Smart Grid Future PDF
Smart Grid Future PDF
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.
Digital Object Identifier 10.1109/ACCESS.2017.Doi Number
ABSTRACT This paper conducts a comprehensive study on the application of big data and machine
learning in the electrical power grid, introduced through the emergence of the next-generation power system
– the smart grid (SG). Connectivity lies at the core of this new grid infrastructure, which is provided by the
internet of things (IoT). This connectivity, and constant communication required in this system, also
introduced a massive data volume that demands techniques far superior than conventional methods for
proper analysis and decision-making. IoT integrated SG system can provide efficient load forecasting and
data acquisition technique, along with cost effectiveness. Big data analysis and machine learning techniques
are essential to reap these benefits. In the complex connected system of SG, cyber security becomes a
critical issue; IoT devices and their data turning into major targets of attacks. Such security concerns and
their solutions are also included in this study. Key information obtained through literature review are
tabulated in corresponding sections to provide a clear synopsis; and the findings of this rigorous review are
listed to give a concise picture of this area of study and promising future fields of academic and industrial
research, with current limitations with viable solutions along with their effectiveness.
INDEX TERMS Big Data Analysis, Cyber Security. IoT, Machine Learning, Smart Grid.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
(a)
(b)
FIGURE 1. Utility grids: (a) conventional grid (b) smart grid. In the conventional system power flows from in one direction only; but for smart grid,
there is no strict structure. Generation can occur at the consumer side too, such as the wind and the solar farms at the outer periphery of the topology.
Power flow can also be bidirectional, demonstrated by the energy storages and the house in this illustration.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Constant connectivity and communication is one of the core systems are required to ensure proper operation of the smart
components of smart grid, and that requires devices equipped grid, safekeeping of data, and thwart any attack aimed at the
with such capabilities. The network created by such devices, power system. Machine learning is an attractive solution
connected to other nodes of the system through the internet, processing big data, and implementing effective security
are called the “internet of things (IoT)”. In the internet of solutions.
things each object has its own identity in the digital world. This paper presents a concise picture of the electricity grid’s
Everything is connected through a complex network. IoT transition towards the smart grid, the ensuing rise in IoT
comprises of smart objects which possess self-awareness, usage, and the challenges this new system brings forward.
interaction with the environment and data processing. Smart The most obvious trials are of course the handling of the
devices are capable to communicate with other such devices huge amount of data in this connected system, their proper
in this system [14]. Most common smart devices employed analysis and safety, as well as protecting this new power grid
in the grid, such as the smart meter, falls into this category. from attacks generated in both physical and cyber
These devices provide the detailed data required for accurate dimensions. This work can act as a base for future academic
information and automated decision support which give the and industrial researchers, while pointing out the current
smart grid the unique capabilities it demonstrates over the limitations with possible solutions along with their
legacy system. All this data need to be handled in real time, effectiveness.
and stored to use historical data to create decisions based on The rest of the paper is organized as follows: a short history
certain cases. Various research works have been conducted of the power grid from its inception is presented in section II.
with data obtained from intelligent devices in substations, Discussion on IoT components, its applications and issues is
feeders, and various databases [15]. Information sources can carried out in section III. Section IV focuses on big data, and
be market data, lighting data, power system data, the role of big data analysis in smart grid. Section V puts
geographical data, weather data etc. [16]. Optimization from forward machine learning as a method capable of handling
generation to distribution requires reliable, accurate and the big data generated in the IoT-based smart grid, and
efficient prediction model for electric energy consumption. highlights its capabilities in renewable energy forecasting.
For example, energy consumption data (kWh) from Emerging security threats to the smart grid, its data, and
100,000’s of customer smart meters at 15 minutes sampling devices are discussed in section VI, including protection and
intervals shows that ensuring the quality of the collected data threat-detection techniques. The excerpt of this detailed study
poses a unique challenge for prediction models and is presented in section VII, with future research directions
evaluation of their efficacy for SG [17]. There are several outlined. Finally, the conclusions are drawn in section VIII.
factors which require to be predicted, such as: renewable
generation, power purchases from energy markets, 24 hour II. CHANGES IN THE CENTURY-OLD GRID
planning of load distribution etc. [18, 19]. These factors are In the early days of electric power systems, AC and DC
the part and parcel of SG sustainability and security [20]. contended to become the industry standard. The AC system
Predictability of electricity consumption has been studied prevailed and have been in use ever since. The reason of
with dynamic demand response in [21]. High volume of data AC’s dominance is its ability to use transformers for
from SG increases the complexity of data analysis. Dynamic changing the voltage level, and enabling the transmission of
energy management (DEM) is required for processing this high voltage electricity which reduces loss. The first
huge amount of data for power flow optimization, system demonstration of the AC transmission system took place in
monitoring, real-time operation, and production planning 1886, at Great Barrington, Massachusetts, USA, by William
[22, 23]. Data of such magnitude, which cannot be processed Stanley and George Westinghouse [29]. Westinghouse later
through traditional processes, is termed as “big data”, and it formed the Westinghouse Electric Company that went on
has also become a centerpiece of current research. supply AC power to Buffalo, New York from the Adams
Researches on big data-based power generation, optimization Power Plant at the Niagra Falls in 1896. Thus the dominance
and forecasting techniques are extended to the renewable of AC system is established, and the worldwide power grid
energy based system such as wind energy system [23, 24]. A adopted this technology as electrification expanded
portion of the data produced in SG contains individual users’ massively over the next century. Now, in the 21st century,
confidential information. This type of data is required to be technology has advanced astronomically as compared to the
protected under legal regulations [25, 26]. Moreover, this late 1800s; however, the grid system in the world largely
data contains classified and sensitive information of an resembles the century-old system that initiated the process of
organization or central grid of a country. Manipulation of electrification. The advanced technologies that emerged in
such data can affect the safe operation of the grid. Therefore the power sector include power electronics, renewable
security and privacy is a very important issue [27]. An IoT energy sources, distributed generation, advanced monitoring
integrated SG is a cyber-physical system [28], which makes and communication system etc. The legacy grid was not
it prone to cyberattacks. Therefore, adequate protection designed to accommodate these devices, and thus they create
significant problems when integrated with the existing grid
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
infrastructure. For example, power electronics based loads elsewhere physically, and carry out their tasks through the
act differently than the generally perceived loads of resistive, resulting exchange, are termed as IoT devices. IoT stands for
capacitive, and inductive properties; electronics devices “internet of things”, which can be defined as the interrelated
exhibit constant power load (CPL) properties that cause system that links up such devices, and facilitate data transfer
significant system-instabilities [30]. Distributed generation without any human intervention. According to Gubbi et al.
causes bi-directional power flow and thus contradicts the [31], IoT is an interconnection of sensing and actuating
historically unidirectional flow of the grid. Renewable devices providing the ability to share information across
sources often generate intermittent DC power (e.g. solar platforms through an unified framework, developing a
energy) opposing the predominant AC systems. The common operating picture for enabling innovative
renewable sources of AC (e.g. wind energy) are highly applications. This is achieved by seamless ubiquitous
varying as well. All these which makes integrating renewable sensing, data analytics and information representation with
sources in the existing grid a huge challenge. However, even cloud computing as the unifying framework. Each of those
though these next-generation systems disrupt the grid objects has its own embedded computing system which
architecture in place, adopting these technologies is the way enables it to be identified and to be interconnected with each
to move forward, not the other way round. Therefore, the other. The IoT architecture is shown in fig. 2. IoT will consist
current time marks the transition period for the electricity of more than 30 billion objects by 2020 [32]. The astronomic
grid – a metamorphosis that will supplant the archaic system increase in number of IoT devices is visualized in fig. 3.
with an architecture well-capable to accommodate the From a mere 13 billion in 2015, their predicted population
advanced concepts and tools. This next-generation system is reaching 30 billion and beyond in a timespan of five years
called the “smart grid”. The grid evolution timeline in perfectly demonstrates the current trend of IoT application.
presented in Table I. These devices are able to operate with a less amount of
TABLE I external intervention and are capable of responding to the
SIGNIFICANT EVENTS IN THE EVOLUTION OF ELECTRICITY GRID environment spontaneously.
Year Significant events IoT includes, but not limited to, technologies such as
1800 Alessandro Volta made an electric battery to provide a steady medical equipment, smart vehicles, smart grid, smart homes,
supply and smart cities. IoT applications bring forth numerous
1831 Michael Faraday discovered dynamo
benefits. It can reduce human intervention in the process of
interconnecting devices. The most important impacts can be
1878 Invention of incandescent lamp by Thomas Edison (in America)
observed in the power sector, home appliances, and in smart
and Joseph Swan (in Britain)
cities. Smart grids which contain the attributes of IoT may be
1882 DC street lamps appear in New York the possible solution of future global energy crisis. Efficiency
1886 AC system spread rapidly in the following years at transmission and distribution ends can be escalated.
1888 The induction motor got patented independently by Nikola Tesla Renewable energy sources can be more effectively utilized
(in USA) and Galileo Ferraris (in Italy) under IoT based networks. Currently, smart homes have
1896 The Adams Power Plant supplied AC power to Buffalo, New monitoring systems that increases the cost effectiveness [33].
York It also reduces the unwanted consumptions of energy. In a
1976 Power MOSFET appears as a commercial product
smart city, optimization of schedule for public transport can
be done with IoT. However, though the general lifestyle has
2017 Wind power becomes economically feasible
caught up with this technology, it is hardly present in the grid
system. Incorporating these connecting devices in the grid
III. APPLICATION OF INTERNET OF THINGS (IOT) IN
DISTRIBUTED POWER SYSTEM infrastructure is a major step to advance towards smart grid –
The underpinnings those make the smart grid do so many which can be evidenced by the significance put on IoT in
things that the legacy grid is incapable of are a lot of designing microgrids [34]. Niche uses of IoT devices are also
connected devices, which are capable exchanging emerging with applications that are already exists, or
information, and receive commands to act in a certain way. anticipated to appear in near future. Smart homes, where
This extensive communication is made possible by the household appliances can be controlled by connected
internet, and all these devices are connected to their intelligent devices is an example of such use. Connected
respective networks. Devices connected to the internet are vehicles, distributed energy resources (DER), green buildings
currently part and parcels of the daily life, and more and are some more applications [35-37].
more of such devices are emerging every day. An example of
such devices can be smart thermostats. Such devices, which
use the internet to stay connected to resources located
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE II
IOT COMPONENTS FOR MONITORING POWER TRANSMISSION LINES, WITH CORRESPONDING MONITORING TECHNIQUES [44].
Monitoring Item Methodology Usage
Transmission Tower Leaning sensor transmits the status of the transmission tower to the nearby Real time monitoring
Leaning backbone node. Early warning
Conductor Galloping Calculation and analysis of monitoring point can determine the number of Avoiding tower collapse
horizontal and vertical galloping conductors. Possible discharge between phase conductor
Wind deviation It can be calculated by three dimensional accelerated sensors on the finding discharge point
conductors.
Micro-meteorology Wireless sensors can be used. Wireless recording of temperature, humidity, wind
velocity, sunshine, and rainfall
Conductor icing It can be determined by micro-meteorology and tension sensors. Early warning decision making
Alleviating ice flashover
Wind vibration Can be detected with acceleration sensors. Analyzing wind parameters
Conductor Wireless temperature sensor can be used Real time conductor state monitoring
Temperature
TABLE III
IOT APPLICATION IN SMART GRID.
Application Layer IoT application Security Concerns
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Seamless communication is a core feature of smart grid, demand side. This adjustment of load keeps the other
essential for its proper functioning; and IoT integration can components of grid running. Smart load control and load
aid in smart grid communication too. Mainly four models are shedding should aim at minimizing power outage in sudden
currently being used for communication technologies: device change of a load in the grid. An automated system to do such
to device, device to cloud, device to gateway, and back-end tasks with the help of IoT devices was presented in [58]. This
data sharing pattern [44]. Three layered communication method worked by predicting the day-ahead load, and
systems for IoT implemented smart grid system has also tracking the available generation. When it found the load to
been developed, the layers being: home area network (HAN), be greater than the supply, it could suggest the consumers to
neighbor area network (NAN), and wide area network switch off some appliances, or schedule possible loads to run
(WAN). HAN comprises both wired and wireless at off-peak hours. Fig. 5 shows the working principle of this
technologies, e.g. wired technology is powerline method. Subscriber (consumer) data, weather information,
communications, and wireless communications are ZigBee, and historical data from the grid were used for the prediction
Bluetooth, and WiFi. A home gateway (HG) is a key in this system. All the analysis and decision-making was
component of HAN, which collects data from home conducted in a cloud infrastructure; while the system
appliances. NAN requires a communication system which components communicated through powerline
can cover a radius of more than thousand meters. NAN communication or some wireless technology. Simulation
collects data from the energy meters in HAN and transmits results showed this system to be quicker in responding to
those data to the WAN [52]. WAN serves as interconnection emergencies, and its potential to avoid sudden power outage
between every component of communication link such as [58].
network gateways, NANs, distributed grid devices, utility
control centers, and substations. Core and Backhaul are two
interconnected networks of WAN. Detailed discussions of
HAN, NAN and WAN systems are included later in this
section. Information from the physical systems in IoT
integrated smart grid is fed into data concentrator [53-55].
