15 Review of Cyber-Physical Attacks and Counter Defense Mechanisms For Advanced Metering Infrastructure in Smart Grid
15 Review of Cyber-Physical Attacks and Counter Defense Mechanisms For Advanced Metering Infrastructure in Smart Grid
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 20:05:10 UTC from IEEE Xplore. Restrictions apply.
TABLE I: Cyber and Physical Attacks Targeted at the AMI
Attack Target
Attack Type
Smart Meter AMI Communication Network
1. Meter Manipulation
Physical 1. Physical Attack
2. Meter Spoofing and Energy Fraud Attack
Availability 1. Denial of Service (DoS) 1. Distributed Denial of Service (DDoS)
Cyber
Integrity 1. False Data Injection Attack (FDIA) 2. False Data Injection Attack (FDIA)
1. De-pseudonymization Attack
1. WiFi/ZigBee Attack
2. Man-in-the-middle Attack
Confidentiality 2. Internet Attack
3. Authentication Attack
3. Data Confidentiality Attack
4. Disaggregation Attack
III. D EFENSE M ECHANISMS IN S MART M ETERS allow visualization in a two-dimensional space. Third, anomaly
Among the cyber-physical security threats faced by the smart detection takes place in a set of data that includes the usage
meters, electricity theft is a major security challenge caused of all consumers. This means that an attacker would have
by meter manipulation and FDIA, where malicious attackers trouble reverse engineering and avoiding detection as it would
can alter consumption measurements collected by smart meters. require two things. Complete knowledge of every smart meter
According to a World Bank report [24], [25], electricity theft and all consumer information being within the communications
reaches up to 50% in some jurisdictions of developing countries. network.
The significance of security for smart meters has been a well- In [17], usage data was proved to be non-stationary and Auto
researched topic in the literature, where the focus is on ensuring Regressive Integrated Moving Average (ARIMA) forecasting
power availability at all times [13], [26]. Traditional research methods were proposed to validate readings. First, the ARMA
for detecting electricity theft has focused on implementing model is ill-suited for anomaly detection in electricity consump-
specific devices, like wireless sensors and balance meters, to tion since most customers use up their power in a non-stationary
provide a high theft detection rate [22], [23]. An anti-tampering manner. The ARIMA forecasting methods are introduced for
sensor based AMI intrusion detection mechanism was intro- validating electricity consumption readings. Second, to evaluate
duced in [22], where anti-tampering sensors were embedded the effectiveness of forecasting with ARIMA; a scenario where
into smart meters. In [23], a limited number of balanced meters smart meters were tampered with to allow electricity theft was
were installed in the smart grid distribution network, so that evaluated. Third, introducing complementary checks on factors
the system operator can detect whether abnormal smart meters such as mean and variance was found to aid in the mitigation
existing in the network. Since additional devices need to be of electricity theft by 77.56%
installed in these works, the cost of detecting the abnormal ac- In [18], CPBETF (Consumption Pattern-Based Energy Theft
tions of millions of smart meters will be significantly increases. Detector) which employs a multi-class Support Vector Machine
Moreover, all of these works cannot detect specific smart meters (SVM) for each customer was formulated. In this detection,
that being hacked. transformer meters measure the total consumption of each
A. Machine Learning for Electricity Theft Detection neighborhood. Then, the total usage reported by the smart
Recently, machine learning have been used to train a classifier meters is compared to the measurements from the transformers.
based on detailed electricity usage measurements, which aims to Users and clients will be marked as suspicious if a nontechnical
classify the normal usage versus electricity theft. The basic pro- loss (NTL) is detected at this level. A Users past data as well
cedure of this approach consists of seven parts: data collection as synthetic attack datasets are used to train a multi-class SVM
and preprocessing, feature extraction, machine learning based (support vector machine). With this, a classifier can be generated
classifier training, data classification, and suspected electricity to determine whether the recent sample is either benign or
theft generation. malicious.
In [16], Principal Component Analysis (PCA) based theft Apart from the above techniques many other classification
detection was proposed to detect abnormalities in electricity methods exist for detection of energy theft. Methods such as,
consumption behavior. A method is proposed which leverages fuzzy logic classification and neural networks are also feasible.
the Density-Based Spatial Clustering of Applications with Noise However, these works ignore the attack models of potential
(DBSCAN) algorithm, and this procedure is shown to properly thieves and the effectiveness of anomaly detector was only
detect abnormalities in consumption behavior when used with evaluated based on given datasets of attack examples.
