INTELLIGENT CONTROL AND SECURITY SYSTEMS IN CYBER-PHYSICAL AND CLOUD ENVIRONMENTS OF SMART GRID

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.30.956

Keywords:

Smart Grid, cloud computing, edge computing, orchestration, intelligent control, attack resilience, distributed Kalman filter, trust metrics, survivable control, cyber-physical systems.

Abstract

The paper examines methodological, algorithmic, and architectural approaches to designing intelligent control and defense systems aimed at ensuring the operational resilience of Smart Grids under the growing intensity of cyber threats. The necessity of transitioning from traditional IT-oriented security tools to hybrid adaptive solutions is substantiated. These solutions combine mechanisms of cyber-physical survivability, automatic recovery, and cognitive response to high-risk attacks such as Denial-of-Service, spoofing, and data injection. A conceptual model of Smart Grid resilience architecture is proposed, built on the synthesis of robust estimation methods, fault-tolerant control, distributed filtering (Distributed Kalman Filtering), and dynamic trust management models. A systematic classification of modern attack vectors targeting digital substations, SCADA, RTU, and HMI components is developed, with formalization of requirements for their protection in the context of both information and physical security. The study explores cloud-edge orchestration of Smart Grid telemetry streams, deploying analytics close to data sources (edge) and scalable aggregation in the cloud for model training and real-time event correlation. The proposed mechanisms account for latency, bandwidth, and workload isolation constraints within cloud environments. The paper highlights challenges in implementing continuous monitoring, anomaly detection, and real-time decision-making, and identifies future directions involving self-learning models for incident detection and reactive control based on artificial intelligence algorithms, considering scalability, reliability, and resilience to hidden threats. The effectiveness of the proposed model is confirmed through experimental simulation of false data injection, DoS, and spoofing attacks in digital substation environments of Smart Grids.

Downloads

Download data is not yet available.

References

Sun, C.-C., Liu, C.-C., & Xie, J. (2016). Cyber-physical system security of a power grid: State-of-the-art. Electronics, 5(3), 40. https://doi.org/10.3390/electronics5030040

Younisse, R., & AlKasassbeh, M. (2025). Evaluating deep learning for detecting data integrity attacks in energy smart grids. In 2025 International Conference on New Trends in Computing Sciences (ICTCS), pp. 368–372. https://doi.org/10.1109/ICTCS65341.2025.10989460

Jiang, W., Gao, W., Wang, W., Li, Y., Li, Y., & Zhang, G. (2025). Detection of false data injection attack in smart grid based on extended Kalman and smooth variable structure filter. IEEE Access, 13, 5257–5270. https://doi.org/10.1109/ACCESS.2024.3524558

Zhang, D.-Y., & Li, X.-J. (2025). Fully distributed resilient energy management for smart grids under false data injection attacks. IEEE Internet of Things Journal, 12(15), 32035–32045. https://doi.org/10.1109/JIOT.2025.3575397

Li, L., Ding, S. X., Zhou, L., Zhong, M., & Peng, K. (2024). The system dynamics analysis, resilient and fault-tolerant control for cyber-physical systems. arXiv. https://arxiv.org/abs/2409.13370

Cao, Y., Zhang, L., Zhao, X., Jin, K., & Chen, Z. (2022). An intrusion detection method for industrial control system based on machine learning. Information, 13(7), 322. https://doi.org/10.3390/info13070322

Alonso, M., Turanzas, J., Amaris, H., & Ledo, A. T. (2021). Cyber-physical vulnerability assessment in smart grids based on multilayer complex networks. Sensors, 21(17), 5826. https://doi.org/10.3390/s21175826

Malik, M. I., Ibrahim, A., Hannay, P., & Sikos, L. F. (2023). Developing resilient cyber-physical systems: A review of state-of-the-art malware detection approaches, gaps, and future directions. Computers, 12(4), 79. https://doi.org/10.3390/computers12040079

Kostiuk, Y., Dovzhenko, N., Mazur, N., Skladannyi, P., & Rzaeva, S. (2025). The methodology for protecting grid environments from malicious code during the execution of computational tasks. Cybersecurity: Education, Science, Technique, 3(27), 22–40. https://doi.org/10.28925/2663-4023.2025.27.710

Rashed, M., Gondal, I., Kamruzzaman, J., & Islam, S. (2021). State estimation within IED based smart grid using Kalman estimates. Electronics, 10(15), 1783. https://doi.org/10.3390/electronics10151783

Y. Kostiuk, et al., Architecture of the Software System of Confidential Access to Information Resources of Computer Networks, in: Cyber Security and Data Protection, vol. 4042 (2025) 37-53.

Pei, C., Xiao, Y., Liang, W., & Han, X. (2021). A deviation-based detection method against false data injection attacks in smart grid. IEEE Access, 9, 15499–15509. https://doi.org/10.1109/ACCESS.2021.3051155

Kostiuk, Y., Skladannyi, P., Sokolov, V., Zhyltsov, O., & Ivanichenko, Y. (2025). Effectiveness of information security control using audit logs. In Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2025), pp. 524–538.

