity for Power Cyber-Physical Systems. Power System Automation 2022, 46, 200–215. [Google Scholar]
- Wang, Q.; Tai, W.; Tang, Y.; et al. A Review of False Data Injection Attacks for Power Cyber-Physical Systems. Acta Automatica Sinica 2019, 45, 72–83. [Google Scholar] [CrossRef]
- Xia, Y.; Wang, Y.; Zhou, L.; et al. Detection Method for False Data Injection Attacks Based on Improved Generative Adversarial Networks. Electric Power Construction 2022, 43, 58–65. [Google Scholar]
- Gallardo, C.; Burgos-Mellado, C.; Muñoz-Carpintero, D.; et al. Reinforcement learning-based false data injection attacks detector for modular multilevel converters. IEEE Transactions on Industrial Electronics 2023, 71, 7927–7937. [Google Scholar] [CrossRef]
- Yang, F.; Wang, J.; Pan, Q.; et al. Resilient Event-Triggered Control for Cyber-Physical Integrated Power Systems Under Network Attacks. Acta Automatica Sinica 2019, 45, 110–119. [Google Scholar]
- Chen, L.; Li, Y.; Huang, M.; et al. Robust Dynamic State Estimator of Integrated Energy Systems Based on Natural Gas Partial Differential Equations. IEEE Transactions on Industry Applications 2022, 58, 3303–3312. [Google Scholar] [CrossRef]
- Wang, D.; Huang, L.; Liu, J.; et al. Defense Strategy for Power Cyber-Physical Systems Against Load False Data Injection Attacks. Power System Protection and Control 2019, 47, 28–34. [Google Scholar]
- Lu, J.; Yang, C.; Du, R.; et al. False Data Injection Attacks in Power CPS. Intelligent Computer and Applications 2022, 12, 121–126. [Google Scholar]
- Yang, Y.; Guo, L.; Wang, H.; et al. Fast Defense Strategy Against False Data Injection Attacks in DC Microgrids Based on Data-Driven Approaches. Electric Power Automation Equipment 2021, 41, 102–110. [Google Scholar]
- Guo, F.; Zheng, X.; Deng, C.; et al. Detection and System Recovery Methods for Unbounded False Data Injection Network Attacks in DC Microgrids. Power System Automation 2023, 47, 146–153. [Google Scholar]
- Yi, N.; Xu, J.; Chen, Y.; et al. Multi-Stage Low-Cost False Data Injection Attack Methods for Power CPS. Zhejiang Electric Power 2023, 42, 10–21. [Google Scholar]
- Yang, R.; et al. Resilience assessment and improvement for electric power transmission systems against typhoon disasters: A data-model hybrid driven approach. Energy Reports 2022, 8, 10923–10936. [Google Scholar] [CrossRef]
- Xia, Y.; Wang, Y.; Zhou, L.; et al. Detection Method for False Data Injection Attacks Based on Improved Generative Adversarial Networks. Electric Power Construction 2022, 43, 58–65. [Google Scholar]
- Chen, L.; Li, Y.; Cai, J.; et al. SCKF-LSTM-Based Trajectory Tracking for Electricity–Gas Integrated Energy System. IEEE Transactions on Industrial Informatics 2025. [Google Scholar] [CrossRef]
- Li, Y.; Wang, R.; Li, Y.; et al. Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach. Applied Energy 2023, 329, 120291. [Google Scholar] [CrossRef]
- Cui, Y.; Xu, Y.; et al. Deep reinforcement learning based optimal energy management of multi-energy microgrids with uncertainties. CSEE Journal of Power and Energy Systems 2024. [Google Scholar]
- Chen, F.; Shi, J.; Liu, H.; et al. Reliability Assessment of Generation-Transmission Systems Considering Load Redistribution Attacks and Vulnerable Line Defenses. Power System Automation 2022, 46, 65–72. [Google Scholar]
- Liang, G.; Weller, S.; Zhao, J.; et al. A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios. IEEE Transactions on Smart Grid 2019, 10, 1704–1712. [Google Scholar] [CrossRef]
- Luo, X.; He, J.; Wang, X.; et al. Topology Optimization for Resilient Defense Strategies Against False Data Injection Attacks in Smart Grids. Acta Automatica Sinica 2023, 49, 1326–1338. [Google Scholar]
