Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey
Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefor...
Saved in:
Published in | Sensors (Basel, Switzerland) Vol. 24; no. 12; p. 3815 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Switzerland
MDPI AG
13.06.2024
MDPI |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs’ operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs’ security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs’ security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques. |
---|---|
AbstractList | Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs’ operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs’ security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs’ security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques. Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs' operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs' security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs' security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques.Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs' operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs' security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs' security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques. |
Audience | Academic |
Author | Shen, Jun Xing, Wei |
AuthorAffiliation | College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; xingwei@nuaa.edu.cn |
AuthorAffiliation_xml | – name: College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; xingwei@nuaa.edu.cn |
Author_xml | – sequence: 1 givenname: Wei surname: Xing fullname: Xing, Wei – sequence: 2 givenname: Jun surname: Shen fullname: Shen, Jun |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38931599$$D View this record in MEDLINE/PubMed |
BookMark | eNptkktv1DAQxyNURB9w4AugSFzoYVu_kthc0GrFo6gSSAtny5mMt16SuLWTSrnxHfoN-SS4TVm1FZqDrZnf_O15HGZ7ve8xy15TcsK5IqeRCcq4pMWz7IAKJhaSMbL34L6fHca4JYRxzuWLbJ9LxWmh1EH2dY0wBjdM-cr3Q_Bt7m2-mmoMf37ffL-YogPT5uspDtjFfOwbDHM4Xw6DgV_xfb7M12O4xull9tyaNuKr-_Mo-_np44_Vl8X5t89nq-X5AgqihgWAUEYoaChnoAouqgqNgpJQxBqhqVlRW4ZIVGGRS9OAIIi2rkVJlbKWH2Vns27jzVZfBteZMGlvnL5z-LDRJgwOWtTAq5pwxqRBEKYRUlkORNVG0aIqmEpaH2aty7HusAFMPTDtI9HHkd5d6I2_1pQyUkkhk8K7e4Xgr0aMg-5cBGxb06Mfo-akYpJyKouEvn2Cbv0Y-tSrOyoZYSxRJzO1MakC11ufHoZkDXYO0uCtS_5lpVRZ8FKWKeHNwxp2n_835AQczwAEH2NAu0Mo0bcLpHcLlNjTJyy4wQzudjmMa_-T8Rej68dD |
CitedBy_id | crossref_primary_10_1016_j_jprocont_2025_103409 crossref_primary_10_3390_s25010213 |
Cites_doi | 10.1109/TCYB.2017.2716115 10.1109/TAC.2020.3029342 10.1109/MIS.2010.104 10.1016/j.compind.2018.04.017 10.1109/TIFS.2022.3146078 10.1109/TFUZZ.2022.3148875 10.1109/TAC.2020.3032598 10.1016/j.isatra.2023.08.018 10.1007/s12555-014-0261-7 10.1109/TII.2024.3363091 10.1109/JSYST.2024.3384372 10.3390/app11093751 10.1109/TAES.2015.140589 10.1007/s00170-020-06572-4 10.1109/ACCESS.2020.2966281 10.1016/j.automatica.2022.110345 10.1109/TSMC.2024.3378700 10.3390/s23031683 10.1109/TSG.2022.3217060 10.3233/JIFS-222427 10.1109/TSMC.2023.3344876 10.1049/iet-cta.2020.0867 10.1080/00207179.2018.1537518 10.1109/ACCESS.2017.2780188 