Smart meters are vulnerable gateways to cyberattacks

Share

A research team from Denmark's Aalborg University and University of the Punjab in Pakistan has investigated if smart meters (SMs) could become potential targets of cyber threats and have concluded that these devices already represent a “massive” cybersecurity vulnerability.

The scientists explained that SMs are essential to advanced metering infrastructure (AMI), enabling remote monitoring and linking utilities with customers while supporting a rooftop PV–driven green energy transition. However, their widespread deployment introduces significant cybersecurity risks, including inaccurate billing, energy theft, service disruptions, and privacy breaches, making robust security measures essential.

They estimated that over 209 million SMs are currently deployed across Europe and said that, while these devices offer functionalities such as outage detection, theft detection, and power quality monitoring, they also raise concerns about privacy, data interception, and system vulnerability.

 Do you want to strengthen and enhance the cybersecurity of your solar energy assets to safeguard them against emerging threats?

Join us on Apr. 29 for pv magazine Webinar+ | Decoding the first massive cyberattack on Europe’s solar energy infrastructure – The Poland case and lessons learned

Industry experts will explore real-world cyberattack scenarios, highlight potential vulnerabilities in solar and storage systems, and share practical, actionable strategies to protect your energy assets. Attendees will gain valuable knowledge on how to anticipate, prevent, and respond to cyber threats in the rapidly evolving solar energy sector.

The group also emphasized that cyberattacks, particularly false data injection, can manipulate meter readings, compromise system integrity, and cause significant financial losses for utilities. By altering consumption data, attackers can evade billing, enable energy theft, or distort demand patterns used for grid management.

Beyond direct revenue impacts, these attacks can mislead system operators, resulting in incorrect operational decisions such as improper load balancing, faulty demand forecasting, or inefficient energy distribution. Over time, such disruptions can degrade system performance and reliability.

Currently, hardware-based and software-based approaches are used to detect anomalies in SM data. Hardware solutions require additional equipment, while software-based methods include data-driven, network-based, state estimation-based, and hybrid techniques. Both solutions, however, face challenges such as scalability issues, inability to detect multiple simultaneous attacks, sensitivity to noise, and reliance on expensive measurement devices like Phasor Measurement Units (PMUs).

To address these limitations, the researchers proposed a novel attack detection method that leverages smart meter data and a robust state estimation framework.

The proposed approach relies on a distribution system state estimator (DSSE), which is a mathematical tool that processes limited, noisy real-time data from sensors, to determine grid states, such as voltages and currents, even when measurements are noisy or incomplete. It then constructs confidence ellipses around the estimated values to capture uncertainty. These ellipses, commonly used to visualize the relationship and variability between two variables, provide a statistical boundary for expected behavior.

By measuring the distance between real-time data and these boundaries, the method can reportedly identify anomalies, with any value falling outside its corresponding ellipse being flagged as suspicious, indicating a potential cyberattack.

This approach, according to the research team, simplifies threshold selection, improves detection accuracy, and performs well even under high noise conditions and multiple-node attacks. It was validated using two grid models of different sizes, simulating both single-node and multiple-node attacks. Attack scenarios involved small manipulations of voltage values, which are realistic for avoiding detection.

The method was then compared with traditional techniques such as the chi-square test and the Largest Normalized Residual (LNR) test, with the results showing that while traditional methods are sensitive to noise and require careful threshold tuning, the proposed approach maintains high detection accuracy and reduces false detections, especially in noisy environments.

“It should be noted that the suggested approach has a higher computational complexity and requires more processing power to accomplish,” the academics stated. “However, this method provides a more precise detection of power theft, an issue that imposes enormous costs on both society and end-users, who jointly endure the financial burden of stolen energy until its termination.”

The “Securing the green grid: A data anomaly detection method for mitigating cyberattacks on smart meter measurements” study, published in the International Journal of Critical Infrastructure Protection, also highlights the importance of protecting critical nodes and suggests countermeasures such as removing or correcting compromised data and implementing stronger cybersecurity practices.

This content is protected by copyright and may not be reused. If you want to cooperate with us and would like to reuse some of our content, please contact: editors@pv-magazine.com.

Popular content

Who are the Top 100 PV manufacturers today?
26 March 2026 The Terawatt PV 100 ranks the top 100 solar manufacturing companies using a new methodology based on production scale, financial strength, and corpora...