- Yang, Q.; Yang, J.; Ma, X. Research on False Data Injection Attacks in Power Systems. Microelectronics & Computer 2011, 28, 175–179. [Google Scholar]
- Wei, L.; Zhang, Q. False Data Injection Attack Detection in Smart Grids Based on Improved UKF. Journal of System Simulation 2023, 35, 1508. [Google Scholar]
- Li, Y.; Yang, Z. Application of EOS-ELM with Binary Jaya-Based Feature Selection to Real-Time Transient Stability Assessment Using PMU Data. IEEE Access 2017, 5, 23092–23101. [Google Scholar] [CrossRef]
- Le, J.; Lang, H.; Tan, T.; et al. A Review of Information Security Issues in Distributed Economic Dispatch of New Distribution Systems. Power System Automation 2024, 48, 177–191. [Google Scholar]
- Huang, D.; Wang, Y.; Hu, A.; et al. False Data Injection Attack Detection Combining Unsupervised and Supervised Learning. Electric Power Engineering Technology 2024, 43, 134–141. [Google Scholar]
- Zhang, Y.; Li, S.; Gu, X.; et al. Resilience Assessment Method for Backbone Network Considering Malicious Physical Attacks and Secondary Faults. Electric Power Construction 2023, 44, 95–105. [Google Scholar]
- Chen, J.; Rao, J.; Li, W.; et al. Detection Method of False Data Injection Attacks on Power Grids Based on Vector Auto-Regression Model. Journal of Electric Power Science and Technology 2024, 39, 1–9. [Google Scholar]
- Chen, L.; Hui, X.; et al. Dynamic state estimation for integrated natural gas and electric power systems. In Proceedings of the 2021 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). IEEE 2021; 397-402. [Google Scholar]
- Wang, D.; Huang, L.; Liu, J.; et al. Defense Strategy for Power Cyber-Physical Systems Against Load False Data Injection Attacks. Power System Protection and Control 2019, 47, 28–34. [Google Scholar]
- Shi, Z.; et al. Short-term load forecasting based on LS-SVM optimized by bacterial colony chemotaxis algorithm. In Proceedings of the 2009 international conference on information and multimedia technology. IEEE 2009, 306–309. [Google Scholar]
- Fan, Q.; Liu, D.; Wang, Y.; et al. Key Technologies and Progress in the Morphological Evolution of Power Cyber-Physical Systems. Proceedings of the CSEE 2023, 44, 8341–8352. [Google Scholar]
- Sun, K.; Qiu, W.; Li, K.; et al. Network Attack Defense Control Strategy for Fast Frequency Response Systems. Chinese Journal of Electrical Engineering 2021, 41, 5476–5485. [Google Scholar]
- Chen, X.; Zhang, T.; Liu, X. False Data Injection Attack Detection and Resilience in Power Grids Using Deep Reinforcement Learning. Energy Reports 2024, 9, 11260–11274. [Google Scholar]
- Syrmakesis, A.D.; Alhelou, H.H.; Hatziargyriou, N.D. A novel cyberattack-resilient frequency control method for interconnected power systems using SMO-based attack estimation. IEEE Transactions on Power Systems 2023, 39, 5672–5686. [Google Scholar] [CrossRef]
- Zhang, M.; Li, J.; Li, Y.; et al. Deep learning for short-term voltage stability assessment of power systems. IEEE Access 2021, 9, 29711–29718. [Google Scholar] [CrossRef]
- Qu, Z.; Qu, N.; Zhou, Y.; et al. Extraction of Typical Operating Scenarios of New Power System Based on Deep Time Series Aggregation. CAAI Transactions on Intelligence Technology 2024, 1–17. [Google Scholar] [CrossRef]
- Chen, L.; Gu, S.; Wang, Y.; et al. Stacked Autoencoder Framework of False Data Injection Attack Detection in Smart Grid. Mathematical Problems in Engineering 2021, 2021, 2014345. [Google Scholar] [CrossRef]
- Zang, T.; Tong, X.; Li, C.; et al. Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks. Energies 2025, 18, 1479. [Google Scholar] [CrossRef]
- Li, Y.; Li, G.; Gu, X.; et al. Transient stability assessment of power systems based on ensemble OS-ELM. Transactions of China Electrotechnical Society 2015, 30, 412–418. [Google Scholar]