10.1109/MITS.2023.3305643 10.1016/j.jfranklin.2024.106715 10.1007/s11276-021-02579-1 10.1016/j.ins.2022.01.009 10.1109/TII.2019.2963294 10.1109/TAC.2013.2266831 10.3390/s23031634 10.1109/TCNS.2021.3094782 10.1109/TCYB.2021.3119461 10.1016/j.automatica.2019.108687 10.1109/ACCESS.2021.3063229 10.1002/rnc.5831 10.23919/ChiCC.2019.8866688 10.1109/JAS.2022.105548 10.1049/iet-cps.2016.0025 10.1016/j.ins.2017.07.029 10.1109/TNSE.2020.3018871 10.1504/IJVAS.2020.116448 10.1186/s40537-022-00616-0 10.1016/j.arcontrol.2019.04.011 10.1109/TICPS.2024.3373715 10.32604/cmc.2024.046396 10.1109/JSYST.2023.3287528 10.3390/s20216123 10.1109/TIE.2019.2944091 10.1109/TII.2024.3383520 10.1016/j.promfg.2017.07.198 10.1109/TDSC.2018.2883057 10.3390/s151127625 10.1109/TSMC.2021.3106228 10.1016/j.procir.2015.12.019 10.1016/j.ins.2023.03.088 10.1080/00207179.2019.1707278 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2024 by the authors. 2024 |
Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2024 by the authors. 2024 |
DBID | AAYXX CITATION NPM 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PHGZM PHGZT PIMPY PJZUB PKEHL PPXIY PQEST PQQKQ PQUKI PRINS 7X8 5PM DOA |
DOI | 10.3390/s24123815 |
DatabaseName | CrossRef PubMed ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) ProQuest Hospital Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) ProQuest Health & Medical Collection PML(ProQuest Medical Library) ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef PubMed Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Central China ProQuest Central Health Research Premium Collection Health and Medicine Complete (Alumni Edition) ProQuest Central Korea Health & Medical Research Collection ProQuest Central (New) ProQuest Medical Library (Alumni) ProQuest One Academic Eastern Edition ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Health & Medical Complete ProQuest Medical Library ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic Publicly Available Content Database PubMed CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_c37b03228aec4ad489f3c09ba9157529 PMC11207848 A799653686 38931599 10_3390_s24123815 |
Genre | Journal Article Review |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61973156 |
GroupedDBID | --- 123 2WC 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH AAYXX ABDBF ABUWG ACUHS ADBBV ADMLS AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS BENPR BPHCQ BVXVI CCPQU CITATION CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HH5 HMCUK HYE IAO ITC KQ8 L6V M1P M48 MODMG M~E OK1 OVT P2P P62 PHGZM PHGZT PIMPY PQQKQ PROAC PSQYO RNS RPM TUS UKHRP XSB ~8M 3V. ABJCF ARAPS HCIFZ KB. M7S NPM PDBOC PMFND 7XB 8FK AZQEC DWQXO K9. PJZUB PKEHL PPXIY PQEST PQUKI PRINS 7X8 5PM PUEGO |
ID | FETCH-LOGICAL-c509t-cc49a49cd132c953477ea9c601eebecdb25bf2ee095fe38adc40eefbb46199ff3 |
IEDL.DBID | M48 |
ISSN | 1424-8220 |