PCA. There are three advantages with the use of this method. B. Game Theory for Electricity Theft Detection
First, the researchers could calculate the consumption trends Game theoretic theft detection schemes have been proposed
which repeat over time by extracting principal components recently and provide another angle on solving the electricity
which retain the maximum amount of variance in the data. theft issues [12], [19]. To solve the problem of theft detection,
Components that belong in the lower variance are filtered out a single leader, multi-follower Stackelberg game can be formu-
as noise in usage behavior. Second, to process the massive lated between the utility and thieves to characterize strategic
amount of data, the two principal components are noted to interactions between the two [12]. In this game, the utility
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 20:05:10 UTC from IEEE Xplore. Restrictions apply.
TABLE II: Different Application Techniques for Electricity Theft Detection
Electricity Theft Detection Techniques Advantage Disadvantage
Traditional Method Anti-tampering Sensor [22] 1. Not identify specific meters being compromised
1. Reduce risks due to non-billed electricity
[22-26] 2. Increase the cost of deploying and operating
Trusted Balanced Meter [23]
PCA based detection [16] 1. Implement of Meter Data Management System 1. Ignore the attack models of potential thieves
Machine Learning
2. Train a classifier based on usage data 2. Evaluate effectiveness only on given attack example
[16-18] ARIMA based Detection [17] 3. Increase effectiveness of theft detection 3. Ignore the privacy of customer consumption
SVM based Detection [18]
1. Propose interactions between utility and thieves
Game Theory [12] Stackelberg Game [12] 2. Consider the worst case of electricity theft 1. Ignore coordination between the electricity thieves
3. Consider the privacy of customer consumption
intended to maximize the detection probability and minimize TABLE III: Game Theoretic Applications
the investment in monitoring fraud. On the other hand, each
electricity thief was to steal a certain amount of power and Game Theoretic Applicaitons Game Features
minimize the probability being uncovered. Based on the Nash 1. Noncooperative
equilibrium of the formulated game, the optimal strategies for Defending AMI communication network 2. Static
against data confidentiality attacks [28] 3. Two-player
the defender are derived for selecting the sample rate and the 4. Nash equilibrium
optimal tariff. 1. Noncooperative
However, these works assume all electricity thieves as a Protecting AMI communication network 2. Stackerlberg
player, and the competition between thieves was ignored in the against data confidentiality attacks [29] 3. Two-player
4. Stackerlberg equilibrium
model. If thieves add high loads to the distribution networks and
steal electricity at the same time, the resulting power surges and 1. Noncooperative
Protecting AMI communication network 2. Bayesian
electrical system failures can cause power outages, raising the against DDoS attacks [31] 3. Multiple-player
possibility of thefts being detected. A summary of the different 4. Nash equilibrium
applications for electricity theft in the AMI is shown in Table II. P
which is subject to a budget constraint i si ≤ S ≤ N, ∀i.
IV. D EFENSE M ECHANISMS IN AMI C OMMUNICATION The attacker and defender’s utility functions are determined by
N ETWORK the data value or security asset Wi for each node i. Take a
In this section, we first study the model of the AMI commu- case where the defender and attacker know everything about a
nication network. Then, we survey two specific game-theoretic system. In this case the Nash equilibrium by definition is the
models for defending the communication network against data optimal arrangement which provides the most utility to each
confidentiality attacks and distributed DoS attacks, respectively. player from the actions of other players [28], [29]. In the end,
Consider the AMI communication network as a tree-pattern The Nash equilibrium can derive the behavior to be expected
architecture T with one root node, where nodes represent the from both attacker and defender.
AMI devices. Let N = {1, 2, ..., N } denote the set of nodes in However, assume the attacker chooses their strategy based
T , where N is the total number of nodes, and the root node on based on security techniques deployed in the target system.
is referred as 1. Each node i ∈ N \ {1} records data from its Therefore, the interactions between the two can be formulated
children nodes Ch(i), combines this data as a whole, and finally by a Stackelberg game [30]. In this game, the defender acts
sends it to its respective parent node f (i). Assume that a total as a leader which attempts to compose encryption rates. The
of N aggregation levels existing in T , and let Ni denote the set defenders purpose is to adjust encryption rates to protect the
of nodes belonging to the i-th aggregation level. In the attack- security of the most amount of data possible. The method
defense scenario, the attacker can select each node for attacking. which the Stackelberg games solve the problem is backwards
Therefore, game theory provides a way for the defender to find induction, producing a solution known as Stackelberg Equilib-
the optimal defense mechanism. rium (SE) [29]. In this game, the defender may anticipate the
A. Defense Mechanisms for Data Confidentiality Attacks attackers actions, find an efficient defense budget, and create
In [27], the data confidentiality attacks in the AMI commu- the optimal encryption rate on each device in the AMI with the
nication network are analyzed. In this attack-defense scenario, help of the SE in order to mitigate attacks.
the attacker aims to compromise the AMI data by attacking the B. Defense Mechanisms for Distributed DoS Attacks
nodes of the communication network T without being detected. In [31], the honeypot based defense mechanism is imple-
Correspondingly, out of a set, the defender may pick one secu- mented for countering distributed DoS attacks in the AMI com-
rity mode available for each node. A two-player noncooperative munication network, where honeypots are defined as defense
game is formulated to model the interaction between the two. resources that help lure, discover, and gather attack information.
