I. Introduction
Over the past few decades, the evolution of enabling technologies such as sensing, computing, communication, and intelligent control has led to a transition from conventional Supervisory Control and Data Acquisition (SCADA) to the modern Smart Grid (SG). While these advancements have enhanced intelligence and adaptability in SGs, they have also introduced new vulnerabilities, increasing the risk of malicious cyber-attacks [1]. Despite of the existing protective measures like data encryption, authentication, firewalls, cryptography, and digital watermarking in the cyber layer of SCADA systems, incidents such as the Stuxnet malware attack on an Iranian nuclear power plant and cyber attacks on the Ukrainian power delivery network have revealed their insufficiency in defending against intrusions on the cyber-physical layers [2]. Commonly studied attacks in SGs fall into three main categories: Denial of Service (DoS) attacks, False Data Injection Attacks (FDIAs), and Replay Attacks (RAs). The first two categories of stealthy attacks has been well researched in the literature, and can be minimized or prevented by using anomaly identification and multi factor based authentication tools, implementing strong firewall, intrusion detection and data loss prevention mechanism and advanced statistical and signal processing based attack detection methods [3]. Further, the stealthy FDIA in AC state estimation necessitates estimation of the system states with some level of confidence, along with the noise covariance matrix information in order to generate a new set of malicious attack vector that basically steers the execution process while maintaining a balance in its stealthiness properties. Compared to the above two, the RAs are although very easy to execute in real practice but difficult to spot due to the statistical similarities of the replayed signal with the original observations and thereby having capability of passing examination of cryptographic keys, resulting interrupting the power delivery and degrade system performances [4]. Additionally, RAs can exploit the time-lag between data capture that further complicates detection efforts. Moreover, in the context of PSSE, RAs on some specific measurements are more detrimental than any random selection of measurement which further intricates the RA detection challenges.