From data concentrator information is met with the
requirements of internet protocols for web services or cloud
computing platforms. Those web services and cloud
computing platforms further process the data. The energy
service providers’ (ESP) sites are connected with the
Aggregation layer [53-56]. The underlying layers of IoT are
depicted in fig. 4.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
propagation delays, processing delays, and queuing delays. and wide area measurement system (WAMS) design; and
PDC latency, on the other hand, comprises of PDC device usage of robust analytic functions [62].
latency and PDC wait-time. Wait-time latency indicates the
time each PDC has to wait for certain user-configurable IV. SMART GRID WITH BIG DATA ANALYSIS
time-duration so that slower PMU data can be reached and As it is mentioned in the previous section, integrating IoT
processed for time alignment operation at PDC. The devices in every sector of the grid infrastructure is a
maximum tolerable latency is 40 ms which includes latencies mandatory step for moving towards smart grid. It has also
introduced by communication network, PMU, PDC, etc. This been stated that the defining feature of these devices is their
requirement must be met by any IoT architecture for the ability to communicate with other devices and control
system to function deterministically [59, 60]. centers, and send useful information. Thus, an unprecedented
Communication infrastructure is a critical aspect of IoT amount of data gets generated in an interconnected network
deployment. Typical means of communication are leased [63-66], posing challenges to the conventional methods of
telephone lines, power lines, microwave and fiber optic, data transfer, storage, and analysis. As documented in
among others. IoT functions require real-time processing of reference [67], water consumption data of 61,263 houses in
synchrophasor data at wide area level to aid in making Surrey, Canada amounted to 5 MB, information about speeds
informed decisions. The protection and control commands and locations of vehicles passing through the Madrid
should be available for the destination in a deterministic Highway, Spain generated 450 MB of data, and monitoring a
manner. Communication channel capacity, latency and hence 400 square kilometer area in Cologne, Germany for a day
efficiency, are therefore important for successful created a dataset sized at 4.03 GB – recording information of
implementation of IoT system. Channel capacity defines the around 700 vehicles. Monitoring of transmission line,
amount of data that can be carried by a communication generation unit, substation state, smart metering [68], and
network. In IoT system, all PMUs send phasor data directly data acquisition from smart home - all produce a large
or indirectly to central PDC (phasor data concentrators) for amount of data from the smart grid, which are to be stored in
concentration through time alignment and data aggregation. a cloud-based system for proper analysis. Cloud supported
The aggregated data streams are used by analytic functions to IoT system has been proposed in reference [69] to manage all
identify anomalies and issue corresponding commands to those data.
rectify. With an expected 3000 PMUs transmitting 4 phasors, Enter big data analysis [70], which has become a
6 analog quantities, and 8 digital quantities each to central buzzword in the global scientific and data analyst
PDC, all in floating-point format at 25 or 50 messages per communities [71-73]. Big data refers to massive amount of
second rate, 68 Mbps on a serial port, or 135 Mbps in TCP data that require more advanced methods to be captured,
IP, or 122 Mbps in UDP is required. As discussed in [61], a curated, managed, and analyzed than the traditional tools and
typical serial port cannot handle the above traffic and hence signal processing models. The amount of data that defines
an Ethernet port with TCP/IP or UDP is preferred. big data is not explicitly defined, rather it moves as the
Essentially, the chosen communication infrastructure should technology progresses. Generally, data demonstrating three
enable the bandwidth requirement in a reliable way. characteristics can be labeled as big data: it has a large
Since IoT data contains critical information, it is imperative volume; the velocity or frequency of this data generation,
that the data to be secured from all types of attacks. Attackers storage, or transmission is high; and there is a lot of variation
can modify the data to cause system instabilities or even of data in the dataset. These features match with the data IoT
blackout. To ensure the reliability, a two-layer devices generate, and thus the data generated in the smart
communication security can be constructed: one inside grid can be considered big data. Fig. 6 shows how expanding
substations using already deployed security measures for all in the aforementioned three sectors define big data. Although
data communication, and the other by secured means such as big data means a massive amount of data, technically it
encryption for data stream outside substation. All analytical covers the predictive and behavioral analysis using those
functions using IoT data assume that the incoming data is data. This huge amount of data is available at every aspect of
error free and continuous. But PMU measurements can our lives, and demands critical analysis. Scientists,
become unavailable due to unexpected failure of the PMUs businessmen, social welfare organizations, economists, and
or PDCs or due to loss of communication links caused by many others need to process through this large volume of
congestion of communication network. This missing data information that is available online. Big data analytics is
will result in wrong outputs from the analytical functions. based on this massive data, and the associated analytic
Practical counter measures for reliable and secure data techniques, which is visualized in fig. 7. These techniques
transfer are: building in as much redundancy as possible in are based on different platforms such as Windows, Linux,
PMUs, PDCs and communication; proper PMU placement Mac etc., and they require certain levels of expertise. They
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
FIGURE 7. The components that create big data analytics. Big data and
the techniques to analyze it has created the discipline of big data
analytics [87].
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE IV
DIFFERENT ANALYTICAL TOOLS FOR BIG DATA, THEIR PLATFORMS, REQUIRED SKILL LEVELS, AND LIMITATIONS (ADAPTED FROM [88]).
Tool Category Platform Skill Level Limitations
Data Data cleaning Browser Advanced begineer Sends data to an external site which
Wrangler compromises securtiy.
R Project Statistical analysis Linux, Mac, Unix, Intermediate to advanced Takes time to adapt; interface is text-only;
Windows has limited memory.
TimeFLow Temporal data analysis Desktop+Java Beginner No option available for exporting results.
NodeXL Network analysis Windows Expert Problems with application program interface
(API).
CSVKit CSV (comma-separated values) Linux or Mac with Expert Slow to adapt; Dependant on Python.
file analysis Python
Tableau Visualization app Windows Advanced beginner to Sends data to public website which
intermediate compromises securtiy.
TABLE V
ADVANTAGES, APPLICATION, DIFFICULTY LEVEL, SYSTEM REQUIREMENT, SOFTWARE PLATFORM, AND COST ASSOCIATED WITH SOME BIG DATA
ANALYSIS TECHNIQUES (ADAPTED FROM [89]).
List of Methods Advantage Application Difficulty System Required Software Cost
Level Involved involved
Machine learning Strategic resource usage, Building and training Expert Training dataset, AI Python, Matlab High
simplified management. intelligent system. algorithms.
Data mining Summarizing relevant Data extraction, data Expert Crawler, NLP. Python, R, High
information from a large cleaning, data labeling. Matlab
amount of data.
Genetic Saving time during traning, Training optimization. Expert Genetic representation, Matlab, Python High
llgorithms quick convergance. fitness function.
Neural networks Less mean squared error Anomaly detection, Expert Training dataset, Matlab, Python High
(MSE). pattern recognition, hidden layer,
prediction. optimization.
Natural language Handling text data. Analyzing and Expert NLP tool Python High
processing (NLP) visualizing text data.
A/B testing Figuring out the best Web analytics. Beginner Browers Google Medium
strategies. analytics,
Optimizely
Cluster Gaining insights from data. Data grouping, Intermediate Classifers Python, Matlab Medium
classification.
Crowd-sourcing Human intuition, real time Gathering large scale Beginner Web page FeatureHub Low
analysis. data features.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
decisions to run the grid; and thus enables the smart grid to management employing entropy based feature selection,
function as it is intended to. machine learning, and soft computing was proposed by
Machine learning (ML) is a term which refers to learning Jurado et al. in [132]. Several algorithms such as extreme
and making predictions from available data by a system. It is learning machine, support vector regression, improved
comprised of various algorithms which analyze the available second order, decay radial basis function neural network, and
data through a set of instructions to produce data-driven error correction to train common radial basis function
predictions and/or decisions. Machine learning undergoes the networks for predicting load was investigated in [133]. Ryu
rigorous process of designing and programming explicit et al. proposed a deep neural network (DNN) load
algorithms with expected performance. The steps and forecasting method for short term prediction at the load side
associated standards of this process are presented in table which demonstrated as high as 29% less error compared to
VII. Machine learning functionalities include predictions of existing systems such as shallow neural network (SNN), and
consumption, price, power generation, future optimum double seasonal Holt-Winters (DSHW) [91]. A graphics
schedule, fault detection, adaptive control, sizing, and processing unit (GPU) based load forecasting method has
detection of network intruders during a data breach [109- been proposed in [92]. A 45 MW smart grid in University of
116]. Xu et al. presented an assessment model for analyzing California San Diego (UCSD) is considered in [134]. This
transient stability which employed extreme learning grid supplies 54000 consumers from both renewable and
machine, and demonstrated impressive accuracy and non-renewable energy sources. The UCSD grid is equipped
computational speed when tested on New England 39 bus with advanced monitoring and storage techniques. In that
system [117]. Wang et al. pursued a similar objective with work, big data analyses have been done leveraging large
their novel core vector machine (CVM) algorithm to utilize amount of data and the Hadoop system. Machine learning
big data generated by PMU, their system was also tested on can also be applied for various security applications in smart
the New England bus system [118]. For transmission grid. A concise presentation of such uses is shown in fig. 9.
systems, machine learning can be employed to analyzed the However, the most promising and much needed use of
phasor measurement unit (PMU), and micro phasor machine learning in the next generation energy system is the
measurement unit (µPMU) data for uses such as system renewable energy sector. And therefore, in the following
visualization and frequency detection. Machine learning can subsections, implementation of machine learning in SG with
be used in these purposes alongside other software such as renewable energy sources is discussed.
power plant model validation tool (PPMV), and free flight
risk assessment tool (FRAT). Several machine learning
methods are being introduced at different phases of
renewable energy power system based SGs, creating a whole
new prospect for research [119-121]. For example, the
support vector machines (SVM) have been widely
implemented into several problems of renewable energy
power systems, which provided many optimization and
prediction techniques in SG [122-124]. Economic
optimization for smart grid prosumer node with a two-level
control scheme is developed in [125]. Machine learning
based fast and accurate algorithm for monitoring power
quality (PQ) events in an SG has been developed recently in
[126, 127]. Li et al. applied machine learning to analyze user
predilections in a smart grid to find out usage pattern and
preferences [128]. In [129], Remani T. et al. demonstrated a
generalized use of reinforced learning to schedule residential
load considering renewable energy sources and all possible
tariff types. For distributed generation systems, islanding
detection using machine learning and wavelet design was
investigated in [130]. Application of particle swarm
optimization (PSO) to enhance stability for unplanned
islanding in microgrid is proposed in [131]. Big data analysis
to monitor and detect such islanding incidents comes before
this stabilization stage. A hybrid system for demand side
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE VII
STEPS INVOLVED IN MACHINE LEARNING AND DATA MINING [135].
Steps involved Standards
Determining objective ◼ ◼ ◼
Collecting data ◼ ◼ ◼ ◼
Cleansing data ◼ ◼ ◼ ◼
Reducing data ◼ ◼ ◼
Reformulating problem ◼
Explorating data ◼ ◼
Selecting tools ◼ ◼
Constructing model ◼ ◼ ◼ ◼
Validating model ◼ ◼ ◼ ◼
Interpretating result ◼ ◼ ◼ ◼
Deployment ◼ ◼ ◼
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
was shown that overstated trading information can result in for such prediction in [185]. This method outperformed
reduced utility of smart grids. statistical regression algorithms in terms of robustness to
prediction numbers, bias, and accuracy. A hierarchical model
B. MACHINE LEARNING APPLICATION IN SOLAR was proposed based on the machine learning algorithms by
ENERGY FORECASTING Li et. al. in reference [186]. In this work, 15-minute averaged
Solar energy is one of the most prominent renewable energy power measurements were collected from the year 2014.
sources. Solar photovoltaic (PV) systems had 22 GW of Computing error statistics models were used to test its
global capacity in 2009 and almost 139 GW in 2013 [170, accuracy. The hierarchical forecasting approach utilized
171]. Similar to wind energy sources, the solar power machine learning tools at a micro level to predict each
systems too are impeded by many difficulties. Many natural inverter performance. Then it evaluated the performances at
and man-made impediments such as weather conditions, a larger level by adding up the micro level predictions. In
seasonal changes, topographic elevation, discontinuous that way, it provided a bigger picture of the plant. This
production, and intra‑hour variability have effects on solar framework is visualized in fig. 36. Table VIII summarizes
PV system performance. As a result, solar energy the applications of machine learning techniques in renewable
information should be acquired in advance to minimize the source integrated smart grid encountered in literature.
operating costs caused by the various obstacles mentioned
above. Prediction models for both meteorological forecasts
and system outputs were presented in references [172-178].