In this game, the attacker’s strategy is defined as the probability A Bayesian honeypot game model is formulated between benign
p
P i of attacking node i, which is subject to a budget limitation, users and malicious ones. The equilibrium in conditions can be
i pi ≤ P ≤ 1, ∀i. In contrast, the defender’s strategy is achieved for deriving the strategies in use of honeypots and
defined as the encryption rate si of the packets at node i, anti-honeypots.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 20:05:10 UTC from IEEE Xplore. Restrictions apply.
The Bayesian game is defined as follows: G1 as G1 , [7] S. Baker, N. Filipiak, and K. Timlin, “In the dark: Crucial industries
{{Z, W}, {FZ , FW }, {JZ , JW }}, where Z , {Z1 , Z2 , Z3 } confront cyber attacks,” 2014.
[8] E. Naone, “Hacking the smart grid,” 2010.
usually represent an array of services such as: honeypots, real [9] P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, “A denial of service attack
communications, and anti-honeypots. As provided by the smart in advanced metering infrastructure network,” in 2014 IEEE International
grid; W , {W1 , W2 } is the set of unique visitors: in this Conference on Communications (ICC), June 2014, pp. 1029–1034.
[10] P. McDaniel and S. McLaughlin, “Security and privacy challenges in the
case non-malicious users and malicious attackers. {FZ , FW } smart grid,” IEEE Security Privacy, vol. 7, no. 3, pp. 75–77, May 2009.
denotes the set of strategies used by the attackers and honeypots [11] F. M. Cleveland, “Cyber security issues for advanced metering infrasttruc-
respectively. FZ , {Ω1 , Ω2 } denotes a binary variable. Ω1 ture (ami),” in 2008 IEEE Power and Energy Society General Meeting -
Conversion and Delivery of Electrical Energy in the 21st Century, July
represents a service which is being provided. FW , {Λ1 , Λ2 } 2008, pp. 1–5.
also represent a set of binary variables. To represent providing [12] S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry, “Game-
access: Λ1 is used. {JZ , JW } denotes player payoff, where theoretic models of electricity theft detection in smart utility networks:
Providing new capabilities with advanced metering infrastructure,” IEEE
JZ represents the real server payoffs and JW represents the Control Systems, vol. 35, no. 1, pp. 66–81, Feb 2015.
payoff for the visitors. The payoffs of legitimate users and [13] R. Jiang, R. Lu, Y. Wang, J. Luo, C. Shen, and X. S. Shen, “Energy-
attackers are analyzed via game trees. To evaluate the overall theft detection issues for advanced metering infrastructure in smart grid,”
Tsinghua Science and Technology, vol. 19, no. 2, pp. 105–120, April 2014.
performance of the proposed scheme, an AMI network testbed [14] S. McLaughlin, B. Holbert, A. Fawaz, R. Berthier, and S. Zonouz, “A
is constructed. A summary of the different game-theoretic multi-sensor energy theft detection framework for advanced metering
applications for protecting the AMI communication network is infrastructures,” IEEE Journal on Selected Areas in Communications,
vol. 31, no. 7, pp. 1319–1330, July 2013.
shown in Table III. [15] E. de Buda, “System for accurately detecting electricity theft,” Patent US
20 100 007 336 A1, January, 2010.
V. C ONCLUSION [16] V. Badrinath Krishna, G. A. Weaver, and W. H. Sanders, PCA-Based
Method for Detecting Integrity Attacks on Advanced Metering Infrastruc-
In this paper, we provide a comprehensive overview on ture. Cham: Springer International Publishing, 2015, pp. 70–85.
the potential cyber and physical attacks targeted at the AMI, [17] V. Badrinath Krishna, R. K. Iyer, and W. H. Sanders, ARIMA-Based
especially in smart meters and the communication network. Modeling and Validation of Consumption Readings in Power Grids.
Cham: Springer International Publishing, 2016, pp. 199–210.
We have identified the main security threat for smart meters: [18] P. Jokar, N. Arianpoo, and V. C. M. Leung, “Electricity theft detection in
electricity theft, and categorized three detection mechanisms ami using customers’ consumption patterns,” IEEE Transactions on Smart
including device implementation, machine learning and game Grid, vol. 7, no. 1, pp. 216–226, Jan 2016.