- Dehbozorgi, M.R.; Rastegar, M.; Arani, M.F.M. False Data Injection Attack Detection and Localization Framework in Power Distribution Systems Using a Novel Ensemble of CNNs and Explainable Artificial Intelligence. IEEE Transactions on Industry Applications 2025. [Google Scholar] [CrossRef]
- Fahmeeda, S.; Bhagyashree, B.K. Detection and prevention of false data injection attack in cyber physical power system. In Proceedings of the 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE 2021, 1-5.
- Zhang, P.; Xiong, Y.; Jian, J. Research on False Data Injection Attacks in Smart Grids Based on Multi-Objective Bi-Level Programming. Operations Research and Management 2023, 32, 22. [Google Scholar]
- Yuan, K.; Luo, P.; Wang, G.; et al. New Detection Method for Covert Data Attacks in Power Systems Based on Grey Relational Analysis. New Electrical Technology 2019, 38, 17–23. [Google Scholar]
- Yang, S.; Tan, B.; Guo, J. False Data Injection Attack Detection for New Energy Internet Based on Double Markov Chains. Electric Power Automation Equipment 2021, 41, 212–220. [Google Scholar]
- Dongmei, H.; Zhonghui, D.; Anduo, H.; et al. Low-Cost Adversarial Stealthy False Data Injection Attack and Detection Method. Power System Technology 2023, 47, 1531–1539. [Google Scholar]
- Wu, Y.; Ru, Y.; Liu, J.; et al. Detection of False Data Injection Attacks in Automatic Generation Control Systems Based on Set Member Filtering. Power System Automation 2022, 46, 33–41. [Google Scholar]
- Li, P.; Liu, Y.; Xin, H.; et al. Vulnerability Assessment of Distribution Network Cyber-Physical Systems Under Distributed Collaborative Control Mode. Automation of Electric Power Systems 2018, 42, 22–29. [Google Scholar]
- Li, R.; Liu, S.; Yan, L. CPS Network Attack Detection Method for New Energy Distribution Networks Based on FP-Growth Algorithm. Telecommunications Science 2024, 40, 103–113. [Google Scholar]
- Zhao, Z.; Shang, Y.; Qi, B.; et al. Research on defense strategies for power system frequency stability under false data injection attacks. Applied Energy 2024, 371, 123711. [Google Scholar] [CrossRef]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM–GAB algorithm. Energy Reports 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Zhu, H.; Xu, L.; Bao, Z.; et al. Secure control against multiplicative and additive false data injection attacks. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 92–100. [Google Scholar] [CrossRef]
- Xie, Y.; Yan, X.; Yan, Z.; et al. Optimization of False Data Injection Attack Strategy for AC-DC Hybrid Power Grids. Electric Power Engineering Technology 2023, 42, 15–24. [Google Scholar]
- Li, Y.; Zhang, M.; Chen, C. A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems. Applied Energy 2022, 308, 118347. [Google Scholar] [CrossRef]
- Feng, C.; Li, Y.; Xu, T. Security Evaluation Method for Distribution Network Cyber-Physical Systems Considering Risk Propagation and Expected Failure Analysis. Science & Technology and Engineering 2022, 22, 10116–10122. [Google Scholar]
- Arafah, M.; Phillips, I.; Adnane, A.; et al. Anomaly-based network intrusion detection using denoising autoencoder and Wasserstein GAN synthetic attacks. Applied Soft Computing 2025, 168, 112455. [Google Scholar] [CrossRef]
- Khalid, H.; Peng, J. Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction. IEEE Transactions on Smart Grid 2017, 8, 697–707. [Google Scholar] [CrossRef]
- Liu, X.; Chang, P.; Sun, Q. Detection of False Data Injection Attacks in Power Grids Based on XGBoost and Unscented Kalman Filter Adaptive Hybrid Prediction. Proceedings of the CSEE 2021, 41, 5462–5476. [Google Scholar]
- Suan, K. Research on False Data Injection Attack Problem in Power CPS State Estimation. Zhejiang University, 2018.