IngestDate | Wed Aug 27 01:29:43 EDT 2025 Thu Aug 21 18:32:50 EDT 2025 Fri Jul 11 02:22:51 EDT 2025 Fri Jul 25 06:05:16 EDT 2025 Tue Jun 10 21:08:11 EDT 2025 Wed Feb 19 02:06:45 EST 2025 Thu Apr 24 23:00:02 EDT 2025 Tue Jul 01 03:51:03 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Keywords | security control cyber–physical system cyber attack |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c509t-cc49a49cd132c953477ea9c601eebecdb25bf2ee095fe38adc40eefbb46199ff3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Review-3 content type line 23 |
OpenAccessLink | http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s24123815 |
PMID | 38931599 |
PQID | 3072727022 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_c37b03228aec4ad489f3c09ba9157529 pubmedcentral_primary_oai_pubmedcentral_nih_gov_11207848 proquest_miscellaneous_3072813185 proquest_journals_3072727022 gale_infotracacademiconefile_A799653686 pubmed_primary_38931599 crossref_primary_10_3390_s24123815 crossref_citationtrail_10_3390_s24123815 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20240613 |
PublicationDateYYYYMMDD | 2024-06-13 |
PublicationDate_xml | – month: 6 year: 2024 text: 20240613 day: 13 |
PublicationDecade | 2020 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2024 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | Kazemi (ref_30) 2021; 52 Lu (ref_46) 2017; 417 ref_58 ref_56 ref_11 Geng (ref_54) 2023; 17 Berger (ref_15) 2016; 41 ref_53 Shalini (ref_33) 2023; 79 Wang (ref_8) 2010; 25 ref_19 ref_17 Gao (ref_14) 2020; 113 Kazemi (ref_42) 2020; 14 Amin (ref_26) 2021; 9 Yang (ref_31) 2022; 142 Wang (ref_48) 2022; 32 Yuan (ref_52) 2015; 13 Dibaji (ref_2) 2019; 47 Sun (ref_55) 2019; 16 ref_25 ref_23 Li (ref_16) 2020; 66 Chen (ref_18) 2017; 48 Combastel (ref_43) 2020; 93 Dai (ref_28) 2020; 7 Pasqualetti (ref_6) 2013; 58 Joerger (ref_32) 2016; 52 Su (ref_41) 2020; 17 Dafflon (ref_5) 2021; 113 Wu (ref_63) 2020; 66 Huang (ref_40) 2022; 14 Fei (ref_61) 2024; 361 Jha (ref_13) 2021; 27 Alguliyev (ref_3) 2018; 100 Kumari (ref_37) 2022; 9 Chen (ref_44) 2021; 52 ref_35 Kumar (ref_36) 2020; 15 Liu (ref_34) 2023; 142 Alsariera (ref_38) 2021; 12 Poudel (ref_20) 2018; 18 Duo (ref_27) 2022; 9 Wu (ref_51) 2021; 9 Negri (ref_10) 2017; 11 Pan (ref_4) 2022; 30 Baheti (ref_1) 2011; 12 Liu (ref_57) 2020; 93 Ma (ref_47) 2024; 54 Reji (ref_39) 2023; 44 Abbaspour (ref_49) 2019; 67 Fei (ref_62) 2024; 2 Padmanabhan (ref_21) 2017; 6 Kuvshinkova (ref_22) 2003; 1 Ma (ref_29) 2022; 589 Silva (ref_12) 2015; 15 ref_9 Ma (ref_59) 2023; 633 Choraria (ref_45) 2022; 17 ref_7 Zhao (ref_60) 2020; 8 Shih (ref_24) 2016; 1 Wang (ref_50) 2024; 20 |
References_xml | – volume: 48 start-page: 1862 year: 2017 ident: ref_18 article-title: Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2017.2716115 – volume: 66 start-page: 3773 year: 2020 ident: ref_63 article-title: Zero-sum game-based optimal secure control under actuator attacks publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.3029342 – volume: 79 start-page: 10353 year: 2023 ident: ref_33 article-title: Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test publication-title: J. Supercomput. – volume: 25 start-page: 85 year: 2010 ident: ref_8 article-title: The emergence of intelligent enterprises: From CPS to CPSs publication-title: IEEE Intell. Syst. doi: 10.1109/MIS.2010.104 – volume: 100 start-page: 212 