[19] A. A. Crdenas, S. Amin, G. Schwartz, R. Dong, and S. Sastry, “A
theory. Machine learning provides a more efficient way for game theory model for electricity theft detection and privacy-aware
theft detection than device implementation. And game theory control in ami systems,” in 2012 50th Annual Allerton Conference on
formulates the interaction model between utility and thieves Communication, Control, and Computing (Allerton), Oct 2012, pp. 1830–
1837.
for optimal detection strategies. Game theory is expected to [20] S. Amin, G. A. Schwartz, A. A. Cardenas, and S. S. Sastry, “Game-
become a key analysis tool for analyzing cyber-physical security theoretic models of electricity theft detection in smart utility networks:
issues. Therefore, for AMI communication network, we survey Providing new capabilities with advanced metering infrastructure,” IEEE
Control Systems, vol. 35, no. 1, pp. 66–81, Feb 2015.
two specific game-theoretic models for protecting the network [21] F. Milano, C. Canizares, and M. Invernizzi, “Multi-objective optimization
against data confidentiality attacks and distributed DoS attacks, for pricing system security in electricity markets,” IEEE Trans. on Power
respectively. As we have reviewed, game theory provides a way Syst., vol. 18, no. 2, pp. 596–604, 2003.
[22] K. Xie, Y.-H. Song, J. Stonham, E. Yu, and G. Liu, “Decomposition
to predict the rational attack actions and derive the optimal model and interior point methods for optimal spot pricing of electricity
defense strategies against potential attacks. in deregulation environments,” IEEE Trans. Power Syst., vol. 15, no. 1,
pp. 39–50, 2000.
VI. ACKNOWLEDGEMENT [23] M. Esmalifalak, G. Shi, Z. Han, and L. Song, “Bad data injection attack
and defense in electricity market using game theory study,” IEEE Trans.
This work was supported by the National Science Foundation Smart Grid, vol. 4, no. 1, pp. 160–169, Mar. 2013.
under Grants CNS-1553494 (NSF) and 800006104 (DOE). [24] “EBIOS expression of needs and identification of security objectives risk
management method,,” ANSSI, Tech. Rep., January 2010.
R EFERENCES [25] L. Wei, A. H. Moghadasi, A. Sundararajan, and A. Sarwat, “Defending
mechanisms for protecting power systems against intelligent attacks,” in
[1] L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power Proc. IEEE 10th SoSE Conf., San Antonio, the United States, May 2015.
grid protection against coordinated cyber-physical attacks,” IEEE Trans. [26] L. Wei, A. I. Sarwat, and W. Saad, “Risk assessment of coordinated cyber-
on Smart Grid, vol. PP, no. 99, pp. 1–1, 2017. physical attacks against power grids: A stochastic game approach,” in 2016
[2] I. Parvez, A. Sundararajan, and A. Sarwat, “Frequency band for han and IEEE Industry Applications Society Annual Meeting, Oct 2016, pp. 1–7.
nan communication in smart grid,” in IEEE Symposium on Computational [27] Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, “A game theoretical
Intelligence Applications in Smart Grid (CIASG), Orlando, Dec. 2014. analysis of data confidentiality attacks on smart-grid ami,” IEEE Journal
[3] A. Anzalchi and A. Sarwat, “A survey on security assessment of metering on Selected Areas in Communications, vol. 32, no. 7, pp. 1486–1499, July
infrastructure in smart grid systems,” in IEEE Southeast Conference, Fort 2014.
Lauderdale, 2015. [28] R. B. Myerson, Game Theory, Analysis of Conflict. Cambridge, MA,
[4] I. Parvez, A. I. Sarwat, L. Wei, and A. Sundararajan, “Securing metering USA: Harvard University Press, Sep. 1991.
infrastructure of smart grid: A machine learning and localization based [29] L. Shapley, “Stochastic games,” in Proc. Nat. Acad. Sci. USA, vol. 39,
key management approach,” Energies, vol. 9, no. 9, 2016. 1953, pp. 1095–1100.
[5] P.-Y. Chen, S. M. Cheng, and K.-C. Chen, “Smart attacks in smart grid [30] A. Neyman and S. Sorin, Stochastic Games and Applications. New York:
communication networks,” IEEE Commun. Mag., vol. 50, no. 8, pp. 24– Kluwer Academic, Jul. 1999.
29, 2012. [31] K. Wang, M. Du, S. Maharjan, and Y. Sun, “Strategic honeypot game
[6] S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber attack-resilient control model for distributed denial of service attacks in the smart grid,” IEEE
for smart grid,” in 2012 IEEE PES Innovative Smart Grid Technologies Transactions on Smart Grid, vol. PP, no. 99, pp. 1–1, 2017.
(ISGT), Jan 2012, pp. 1–3.
Authorized licensed use limited to: Universidad del Valle. Downloaded on September 17,2025 at 20:05:10 UTC from IEEE Xplore. Restrictions apply.