- Wang, T.; Sun, C.; Gu, X.; et al. Modeling of Power Communication Coupled Networks and Their Vulnerability Analysis. Proceedings of the CSEE 2018, 38, 3556–3567. [Google Scholar]
- Le, J.; Lang, H.; Tan, T.; et al. A Review of Information Security Issues in Distributed Economic Dispatch of New Distribution Systems. Automation of Electric Power Systems 2024, 48, 177–191. [Google Scholar]
- Zhao, J.; An, K.; Wang, X. Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network. Journal of Cyber Security and Mobility 2024, 1331–1356. [Google Scholar] [CrossRef]
- Chattopadhyay, A.; Prakash, A.; Shafique, M. Secure Cyber-Physical Systems: Current Trends, Tools and Open Research Problems. In Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017. IEEE 2017, 1104-1109.
- Yang, Q.; Yang, J.; Ma, X. Research on False Data Injection Attacks in Power Systems. Microelectronics & Computer 2011, 28, 175–179. [Google Scholar]
- Wang, S.; Zhao, Y.; You, D.; et al. A Survey on Cyber-Physical Systems Attacks in the Framework of Discrete Event Systems. Control and Decision 2022, 37, 1934–1944. [Google Scholar]
- Yang, S.; Sun, F.; Ren, S.; et al. Secure Dispatch Strategy for Cyber-Physical Energy Systems under False Data and DoS Attacks. In Proceedings of the 2024 36th Chinese Control and Decision Conference (CCDC). IEEE 2024, 5056-5060.
- Cai, X.; Wang, Q.; Tai, W.; et al. Defense Method for False Data Injection Attacks in Power CPS Based on Multi-Stage Game. Electric Power Construction 2019, 5, 48–54. [Google Scholar]
- Zhang, Y.; Li, S.; Gu, X.; et al. Resilience Assessment Method for Backbone Network Considering Malicious Physical Attacks and Secondary Faults. Electric Power Construction 2023, 44, 95–105. [Google Scholar]
- Chen, J.; Rao, J.; Li, W.; et al. Detection Method of False Data Injection Attacks on Power Grids Based on Vector Auto-Regression Model. Journal of Electric Power Science and Technology 2024, 39, 1–9. [Google Scholar]
- Wang, D.; Huang, L.; Liu, J.; et al. Defense Strategy for Power Cyber-Physical Systems Against Load False Data Injection Attacks. Power System Protection and Control 2019, 47, 28–34. [Google Scholar]
- Sun, K.; Qiu, W.; Li, K.; et al. Network Attack Defense Control Strategy for Fast Frequency Response Systems. Chinese Journal of Electrical Engineering 2021, 41, 5476–5485. [Google Scholar]
- Chen, B.; Li, M. Research on a Data-Driven Framework for Defending Against False Data Injection Attacks in Power Systems. Electric Measurement & Instrumentation 2024, 61, 10–16. [Google Scholar]
- Li, Y.; Bu, F.; Li, Y.; et al. Optimal scheduling of island integrated energy systems considering multi-uncertainties and hydrothermal simultaneous transmission: A deep reinforcement learning approach. Applied Energy 2023, 333, 120540. [Google Scholar] [CrossRef]
- Zhang, Z.; Chen, H.; Liu, B.; et al. An effective updating scheme based DETM robust LFC under non-ideal communication network. Automatica 2024, 167, 111786. [Google Scholar] [CrossRef]
- Liu, Y.; Lu, Y. Event-Triggered Sliding Mode Control of Direct-Current Microgrid System Under Network Attack. Journal of Electric Power Science and Technology 2025, 39, 212–221. [Google Scholar]
- Zheng, Y.; Mudhangulla, S.B.; Anubi, O.M. Moving-horizon false data injection attack design against cyber–physical systems. Control Engineering Practice 2023, 136, 105552. [Google Scholar] [CrossRef]
- Wu, Z.; Xu, D.; Xu, J.; et al. Key Technologies of Distribution Network State Estimation Under Multiple Cyber-Physical Attacks. Power System Automation 2024, 48, 127–138. [Google Scholar]
- Cao, K.; Li, R.; Zhang, X.; et al. Research on Uncertainty for Complex Event Streams in Cyber-Physical Systems. Computer Engineering and Science 2015, 37, 415–421. [Google Scholar]
- Feng, Y.; Jia, W. Research Status and Prospect of Smart Microgrids Under Network Attack Models. Smart Grid 2022, 12, 119–125. [Google Scholar] [CrossRef]
- Zhang, P.; Xiong, Y.; Jian, J. Research on False Data Injection Attacks in Smart Grids Based on Multi-Objective Bi-Level Programming. Operations Research and Management 2023, 32, 22. [Google Scholar]
- Yuan, K.; Luo, P.; Wang, G.; et al. New Detection Method for Covert Data Attacks in Power Systems Based on Grey Relational Analysis. New Electrical Technology 2019, 38, 17–23. [Google Scholar]
- Yang, S.; Tan, B.; Guo, J. False Data Injection Attack Detection for New Energy Internet Based on Double Markov Chains. Electric Power Automation Equipment 2021, 41, 212–220. [Google Scholar]
- Dongmei, H.; Zhonghui, D.; Anduo, H.; et al. Low-Cost Adversarial Stealthy False Data Injection Attack and Detection Method. Power System Technology 2023, 47, 1531–1539. [Google Scholar]
- Bo, X.; Qu, Z.; Wang, L.; et al. Active defense research against false data injection attacks of power CPS based on data-driven algorithms. Energies 2022, 15, 7432. [Google Scholar] [CrossRef]
- Wu, Y.; Ru, Y.; Liu, J.; et al. Detection of False Data Injection Attacks in Automatic Generation Control Systems Based on Set Member Filtering. Power System Automation 2022, 46, 33–41. [Google Scholar]
- Li, Y.; Li, Y.; Sun, Y. Online Static Security Assessment Of Power Systems Based On Lasso Algorithm. Applied Sciences 2018, 8, 1442. [Google Scholar] [CrossRef]
- Xie, Y.; Yan, X.; Yan, Z.; et al. Optimization of False Data Injection Attack Strategy for AC-DC Hybrid Power Grids. Electric Power Engineering Technology 2023, 42, 15–24. [Google Scholar]
- Feng, C.; Li, Y.; Xu, T. Security Evaluation Method for Distribution Network Cyber-Physical Systems Considering Risk Propagation and Expected Failure Analysis. Science & Technology and Engineering 2022, 22, 10116–10122. [Google Scholar]
- Pruengkarn, R. Enhancing classification performance by handling noise and imbalanced data with fuzzy classification techniques. Perth, Australia: Murdoch University, 2018.
- Zhou, H.; Xu, F.; Liu, X.; et al. A Machine Learning Approach for False Data Injection Attack Detection in Power Systems. Journal of Power Systems 2024, 45, 1254–1264. [Google Scholar]
- Bai, X.; Ma, Q.; Tang, Z.; et al. A Real-Time False Data Injection Attack Detection Method Using Ensemble Learning. International Journal of Electrical Power & Energy Systems 2023, 118, 105920. [Google Scholar]
- Yang, X.; et al. Gaussian Mixture Model Uncertainty Modeling for Power Systems Considering Mutual Assistance of Latent Variables. IEEE Transactions on Sustainable Energy 2024, 1–4. [Google Scholar] [CrossRef]
- Li, Y.; Wei, X.; Li, Y.; et al. Detection of false data injection attacks in smart grid: A secure federated deep learning approach. IEEE Transactions on Smart Grid 2022, 13, 4862–4872. [Google Scholar] [CrossRef]
- Shukla, S.; Thakur, S.; Hussain, S.; et al. Identification of false stealthy data injection attacks in smart meters using machine learning and blockchain. In Proceedings of the International Congress on Blockchain and Applications; Springer International Publishing: Cham, 2022; pp. 398–409. [Google Scholar]
- Li, X.; Wang, X.; Liu, G.; et al. Comprehensive Evaluation of False Data Injection Attacks in Power Systems Using a Data-Driven Approach. IEEE Transactions on Industrial Informatics 2023, 19, 2345–2353. [Google Scholar]
- Zhang, F.; Huang, Z.; Kou, L.; et al. Data Encryption Based on a 9D Complex Chaotic System with Quaternion for Smart Grid. Chinese Physics B 2023, 32, 010502. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Mugemanyi, S.; et al. Dynamic Exploitation Gaussian Bare-Bones Bat Algorithm for Optimal Reactive Power Dispatch to Improve the Safety and Stability of Power System. IET Renewable Power Generation 2022, 16, 1401–1424. [Google Scholar] [CrossRef]
- Fang, Z.; Zhao, D.; Chen, C.; et al. Nonintrusive Appliance Identification with Appliance-Specific Networks. IEEE Transactions on Industry Applications 2020, 56, 3443–3452. [Google Scholar]
- Liu, Y.; Jiang, X.; Zhang, S.; et al. Data Integrity Protection in Power CPS: Approaches and Challenges. Journal of Electric Power Engineering 2020, 50, 143–155. [Google Scholar]
- Sheng, Z.; Yao, J.; Guo, L. A Hybrid Detection Framework for Cyber-Attacks in Power Systems. Journal of Electrical Engineering & Technology 2024, 19, 541–550. [Google Scholar]
- Qu, Z.; Dong, Y.; Li, Y.; et al. Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach. Applied Energy 2024, 360, 122736. [Google Scholar] [CrossRef]
- Zhang, W.; Liang, J.; Wu, T. Survey of Attack Detection and Defense Methods for Smart Grids. Journal of Control and Decision 2023, 38, 2567–2575. [Google Scholar]
- Mhapsekar, R.U.; Umrani, M.I.; Faizan, M.; et al. Building trust in AI-driven decision making for cyber-physical Systems (CPS): A comprehensive review. In Proceedings of the 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE 2024, 1-8.
- Lin, W.T.; Chen, G.; Zhou, X. Privacy-preserving federated learning for detecting false data injection attacks on power system. Electric Power Systems Research 2024, 229, 110150. [Google Scholar] [CrossRef]
- Xu, S.; Lu, Y.; Wu, F. Cyber-Attack Detection and Resilience Strategy in Smart Grids Based on Big Data Analytics. Power System Automation 2023, 47, 1859–1871. [Google Scholar]
- Fang, Y.; Liu, Z.; Chen, D. Hybrid Machine Learning Methods for Cyber-Attack Detection in Power Systems. Journal of Energy Engineering 2024, 10, 134–145. [Google Scholar]
- Liu, X.; Bao, Z.; Lu, D.; et al. Modeling of Local False Data Injection Attacks With Reduced Network Information. IEEE Transactions on Smart Grid 2015, 6, 1686–1696. [Google Scholar] [CrossRef]
- Xu, K.; Niu, Y. Decentralized attack detection for multi-area power systems via interconnection-decoupled sliding mode observer. International Journal of Robust and Nonlinear Control 2023, 33, 6697–6714. [Google Scholar] [CrossRef]
- Preeti, G.; Sanjeev Kumar, P. A Blockchain Based Decentralized Application System for Vanet FDIA Detection. In Proceedings of the International Conference on Computing and Communication Networks; Springer Nature: Singapore, 2023; pp. 95–119. [Google Scholar]
- Tirulo, A.; Chauhan, S. Deep learning for active detection of FDIAs to defend distributed demand response in smart grid. International Journal of Grid and Utility Computing 2024, 15, 572–587. [Google Scholar] [CrossRef]
- Bai, Z.; Chen, Y.; Wei, L.; et al. Application of AI and ML Techniques in Cybersecurity of Power CPS. Power and Energy Systems 2024, 46, 2267–2278. [Google Scholar]
- Li, Y.; Ma, W.; Li, Y.; et al. Enhancing Cyber-Resilience in Integrated Energy System Scheduling with Demand Response Using Deep Reinforcement Learning. Applied Energy 2025, 379, 124831. [Google Scholar] [CrossRef]
- Syrmakesis, A.D.; Hatziargyriou, N.D. Cyber resilience methods for smart grids against false data injection attacks: Categorization, review and future directions. Frontiers in Smart Grids 2024, 3, 1397380. [Google Scholar] [CrossRef]
- Gao, S.; Zhang, H.; Wang, Z.; et al. Data-driven injection attack strategy for linear cyber-physical systems: An input-output data-based approach. IEEE Transactions on Network Science and Engineering 2023, 10, 4082–4095. [Google Scholar] [CrossRef]
- Wang, G.; Sun, Q.; et al. Detection and Mitigation of Coordinated False Data Injection Attacks in Power Grids. Journal of Control Engineering Practice 2024, 25, 347–359. [Google Scholar]
- Hu, P.; Li, L. A Review of Cyber-Physical Security in Smart Grids. Information Security Research 2019, 5, 1068. [Google Scholar]
- Pei, C.; Xiao, Y.; Liang, W.; et al. Canonical Variate Analysis for Detecting False Data Injection Attacks in Alternating Current State Estimation. IEEE Transactions on Network Science and Engineering 2024. [Google Scholar] [CrossRef]
- Wang, L.; Qu, Z.; Li, Y.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Kausar, F.; Deo, S.; Hussain, S.; et al. Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems. Energies 2024, 17, 5337. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Nguyen, H.; Zheng, R.; et al. A Stealthy Attack Against Electricity Market Using Independent Component Analysis. IEEE Systems Journal 2018, 12, 297–307. [Google Scholar] [CrossRef]
- Li, W.; Fu, H.; Wu, S.; et al. RETRACTED: A Kalman Filter-Based Distributed Cyber-Attack Mitigation Strategy for Distributed Generator Units in Meshed DC Microgrids. Energies 2023, 16, 7959. [Google Scholar] [CrossRef]
- Li, R.; Liu, S.; Yan, L. CPS Network Attack Detection Method for New Energy Distribution Networks Based on FP-Growth Algorithm. Telecommunications Science 2024, 40, 103–113. [Google Scholar]
- Bou-Harb, E.; Ghani, N.; Erradi, A.; et al. Passive inference of attacks on CPS communication protocols. Journal of information security and applications 2018, 43, 110–122. [Google Scholar] [CrossRef]
- Ezechi, C.; Akinsolu, M.O.; Sangodoyin, A.O.; et al. Software-defined networking in cyber-physical systems. Cyber Physical System 2.0, Communication and Computational Technologies 2024, 44.
- Capogrosso, L.; Xu, S.; Fraccaroli, E.; et al. Learning-Enabled CPS for Edge-Cloud Computing. In Proceedings of the 2024 IEEE 14th International Symposium on Industrial Embedded Systems (SIES). IEEE 2024, 132-139.
