{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:43:05Z","timestamp":1775144585802,"version":"3.50.1"},"reference-count":168,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia","doi-asserted-by":"publisher","award":["GUP 2023-010"],"award-info":[{"award-number":["GUP 2023-010"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3545153","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T18:57:27Z","timestamp":1740509847000},"page":"1965-1997","source":"Crossref","is-referenced-by-count":28,"title":["Cybersecurity Challenges in Smart Grid Systems: Current and Emerging Attacks, Opportunities, and Recommendations"],"prefix":"10.1109","volume":"6","author":[{"given":"Sanaz","family":"Amanlou","sequence":"first","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5511-0205","authenticated-orcid":false,"given":"Mohammad Kamrul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9097-3441","authenticated-orcid":false,"given":"Umi","family":"Asma\u2019 Mokhtar","sequence":"additional","affiliation":[{"name":"Center for Cyber Security, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, Bangi, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7927-3436","authenticated-orcid":false,"given":"Khalid","family":"Mahmood Malik","sequence":"additional","affiliation":[{"name":"College of Innovation &amp; Technology, University of Michigan&#x2014;Flint, Flint, MI, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0490-7799","authenticated-orcid":false,"given":"Shayla","family":"Islam","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Digital Innovation, UCSI University, Kuala Lumpur, Malaysia"}]},{"given":"Sheroz","family":"Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, College of Engineering and Information Technology, Onaizah Colleges, Qassim, Saudi Arabia"}]},{"given":"Muhammad","family":"Attique Khan","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, Prince Mohammad Bin Fahd University, Al-Khobar, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1351-898X","authenticated-orcid":false,"given":"Muhammad","family":"Asghar Khan","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Prince Mohammad Bin Fahd University, Al-Khobar, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/NAPS.2017.8107283"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2200703"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SoutheastCon42311.2019.9020426"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.312583"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.03.089"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-812154-2.00013-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913984"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/inventions4010022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17265\/1934-8975\/2015.07.005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2802704"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.01.015"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2019.01.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.107094"},{"issue":"1","key":"ref16","first-page":"24","article-title":"Cybersecurity in smart grids, challenges and solutions","volume":"5","author":"Faquir","year":"2021","journal-title":"AIMS Electron. Elect. Eng."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/en14185894"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067331"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11233854"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103540"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2022.108975"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721743"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.6295205"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2015.131"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LT.2018.8368498"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2016.7558983"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2368382"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.250"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2602846"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/9781119751908.ch4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2421991"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSSS.2012.238"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2504560"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2011.6162695"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.017"},{"key":"ref36","article-title":"The smart grid inter-operability panel\u2014Cyber security working group, guidelines for smart grid cyber security","year":"7628"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.1831"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2830118"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ComManTel.2013.6482409"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s41635-020-00094-x"},{"key":"ref42","first-page":"4926","article-title":"Side channel attacks on smart home systems: A short overview","volume-title":"Proc. 43rd Annu. Conf. IEEE Ind. Electron. Soc. (IECON)","author":"Nassiri"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933020"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2616442"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831164"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/sec.957"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2388479"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568478"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2884952"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/UPEC.2015.7339762"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2016.0151"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.8.473-479"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2227342"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.4018\/IJSWIS.297143"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.4018\/IJCAC.311036"},{"key":"ref56","volume-title":"Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure","author":"Knapp","year":"2013"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883456"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320093"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3040247"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040971"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2017.160047"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/b978-0-12-415844-3.00004-8"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-287-299-9_5"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2010.2050076"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2294120"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2018.8635743"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909807"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2018.8538705"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026923"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2017.05.034"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ITEC-AP.2019.8903798"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.06.015"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.segan.2017.08.002"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2015.11.004"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986278"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717741463"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-4246-6"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.024"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-97643-3_3"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.023"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGCE.2015.7454291"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2165948"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717726309"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6562953"},{"issue":"2","key":"ref85","first-page":"859","article-title":"Review of asymmetric key cryptography in wireless sensor networks","volume":"8","author":"Kumar","year":"2016","journal-title":"Int. J. Eng. Technol."},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3211257"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3033758"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2705076"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.02.007"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3486649"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5258-8_78"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2656067"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746376"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3487265"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2016.08.011"},{"key":"ref99","first-page":"183","article-title":"A key management architecture for SCADA systems","volume-title":"Proc. AISW-NetSec Workshop","author":"Dawson"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2008.2005683"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2009.2036181"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263179"},{"issue":"2","key":"ref103","first-page":"281","article-title":"Hybrid key management architecture for robust SCADA systems","volume":"29","author":"Choi","year":"2013","journal-title":"J. Inf. Sci. Eng."},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICSCET.2018.8537287"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831171"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1057"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2907650"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2934122"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2018.2881117"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6071"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4346"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ISGTEurope.2014.7028738"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ISGT-LA.2015.7381254"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108465"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.05.015"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-181139"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.026"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.3403\/30282300"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2016.05.007"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622064"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2016.2630803"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0045"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2734903"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2703911"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.10.007"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.5220\/0007752501570164"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6629098"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2019.2940335"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2018.10.014"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.071"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2021349"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2998479"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2993601"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2819663"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2019918572"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9348061"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2957140"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5560621"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3107301"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045368"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100341"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3040083"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.3389\/fenrg.2022.964305"},{"issue":"1","key":"ref147","first-page":"2513","article-title":"Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications","volume":"63","author":"Ghazal","year":"2020","journal-title":"Solid-State Technol."},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICPICS50287.2020.9202401"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.3390\/s20185305"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.12.011"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/INCOS45849.2019.8951344"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2019.8909779"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.3390\/en15134877"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.3010510"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983911"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2952017"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2020.2973681"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968934"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2963791"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/isgt-europe54678.2022.9960436"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3231728"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3113469"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3121291"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2024.3478333"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-023-3968-9"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2024.9010123"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.esr.2024.101360"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3372018"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10902093.pdf?arnumber=10902093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T06:10:03Z","timestamp":1747116603000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10902093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":168,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3545153","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}