year: 2018 ident: ref_3 article-title: Cyber-physical systems and their security issues publication-title: Comput. Ind. doi: 10.1016/j.compind.2018.04.017 – volume: 17 start-page: 670 year: 2022 ident: ref_45 article-title: Design of false data injection attack on distributed process estimation publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2022.3146078 – volume: 30 start-page: 4359 year: 2022 ident: ref_4 article-title: Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme publication-title: IEEE Trans. Fuzzy Syst. doi: 10.1109/TFUZZ.2022.3148875 – volume: 66 start-page: 4303 year: 2020 ident: ref_16 article-title: Active security control approach against DoS attacks in cyber-physical systems publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.3032598 – volume: 1 start-page: 5 year: 2003 ident: ref_22 article-title: SQL Slammer worm lessons learned for consideration by the electricity sector publication-title: N. Am. Electr. Reliab. Counc. – volume: 142 start-page: 478 year: 2023 ident: ref_34 article-title: Dynamic event-triggered fault detection for rotary steerable systems with unknown time-varying noise covariances publication-title: ISA Trans. doi: 10.1016/j.isatra.2023.08.018 – volume: 13 start-page: 1423 year: 2015 ident: ref_52 article-title: Resilient control in the presence of DoS attack: Switched system approach publication-title: Int. J. Control. Autom. Syst. doi: 10.1007/s12555-014-0261-7 – volume: 20 start-page: 7832 year: 2024 ident: ref_50 article-title: Resilient Control of CPSs Under Mixed DoS Attacks: A Type-Dependent ADT Approach publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2024.3363091 – ident: ref_56 doi: 10.1109/JSYST.2024.3384372 – ident: ref_25 doi: 10.3390/app11093751 – volume: 17 start-page: 650 year: 2020 ident: ref_41 article-title: A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids publication-title: IEEE Trans. Ind. Inform. – ident: ref_23 – volume: 52 start-page: 726 year: 2016 ident: ref_32 article-title: Fault detection and exclusion using solution separation and chi-squared ARAIM publication-title: IEEE Trans. Aerosp. Electron. Syst. doi: 10.1109/TAES.2015.140589 – volume: 113 start-page: 2395 year: 2021 ident: ref_5 article-title: The challenges, approaches, and used techniques of CPS for manufacturing in Industry 4.0: A literature review publication-title: Int. J. Adv. Manuf. Technol. doi: 10.1007/s00170-020-06572-4 – volume: 8 start-page: 19271 year: 2020 ident: ref_60 article-title: Co-design of dual security control and communication for nonlinear CPS under DoS attack publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2966281 – volume: 142 start-page: 110345 year: 2022 ident: ref_31 article-title: Sliding mode-based adaptive resilient control for Markovian jump cyber–physical systems in face of simultaneous actuator and sensor attacks publication-title: Automatica doi: 10.1016/j.automatica.2022.110345 – ident: ref_58 doi: 10.1109/TSMC.2024.3378700 – ident: ref_17 doi: 10.3390/s23031683 – volume: 14 start-page: 2367 year: 2022 ident: ref_40 article-title: Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2022.3217060 – volume: 44 start-page: 4245 year: 2023 ident: ref_39 article-title: An intrusion detection system based on hybrid machine learning classifier publication-title: J. Intell. Fuzzy Syst. doi: 10.3233/JIFS-222427 – volume: 54 start-page: 2685 year: 2024 ident: ref_47 article-title: Distributed Secure Estimation Against Sparse False Data Injection Attacks publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2023.3344876 – volume: 14 start-page: 3526 year: 2020 ident: ref_42 article-title: Efficient resilient dynamic co-estimation framework for cyber-physical systems under sensor attacks publication-title: IET Control Theory Appl. doi: 10.1049/iet-cta.2020.0867 – volume: 93 start-page: 1907 year: 2020 ident: ref_57 article-title: Event-triggered resilient control for cyber-physical system under denial-of-service attacks publication-title: Int. J. Control doi: 10.1080/00207179.2018.1537518 – volume: 12 start-page: 597 year: 2021 ident: ref_38 article-title: Detecting generic network intrusion attacks using tree-based machine learning methods publication-title: Int. J. Adv. Comput. Sci. Appl. – volume: 6 start-page: 1753 year: 2017 ident: ref_21 article-title: Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2780188 – ident: ref_53 doi: 10.1109/MITS.2023.3305643 – volume: 361 start-page: 106715 year: 2024 ident: ref_61 article-title: Data driven secure control for cyber–physical systems under hybrid attacks: A Stackelberg game approach publication-title: J. Frankl. Inst. doi: 10.1016/j.jfranklin.2024.106715 – volume: 27 start-page: 2595 year: 2021 ident: ref_13 article-title: Smart grid cyber-physical systems: Communication technologies, standards and challenges publication-title: Wirel. Netw. doi: 10.1007/s11276-021-02579-1 – volume: 589 start-page: 790 year: 2022 ident: ref_29 article-title: Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.01.009 – volume: 16 start-page: 4920 year: 2019 ident: ref_55 article-title: Resilient model predictive control of cyber–physical systems under DoS attacks publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2019.2963294 – volume: 58 start-page: 2715 year: 2013 ident: ref_6 article-title: Attack detection and identification in cyber-physical systems publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2013.2266831 – ident: ref_11 doi: 10.3390/s23031634 – volume: 9 start-page: 775 year: 2021 ident: ref_51 article-title: Secure control for cyber-physical systems under malicious attacks publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2021.3094782 – volume: 52 start-page: 13557 year: 2021 ident: ref_44 article-title: Delay-dependent distributed Kalman fusion estimation with dimensionality reduction in cyber-physical systems publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2021.3119461 – volume: 113 start-page: 108687 year: 2020 ident: ref_14 article-title: State estimation and self-triggered control of CPSs against joint sensor and actuator attacks publication-title: Automatica doi: 10.1016/j.automatica.2019.108687 – volume: 9 start-page: 38571 year: 2021 ident: ref_26 article-title: CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3063229 – volume: 32 start-page: 2760 year: 2022 ident: ref_48 article-title: Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case publication-title: Int. J. Robust Nonlinear Control doi: 10.1002/rnc.5831 – ident: ref_9 doi: 10.23919/ChiCC.2019.8866688 – volume: 9 start-page: 784 year: 2022 ident: ref_27 article-title: A survey of cyber attacks on cyber physical systems: Recent advances and challenges publication-title: IEEE/CAA J. Autom. Sin. doi: 10.1109/JAS.2022.105548 – volume: 1 start-page: 3 year: 2016 ident: ref_24 article-title: Designing CPS/IoT applications for smart buildings and cities publication-title: IET Cyber-Phys. Syst. Theory Appl. doi: 10.1049/iet-cps.2016.0025 – volume: 417 start-page: 454 year: 2017 ident: ref_46 article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer publication-title: Inf. Sci. doi: 10.1016/j.ins.2017.07.029 – volume: 7 start-page: 3212 year: 2020 ident: ref_28 article-title: Distributed reinforcement learning for cyber-physical system with multiple remote state estimation under DoS attacker publication-title: IEEE Trans. Netw. Sci. Eng. doi: 10.1109/TNSE.2020.3018871 – volume: 15 start-page: 256 year: 2020 ident: ref_36 article-title: Detection of DoS attacks using machine learning techniques publication-title: Int. J. Veh. Auton. Syst. doi: 10.1504/IJVAS.2020.116448 – volume: 9 start-page: 56 year: 2022 ident: ref_37 article-title: Detecting Denial of Service attacks using machine learning algorithms publication-title: J. Big Data doi: 10.1186/s40537-022-00616-0 – volume: 47 start-page: 394 year: 2019 ident: ref_2 article-title: A systems and control perspective of CPS security publication-title: Annu. Rev. Control doi: 10.1016/j.arcontrol.2019.04.011 – volume: 2 start-page: 60 year: 2024 ident: ref_62 article-title: Learning Secure Control Design for Cyber-Physical Systems under False Data Injection Attacks publication-title: IEEE Trans. Ind. Cyber-Phys. Syst. doi: 10.1109/TICPS.2024.3373715 – ident: ref_35 doi: 10.32604/cmc.2024.046396 – volume: 17 start-page: 3551 year: 2023 ident: ref_54 article-title: Observer-Based MPC for Interval Type-2 Fuzzy Cyber–Physical Systems Against Multichannel Jamming Attacks publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2023.3287528 – ident: ref_7 doi: 10.3390/s20216123 – volume: 67 start-page: 7951 year: 2019 ident: ref_49 article-title: Resilient control design for load frequency control system under false data injection attacks publication-title: IEEE Trans. Ind. Electron. doi: 10.1109/TIE.2019.2944091 – volume: 12 start-page: 161 year: 2011 ident: ref_1 article-title: Cyber-physical systems publication-title: Impact Control Technol. – ident: ref_19 doi: 10.1109/TII.2024.3383520 – volume: 11 start-page: 939 year: 2017 ident: ref_10 article-title: A review of the roles of digital twin in CPS-based production systems publication-title: Procedia Manuf. doi: 10.1016/j.promfg.2017.07.198 – volume: 18 start-page: 235 year: 2018 ident: ref_20 article-title: Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2018.2883057 – volume: 15 start-page: 