| Issue |
Security and Safety
Volume 4, 2025
Security and Safety for Next Generation Industrial Systems
|
|
|---|---|---|
| Article Number | 2025005 | |
| Number of page(s) | 17 | |
| Section | Industrial Control | |
| DOI | https://doi.org/10.1051/sands/2025005 | |
| Published online | 24 October 2025 | |
- New Power System Development Blueprint Editorial Group. New Power System Development Blueprint [R/OL]. China Electric Power Press, 2023.6. http://big5.www.gov.cn/gate/big5/www.gov.cn/lianbo/bumen/202306/P020230823671991045922.pdf [2024.5.17]. [Google Scholar]
- New Power System Active Defense Technology System White Paper Editorial Group. New Power System Active Defense Technology System White Paper [R/OL]. Zhejiang University, Guizhou University, 2023.9. http://www.ditan.com/static/upload/file/20231106/1699247194833548.pdf [2024.9.17]. [Google Scholar]
- Yohanandhan RV, Elavarasan RM, Pugazhendhi R, et al. A Specialized Review on Outlook of Future Cyber-Physical Power System (CPPS) Testbeds for Securing Electric Power Grid. Int. J. Electr. Power Energy Syst 2022; 136: 107720. [Google Scholar]
- Liang GQ, Weller SR, Zhao JH, et al. The 2015 Ukraine Blackout: Implications for False Data Injection attack. IEEE Trans Power Syst 2017; 32: 4. [Google Scholar]
- Chang ZJ, Liu Y. Analysis on the Recovery of Power Grid after the “3.21” Blackout in Brazil. Electr Power Technol 2021. [Google Scholar]
- Gong XA. Analysis of the Major Power Outage in Venezuela and Suggestions for the Security Protection of Critical Infrastructures. Inform Technol Netw Secur 2019. [Google Scholar]
- Fan C, Yao JG, Zhang QB, et al. Analysis and Reflections on the “8.9” UK Power Outage Oscillation Incident. Jiangsu Electr Eng 2020; 39: 34–41. [Google Scholar]
- Hou YQ, Ding Y, Bao ML, et al. Analysis of the Texas Power Outage from the Perspective of Electromagnetic Coupling and Enlightenment for the Development of China’s New Power System. Proc CSEE 2022, 1–14. doi:10.13334/j.0258-8013.pcsee.212202. [Google Scholar]
- Wu WD, Shen W, Xu BF. A Survey on risks Analysis of Electric Power Cyber-Physical system with Integrated Preventive and Protective Security. Electr Meas Instrum 2020, 57. [Google Scholar]
- Zhu BQ, Guo YH, Guo CX, et al. A Review on Security Assessment and Defense of Electric Power Cyber-Physical system under Information Failure threat. Protect Control Mod Electr Syst 2021; 49: 10. [Google Scholar]
- Tang Y, Chen Q, Li MY, et al. A Survey on Cyber attack in Electric Power Cyber-Physical Convergent system. Autom Electr Power Syst 2016; 40: 11. [Google Scholar]
- Tang Y, Wang Q. Analysis and Control of Cyber-Physical system for New Power system. Electr Power Eng Technol 2022; 41: 1. [Google Scholar]
- Yang ZY, Zhang SP, Sun H. Comprehensive Analysis and risks Research of Cyber-Physical Network Security in Power system. South Energy Constr 2020; 7: 17. [Google Scholar]
- Liu YH, Wang YF. Evolution Mechanism and Active Defense Exploration of Inter-Domain Cascading Failures in New Power system. Electr Power 2022; 55: 62–72+81. [Google Scholar]
- Feng Y, Huang R, Zhao W, et al. A survey on coordinated attacks against cyber–physical power systems: Attack, detection, and defense methods. Electr Power Syst Res 2025, 241(000). [Google Scholar]
- Kirn Kumar N, Indra Gandhi V, Ravi L, et al. Improving Security for Wind Energy system in Smart Grid Applications Using Digital Protection Technique. Sustain Cities Soc 2020, 60. [Google Scholar]
- Walker A, Desai J, Saleem D, et al. Cybersecurity in Photovoltaic Plant Operations. Golden, CO, United States: National Renewable Energy Lab. (NREL), 2021. [Google Scholar]
- Nejabatkhah F, Li YW, Liang H, et al. Cyber-Security of Smart Microgrids: A Survey. Energies 2020; 14: 27. [Google Scholar]
- Antonov A, Häring T, Korõtko T, et al. Pitfalls of Machine Learning Methods in smart grid: A Legal Perspective. In: 2021 International Symposium on Computer Science and Intelligent Controls (ISCSIC). IEEE, 2021, 248–56. [Google Scholar]
- Khoei TT, Slimane HO, Kaabouch N. A Comprehensive Survey on the Cyber-Security of smart grid: Cyber-attack, Detection, Countermeasure Techniques, and Future Directions. arXiv preprint [arXiv:2207.07738], 2022. [Google Scholar]
- Gomez C, Paradells J. Wireless Home Automation network: A Survey of Architectures and Technologies. IEEE Commun Mag 2010; 48: 92–101. [Google Scholar]
- Zhang J, Li Q, Ye J, et al. Cyber-physical Security Framework for Photovoltaic Farms. In: 2020 IEEE CyberPELS (CyberPELS), IEEE, 2020. [Google Scholar]
- Li H, Lu R, Zhou L, et al. An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid. IEEE Syst J 2014; 8: 655–63. [Google Scholar]
- Zeller M. Common Questions and Answers Addressing the Aurora Vulnerability. Schweitzer Engineering Laboratories Rep., 2011. [Google Scholar]
- Liang J, Sankar L, Kosut, O. Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation. IEEE Trans Power Syst 2016; 31: 3864–72. [Google Scholar]
- Yuan Y, Li Z, Ren K. Modeling Load Redistribution attack in Power system. IEEE Trans Smart Grid 2011; 2: 382–90. [Google Scholar]
- Soltan S, Zussman G. EXPOSE the Line Failures Following a Cyber-Physical Attack on the Power Grid. IEEE Trans Control Netw Syst 2018. [Google Scholar]
- Cha ST, Wu Q, Nielsen AH. Real-Time Hardware-In-The-Loop (HIL) Testing for Power Electronics Controllers. In: Proceedings of the 2012 Asia-Pacific Power and Energy Engineering Conference (APPEEC), IEEE, 2011. [Google Scholar]
- Zhao C, He J, Cheng, P. Analysis of Consensus-Based Distributed Economic Dispatch Under Stealthy attack. IEEE Trans Ind Electron 2017. [Google Scholar]
- Pliatsios D, Sarigiannidis PG, Lagkas T, et al. A Survey on SCADA system: Secure Protocols, Incidents, threat, and Tactics. IEEE Commun Surv Tutor 2020. [Google Scholar]
- Upadhyay D, Sampalli S. SCADA (Supervisory Control and Data Acquisition) system: Vulnerability Assessment and Security Recommendations. Comput Secur 2020; 89: 101666.1–101666.18. [Google Scholar]
- China Energy Storage Network. (2023, December 21). Source-grid-load-storage integrated control platform aids in the construction of new power systems. Retrieved April 25, 2025, from https://mcn.solarbe.com/news/20231221/83624.html. [Google Scholar]
- Li YN, Liu W, Wei XS, et al. Research on Vulnerability of Distribution network with Distributed Photovoltaic under Cyber attack. J Integr Intell Energy 2024; 46: 50–7. [Google Scholar]
- Duo W, Zhou M, Abusorrah A. A Survey on Cyber attack against Cyber-Physical system: Recent Progress and Challenges. IEEE/CAA J Autom Sin 2022. doi:10.1109/jas.2022.105548. [Google Scholar]
- Zhang H, Liu B, Wu H. Cyber-Physical Attack and Defense in Smart Grid: A Review. IEEE Access 2021. doi:10.1109/access.2021.3058628. [Google Scholar]
- Feng YW, Jia W. Current Status and Prospects of Research on Smart Microgrids under Cyber-Attack Modes. Smart Grid 2022; 12: 119–29. [Google Scholar]
- Burke Q, McDaniel P, La Porta T. Misreporting attack Against Load Balancers in Software-Defined Networking. Mob Netw Appl 2023; 28: 1482–97. [Google Scholar]
- Yang ZY, Zhang SP, Sun H. Integrated Cyber-Physical Contingency Analysis and risks Estimates. Southern Energy Constr 2020; 7: 6–22. [Google Scholar]
- Cai XP, Wang Q, Huang JY, et al. Cyber-Physical Collaborative Emergency Control Method for Power System Network attack. J Glob Energy Inter 2020; 3: 560–8. [Google Scholar]
- Zhang T, Fei JX, Wang Q, et al. Research on Collaborative Defense Architecture and Mechanism of Cross-Domain attack in Power Cyber-Physical system. Acta Electron Sin 2024; 52: 1205–18. [Google Scholar]
- Weng S, Weng P, Zhou J, et al. Distributed Secure State Estimation for Interconnected Power system under FDI attack. Control Decis 2023; 38: 1935–41. [Google Scholar]
- Shi X, Guo H, Wang W, et al. Considering the Network Vulnerabilities in Power system: Modeling and Evaluating Load Redistribution attack. Front Energy Res 2023. doi:10.3389/fenrg.2023.1242047. [Google Scholar]
- Xia X, Xiao Y, Liang W, et al. Survey on Smart Meter Tampering Attack Detection Methods. Proc IEEE 2022. doi:10.1109/jproc.2021.3139754. [Google Scholar]
- Xie D, Li H, Chen B, et al. Multitype Energy Storage Participation Peak Load Regulation Model and Its Optimal Scheduling Strategy. Guangxi Electr Power 2024; 45: 44–52. [Google Scholar]
- Shi L, Eder MA, Shihavuddin ASM, et al. Study on Attack Paths of Cyber Attack in Cyber-Physical Power system. IET Gener Trans Distrib 2020; 14: 2352–60. [Google Scholar]
- Yohanandhan RV, Elavarasan RM, Pugazhendhi R, et al. A Holistic Review on Cyber-Physical Power System (CPPS) Testbeds for Secure and Sustainable Electric Power Grid–Part–I: Background on CPPS and Necessity of CPPS Testbeds. Int J Electr Power Energy Syst 2022. [Google Scholar]
- Alvarez-Alvarado MS, Apolo-Tinoco C, Ramirez-Prado MJ, et al. Cyber-Physical Power system: A Comprehensive Review about Technologies Drivers, Standards, and Future Perspectives. J Electr Power Energy Syst 2024. doi:10.1016/j.compeleceng.2024.109149. [Google Scholar]
- Wei Q, Wang W, Cheng P. Industrial Internet Security: Architecture and Defense. Mechanical Industry Press, 2021. [Google Scholar]
- CNCC. New Cyber-Physical Security Paradigms in Power Systems–The Collision of Information Security and Control Theory Perspectives. https://www.ccf.org.cn/Focus/2023-10-19/796502.shtml, China Computer Federation, 2023. Accessed on October 17, 2024. [Google Scholar]
- Ruan J, Liang G, Zhao H, et al. Applying Large Language Models to Power Systems: Potential Security Threats. IEEE Trans Smart Grid 2024; 15: 3333–6. [Google Scholar]
- Tete S. Threat Modelling and risks Analysis for Large Language Model (LLM)-Powered Applications. J Electr Power Energy Syst 2024. doi:10.1016/j.compeleceng.2024.109149. [Google Scholar]
- Paul S, Chen Y-C, Grijalva S, et al. A Cryptographic Method for Defense Against MiTM Cyber Attack in the Electricity Grid Supply Chain. In Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), New Orleans, LA, USA, 2022, 1–5. doi:10.1109/ISGT50606.2022.9817541. [Google Scholar]
- Kuroptev K, Steinke F. Coordinated cyber attacks on smart grids considering software supply chains. In: Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE), Grenoble, France, 2023, 1–5. doi:10.1109/ISGTEUROPE56780.2023.10407630. [Google Scholar]
- Liu E. Research on Privacy Protection Issues in Smart Grids [Dissertation]. Zhejiang, China: Zhejiang University, 2018. [Google Scholar]
- Zhang T, Fei J, Wang Q, et al. Research on Collaborative Defense Architecture and Mechanism of Cross-Domain Attacks in Power Cyber-Physical Systems. Acta Electron Sin 2024; 52: 1205–18. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.