Chen, Z., Zhang, H., & Tian, Y. (2023). Security-based resilient distributed energy management against DoS and FDI coordinated attacks. In 2023 35th Chinese Control and Decision Conference (CCDC), pp. 1032–1037. https://doi.org/10.1109/CCDC58219.2023.10326813

P. Skladannyi, et al., Model and Methodology for the Formation of Adaptive Security Profiles for the Protection of Wireless Networks in the Face of Dynamic Cyber Threats, in: Cyber Security and Data Protection, vol. 4042 (2025) 17-36.

Kurt, M. N., Yılmaz, Y., & Wang, X. (2020). Secure distributed dynamic state estimation in wide-area smart grids. IEEE Transactions on Information Forensics and Security, 15, 800–815. https://doi.org/10.1109/TIFS.2019.2928207

Kostiuk, Y., Khorolska, K., Bebeshko, B., Dovzhenko, N., Korshun, N., & Pazynin , A. (2025). Instrumental means of ensuring information security against hidden threats in cloud computing infrastructure. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 633–655. https://doi.org/10.28925/2663-4023.2025.28.857

Li, X., Wen, M., He, S., Lu, R., & Wang, L. (2024). A privacy-preserving federated learning scheme against poisoning attacks in smart grid. IEEE Internet of Things Journal, 11(9), 16805–16816. https://doi.org/10.1109/JIOT.2024.3365142

Younisse, R., & AlKasassbeh, M. (2024). SGID: A semi-synthetic dataset for injection attacks in smart grid systems. In 2024 15th International Conference on Information and Communication Systems (ICICS), pp. 1–4. https://doi.org/10.1109/ICICS63486.2024.10638278

Y. Kostiuk, et al., Intelligent System for Simulation Modeling and Research of Information Objects, in: 1st Workshop Software Engineering and Semantic Technologies (SEST 2025), vol. 4053 (2025) 237-251.

Johncy, G., & Shaji, R. S. (2024). Secure smart grid implementation with automatic data integrity attack location prediction and exalted energy theft detection. Connection Science, 36(1). https://doi.org/10.1080/09540091.2024.2403393

Kostiuk, Y., Skladannyi, P., Sokolov, V., Hulak, H., & Korshun, N. (2025). Models and algorithms for analyzing information risks during the security audit of personal data information system. In Proceedings of the Third International Conference on Cyber Hygiene & Conflict Management in Global Information Networks (CH&CMiGIN’24), Vol. 3925, pp. 155–171.

An, D., Yang, Q., Liu, W., & Zhang, Y. (2019). Defending against data integrity attacks in smart grid: A deep reinforcement learning-based approach. IEEE Access, 7, 110835–110845. https://doi.org/10.1109/ACCESS.2019.2933020

Kostiuk, Y., Skladannyi, P., Korshun, N., Bebeshko, B., & Khorolska, K. (2024). Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network. in: Cybersecurity Providing in Information and Telecommunication Systems II, Vol. 3826, рр.129–138.

Vincent, E., Korki, M., Seyedmahmoudian, M., Stojcevski, A., & Mekhilef, S. (2024). Reinforcement learning-empowered graph convolutional network framework for data integrity attack detection in cyber-physical systems. CSEE Journal of Power and Energy Systems, 10(2), 797–806. https://doi.org/10.17775/CSEEJPES.2023.01250

Kostiuk, Y., Skladannyi, P., Samoilenko, Y., Khorolska, K., Bebeshko, B., & Sokolov, V. (2025). A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps. In Cyber Hygiene & Conflict Management in Global Information Networks, Vol. 3925, pp. 249–264.

Kang, T., Liu, K., Ye, X., Bai, M., Gao, M., & Zhang, W. (2019). Joint modeling and risk simulation analysis based on cyber-physical system in distribution network. In 2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP) (pp. 1754–1758). https://doi.org/10.1109/APAP47170.2019.9224788

Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975. https://doi.org/10.1016/j.epsr.2022.108975

Dovzhenko, N., Ivanichenko, Y., & Kostiuk, Y. (2025). Graph-based methodology for detection and localization of cyber threats in cloud environments with integrated iot components. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 762–776. https://doi.org/10.28925/2663-4023.2025.29.938

Downloads


Abstract views: 48

Published

2025-10-26

How to Cite

Kostiuk, Y., Skladannyi, P., Rzaeva, S., Samoilenko, Y., & Korshun, N. (2025). INTELLIGENT CONTROL AND SECURITY SYSTEMS IN CYBER-PHYSICAL AND CLOUD ENVIRONMENTS OF SMART GRID. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(30), 125–156. https://doi.org/10.28925/2663-4023.2025.30.956

Most read articles by the same author(s)

1 2 3 4 5 > >>