27625 year: 2015 ident: ref_12 article-title: A model-based approach to support validation of medical cyber-physical systems publication-title: Sensors doi: 10.3390/s151127625 – volume: 52 start-page: 4950 year: 2021 ident: ref_30 article-title: Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2021.3106228 – volume: 41 start-page: 638 year: 2016 ident: ref_15 article-title: Characterization of cyber-physical sensor systems publication-title: Procedia Cirp doi: 10.1016/j.procir.2015.12.019 – volume: 633 start-page: 504 year: 2023 ident: ref_59 article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2023.03.088 – volume: 93 start-page: 2596 year: 2020 ident: ref_43 article-title: A distributed Kalman filter with symbolic zonotopes and unique symbols provider for robust state estimation in CPS publication-title: Int. J. Control doi: 10.1080/00207179.2019.1707278 |
SSID | ssj0023338 |
Score | 2.4583423 |
SecondaryResourceType | review_article |
Snippet | Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal... Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal... |
SourceID | doaj pubmedcentral proquest gale pubmed crossref |
SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
StartPage | 3815 |
SubjectTerms | Communication Computer science Control systems cyber attack Cyberterrorism cyber–physical system Denial of service attacks Investment analysis Markov analysis Nuclear energy Nuclear power plants Review Safety and security measures security control Security management |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Na9wwEBUlp_ZQ-l23SVBLob2Y2JJsS7ltloYQaCmkgdyEPmmheMPGW8it_6H_sL-kM5bWrGmhl14tGcYzkuY9rHlDyJsoY9N1kpeBKVYK6-vSRiFKD9nauzrGVmLt8IeP7dmlOL9qrnZafeGdsCQPnBx35HhnK1h10gQnjBdSRe4qZY2qAWmwsXQPct6WTGWqxYF5JR0hDqT-6AbyFOamZpZ9RpH-P4_inVw0vye5k3hOH5D7GTHSRbL0IbkT-kfk3o6O4GNyfpG70NFlunlOV5Eub21Y__rx81OOBM3i5BTLxtZpmC6GAYvsj-mCXmzW38PtE3J5-v7z8qzMTRJKB7l-KJ0TygjlPNBKpxouui4Y5YBnBYyPt6yxkYUAUCoGLo13ogohWiuAOqkY-VOy16_68JxQj9yibV1nuyB4pUxrvYG3axZ9FRpZkHdb52mXFcSxkcU3DUwC_awnPxfk9TT1Oslm_G3SCUZgmoBK1-MDiL_O8df_in9B3mL8NO5HMMaZXFYAn4TKVnrRAaNreCvbguxvQ6zzRr3RcMSxDmvyWEFeTcOwxfC_ienDapPmyBrLzAvyLK2IyWbEe4AIwQw5Wyuzj5qP9F-_jDLegHQBnwn54n-44SW5ywBu4SW2mu-TvWG9CQcAlwZ7OO6M31pGFQU priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Technology Collection dbid: 8FG link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9QwELWgXOCA-CalIIOQ4BI1iZ3E5oKWFUtVCYRUKvVm-ROQUNJms0i98R_4h_wSZhJv2AjEde2VHM_Y814y84aQ50GEsq4FS30hi5Qbl6cmcJ46iNbO5iFUAmuH33-ojk758Vl5Fl-4rWNa5fZOHC5q11p8R34IvljUWDxVvD6_SLFrFH5djS00rpJrOUQaTOkSq3cT4WLAv0Y1IQbU_nAN0QojVDmLQYNU_98X8k5EmmdL7oSf1S1yM-JGuhgNfZtc8c0dcmNHTfAuOT6Jvejocsw_p22gy0vju18_fn6M9qBRopxi8Vg3DtNF32Op_Su6oCeb7ru_vEdOV28_LY_S2CohtRDx-9RaLjWX1gG5tLJkvK69lhbYlkcrOVOUJhTeA6AKngntLM-8D8ZwIFAyBHaf7DVt4x8S6pBhVJWtTe05y6SujNPw77wILvOlSMjL7eYpG3XEsZ3FNwV8AvdZTfuckGfT1PNRPONfk96gBaYJqHc9_NB2n1U8Psqy2mRw9wjtLdeOCxmYzaTRMge8WciEvED7KTyVsBirY3EBPBLqW6lFDbyuZJWoEnKwNbGKx3Wt_jhXQp5Ow3DQ8OuJbny7GeeIHIvNE_Jg9IhpzYj6ABfCMsTMV2YPNR9pvn4ZxLwB7wJK42L__-t6RK4XAKcwSS1nB2Sv7zb-McCh3jwZfP43OiwMtw priority: 102 providerName: ProQuest |