A forecasting approach aiming at very short-term solar
power forecast based on the city of Évora, Portugal was
proposed in reference [93]. This model used a vector
autoregressive model fitted with recursive least squares. Data
from smart meter and other smart components at medium
voltage/low voltage (MV/LV) substation level were used in
this model. Chaouachi et al. proposed a neuro-fuzzy system
for maximum power point tracking (MPPT) in 20 kW solar
photovoltaic (PV) system in [179]. This method utilized
classifier running on fuzzy logic in accordance with three
artificial neural network having multiple layers. Reference
[180] utilized those two methods for an intelligent energy
management system that could predict PV generation 24
hours ahead. Another day-ahead forecasting method that
could take weather data into consideration was presented in
[181] by Yang et al. Their method was a hybrid one,
employing three different machine learning techniques in the
three stages of the prediction system, and was trained on data
collected from the Taiwan Central Weather Bureau. Hossain
et al. emlpoyed machine learning techniques such as
multilayer perceptron (MLP), least median square (LMS),
and support vector machine (SVM) in forecasting of solar
power in two-phase experiment, where the second phase
concentrated on parameter optimization to find out
performance enhancement margin before and after such
optimization [182]. They concluded that increased attention
in parameter optimization and selection of feature subset
could go a long way to increase prediction accuracy. Li et al.
proposed a solar irradiance forecasting technique employing
SVM regression and hidden Markov model in [183]. A coral
reefs optimization - extreme learning machine (CRO–ELM)
algorithm was proposed in reference [184] to predict solar
irradiation worldwide – which demonstrated better
performance than conventional ELM and SVM. Salcedo-
Sanz et al. also employed Gaussian process regression (GPR)
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE VIII
APPLICATION OF MACHINE LEARNING TECHNIQUES IN SMART GRIDS WITH RENEWABLE ENERGY SOURCES.
Reference Institute Year Machine Technique Application
learning strategy
Xu et al. Hong Kong Polytechnic 2011 Data Extreme learning machine Assessment model for
[117] University, Hong Kong (with categorization analyzing transient
external collaboration) stability
Wang et al. Wuhan University, China 2016 Classification Core vector machine (CVM) Analyzing transient
[118] (with external collaboration) stability
Li et al. [128] The University of Oklahoma, 2011 Pattern Machine learning Finding out customer
USA recognition usage pattern and
preferences
Alshareef et University of Ontario Institute 2014 Detection & Machine learning and wavelet design Islanding detection in
al. [130] of Technology, Canada Classification distributed generation
systems
Jiang et al. National Renewable Energy 2017 Optimization Particle swarm optimization Enhancing stability for
[131] Laboratory, USA (with unplanned islanding in
external collaboration) microgrid
Jurado et al. Sensing & Control Systems, 2015 Data Entropy based feature selection, machine Demand side
[132] Spain (with external categorization & learning, and soft computing management
collaboration) Optimization
Marvuglia et CRP Henri Tudor/CRTE, 2012 Detection Generalized mapping regressor (GMR) Detecting faults in wind
al. [160] Luxembourg (with external farms
collaboration)
Fan et al. Monash University, Australia 2009 Classification & Bayesian clustering Scheduling wind farm and
[161] (with external collaboration) Optimization trading of wind power
Lee et al. University of Texas at Austin, 2014 Prediction Guassian process and neural network Predicting wind power
[162] USA
Salcedo-Sanz Universidad de Alcalá, Spain 2014 Prediction & Extreme learning machine and coral reefs Short term wind power
et al. [163] (with external collaboration) Optimization optimization (CRO) algorithm prediction
Zhang et al. Wuhan University, China 2016 Data Variational mode decomposition and quantile Short term wind power
[164] (with external collaboration) categorization & regression averaging prediction
Prediction
Yeh et al. University of Technology 2014 Prediction & Improved simplified swarm optimization Predicting wind power
[165] Sydney, Australia (with Optimization (iSSO) generation
external collaboration)
Rahmani et Universiti Teknologi Malaysia, 2013 Prediction & Particle swarm optimization (PSO) and ant Short term wind power
al. [166] Malaysia (with external Optimization colony optimization (ACO) prediction
collaboration)
Wang et. al. Nanjing University of 2018 Prediction Hybrid strategy based on a three-phase signal Wind speed prediction
[167] Information Science and decomposition (TPSD) technique, feature
Technology, China (with extraction (FE) and weighted regularized
external collaboration) extreme learning machine (WRELM)
Chaouachi et Tokyo University of 2010 Detection Neuro-fuzzy system Maximum power point
al. [179] Agriculture and Technology, tracking (MPPT) in solar
Japan photovoltaic (PV) system
Chaouachi et Tokyo University of 2013 Prediction Neuro-fuzzy system Intelligent energy
al. [180] Agriculture and Technology, management system for
Japan (with external photovoltaic generation
collaboration) prediction
Yang et al. National Cheng Kung 2014 Prediction Hybrid machine learning employing learning Forecasting solar
[181] University, Taiwan (with vector quantization (LVQ), self-organizing generation considering
external collaboration) map (SOM) network, and Support vector weather data
regression (SVR) at different stages
Hossain et al. Central Queensland 2013 Prediction Multilayer perceptron (MLP), least median Forecasting solar power
[182] University, Australia square (LMS), and support vector machine
(SVM)
Li et al. [183] CSIRO CCI, Australia (with 2016 Prediction SVM regression and hidden Markov model Forecasting solar
collaboration) irradiance
Salcedo-Sanz Universidad de Alcalá, Spain 2014 Prediction Coral reefs optimization – extreme learning Predicting solar
et al. [184] (with external collaboration) machine (CRO–ELM) algorithm irradiation worldwide
Salcedo-Sanz Universidad de Alcalá, Spain 2014 Prediction Gaussian process regression (GPR) Predicting solar irradiance
et al. [185] (with external collaboration) worldwide
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE IX
AVAILABLE INFORMATION IN A SMART GRID SYSTEM THAT CAN BE TARGETED IN CYBER-ATTACKS [195].
Data Element Type of Asset Description
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
units (PMU) and control center etc. [196, 200]. FDIAs are
TABLE X modeled mathematically in [197, 201]. The advanced
VULNERABLE COMPONENTS OF DIGITAL ELECTICAL UTILITY
INFRASTRUCTURE THAT CAN BE TARGETED FOR CYBER-ATTACKS [194]. metering infrastructure (AMI) is one of the most targeted
Component Related Assets parts of a smart grid for cyber-attacks due to its large
proportions and cyber-physical properties [202]. Wei et al.
Billing and Debt Collection (BDC) Customers, personal
information
listed the attacks on AMI components such as smart meters,
Supervisory Control and Data Acquisition National Utility Network, and communication network in [202], FDIA, and distributed
(SCADA) Centralized system denial of service (DDoS) appeared as risks in both sectors.
Programmable Logic Controller (PLC) Subsystem of SCADA, Fault Thus false data injection poses a significant threat that can be
Recorders
Energy Management Systems Electric Utility Grid
carried out in stealth to misguide the state estimation process,
(EMS)/Distribution Management Systems information and disrupt measurement and monitoring systems in smart
(DMS) grid [199]. Energy trading is also a prominent feature of
Cyber Physical System (CPS) Overall monitoring smart grids, which requires the exchange of energy prices,
elements, Computer based
algorithms contracts, and transactions between grid entities. Because of
Power Line Communication Smart Meters, Public these, the system attracts attacks including availability
Cellular Network attacks, integrity attacks, and confidentiality attacks. If the
energy trading sector is exploited, energy, money, and data
theft as well as DoS attacks are possible [203].
Among consumer-level energy appliances, home energy
management system (HEMS) is a common one. In an
HEMS, security and privacy of communication infrastructure
is provided by the home gateway (HG) system. Network and
software attacks are both capable of damaging HEMS. Smart
meters which record energy data from the user-end to billing
have a connection which is stable and trustable with the
home gateway system. Neither of these devices can be shut
down remotely. They do not have the physical access of
HEMS. Smart meters use wireless LAN (WLAN) and other
communication networks which should be tamper proof.
Home gateway serves as a communication channel of SG. Its
configuration is controlled by the suppliers. Any error in the
data can be reported to the meter point operator (MPO).
FIGURE 12. Predicted attack sources over the years. IoT always
Network attack is the most important concern of HG. Every
remains a major vulnerability against cyber-threats. “CxO issues” component of HG has cryptographic key-stores, which use
indicate data breaches at corporate officer levels.
different protocols for secret key generation, key exchange
In a data-based system like the smart grid, false data and management. Different protection levels are associated
injection can have devastating effects, and that motivation with each protocol. Table XI compares some of the most
acts behind false data injection attacks (FDIA). The objective common attack types to demonstrate their relative effects on
of such attacks is to alter original data in an attempt to smart meter systems, and associated financial impacts. It can
mislead the system. Load distribution attack, stealthy be concluded from this comparison that availability attacks
deception attack, covert cyber deception attack, data integrity are the most severe ones, as they have the most adverse
attack, and malicious data attack – all these terms are also effects on the smart meter systems, while all three attack
used to mention such attacks [196, 197]. FDIAs need to be types have serious financial tolls. If compared within the
capable of escaping bad data detection (BDD) protocols in availability attack categories, radio frequency jamming, and
place, and perform stealth attacks on the system state reply attacks are the most effective ones financial sabotage
estimation mechanism [196] – which is fundamental to and smart meter communication blockade; however, denial
monitor the state of a power system [197]. Also, most of the of service (DoS) is the weapon of choice for inducing delay
legacy BDD systems fail to detect such attacks [197]. Along in the smart meter system effectively [204].
with affecting the state estimations, FDIA can disrupt
electricity markets through false economic dispatch and data
[196, 198, 199]. False data can occur in the cyberspace, or in
the physical space to affect device operation. These can
result in flooding of a communication network, corruption of
data, authentication failure, replacement of data packet from
communication channels connecting phasor measurement
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
N N!
TABLE XI Total ( ) (6)
COMMON ATTACK TYPES AND THEIR IMPACTS (ADAPTED FROM [204]). k k !( N k )!
Attack Financial Delay in Duration of Now if N-2 contingency is considered (taking k = 2), the
Impact Smart Smart Meter
Meter Communication
possible combinations of simultaneous attacks will be:
System Blockade
Denial of * ** * N N! N ( N 1) (N 2 N )
service ( ) ( ) (7)
Radio *** * *** 2 2!( N 2)! 2 2
Availability
frequency Therefore, it is very much possible to cripple power
attacks
jamming
Reply *** * ***
systems with well-planned attacks.
attacks Cyber-attacks on infrastructure is a very possible reality. In
Integrity attacks *** * * the fiscal year of 2014 alone, 79 such attacks on the United
Confidentiality attacks *** * * States energy companies have been recorded by a
***: extreme, **: moderate, *: mild Department of Homeland Security division. In 2013, this
number was 145. 37% of USA energy companies failed to
To visualize the process of cyber-attacks in a smart grid prevent attackers in the time-period of April 2013 to 2014
system, a simple scenario can be considered where the state [208]. During 1994-2004, the transmission system was
of a power system is expressed in complex magnitudes of attacked the most worldwide – a staggering 62% of all
voltages and bus angles. Taking the voltage magnitudes as V, attacks in this period were aimed at this part of the power
and the angles as , the state vector as S can be defined as system, as presented by the Journal of Energy Security [209].
[193]: Attack percentages on all major power grid components in
this time are presented in fig. 13. Some recent attacks are
S [1 2 3 ...... nV1V2V3 ......Vn ]T (1) presented in table XII. In this age of connected systems,
The state estimation can be stated as below [205]: cyber-security thus appeared as a serious concern in the
energy sector. 63% of utility executives believe their
m countries’ utility grids face significant of moderate risks of
min J ( X ) wi ( zi hi ( X )) 2 (2) being targets of cyber-attacks in the next five years, as found
i 1 in a global survey conducted in October 2017. Their
Here, h(X) acts as the measurement function to represent concerns regarding electric supply interruption from cyber-
the measurement of the weights: z and w, m is the maximum attacks are visualized in fig. 14, which shows moderate
number of measurement. Without any error, likelihood of attacks worldwide is almost 50%, with a similar
scenario over North America, Asia Pacific, and Europe.
Zi hi ( X ) (3) However, while considering significant likelihood, Europe
With error, this will be: expects the least amount of attacks [210]. A survey
conducted by McAfee in 2007 documented large-scale
Zi hi ( X ) ei (4) DDoS attacks. Frequencies of those attacks on infrastructures
of different countries are shown in fig. 15. Brazil’s systems
Here e indicates the measurement error. Now if a cyber-
appear to be the most attacked ones, hit 80% of the time,
attack aimed at inserting malicious data in this power system
followed closely by India, France, Spain, and Italy [209].
is launched, and it succeeds in modifying the measurement
This survey contrasts with the one presented in fig. 16, as the
data with an attack vector, , then the control system will
most three of the most hit countries (France, Spain, and Italy)
receive the following measurement data:
are European. But these attack statistics are from 2007, and
the survey visualized in fig. 15 is from 2017: which
Zi hi ( X ) ei (5) demonstrates the significant improvement in European
For contingency analysis [206], with W&W 6 bus system cyber-infrastructure that almost negated significant
considered as the benchmark, power security was intended to likelihood of cyber-attacks in that region. Both of these
be maintained for N-1 contingencies by the North American surveys, however distant their time periods are, placed the
Reliability Corporation (NERC) [207]. Even so, power United States as a prime target of attacks. Then it is no
systems remain exposed to damages resulting from outages surprise to find this country as the one facing the most
in multiple branches – for example N-k contingencies. For N damages – $17.6 million – as documented in a 2017 report
number of branches, total contingencies to be considered for [211]. These losses faced by different countries are presented
k outages can be formulated as: in fig. 15, where no other country faced so much penalty as
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
the US, and Australia was the least hurt – capping the
damage costs at $4.3 million. But being the target of the
majority of cyber-attacks may have made the United States
evolve as one the most prepared countries to face such
adversaries, as shown in fig. 17 [212]. However, this 2015
preparedness index did not help the city of Atlanta in the
state of Georgia, USA, when most of its municipal activities
shuddered to a halt after being attacked by a ransomware on
March, 2018. This situation persisted for five days, after
which the system recovered partially [213]. This is just a
demonstration of the fast-evolving cyber-threats, and the
need of better counter-measures.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE XII
SOME RECENT CYBER-ATTACK INCIDENTS.
References Year Location Attacked System Impact of the Attack
[214] September, Siemens systems at U.K., Windows operation system Unstable power system operation.
2010 North America Korea, and
Iran
[215] August, Midwest and Northwest Software program of the Up to 4-day-long blackouts in some parts, affecting around
2003 U.S and Ontario, Canada cyber system 50,000,000 people and 61,800 MW of electric load.
[215] September, Italy and Switzerland Communication system Disruption in power supply affecting a total of 56,000,000
2003 within the power grid people. 18 hours of blackout in Italy causing massive financial
operators damage.
[215] November, Southwest Europe Communication system Large blackout.
2006
[216] December, Ukrainian Kyivoblenergo Computer and SCADA Blackout lasting 3 hours, affecting 225,000 people.
2015 System
[217] June, Ukraine Network system Power providers, major banks, government and airport
2017 computers taken out of service.
[213] March, Atlanta, Georgia Municipal system City government’s computer systems, traffic ticket system,
2018 water bill payment system, and airport WiFi were taken out by
ransomware, affecting around 6,000,000 people.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE XIII
CURRENT CYBER-SECURITY STANDARDS AND STANDARDIZATION ORGANIZATIONS.
Standards Full Form Description
ISO/IEC ISO/IEC 27001:2013 – Information technology A standard for information security management system (ISMS).
27001 [229] – Security techniques – Information security
management systems – Requirements
CISQ [230] Consortium for IT Software Quality Standards to automate measurement of structural quality of software, and their size.
ISF [231] Information Security Forum Issued an inclusive list of information security best-practices named ‘Standard of Good
Practice (SoGP)’, updated every two years, except 2013-2014, the latest version came
out in 2016 [232].
NERC [233] North American Electric Reliability Corporation Aimed at identifying the source(s) utilized
NIST CSF National Institute of Standards and Technology Presents a high level taxonomy for outcomes of cybersecurity, along with a
[234] Cybersecurity Framework methodology for assessing and managing those outcomes.
ISO/IEC International Organization for Develops the ‘Common Criteria’ [236], and allows integration and secure testing of
15408 [235] Standardization/International Electrotechnical many different software and hardware products.
Commission 15408
RFC 2196 Request for Comments Developes security procedurs and policies for internet-connected information systems.
[237] Provides a broad and general overview of security of information which includes
security policies, incident response, and network security.
ISA/IEC International Society of Series of technical reports, standards, and related information to delineate procedures to
62443 [238] implement industrial automation and control systems (IACS) that are secure
Automation/International Electrotechnical
electronically. Applicable to system integrators, end-users, control systems
Commission 62443
manufacturers, and security practitioners responsible for designing, manufacturing,
managing, or implementing industrial automation and control systems.
TABLE XIV
ENCRYPTION ALGORITHMS FOR CYBER-SECURITY.
Category Name Key lengths for use between Key lengths for use now and beyond Reference
2011-2029 2030
(per SP 800-57 and SP 800-131) (per SP 800-57 and SP 800-131)
Symmetric Key Advanced Encryption Standard (AES) AES-128, AES-192, and AES-256 AES-128, AES-192, and AES-256 with [239]
with ECB, CBC, OFB, CFB-1, ECB, CBC, OFB, CFB-1, CFB-8, CFB-
CFB-8, CFB-128, CTR, or XTS 128, CTR, or XTS mode.
mode.
Triple-Data Encryption Algorithm 3-key TDES with TECB, TCBC, N/A – cannot use TDES beyond 2030 [240]
(TDEA) TCFB, TOFB, or CTR mode.
Asymetric Key Digital Signature DSA with (L=2048, N=224) or DSA with (L=3072, N=256) **, RSA [241]
Standard (DSS): (L=2048, N=256), RSA with with (|n|=3072) **, ECDSA2 with curves
Digital Signature Algorithm (DSA), (|n|=2048), ECDSA2 with curves P-256, P-384, P-521, K-283, K-409, K-
Rivest–Shamir–Adleman (RSA), P-224, K-233, or B-233 571, B-283, B-409, B-571
Elliptic Curve Digital Signature
Algorithm (ECDSA)
Secure Hash Secure Hash Algorithm (SHA) SHA-224 is approved for all SHA-256, SHA-384, and SHA-512 are [242]
Standard applications. Approved for all applications.
Message Cipher-based Message Authentication CMAC with 3-key TDES CMAC with AES-128, AES-192, or [243]
Authentication Code (CMAC) AES-256
Cipher block chaining - message All algorithms/key sizes listed in CCM with AES-128, AES-192, or AES- [244]
authentication code (CCM) the next column are approved. 256
Galois/Counter Mode (GCM)/ Galois All algorithms/key sizes listed in GCM with AES-128, AES-192, or AES- [245]
Message Authentication Code the next column are approved. 256
(GMAC)
Hash-based Message Authentication HMAC with SHA-1, SHA-224, HMAC with SHA-1, SHA-224, SHA- [246]
Code (HMAC) SHA-256, SHA-384, or SHA-512 256, SHA-384, or SHA-512 with Key
with 112 ≤ Key Length<128 bits Length ≥ 128 bits
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
TABLE XVI
DIFFERENT SOFTWARE ATTACKS AND THEIR COUNTER MEASURES [44, 202].
Attack Type Description Counter Measure
Spoofing Unauthorized user can have access to a user's information; attacker may delete, change Introducing strong authentication
or control the information. mechanism
Password encryption
Using secure communication
protocol
Tampering Attackers modify user policies and Strong authorization
device parameters; possibility of harming people physically Digital signal
Secure communication link
Stackelberg game
Information disclosure User privacy can be manipulated. Strong authorization
Password encryption
Introducing private-enhanced
protocols
Denial of service (DoS) & Stopping all communications between stake holders, denial of access to EMS may be Use of home gateway to filter
Distributed denial of possible. address with the help of firewall
service (DDoS) Using trolling technique
Strong authorization
Honeypot models
Elevation of privileges The EMS includes third party plug-ins; which allow a sandboxed space in the EMS’s Assigning minimum role for users
functionality. When a malicious plug-in finds a backdoor, it could compromise EMS’s Accurate working of entire system
assets.
False data injection attack Injecting false data in the system. Using secure encryption techniques
(FDIA)
Unauthorized Access Gaining access to a program, service, server, website, or other system by means of Installing both spyware and virus
others’ accounts or some other method. protection programs
Protect sensitive data including
passwords and credit card
information
Traffic Analysis A special type of inference attack technique, monitoring communication patterns Dummy traffic approach to prevent
among entities of a system. traffic analysis attack employing
Friend in the Middle (FiM)
Eavesdropping Unauthorized interception of a private communication, for example instant message, Encryption
videoconference, phone call, or fax transmission, in real-time .
Masquerading Attacker pretending to be an authorized user for gaining access to a system. Enhanced key management
systems
Reply attacks Fraudulently or maliciously delaying or repeating a valid data transmission. Also Timestamping
known as playback attack.
Message modification and Modifying data on a target machine or direct a message to an alternate destination by Use of web application firewall
injection altering packet header addresses. Regular software patches
Suppressing error messages
Man-in-the-middle Secret relaying and possible alternation of communication between two parties who Secure or multipurpose internet
(MITM) attacks believe they are directly communicating with each other by an attacker in the middle. mail extensions
Authentication certificates
Flooding A form of denial-of-service attack, executed by sending a succession of SYN Filtering
(synchronize) requests to a target's system aimed at consuming enough server Increasing backlog
resources in order to make the system unresponsive to legitimate traffic. TCP half-open
Radio frequency(RF) Severe Denial-of-service attacks aimed at wireless medium. The attacker targets data Anti-jamming technologies
jamming packets of high importance by emitting radio frequency signals and do not follow
underlying network architecture.
Vulnerability attacks Vulnerability is a weakness that allows an attacker to reduce the information assurance Host-based intrusion detection
of a system. Vulnerabilities appear when three conditions meet: presence of system system
susceptibility or flaw, access of an attacker to that susceptibility, and the attacker’s Use of web proxy
capability to exploit this susceptibility. Use of accounts without
administrative privileges
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[4] E. Hossain, E. Kabalci, R. Bayindir, and R. Perez, [20] S. Aman, Y. Simmhan, and V. K. Prasanna, "Holistic
"Microgrid testbeds around the world: State of art," Energy measures for evaluating prediction models in smart grids,"
Conversion and Management, vol. 86, pp. 132-153, 2014. IEEE Transactions on Knowledge and Data Engineering,
[5] W.-Y. Chiu, H. Sun, and H. V. Poor, "A multiobjective vol. 27, pp. 475-488, 2015.
approach to multimicrogrid system design," IEEE [21] S. Aman, M. Frincu, C. Chelmis, M. Noor, Y. Simmhan, and
Transactions on Smart Grid, vol. 6, pp. 2263-2272, 2015. V. K. Prasanna, "Prediction models for dynamic demand
[6] J. Rodríguez-Molina, M. Martínez-Núñez, J.-F. Martínez, response: Requirements, challenges, and insights," in Smart
and W. Pérez-Aguiar, "Business models in the smart grid: Grid Communications (SmartGridComm), 2015 IEEE
Challenges, opportunities and proposals for prosumer International Conference on, 2015, pp. 338-343.
profitability," Energies, vol. 7, pp. 6142-6171, 2014. [22] M. Manfren, "Multi-commodity network flow models for
[7] J. Yuan, J. Shen, L. Pan, C. Zhao, and J. Kang, "Smart grids dynamic energy management–Mathematical formulation,"
in China," Renewable and Sustainable Energy Reviews, vol. Energy Procedia, vol. 14, pp. 1380-1385, 2012.
37, pp. 896-906, 2014. [23] P. D. Diamantoulakis, V. M. Kapinas, and G. K.
[8] B. L. R. Stojkoska and K. V. Trivodaliev, "A review of Karagiannidis, "Big data analytics for dynamic energy
Internet of Things for smart home: Challenges and management in smart grids," Big Data Research, vol. 2, pp.
solutions," Journal of Cleaner Production, vol. 140, pp. 94-101, 2015.
1454-1464, 2017. [24] J. Yuan, S. Sun, J. Shen, Y. Xu, and C. Zhao, "Wind power
[9] D. S. Markovic, I. Branovic, and R. Popovic, "Smart Grid supply chain in China," Renewable and Sustainable Energy
and nanotechnologies: a solution for clean and sustainable Reviews, vol. 39, pp. 356-369, 2014.
energy," Energy Emission Control Technol, vol. 3, pp. 1-13, [25] D. A. Powner, Electricity Grid Modernization: Progress
2015. Being Made on Cybersecurity Guidelines, But Key
[10] W. Yu, G. Wen, X. Yu, Z. Wu, and J. Lü, "Bridging the gap Challenges Remain to be Addressed: DIANE Publishing,
between complex networks and smart grids," Journal of 2011.
Control and Decision, vol. 1, pp. 102-114, 2014. [26] S. Simitis, "From the market to the polis: The EU directive
[11] S. Abdollahy, A. Mammoli, F. Cheng, A. Ellis, and J. on the protection of personal data," Iowa L. Rev., vol. 80, p.
Johnson, "Distributed compensation of a large intermittent 445, 1994.
energy resource in a distribution feeder," in Innovative Smart [27] J. Hu and A. V. Vasilakos, "Energy big data analytics and
Grid Technologies (ISGT), 2013 IEEE PES, 2013, pp. 1-6. security: challenges and opportunities," IEEE Transactions
[12] J. P. Lopes, C. Moreira, and A. Madureira, "Defining control on Smart Grid, vol. 7, pp. 2423-2436, 2016.
strategies for analysing microgrids islanded operation," in [28] P. Leitao, S. Karnouskos, L. Ribeiro, J. Lee, T. Strasser, and
Power Tech, 2005 IEEE Russia, 2005, pp. 1-7. A. W. Colombo, "Smart agents in industrial cyber–physical
[13] H. Gharavi and R. Ghafurian, "Smart Grid: The Electric systems," Proceedings of the IEEE, vol. 104, pp. 1086-1101,
Energy System of the Future [Scanning the Issue]," 2016.
Proceedings of the IEEE, vol. 99, pp. 917-921, 2011. [29] M. Safiuddin, HISTORY OF ELECTRIC GRID, 2013.
[14] A. Amato, R. Aversa, B. Di Martino, and S. Venticinque, "A [30] E. Hossain, R. Perez, A. Nasiri, and S. Padmanaban, "A
cyber physical system of smart micro-grids," in Network- Comprehensive Review on Constant Power Loads
Based Information Systems (NBiS), 2016 19th International Compensation Techniques," IEEE Access, vol. 6, pp. 33285-
Conference on, 2016, pp. 165-172. 33305, 2018.
[15] M. Kezunovic, "Data Analytics: Creating Information and [31] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,
Knowledge [Guest Editorial]," IEEE Power and Energy "Internet of Things (IoT): A vision, architectural elements,
Magazine, vol. 10, pp. 14-23, 2012. and future directions," Future generation computer systems,
[16] D. Alahakoon and X. Yu, "Smart electricity meter data vol. 29, pp. 1645-1660, 2013.
intelligence for future energy systems: A survey," IEEE [32] A. Nordrum, "Popular internet of things forecast of 50
Transactions on Industrial Informatics, vol. 12, pp. 425-436, billion devices by 2020 is outdated," IEEE Spectrum, vol.
2016. 18, 2016.
[17] J. Shishido and E. U. Solutions, "Smart meter data quality [33] L. Liu, Y. Liu, L. Wang, A. Zomaya, and S. Hu,
insights," in ACEEE Summer Study on Energy Efficiency in "Economical and balanced energy usage in the smart home
Buildings, 2012. infrastructure: A tutorial and new results," IEEE
[18] A. McKane, I. Rhyne, A. Lekov, L. Thompson, and M. A. Transactions on Emerging Topics in Computing, vol. 3, pp.
Piette, "Automated demand response: The missing link in 556-570, 2015.
the electricity value chain," August 2009. [34] C. Gamarra, J. M. Guerrero, and E. Montero, "A knowledge
[19] X. Yu, C. Cecati, T. Dillon, and M. G. Simoes, "The new discovery in databases approach for industrial microgrid
frontier of smart grids," IEEE Industrial Electronics planning," Renewable and Sustainable Energy Reviews, vol.
Magazine, vol. 5, pp. 49-63, 2011. 60, pp. 615-630, 2016.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[35] M. Khan, B. N. Silva, and K. Han, "Internet of things based power distribution systems," Computers & Electrical
energy aware smart home control system," IEEE Access, vol. Engineering, vol. 52, pp. 183-198, 2016.
4, pp. 7556-7566, 2016. [50] A. Al-Ali, I. A. Zualkernan, M. Rashid, R. Gupta, and M.
[36] Y. Saleem, N. Crespi, M. H. Rehmani, and R. Copeland, Alikarar, "A smart home energy management system using
"Internet of things-aided Smart Grid: technologies, IoT and big data analytics approach," IEEE Transactions on
architectures, applications, prototypes, and future research Consumer Electronics, vol. 63, pp. 426-434, 2017.
directions," arXiv preprint arXiv:1704.08977, 2017. [51] F. Un-Noor, S. Padmanaban, L. Mihet-Popa, M. Mollah, and
[37] J. Pan, R. Jain, S. Paul, T. Vu, A. Saifullah, and M. Sha, "An E. Hossain, "A Comprehensive Study of Key Electric
internet of things framework for smart energy in buildings: Vehicle (EV) Components, Technologies, Challenges,
designs, prototype, and experiments," IEEE Internet of Impacts, and Future Direction of Development," Energies,
Things Journal, vol. 2, pp. 527-537, 2015. vol. 10, p. 1217, 2017.
[38] M. Ligade. (2016, April 9). Architecture for IOT [52] Z. Zhu, S. Lambotharan, W. H. Chin, and Z. Fan, "Overview
applications. Available: of demand management in smart grid and enabling wireless
https://medium.com/@maheshwar.ligade/architecture-for- communication technologies," IEEE Wireless
iot-applications-d50ece031d38 Communications, vol. 19, 2012.
[39] J. Bauernberger. (2016, April 9). Securing the Internet of [53] (2015, March 1). RTI Presents "How to Architect Microgrids
Things. Available: https://blog.valbonne- for the Industrial Internet of Things" Complimentary
consulting.com/2016/04/22/securing-the-internet-of-things/ Webinar. Available: https://www.rti.com/news/how-to-
[40] S. Thakurdesai, "Smarter Metering - Now & in Future," architect-microgrids-webinar
Texas Instruments. [54] M. Rana and L. Li, "Microgrid state estimation and control
[41] A. Basit, G. A. S. Sidhu, A. Mahmood, and F. Gao, for smart grid and Internet of Things communication
"Efficient and autonomous energy management techniques network," Electronics Letters, vol. 51, pp. 149-151, 2015.
for the future smart homes," IEEE Transactions on Smart [55] M. M. Rana and L. Li, "An overview of distributed
Grid, vol. 8, pp. 917-926, 2017. microgrid state estimation and control for smart grids,"
[42] W. Shu-wen, "Research on the key technologies of IOT Sensors, vol. 15, pp. 4302-4325, 2015.
applied on Smart Grid," in Electronics, Communications and [56] S. Kinney. (2016, March 1). The smart grid and its key role
Control (ICECC), 2011 International Conference on, 2011, in the Industrial IoT. Available:
pp. 2809-2812. https://enterpriseiotinsights.com/20160418/channels/use-
[43] Y. Wang, W. Lin, T. Zhang, and Y. Ma, "Research on cases/smart-grids-key-role-industrial-iot
application and security protection of internet of things in [57] R. Bikmetov, M. Y. A. Raja, and T. U. Sane, "Infrastructure
smart grid," 2012. and applications of Internet of Things in smart grids: A
[44] Q. Ou, Y. Zhen, X. Li, Y. Zhang, and L. Zeng, "Application survey," in Power Symposium (NAPS), 2017 North
of internet of things in smart grid power transmission," in American, 2017, pp. 1-6.
Mobile, Ubiquitous, and Intelligent Computing (MUSIC), [58] H. Mortaji, S. H. Ow, M. Moghavvemi, and H. A. F.
2012 Third FTRA International Conference on, 2012, pp. Almurib, "Load Shedding and Smart-Direct Load Control
96-100. Using Internet of Things in Smart Grid Demand Response
[45] M. M. Rogers, G. Xu, C. J. Miller, S. P. McElmurry, W. Shi, Management," IEEE Transactions on Industry Applications,
Y. Wang, et al., "HERO: A smart-phone application for vol. 53, pp. 5155-5163, 2017.
location based emissions estimates," Sustainable Computing: [59] D. Minoli, K. Sohraby, and B. Occhiogrosso, "IoT
Informatics and Systems, vol. 8, pp. 3-7, 2015. Considerations, Requirements, and Architectures for Smart
[46] B. Martinez, M. Monton, I. Vilajosana, and J. D. Prades, Buildings—Energy Optimization and Next-Generation
"The power of models: Modeling power consumption for Building Management Systems," IEEE Internet of Things
IoT devices," IEEE Sensors Journal, vol. 15, pp. 5777-5789, Journal, vol. 4, pp. 269-283, 2017.
2015. [60] A. F. Taha, J. Qi, J. Wang, and J. H. Panchal, "Risk
[47] J. Lin, C. Wan, Y. Song, R. Huang, X. Chen, W. Guo, et al., Mitigation for Dynamic State Estimation Against Cyber
"Situation awareness of active distribution network: Attacks and Unknown Inputs," IEEE Transactions on Smart
roadmap, technologies, and bottlenecks," CSEE Journal of Grid, vol. 9, pp. 886-899, 2018.
Power and Energy Systems, vol. 2, pp. 35-42, 2016. [61] Y. Seyedi and H. Karimi, "Coordinated protection and
[48] V. Madani, R. Das, F. Aminifar, J. McDonald, S. Venkata, control based on synchrophasor data processing in smart
D. Novosel, et al., "Distribution automation strategies distribution networks," IEEE Transactions on Power
challenges and opportunities in a changing landscape," IEEE Systems, vol. 33, pp. 634-645, 2018.
Transactions on Smart Grid, vol. 6, pp. 2157-2165, 2015. [62] Y. Zhang, Y. Xu, and Z. Y. Dong, "Robust classification
[49] S. A. Amin, A. Ali-Eldin, and H. A. Ali, "A context-aware model for PMU-based on-line power system DSA with
dispatcher for the Internet of Things: The case of electric missing data," IET Generation, Transmission &
Distribution, vol. 11, pp. 4484-4491, 2017.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[63] B. K. Tannahill and M. Jamshidi, "System of Systems and [78] L. Collins and J. Ward, "Real and reactive power control of
Big Data analytics–Bridging the gap," Computers & distributed PV inverters for overvoltage prevention and
Electrical Engineering, vol. 40, pp. 2-15, 2014. increased renewable generation hosting capacity,"
[64] D. Tayal, "Disruptive forces on the electricity industry: A Renewable Energy, vol. 81, pp. 464-471, 2015.
changing landscape for utilities," The Electricity Journal, [79] J. Soares, N. Borges, M. A. F. Ghazvini, Z. Vale, and P. de
vol. 29, pp. 13-17, 2016. Moura Oliveira, "Scenario generation for electric vehicles'
[65] K. Wang, Y. Wang, X. Hu, Y. Sun, D.-J. Deng, A. Vinel, et uncertain behavior in a smart city environment," Energy,
al., "Wireless big data computing in smart grid," IEEE vol. 111, pp. 664-675, 2016.
Wireless Communications, vol. 24, pp. 58-64, 2017. [80] E.-K. Lee, W. Shi, R. Gadh, and W. Kim, "Design and
[66] N. Zhang, Y. Yan, S. Xu, and W. Su, "A distributed data Implementation of a Microgrid Energy Management
storage and processing framework for next-generation System," Sustainability, vol. 8, p. 1143, 2016.
residential distribution systems," Electric Power Systems [81] N.-C. Yang and W.-C. Tseng, "Adaptive three-phase power-
Research, vol. 116, pp. 174-181, 2014. flow solutions for smart grids with plug-in hybrid electric
[67] A. Paul, A. Ahmad, M. M. Rathore, and S. Jabbar, vehicles," International Journal of Electrical Power &
"Smartbuddy: defining human behaviors using big data Energy Systems, vol. 64, pp. 1166-1175, 2015.
analytics in social internet of things," IEEE Wireless [82] K. Zhou, S. Yang, and Z. Shao, "Energy internet: the
Communications, vol. 23, pp. 68-74, 2016. business perspective," Applied Energy, vol. 178, pp. 212-
[68] N. Uribe-Pérez, L. Hernández, D. de la Vega, and I. Angulo, 222, 2016.
"State of the art and trends review of smart metering in [83] M. Peters, W. Ketter, M. Saar-Tsechansky, and J. Collins,
electricity grids," Applied Sciences, vol. 6, p. 68, 2016. "A reinforcement learning approach to autonomous decision-
[69] Z. Guan, J. Li, L. Wu, Y. Zhang, J. Wu, and X. Du, making in smart electricity markets," Machine learning, vol.
"Achieving Efficient and Secure Data Acquisition for Cloud- 92, pp. 5-39, 2013.
Supported Internet of Things in Smart Grid," IEEE Internet [84] K. Zhou and S. Yang, "Understanding household energy
of Things Journal, vol. 4, pp. 1934-1944, 2017. consumption behavior: The contribution of energy big data
[70] B. K. Tannahill and M. Jamshidi, "Big data analytic analytics," Renewable and Sustainable Energy Reviews, vol.
paradigms-from pca to deep learning," in Proceedings of the 56, pp. 810-819, 2016.
2014 The Association for the Advancement of Artificial [85] K. Zhou and S. Yang, "Demand side management in China:
Intelligence Symposium (AAAI 2014), 2014, pp. 84-90. The context of China’s power industry reform," Renewable
[71] A. Emrouznejad and A. Emrouznejad, Big Data and Sustainable Energy Reviews, vol. 47, pp. 954-965, 2015.
Optimization: Recent Developments and Challenges vol. 18: [86] K. Zhou, C. Fu, and S. Yang, "Big data driven smart energy
Springer, 2016. management: From big data to big insights," Renewable and
[72] W. Pedrycz and S.-M. Chen, Data science and big data: an Sustainable Energy Reviews, vol. 56, pp. 215-225, 2016.
environment of computational intelligence vol. 24: Springer, [87] (April 10). How can we differentiate Big Data Analytics
2017. from Statistical Predictive Modeling Techniques? Available:
[73] L. Rodríguez-Mazahua, C.-A. Rodríguez-Enríquez, J. L. http://www.zarantech.com/blog/can-differentiate-big-data-
Sánchez-Cervantes, J. Cervantes, J. L. García-Alcaraz, and analytics-statistical-predictive-modelling-techniques/
G. Alor-Hernández, "A general perspective of Big Data: [88] S. Mujawar and A. Joshi, "Data Analytics Types Tools and
applications, tools, challenges and trends," The Journal of their Comparison," IIJARCE, vol. 4, pp. 488-491, 2015.
Supercomputing, vol. 72, pp. 3073-3113, 2016. [89] P. Hassani. (2016, April 10). An Insight into 26 Big Data
[74] C. Miller, M. Martin, D. Pinney, and G. Walker, "Achieving Analytic Techniques: Part 1. Available:
a resilient and agile grid," National Rural Electric https://blogs.systweak.com/2016/11/an-insight-into-26-big-
Cooperative Association (NRECA): Arlington, VA, USA, data-analytic-techniques-part-1/
2014. [90] X. He, Q. Ai, R. C. Qiu, W. Huang, L. Piao, and H. Liu, "A
[75] J. Giri, "Proactive management of the future grid," IEEE big data architecture design for smart grids based on random
Power and Energy Technology Systems Journal, vol. 2, pp. matrix theory," IEEE transactions on smart Grid, vol. 8, pp.
43-52, 2015. 674-686, 2017.
[76] S. Aman, Y. Simmhan, and V. K. Prasanna, "Energy [91] S. Ryu, J. Noh, and H. Kim, "Deep neural network based
management systems: state of the art and emerging trends," demand side short term load forecasting," Energies, vol. 10,
IEEE Communications Magazine, vol. 51, pp. 114-119, p. 3, 2016.
2013. [92] I. M. Coelho, V. N. Coelho, E. J. d. S. Luz, L. S. Ochi, F. G.
[77] M. T. Burr, M. J. Zimmer, G. Warner, B. Meloy, J. Bertrand, Guimarães, and E. Rios, "A GPU deep learning
W. Levesque, et al., "Emerging Models for Microgrid metaheuristic based model for time series forecasting,"
Finance: Driven by the need to deliver value to end users," Applied Energy, vol. 201, pp. 412-418, 2017.
IEEE Electrification Magazine, vol. 2, pp. 30-39, 2014. [93] R. Bessa, A. Trindade, C. S. Silva, and V. Miranda,
"Probabilistic solar power forecasting in smart grids using
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
distributed information," International Journal of Electrical [107] M. Ali, Z. Dong, X. Li, and P. Zhang, "RSA-Grid: A grid
Power & Energy Systems, vol. 72, pp. 16-23, 2015. computing based framework for power system reliability and
[94] (April 10). Top 10 Data Science, Machine Learning Methods security analysis," in Power Engineering Society General
Used, 2017. Available: Meeting, 2006. IEEE, 2006, p. 7 pp.
https://www.kdnuggets.com/2017/12/top-data-science- [108] X. Wang, Q. Liang, J. Mu, W. Wang, and B. Zhang,
machine-learning-methods.html "Physical layer security in wireless smart grid," Security and
[95] V. G. Agelidis, C. Pavlovski, M. Ciobotaru, T. Communication Networks, vol. 8, pp. 2431-2439, 2015.
Tschirschwitz, R. Corke, T. Lampard, et al., "Unlocking the [109] B. Dickson. (2016, March 1). Exploiting machine learning in
Smart Grid: An Australian industry-university collaborative cybersecurity. Available:
effort to address skill gaps," in Innovative Smart Grid https://techcrunch.com/2016/07/01/exploiting-machine-
Technologies Asia (ISGT), 2011 IEEE PES, 2011, pp. 1-8. learning-in-cybersecurity/
[96] A. Sanchez and W. Rivera, "Big Data Analysis and [110] M. Frincu, C. Chelmis, M. U. Noor, and V. Prasanna,
Visualization for the Smart Grid," in Big Data (BigData "Accurate and efficient selection of the best consumption
Congress), 2017 IEEE International Congress on, 2017, pp. prediction method in smart grids," in Big Data (Big Data),
414-418. 2014 IEEE International Conference on, 2014, pp. 721-729.
[97] M. He, S. Murugesan, and J. Zhang, "Multiple timescale [111] M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, and Z. Han,
dispatch and scheduling for stochastic reliability in smart "Detecting stealthy false data injection using machine
grids with wind generation integration," in INFOCOM, 2011 learning in smart grid," IEEE Systems Journal, 2014.
Proceedings IEEE, 2011, pp. 461-465. [112] W. Liu, B. Tang, J. Han, X. Lu, N. Hu, and Z. He, "The
[98] D. Niyato, E. Hossain, and A. Fallahi, "Sleep and wakeup structure healthy condition monitoring and fault diagnosis
strategies in solar-powered wireless sensor/mesh networks: methods in wind turbines: A review," Renewable and
Performance analysis and optimization," IEEE Transactions Sustainable Energy Reviews, vol. 44, pp. 466-472, 2015.
on Mobile Computing, vol. 6, pp. 221-236, 2007. [113] A. Kusiak and Z. Zhang, "Adaptive control of a wind turbine
[99] H. Jiang, X. Dai, D. W. Gao, J. J. Zhang, Y. Zhang, and E. with data mining and swarm intelligence," IEEE
Muljadi, "Spatial-temporal synchrophasor data Transactions on Sustainable Energy, vol. 2, pp. 28-36, 2011.
characterization and analytics in smart grid fault detection, [114] A. Mellit, S. A. Kalogirou, L. Hontoria, and S. Shaari,
identification, and impact causal analysis," IEEE "Artificial intelligence techniques for sizing photovoltaic
Transactions on Smart Grid, vol. 7, pp. 2525-2536, 2016. systems: A review," Renewable and Sustainable Energy
[100] D. Li and S. K. Jayaweera, "Machine-learning aided optimal Reviews, vol. 13, pp. 406-419, 2009.
customer decisions for an interactive smart grid," IEEE [115] M. Negnevitsky, P. Mandal, and A. K. Srivastava, "Machine
Systems Journal, vol. 9, pp. 1529-1540, 2015. learning applications for load, price and wind power
[101] Y. Tang, J. Yang, J. Yan, and H. He, "Intelligent load prediction in power systems," in Intelligent System
frequency controller using GrADP for island smart grid with Applications to Power Systems, 2009. ISAP'09. 15th
electric vehicles and renewable resources," Neurocomputing, International Conference on, 2009, pp. 1-6.
vol. 170, pp. 406-416, 2015. [116] L. Wenyi, W. Zhenfeng, H. Jiguang, and W. Guangfeng,
[102] X. Fang, D. Yang, and G. Xue, "Online strategizing "Wind turbine fault diagnosis method based on diagonal
distributed renewable energy resource access in islanded spectrum and clustering binary tree SVM," Renewable
microgrids," in Global Telecommunications Conference Energy, vol. 50, pp. 1-6, 2013.
(GLOBECOM 2011), 2011 IEEE, 2011, pp. 1-6. [117] Y. Xu, Z. Dong, K. Meng, R. Zhang, and K. Wong, "Real-
[103] D. O'Neill, M. Levorato, A. Goldsmith, and U. Mitra, time transient stability assessment model using extreme
"Residential demand response using reinforcement learning," learning machine," IET generation, transmission &
in Smart Grid Communications (SmartGridComm), 2010 distribution, vol. 5, pp. 314-322, 2011.
First IEEE International Conference on, 2010, pp. 409-414. [118] B. Wang, B. Fang, Y. Wang, H. Liu, and Y. Liu, "Power
[104] H. Wang, Q. Wang, P. Liu, and L. Sun, "Big data and system transient stability assessment based on big data and
intelligent agent based smart grid architecture," in Agents the core vector machine," IEEE Transactions on Smart Grid,
(ICA), 2017 IEEE International Conference on, 2017, pp. vol. 7, pp. 2561-2570, 2016.
106-107. [119] B. Schölkopf and A. J. Smola, Learning with kernels:
[105] T. Chen, Y. Zhang, X. Wang, and G. B. Giannakis, "Robust support vector machines, regularization, optimization, and
workload and energy management for sustainable data beyond: MIT press, 2002.
centers," IEEE Journal on Selected Areas in [120] P. Zhao, J. Xia, Y. Dai, and J. He, "Wind speed prediction
Communications, vol. 34, pp. 651-664, 2016. using support vector regression," in Industrial Electronics
[106] R. C. Green, L. Wang, and M. Alam, "Applications and and Applications (ICIEA), 2010 the 5th IEEE Conference
trends of high performance computing for electric power on, 2010, pp. 882-886.
systems: Focusing on smart grid," IEEE Transactions on
Smart Grid, vol. 4, pp. 922-931, 2013.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[121] J. Zeng and W. Qiao, "Short-term solar power prediction time energy management," in Big Data, 2013 IEEE
using a support vector machine," Renewable Energy, vol. 52, International Conference on, 2013, pp. 657-664.
pp. 118-127, 2013. [135] D. François, "Methodology and standards for data analysis
[122] H. A. Kazem, J. H. Yousif, and M. T. Chaichan, "Modeling with machine learning tools," 2008.
of daily solar energy system prediction using support vector [136] Formulated.by. (2018, April 10). AI and Machine Learning
machine for Oman," International Journal of Applied in Cyber Security. Available:
Engineering Research, vol. 11, pp. 10166-10172, 2016. https://towardsdatascience.com/ai-and-machine-learning-in-
[123] J.-L. Chen, H.-B. Liu, W. Wu, and D.-T. Xie, "Estimation of cyber-security-d6fbee480af0
monthly solar radiation from measured temperatures using [137] "Global Wind 2006 Report," ed. Brussels, Belgium: Global
support vector machines–a case study," Renewable Energy, Wind Energy Council.
vol. 36, pp. 413-420, 2011. [138] H. Lund and W. Kempton, "Integration of renewable energy
[124] Y. Y. Chia, L. H. Lee, N. Shafiabady, and D. Isa, "A load into the transport and electricity sectors through V2G,"
predictive energy management system for supercapacitor- Energy policy, vol. 36, pp. 3578-3587, 2008.
battery hybrid energy storage system in solar application [139] A. M. Foley, P. G. Leahy, A. Marvuglia, and E. J. McKeogh,
using the Support Vector Machine," Applied Energy, vol. "Current methods and advances in forecasting of wind power
137, pp. 588-602, 2015. generation," Renewable Energy, vol. 37, pp. 1-8, 2012.
[125] F. Liberati and A. Di Giorgio, "Economic Model Predictive [140] F. Douak, F. Melgani, and N. Benoudjit, "Kernel ridge
and Feedback Control of a Smart Grid Prosumer Node," regression with active learning for wind speed prediction,"
Energies, vol. 11, p. 48, 2017. Applied energy, vol. 103, pp. 328-340, 2013.
[126] F. Ucar, O. F. Alcin, B. Dandil, and F. Ata, "Power Quality [141] A. Clifton, L. Kilcher, J. Lundquist, and P. Fleming, "Using
Event Detection Using a Fast Extreme Learning Machine," machine learning to predict wind turbine power output,"
Energies, vol. 11, p. 145, 2018. Environmental research letters, vol. 8, p. 024009, 2013.
[127] L. Morales-Velazquez, R. de Jesus Romero-Troncoso, G. [142] Z. Zhou, F. Xiong, B. Huang, C. Xu, R. Jiao, B. Liao, et al.,
Herrera-Ruiz, D. Morinigo-Sotelo, and R. A. Osornio-Rios, "Game-Theoretical Energy Management for Energy Internet
"Smart sensor network for power quality monitoring in With Big Data-Based Renewable Power Forecasting," IEEE
electrical installations," Measurement, vol. 103, pp. 133-142, Access, vol. 5, pp. 5731-5746, 2017.
2017. [143] C. W. Potter and M. Negnevitsky, "Very short-term wind
[128] B. Li, S. Gangadhar, S. Cheng, and P. K. Verma, "Predicting forecasting for Tasmanian power generation," IEEE
user comfort level using machine learning for smart grid Transactions on Power Systems, vol. 21, pp. 965-972, 2006.
environments," in Innovative Smart Grid Technologies [144] T. G. Barbounis, J. B. Theocharis, M. C. Alexiadis, and P. S.
(ISGT), 2011 IEEE PES, 2011, pp. 1-6. Dokopoulos, "Long-term wind speed and power forecasting
[129] T. R, E. A. Jasmin, and T. P. I. Ahamed, "Residential Load using local recurrent neural network models," IEEE
Scheduling With Renewable Generation in the Smart Grid: Transactions on Energy Conversion, vol. 21, pp. 273-284,
A Reinforcement Learning Approach," IEEE Systems 2006.
Journal, pp. 1-12, 2018. [145] B. Zhu, M.-y. Chen, N. Wade, and L. Ran, "A prediction
[130] S. Alshareef, S. Talwar, and W. G. Morsi, "A new approach model for wind farm power generation based on fuzzy
based on wavelet design and machine learning for islanding modeling," Procedia Environmental Sciences, vol. 12, pp.
detection of distributed generation," IEEE Transactions on 122-129, 2012.
Smart Grid, vol. 5, pp. 1575-1583, 2014. [146] J. L. Torres, A. Garcia, M. De Blas, and A. De Francisco,
[131] H. Jiang, Y. Li, Y. Zhang, J. J. Zhang, D. W. Gao, E. "Forecast of hourly average wind speed with ARMA models
Muljadi, et al., "Big data-based approach to detect, locate, in Navarre (Spain)," Solar Energy, vol. 79, pp. 65-77, 2005.
and enhance the stability of an unplanned microgrid [147] M. C. Mabel and E. Fernandez, "Analysis of wind power
islanding," Journal of Energy Engineering, vol. 143, p. generation and prediction using ANN: A case study,"
04017045, 2017. Renewable energy, vol. 33, pp. 986-992, 2008.
[132] S. Jurado, À. Nebot, F. Mugica, and N. Avellana, "Hybrid [148] R. E. Abdel-Aal, M. A. Elhadidy, and S. Shaahid, "Modeling
methodologies for electricity load forecasting: Entropy- and forecasting the mean hourly wind speed time series
based feature selection with machine learning and soft using GMDH-based abductive networks," Renewable
computing techniques," Energy, vol. 86, pp. 276-291, 2015. Energy, vol. 34, pp. 1686-1699, 2009.
[133] C. Cecati, J. Kolbusz, P. Różycki, P. Siano, and B. M. [149] M. Yesilbudak, S. Sagiroglu, and I. Colak, "A new approach
Wilamowski, "A novel RBF training algorithm for short- to very short term wind speed prediction using k-nearest
term electric load forecasting and comparative studies," neighbor classification," energy conversion and
IEEE Transactions on industrial Electronics, vol. 62, pp. management, vol. 69, pp. 77-86, 2013.
6519-6529, 2015. [150] L. Li, Y.-q. LIU, Y.-p. YANG, H. Shuang, and Y.-m.
[134] N. Balac, T. Sipes, N. Wolter, K. Nunes, B. Sinkovits, and WANG, "A physical approach of the short-term wind power
H. Karimabadi, "Large scale predictive analytics for real-
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
prediction based on CFD pre-calculated flow fields," Journal [164] Y. Zhang, K. Liu, L. Qin, and X. An, "Deterministic and
of Hydrodynamics, Ser. B, vol. 25, pp. 56-61, 2013. probabilistic interval prediction for short-term wind power
[151] K. Mohammadi, S. Shamshirband, L. Yee, D. Petković, M. generation based on variational mode decomposition and
Zamani, and S. Ch, "Predicting the wind power density machine learning methods," Energy Conversion and
based upon extreme learning machine," Energy, vol. 86, pp. Management, vol. 112, pp. 208-219, 2016.
232-239, 2015. [165] W.-C. Yeh, Y.-M. Yeh, P.-C. Chang, Y.-C. Ke, and V.
[152] C. Wan, Z. Xu, P. Pinson, Z. Y. Dong, and K. P. Wong, Chung, "Forecasting wind power in the Mai Liao Wind Farm
"Probabilistic forecasting of wind power generation using based on the multi-layer perceptron artificial neural network
extreme learning machine," IEEE Transactions on Power model with improved simplified swarm optimization,"
Systems, vol. 29, pp. 1033-1044, 2014. International Journal of Electrical Power & Energy
[153] S. Wu, Y. Wang, and S. Cheng, "Extreme learning machine Systems, vol. 55, pp. 741-748, 2014.
based wind speed estimation and sensorless control for wind [166] R. Rahmani, R. Yusof, M. Seyedmahmoudian, and S.
turbine power generation system," Neurocomputing, vol. Mekhilef, "Hybrid technique of ant colony and particle
102, pp. 163-175, 2013. swarm optimization for short term wind energy forecasting,"
[154] M. Mohandes, S. Rehman, and S. Rahman, "Estimation of Journal of Wind Engineering and Industrial Aerodynamics,
wind speed profile using adaptive neuro-fuzzy inference vol. 123, pp. 163-170, 2013.
system (ANFIS)," Applied Energy, vol. 88, pp. 4024-4032, [167] J. Wang, Y. Wang, and Y. Li, "A Novel Hybrid Strategy
2011. Using Three-Phase Feature Extraction and a Weighted
[155] Y. Bao, H. Wang, and B. Wang, "Short-term wind power Regularized Extreme Learning Machine for Multi-Step
prediction using differential EMD and relevance vector Ahead Wind Speed Prediction," Energies, vol. 11, p. 321,
machine," Neural Computing and Applications, vol. 25, pp. 2018.
283-289, 2014. [168] L. Xiao, X. Xiao, C. Dai, M. Pengy, L. Wang, and H. V.
[156] A. U. Haque, P. Mandal, J. Meng, and M. Negnevitsky, Poor, "Reinforcement Learning-based Energy Trading for
"Wind speed forecast model for wind farm based on a hybrid Microgrids," arXiv preprint arXiv:1801.06285, 2018.
machine learning algorithm," International Journal of [169] L. Xiao, N. B. Mandayam, and H. V. Poor, "Prospect
Sustainable Energy, vol. 34, pp. 38-51, 2015. theoretic analysis of energy exchange among microgrids,"
[157] Y. Liu, J. Shi, Y. Yang, and W.-J. Lee, "Short-term wind- IEEE Transactions on Smart Grid, vol. 6, pp. 63-72, 2015.
power prediction based on wavelet transform–support vector [170] Grid integration of large-capacity Renewable Energy
machine and statistic-characteristics analysis," IEEE sources and use of large-capacity Electrical Energy Storage
Transactions on Industry Applications, vol. 48, pp. 1136- (White Paper): International Electrotechnical Commission
1141, 2012. (IEC).
[158] I. Colak, S. Sagiroglu, and M. Yesilbudak, "Data mining and [171] G. Masson, S. Orlandi, and M. Rekinge, "Global Market
wind power prediction: A literature review," Renewable Outlook For Photovoltaics 2014–2018," European
Energy, vol. 46, pp. 241-247, 2012. Photovoltaic Industry Association.
[159] K. Leahy, R. L. Hu, I. C. Konstantakopoulos, C. J. Spanos, [172] R. Marquez and C. F. Coimbra, "Forecasting of global and
and A. M. Agogino, "Diagnosing wind turbine faults using direct solar irradiance using stochastic learning methods,
machine learning techniques applied to operational data," in ground experiments and the NWS database," Solar Energy,
Prognostics and Health Management (ICPHM), 2016 IEEE vol. 85, pp. 746-756, 2011.
International Conference on, 2016, pp. 1-8. [173] L. Martín, L. F. Zarzalejo, J. Polo, A. Navarro, R.
[160] A. Marvuglia and A. Messineo, "Monitoring of wind farms’ Marchante, and M. Cony, "Prediction of global solar
power curves using machine learning techniques," Applied irradiance based on time series analysis: Application to solar
Energy, vol. 98, pp. 574-583, 2012. thermal power plants energy production planning," Solar
[161] S. Fan, J. R. Liao, R. Yokoyama, L. Chen, and W.-J. Lee, Energy, vol. 84, pp. 1772-1781, 2010.
"Forecasting the wind generation using a two-stage network [174] D. Picault, B. Raison, S. Bacha, J. De La Casa, and J.
based on meteorological information," IEEE Transactions Aguilera, "Forecasting photovoltaic array power production
on Energy Conversion, vol. 24, pp. 474-482, 2009. subject to mismatch losses," Solar Energy, vol. 84, pp. 1301-
[162] D. Lee and R. Baldick, "Short-term wind power ensemble 1309, 2010.
prediction based on Gaussian processes and neural [175] C. W. Chow, B. Urquhart, M. Lave, A. Dominguez, J.
networks," IEEE Transactions on Smart Grid, vol. 5, pp. Kleissl, J. Shields, et al., "Intra-hour forecasting with a total
501-510, 2014. sky imager at the UC San Diego solar energy testbed," Solar
[163] S. Salcedo-Sanz, A. Pastor-Sánchez, L. Prieto, A. Blanco- Energy, vol. 85, pp. 2881-2893, 2011.
Aguilera, and R. García-Herrera, "Feature selection in wind [176] J. Lee and G. Park, "Climate effect analysis on solar energy
speed prediction systems based on a hybrid coral reefs generation in Jeju City," Under review in ARPN Journal of
optimization–Extreme learning machine approach," Energy Engineering and Applied Science, 2016.
Conversion and Management, vol. 87, pp. 10-18, 2014.
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[177] Y. Gala, Á. Fernández, J. Díaz, and J. R. Dorronsoro, [190] I. Andrea, C. Chrysostomou, and G. Hadjichristofi, "Internet
"Hybrid machine learning forecasting of solar radiation of Things: Security vulnerabilities and challenges," in
values," Neurocomputing, vol. 176, pp. 48-59, 2016. Computers and Communication (ISCC), 2015 IEEE
[178] C. Voyant, G. Notton, S. Kalogirou, M.-L. Nivet, C. Paoli, Symposium on, 2015, pp. 180-187.
F. Motte, et al., "Machine learning methods for solar [191] C. McLellan. (2016, April 9). Cybersecurity predictions for
radiation forecasting: A review," Renewable Energy, vol. 2016: How are they doing? Available:
105, pp. 569-582, 2017. https://www.zdnet.com/article/ransomware-is-now-big-
[179] A. Chaouachi, R. M. Kamel, and K. Nagasaka, "A novel business-on-the-dark-web-and-malware-developers-are-
multi-model neuro-fuzzy-based MPPT for three-phase grid- cashing-in/
connected photovoltaic system," Solar energy, vol. 84, pp. [192] C. McLellan. (2017, April 9). Cybersecurity in an IoT and
2219-2229, 2010. mobile world: The key trends. Available:
[180] A. Chaouachi, R. M. Kamel, R. Andoulsi, and K. Nagasaka, https://www.zdnet.com/article/cybersecurity-in-an-iot-and-
"Multiobjective intelligent energy management for a mobile-world-the-key-trends/
microgrid," IEEE Transactions on Industrial Electronics, [193] A. Anwar and A. N. Mahmood, "Cyber security of smart
vol. 60, pp. 1688-1699, 2013. grid infrastructure," arXiv preprint arXiv:1401.3936, 2014.
[181] H.-T. Yang, C.-M. Huang, Y.-C. Huang, and Y.-S. Pai, "A [194] "Smart Grid Cyber Security," EURELECTRIC
weather-based hybrid method for 1-day ahead hourly D/2016/12.105/64, December 2016.
forecasting of PV power output," IEEE transactions on [195] S. G. I. P. C. S. W. Group, "Introduction to NISTIR 7628
sustainable energy, vol. 5, pp. 917-926, 2014. guidelines for smart grid cyber security," NIST Special
[182] M. R. Hossain, A. M. T. Oo, and A. Ali, "The combined Publication, vol. 154, 2010.
effect of applying feature selection and parameter [196] R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos,
optimization on machine learning techniques for solar Power "False data injection on state estimation in power systems—
prediction," American Journal of Energy Research, vol. 1, Attacks, impacts, and defense: A survey," IEEE
pp. 7-16, 2013. Transactions on Industrial Informatics, vol. 13, pp. 411-423,
[183] J. Li, J. K. Ward, J. Tong, L. Collins, and G. Platt, "Machine 2017.
learning for solar irradiance forecasting of photovoltaic [197] S. Ahmed, Y. Lee, S.-H. Hyun, and I. Koo, "Covert Cyber
system," Renewable Energy, vol. 90, pp. 542-553, 2016. Assault Detection in Smart Grid Networks Utilizing Feature
[184] S. Salcedo-Sanz, C. Casanova-Mateo, A. Pastor-Sánchez, Selection and Euclidean Distance-Based Machine Learning,"
and M. Sánchez-Girón, "Daily global solar radiation Applied Sciences, vol. 8, p. 772, 2018.
prediction based on a hybrid Coral Reefs Optimization– [198] L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in
Extreme Learning Machine approach," Solar Energy, vol. power market operations," IEEE Transactions on Smart
105, pp. 91-98, 2014. Grid, vol. 2, pp. 659-666, 2011.
[185] S. Salcedo-Sanz, C. Casanova-Mateo, J. Muñoz-Marí, and [199] J. Hao, R. J. Piechocki, D. Kaleshi, W. H. Chin, and Z. Fan,
G. Camps-Valls, "Prediction of daily global solar irradiation "Sparse malicious false data injection attacks and defense
using temporal Gaussian processes," IEEE Geoscience and mechanisms in smart grids," IEEE Transactions on
Remote Sensing Letters, vol. 11, pp. 1936-1940, 2014. Industrial Informatics, vol. 11, pp. 1-12, 2015.
[186] Z. Li, S. Rahman, R. Vega, and B. Dong, "A hierarchical [200] Y. Wang, M. M. Amin, J. Fu, and H. B. Moussa, "A Novel
approach using machine learning methods in solar Data Analytical Approach for False Data Injection Cyber-
photovoltaic energy production forecasting," Energies, vol. Physical Attack Mitigation in Smart Grids," IEEE Access,
9, p. 55, 2016. vol. 5, pp. 26022-26033, 2017.
[187] Q. Liu, P. Li, W. Zhao, W. Cai, S. Yu, and V. C. Leung, "A [201] S. Ahmed, Y. Lee, S.-H. Hyun, and I. Koo, "Feature
survey on security threats and defensive techniques of Selection–Based Detection of Covert Cyber Deception
machine learning: a data driven view," IEEE access, vol. 6, Assaults in Smart Grid Communications Networks using
pp. 12103-12117, 2018. Machine Learning," IEEE Access, 2018.
[188] S. Tan, D. De, W.-Z. Song, J. Yang, and S. K. Das, "Survey [202] L. Wei, L. P. Rondon, A. Moghadasi, and A. I. Sarwat,
of security advances in smart grid: A data driven approach," "Review of Cyber-Physical Attacks and Counter Defense
IEEE Communications Surveys & Tutorials, vol. 19, pp. Mechanisms for Advanced Metering Infrastructure in Smart
397-422, 2017. Grid," arXiv preprint arXiv:1805.07422, 2018.
[189] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. [203] J. Abdella and K. Shuaib, Peer to Peer Distributed Energy
Kalogridis, M. Sooriyabandara, et al., "Smart Grid Trading in Smart Grids: A Survey vol. 11, 2018.
Communications: Overview of Research Challenges, [204] D. Tellbach and Y.-F. Li, "Cyber-Attacks on Smart Meters
Solutions, and Standardization Activities," IEEE in Household Nanogrid: Modeling, Simulation and
Communications Surveys & Tutorials, vol. 15, pp. 21-38, Analysis," Energies, vol. 11, p. 316, 2018.
2013. [205] Y. Liu, P. Ning, and M. K. Reiter, "False data injection
attacks against state estimation in electric power grids,"
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
ACM Transactions on Information and System Security [219] S. L. T. Ghazi. (2011, April 9). The Increasing Importance
(TISSEC), vol. 14, p. 13, 2011. of Security for the Smart Grid. Available:
[206] S. Paul and Z. Ni, "Vulnerability analysis for simultaneous https://www.elp.com/articles/powergrid_international/print/v
attack in smart grid security," in Power & Energy Society olume-16/issue-4/features/the-increasing-importance-of-
Innovative Smart Grid Technologies Conference (ISGT), security-for-the-smart-grid.html
2017 IEEE, 2017, pp. 1-5. [220] Y. Yuan, Z. Li, and K. Ren, "Quantitative analysis of load
[207] S. Poudel, Z. Ni, and W. Sun, "Electrical distance approach redistribution attacks in power systems," IEEE Transactions
for searching vulnerable branches during contingencies," on Parallel and Distributed Systems, vol. 23, pp. 1731-1738,
IEEE Transactions on Smart Grid, 2016. 2012.
[208] J. Pagliery. (2014, April 8). Hackers attacked the U.S. [221] E. Pallotti and F. Mangiatordi, "Smart grid cyber security
energy grid 79 times this year. Available: requirements," in Environment and Electrical Engineering
http://money.cnn.com/2014/11/18/technology/security/energ (EEEIC), 2011 10th International Conference on, 2011, pp.
y-grid-hack/index.html 1-4.
[209] S. M. Amin and A. M. Giacomoni, "Smart grid, safe grid," [222] T. Sommestad, G. N. Ericsson, and J. Nordlander, "SCADA
IEEE power and energy magazine, vol. 10, pp. 33-40, 2012. system cyber security—A comparison of standards," in
[210] J. Pyper. (2018, April 8). DOE Forms a New Office Power and Energy Society General Meeting, 2010 IEEE,
Dedicated to ‘Energy Infrastructure Security’ Available: 2010, pp. 1-8.
https://www.greentechmedia.com/articles/read/doe-new- [223] Q. Chen, D. Kaleshi, Z. Fan, and S. Armour, "Impact of
office-energy-infrastructure-security- Smart Metering Data Aggregation on Distribution System
cybersecurity#gs.QxgPOh0 State Estimation," IEEE Trans. Industrial Informatics, vol.
[211] J. Desjardins. (2017, April 8). These Are the Countries Most 12, pp. 1426-1437, 2016.
(and Least) Prepared for Cyber Attacks. Available: [224] M. A. Mustafa, N. Zhang, G. Kalogridis, and Z. Fan,
http://www.visualcapitalist.com/countries-least-prepared- "DEP2SA: A decentralized efficient privacy-preserving and
cyber-attacks/ selective aggregation scheme in advanced metering
[212] J. Santiago. (2015, April 8). Top countries best prepared infrastructure," IEEE Access, vol. 3, pp. 2828-2846, 2015.
against cyberattacks. Available: [225] K. Zhou and S. Yang, "A framework of service-oriented
https://www.weforum.org/agenda/2015/07/top-countries- operation model of China ׳s power system," Renewable and
best-prepared-against-cyberattacks/ Sustainable Energy Reviews, vol. 50, pp. 719-725, 2015.
[213] A. B. N. Perlroth. (2018, April 8). A Cyberattack Hobbles [226] B. Bitzer and E. S. Gebretsadik, "Cloud computing
Atlanta, and Security Experts Shudder. Available: framework for smart grid applications," in Power
https://www.nytimes.com/2018/03/27/us/cyberattack- Engineering Conference (UPEC), 2013 48th International
atlanta-ransomware.html Universities', 2013, pp. 1-5.
[214] R. McMillan. (2010, April 10). Siemens: Stuxnet worm hit [227] H. Kim, Y.-J. Kim, K. Yang, and M. Thottan, "Cloud-based
industrial systems. Available: demand response for smart grid: Architecture and distributed
https://www.computerworld.com/article/2515570/network- algorithms," in Smart Grid Communications
security/siemens--stuxnet-worm-hit-industrial-systems.html (SmartGridComm), 2011 IEEE International Conference on,
[215] U.-C. P. S. O. T. Force, S. Abraham, H. Dhaliwal, R. J. 2011, pp. 398-403.
Efford, L. J. Keen, A. McLellan, et al., Final report on the [228] X. Zhang, Z. Y. Dong, Z. Wang, C. Xiao, and F. Luo,
august 14, 2003 blackout in the united states and canada: "Quantum cryptography based cyber-physical security
Causes and recommendations: US-Canada Power System technology for smart grids," 2015.
Outage Task Force, 2004. [229] I. O. f. S. (ISO), "ISO/IEC 27001:2013 Information
[216] R. M. L. M. J. A. T. Conway, "Analysis of the Cyber Attack technology — Security techniques — Information security
on the Ukrainian Power Grid," Electricity Information management systems — Requirements," ed: ISO/IEC JTC
Sharing and Analysis CenterMarch 18 2016. 1/SC 27, 2013.
[217] L. Dearden. (2017, April 10). Ukraine cyber attack: Chaos [230] (April 8). CISQ Consortium for IT Software Quality.
as national bank, state power provider and airport hit by Available: http://it-cisq.org/standards/
hackers. Available: [231] (April 8). ISF Information Security Forum. Available:
https://www.independent.co.uk/news/world/europe/ukraine- https://www.securityforum.org/
cyber-attack-hackers-national-bank-state-power-company- [232] "Information Security Forum releases the Standard of Good
airport-rozenko-pavlo-cabinet-a7810471.html Practice for Information Security 2016," ed: Information
[218] G. Kalogridis, M. Sooriyabandara, Z. Fan, and M. A. Security Forum Limited 2016.
Mustafa, "Toward Unified Security and Privacy Protection [233] (April 8). NERC North American Electric Reliability
for Smart Meter Networks," IEEE Systems Journal, vol. 8, Corporation. Available:
pp. 641-654, 2014. https://www.nerc.com/Pages/default.aspx
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
[234] (2014, April 8). Framework for Improving Critical [252] S. Li, Y. Yılmaz, and X. Wang, "Quickest detection of false
Infrastructure Cybersecurity (1.0 ed.). Available: data injection attack in wide-area smart grids," IEEE
https://www.nist.gov/sites/default/files/documents/cyberfram Transactions on Smart Grid, vol. 6, pp. 2725-2735, 2015.
ework/cybersecurity-framework-021214.pdf [253] S. Pan, T. Morris, and U. Adhikari, "Developing a hybrid
[235] (April 8). Standard ISO/IEC 15408, CC v3.1. Release 4 intrusion detection system using data mining for power
Available: http://commoncriteria.pl/index.php/en/common- systems," IEEE Transactions on Smart Grid, vol. 6, pp.
criteria-standard/standard-documentation/standard-iso-iec- 3104-3113, 2015.
15408-cc-v3-1-release-4 [254] M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H.
[236] (April 8). Common Criteria. Available: V. Poor, "Machine learning methods for attack detection in
https://www.commoncriteriaportal.org/ the smart grid," IEEE transactions on neural networks and
[237] B. Fraser, "RFC 2196. Site Security Handbook. 1997," URL: learning systems, vol. 27, pp. 1773-1786, 2016.
http://www. faqs. org/rfcs/rfc2196. html, 2003. [255] Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, et al.,
[238] T. I. S. o. Automation. (2012, April 8). Applying ISA IEC "Machine Learning and Deep Learning Methods for
62443 to Control Systems - ISA Automation Week 2012: Cybersecurity," IEEE Access, 2018.
Security. Available: https://www.isa.org/store/applying-isa- [256] V. B. Krishna, G. A. Weaver, and W. H. Sanders, "PCA-
iec-62443-to-control-systems-isa-automation-week-2012- based method for detecting integrity attacks on advanced
security/122496 metering infrastructure," in International Conference on
[239] M. Dworkin, "Recommendation for block cipher modes of Quantitative Evaluation of Systems, 2015, pp. 70-85.
operation. methods and techniques," NATIONAL INST OF [257] S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry,
STANDARDS AND TECHNOLOGY GAITHERSBURG "Game-theoretic models of electricity theft detection in
MD COMPUTER SECURITY DIV2001. smart utility networks: Providing new capabilities with
[240] E. Barker, "SP 800-67 Rev. 2, Recommendation for Triple advanced metering infrastructure," IEEE Control Systems,
Data Encryption Algorithm (TDEA) Block Cipher," NIST vol. 35, pp. 66-81, 2015.
special publication, vol. 800, p. 67, 2017.
[241] E. B. Barker, "Digital Signature Standard (DSS)," 2009.
[242] Q. H. Dang, "Secure hash standard," 2015.
[243] M. J. Dworkin, "Recommendation for block cipher modes of
operation: The CMAC mode for authentication," 2016.
[244] M. J. Dworkin and M. Dworkin, Recommendation for block EKLAS HOSSAIN (M’09, SM’17)
cipher modes of operation: The CCM mode for received his PhD from the College of
authentication and confidentiality, 2007. Engineering and Applied Science at
University of Wisconsin Milwaukee
[245] M. J. Dworkin, "Recommendation for block cipher modes of (UWM) in 2016. He received his MS in
operation: Galois/Counter Mode (GCM) and GMAC," 2007. Mechatronics and Robotics Engineering
[246] J. M. Turner, "The keyed-hash message authentication code from International Islamic University of
Malaysia, Malaysia in 2010 and BS in
(hmac)," Federal Information Processing Standards Electrical & Electronic Engineering from
Publication, 2008. Khulna University of Engineering and
[247] J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang, "A Technology, Bangladesh in 2006. Dr.
Hossain has been working in the area of distributed power systems and
secure cloud computing based framework for big data
renewable energy integration for last ten years and he has published a
information management of smart grid," IEEE transactions number of research papers and posters in this field. He is now involved
on cloud computing, vol. 3, pp. 233-244, 2015. with several research projects on renewable energy and grid tied microgrid
[248] A. L. Buczak and E. Guven, "A survey of data mining and system at Oregon Tech, as an Assistant Professor in the Department of
Electrical Engineering and Renewable Energy since 2015. He is currently
machine learning methods for cyber security intrusion serving as an Associate Editor of IEEE Access. His research interests
detection," IEEE Communications Surveys & Tutorials, vol. include modeling, analysis, design, and control of power electronic
18, pp. 1153-1176, 2016. devices; energy storage systems; renewable energy sources; integration of
distributed generation systems; microgrid and smart grid applications;
[249] M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, robotics, and advanced control system. Dr. Hossain, with his dedicated
"Network anomaly detection: methods, systems and tools," research team, is looking forward to explore methods to make the electric
Ieee communications surveys & tutorials, vol. 16, pp. 303- power systems more sustainable, cost-effective and secure through
extensive research and analysis on energy storage, microgrid system and
336, 2014. renewable energy sources.
[250] J. Singh and M. J. Nene, "A survey on machine learning
techniques for intrusion detection systems," International IMTIAJ KHAN received the B.Sc. degree
in Electrical and Electronic Engineering
Journal of Advanced Research in Computer and
from Bangladesh University of
Communication Engineering, vol. 2, pp. 4349-4355, 2013. Engineering and Technology (BUET) in
[251] O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data 2017. His undergraduate thesis was on
attacks on the smart grid," IEEE Transactions on Smart “Optimization and Comparison of Single
Walled and Double Walled Carbon
Grid, vol. 2, pp. 645-658, 2011. Nanotube Field Effect Transistors
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/ACCESS.2019.2894819, IEEE Access
Author Name: Preparation of Papers for IEEE Access (February 2017)
2169-3536 (c) 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.