- Du, Y.; Chatterjee, S.; Bhattacharya, A.; et al. Role of reinforcement learning for risk-based robust control of cyber-physical energy systems. Risk Analysis 2023, 43, 2280–2297. [Google Scholar] [CrossRef] [PubMed]
- Li, Y.; Li, J.; Wang, Y. Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach. IEEE Transactions on Industrial Informatics 2021, 18, 2310–2320. [Google Scholar] [CrossRef]
- Ansar, S.A.; Singh, A.; Aggrawal, S.; et al. Modernizing CPS with blockchain: Applications, challenges & future directions. In Proceedings of the 2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS). IEEE 2022, 124-129.
- Selvi, K.; Dilip, G. Enhancing Cyber-Physical Systems Security: A Review of Deep Learning and Blockchain Integration. In Proceedings of the 2024 5th International Conference on Image Processing and Capsule Networks (ICIPCN). IEEE 2024, 725-734.
- Kim, K.; Youn, J.; Kim, H.; et al. State-of-the-Art in Cyber Situational Awareness: A Comprehensive Review and Analysis. KSII Transactions on Internet and Information Systems (TIIS) 2024, 18, 1273–1300. [Google Scholar]
- Wang, Y.; et al. Collaborative optimization of multi-microgrids system with shared energy storage based on multi-agent stochastic game and reinforcement learning. Energy 2023, 280, 128182. [Google Scholar] [CrossRef]
- Liu, F.; Li, Y.; Li, B.; et al. Bitcoin transaction strategy construction based on deep reinforcement learning. Applied Soft Computing 2021, 113, 107952. [Google Scholar] [CrossRef]
- Jamshidi, S.; Amirnia, A.; Nikanjam, A.; et al. Enhancing security and energy efficiency of cyber-physical systems using deep reinforcement learning. Procedia Computer Science 2024, 238, 1074–1079. [Google Scholar] [CrossRef]
- Li, Q.; Yang, X.; Xie, X.; et al. The data recovery strategy on machine learning against false data injection attacks in power cyber physical systems. Measurement and Control 2024, 00202940241268444. [Google Scholar] [CrossRef]
- Li, Y.; He, S.; Li, Y.; et al. Federated multiagent deep reinforcement learning approach via physics-informed reward for multimicrogrid energy management. IEEE Transactions on Neural Networks and Learning Systems 2024, 35, 5902–5914. [Google Scholar] [CrossRef] [PubMed]
- Uddin, M.R.; Rahman, R.; Nguyen, D.C. False Data Injection Attack Detection in Edge-based Smart Metering Networks with Federated Learning. arXiv 2024, arXiv:2411.01313. [Google Scholar]
- Latif, N.; Ma, W.; Ahmad, H.B. Advancements in securing federated learning with IDS: A comprehensive review of neural networks and feature engineering techniques for malicious client detection. Artificial Intelligence Review 2025, 58, 91. [Google Scholar] [CrossRef]
- Kumar, K.; Chakraborty, S.; Kumar, P.; et al. Blockchain-Based Defense Mechanisms for Mitigating Unnecessary Islanding in Microgrids Against Cyber-Attack. In Proceedings of the 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE). IEEE 2024, 1-4.
- Wu, Z.; Liu, Y.; Liang, H. A Quantum Minimum Cut-Set Method for Vulnerable Node Localization Against False Data Injection Attacks. In Proceedings of the 2023 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE 2023, 147-152.
- Tan, Z.; Li, Z. Digital twins for sustainable design and management of smart city buildings and municipal infrastructure. Sustainable Energy Technologies and Assessments 2024, 64, 103682. [Google Scholar] [CrossRef]
- Wessels, M.; van den Brink, P.; Verburgh, T.; et al. Understanding incentives for cybersecurity investments: Development and application of a typology. Digital Business 2021, 1, 100014. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).