Title | Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey |
URI | https://www.ncbi.nlm.nih.gov/pubmed/38931599 https://www.proquest.com/docview/3072727022 https://www.proquest.com/docview/3072813185 https://pubmed.ncbi.nlm.nih.gov/PMC11207848 https://doaj.org/article/c37b03228aec4ad489f3c09ba9157529 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3bitRAEC328qIP4t3oOkQR9CWapDvpbkFkdthxWdhlcR2Yt5C-qbBkNDsjzpv_4B_6JVYlmTDBxZchTFeg09XddU7SdQrghZc-E0KyyKUqjbi2SaQ955HFaG1N4n0uKXf49Cw_nvGTeTbfgU2NzW4Ar66ldlRPalZfvv75ff0eF_w7YpxI2d9cYRSiyJPtwj5eCipkcMr7jwkpQxrWigoNzQehqFHs_3df3gpMw0OTW1FoehtudfAxHLf-vgM7rroLN7dEBe_ByUVXki6ctMfQw4UPJ2vt6j-_fp93bgk7pfKQcsjqtjkcL5eUcf82HIcXq_qHW9-H2fTo0-Q46iomRAYD_zIyhquSK2ORYxqVMS6EK5VB0uXIWVanmfapc4irvGOytIbHznmtOfIo5T17AHvVonKPILRENPLcCC0cZ7Eqc21LvDtJvY1dJgN4tRm8wnRy4lTV4rJAWkHjXPTjHMDz3vRbq6FxndEheaA3INnr5o9F_bnoVlFhmNAxbkGydIaXlkvlmYmVLlWCsDNVAbwk_xU0XbAzpuxyDPCRSOaqGAukdxnLZR7AwcbFxWbSFbjfpYIS9NIAnvXNuN7oI0pZucWqtZEJ5ZwH8LCdEX2fCfwhPMRuyMFcGTzUsKX6-qXR9EbYi2CNy8f_79cTuJEiqqKzagk7gL1lvXJPERUt9Qh2xVzgr5x-GMH-4dHZ-cdR84Zh1KyGv4epEoQ |
linkProvider | Scholars Portal |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiDeBAgaB4BI1sZ3ERkJoWVi2TyG1lXoL8atFQrtlH6C98R_4H_wofgkzm2zYFYhbr7ET2Z7xfN_EnhmAp0GFrCiUiD3XPJbGpbEJUsYO0drZNIRcUezw3n7eP5Lbx9nxGvxcxMLQtcqFTZwbaje09I98E3WRFxQ8xV-ffYmpahSdri5KaNRqseNn39BlG7_aeovyfcZ5791htx83VQVii-A4ia2VupLaOvTDrM6ELApfaYuOiacJOcMzE7j3yD2CF6pyVibeB2Mk-ho6BIHfvQAXpUAkp8j03vvWwRPo79XZi7Ax2RwjOhIiZiuYNy8N8DcALCHg6u3MJbjrXYOrDU9lnVqxrsOaH9yAK0vZC2_C9kFT-4516_vubBhYd2b86Nf3Hx8a-bMmJTqjYLVR3cw6kwmF9r9kHXYwHX31s1twdC6LeBvWB8OBvwvMkUeT57YwhZci0VVuXIVvpzy4xGcqgheLxSttk7ecymd8LtF_oXUu23WO4Enb9axO1vGvTm9IAm0Hyq89fzAcnZTNdi2tKEyCtk5V3srKSaWDsIk2lU6R33IdwXOSX0lWAAdjqyaYAadE-bTKToF-ZCZylUewsRBx2ZiHcflHmSN43DbjxqbTmmrgh9O6j0opuD2CO7VGtGMmlok8FIehVnRlZVKrLYNPp_Pk4civkRVKde__43oEl_qHe7vl7tb-zn24zJHK0QW5VGzA-mQ09Q-Qik3Mw7n-M_h43hvuN5HmTHs |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3ZbtNAFB2VVELwgNgxFBgQCF6s2DNjewYJoTRt1AWiiFKpb8aztUgoKVlAeeMf-Bs-hy_h3nhiEoF466tnYs1yl3PiuxDyzEufFYXksWOKxULbNNZeiNiCt7Ym9T6XmDv8rp_vHYuDk-xkg_xc5sJgWOXSJi4MtR0Z_I-8DbLICkyeYm0fwiIGO703519i7CCFX1qX7TRqETl0829A3yav93fgrp8z1tv90N2LQ4eB2ICjnMbGCFUJZSxwMqMyLorCVcoASXG4OatZpj1zDnCId1xW1ojEOa-1AN6hvOfw3ktks0BW1CKb27v9wfuG7nFgf3UtI85V0p6Ar0T_mK15wEWjgL_dwYo_XI_VXHF-vevkWkCttFOL2Q2y4YY3ydWVWoa3yMFR6IRHu3X0Ox152p1rN_71_ccgSAMNBdIppq6N62HamU4x0f8V7dCj2firm98mxxdyjHdIazgaunuEWuQ3eW4KXTjBE1Xl2lbw65R5m7hMRuTl8vBKE6qYYzONzyWwGTznsjnniDxtpp7XpTv-NWkbb6CZgNW2Fw9G49MyKG9peKETsHyyckZUVkjluUmUrlQKaJepiLzA-yvRJsBiTBVSG2BLWF2r7BTAKjOeyzwiW8srLoOxmJR_RDsiT5phUHP8dlMN3WhWz5EpprpH5G4tEc2aEXMCKoVlyDVZWdvU-sjw09milDigbcCIQt7__7oek8ugbOXb_f7hA3KFAa7DaLmUb5HWdDxzDwGXTfWjoACUfLxonfsNNbJSDQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Control+of+Cyber%E2%80%93Physical+Systems+under+Cyber+Attacks%3A+A+Survey&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Xing%2C+Wei&rft.au=Shen%2C+Jun&rft.date=2024-06-13&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=24&rft.issue=12&rft.spage=3815&rft_id=info:doi/10.3390%2Fs24123815&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |