Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey

Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefor...

Full description

Saved in:
Bibliographic Details
Published inSensors (Basel, Switzerland) Vol. 24; no. 12; p. 3815
Main Authors Xing, Wei, Shen, Jun
Format Journal Article
LanguageEnglish
Published Switzerland MDPI AG 13.06.2024
MDPI
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs’ operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs’ security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs’ security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques.
AbstractList Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs’ operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs’ security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs’ security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques.
Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs' operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs' security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs' security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques.Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal contexts. However, their extensive integration presents increasing security challenges, particularly due to recurring cyber attacks. Therefore, it is crucial to explore CPS security control. In this review, we systematically examine the prevalent cyber attacks affecting CPSs, such as denial of service, false data injection, and replay attacks, explaining their impacts on CPSs' operation and integrity, as well as summarizing classic attack detection methods. Regarding CPSs' security control approaches, we comprehensively outline protective strategies and technologies, including event-triggered control, switching control, predictive control, and optimal control. These approaches aim to effectively counter various cyber threats and strengthen CPSs' security and resilience. Lastly, we anticipate future advancements in CPS security control, envisioning strategies to address emerging cyber risks and innovations in intelligent security control techniques.
Audience Academic
Author Shen, Jun
Xing, Wei
AuthorAffiliation College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; xingwei@nuaa.edu.cn
AuthorAffiliation_xml – name: College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; xingwei@nuaa.edu.cn
Author_xml – sequence: 1
  givenname: Wei
  surname: Xing
  fullname: Xing, Wei
– sequence: 2
  givenname: Jun
  surname: Shen
  fullname: Shen, Jun
BackLink https://www.ncbi.nlm.nih.gov/pubmed/38931599$$D View this record in MEDLINE/PubMed
BookMark eNptkktv1DAQxyNURB9w4AugSFzoYVu_kthc0GrFo6gSSAtny5mMt16SuLWTSrnxHfoN-SS4TVm1FZqDrZnf_O15HGZ7ve8xy15TcsK5IqeRCcq4pMWz7IAKJhaSMbL34L6fHca4JYRxzuWLbJ9LxWmh1EH2dY0wBjdM-cr3Q_Bt7m2-mmoMf37ffL-YogPT5uspDtjFfOwbDHM4Xw6DgV_xfb7M12O4xull9tyaNuKr-_Mo-_np44_Vl8X5t89nq-X5AgqihgWAUEYoaChnoAouqgqNgpJQxBqhqVlRW4ZIVGGRS9OAIIi2rkVJlbKWH2Vns27jzVZfBteZMGlvnL5z-LDRJgwOWtTAq5pwxqRBEKYRUlkORNVG0aIqmEpaH2aty7HusAFMPTDtI9HHkd5d6I2_1pQyUkkhk8K7e4Xgr0aMg-5cBGxb06Mfo-akYpJyKouEvn2Cbv0Y-tSrOyoZYSxRJzO1MakC11ufHoZkDXYO0uCtS_5lpVRZ8FKWKeHNwxp2n_835AQczwAEH2NAu0Mo0bcLpHcLlNjTJyy4wQzudjmMa_-T8Rej68dD
CitedBy_id crossref_primary_10_1016_j_jprocont_2025_103409
crossref_primary_10_3390_s25010213
Cites_doi 10.1109/TCYB.2017.2716115
10.1109/TAC.2020.3029342
10.1109/MIS.2010.104
10.1016/j.compind.2018.04.017
10.1109/TIFS.2022.3146078
10.1109/TFUZZ.2022.3148875
10.1109/TAC.2020.3032598
10.1016/j.isatra.2023.08.018
10.1007/s12555-014-0261-7
10.1109/TII.2024.3363091
10.1109/JSYST.2024.3384372
10.3390/app11093751
10.1109/TAES.2015.140589
10.1007/s00170-020-06572-4
10.1109/ACCESS.2020.2966281
10.1016/j.automatica.2022.110345
10.1109/TSMC.2024.3378700
10.3390/s23031683
10.1109/TSG.2022.3217060
10.3233/JIFS-222427
10.1109/TSMC.2023.3344876
10.1049/iet-cta.2020.0867
10.1080/00207179.2018.1537518
10.1109/ACCESS.2017.2780188
10.1109/MITS.2023.3305643
10.1016/j.jfranklin.2024.106715
10.1007/s11276-021-02579-1
10.1016/j.ins.2022.01.009
10.1109/TII.2019.2963294
10.1109/TAC.2013.2266831
10.3390/s23031634
10.1109/TCNS.2021.3094782
10.1109/TCYB.2021.3119461
10.1016/j.automatica.2019.108687
10.1109/ACCESS.2021.3063229
10.1002/rnc.5831
10.23919/ChiCC.2019.8866688
10.1109/JAS.2022.105548
10.1049/iet-cps.2016.0025
10.1016/j.ins.2017.07.029
10.1109/TNSE.2020.3018871
10.1504/IJVAS.2020.116448
10.1186/s40537-022-00616-0
10.1016/j.arcontrol.2019.04.011
10.1109/TICPS.2024.3373715
10.32604/cmc.2024.046396
10.1109/JSYST.2023.3287528
10.3390/s20216123
10.1109/TIE.2019.2944091
10.1109/TII.2024.3383520
10.1016/j.promfg.2017.07.198
10.1109/TDSC.2018.2883057
10.3390/s151127625
10.1109/TSMC.2021.3106228
10.1016/j.procir.2015.12.019
10.1016/j.ins.2023.03.088
10.1080/00207179.2019.1707278
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2024 by the authors. 2024
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2024 by the authors. 2024
DBID AAYXX
CITATION
NPM
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PHGZM
PHGZT
PIMPY
PJZUB
PKEHL
PPXIY
PQEST
PQQKQ
PQUKI
PRINS
7X8
5PM
DOA
DOI 10.3390/s24123815
DatabaseName CrossRef
PubMed
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
ProQuest Hospital Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
ProQuest Health & Medical Collection
PML(ProQuest Medical Library)
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
PubMed
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Central China
ProQuest Central
Health Research Premium Collection
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
Health & Medical Research Collection
ProQuest Central (New)
ProQuest Medical Library (Alumni)
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Health & Medical Complete
ProQuest Medical Library
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
Publicly Available Content Database

PubMed

CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
– sequence: 3
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_c37b03228aec4ad489f3c09ba9157529
PMC11207848
A799653686
38931599
10_3390_s24123815
Genre Journal Article
Review
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61973156
GroupedDBID ---
123
2WC
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
AAYXX
ABDBF
ABUWG
ACUHS
ADBBV
ADMLS
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
BENPR
BPHCQ
BVXVI
CCPQU
CITATION
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HH5
HMCUK
HYE
IAO
ITC
KQ8
L6V
M1P
M48
MODMG
M~E
OK1
OVT
P2P
P62
PHGZM
PHGZT
PIMPY
PQQKQ
PROAC
PSQYO
RNS
RPM
TUS
UKHRP
XSB
~8M
3V.
ABJCF
ARAPS
HCIFZ
KB.
M7S
NPM
PDBOC
PMFND
7XB
8FK
AZQEC
DWQXO
K9.
PJZUB
PKEHL
PPXIY
PQEST
PQUKI
PRINS
7X8
5PM
PUEGO
ID FETCH-LOGICAL-c509t-cc49a49cd132c953477ea9c601eebecdb25bf2ee095fe38adc40eefbb46199ff3
IEDL.DBID M48
ISSN 1424-8220
IngestDate Wed Aug 27 01:29:43 EDT 2025
Thu Aug 21 18:32:50 EDT 2025
Fri Jul 11 02:22:51 EDT 2025
Fri Jul 25 06:05:16 EDT 2025
Tue Jun 10 21:08:11 EDT 2025
Wed Feb 19 02:06:45 EST 2025
Thu Apr 24 23:00:02 EDT 2025
Tue Jul 01 03:51:03 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords security control
cyber–physical system
cyber attack
Language English
License https://creativecommons.org/licenses/by/4.0
Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c509t-cc49a49cd132c953477ea9c601eebecdb25bf2ee095fe38adc40eefbb46199ff3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Review-3
content type line 23
OpenAccessLink http://journals.scholarsportal.info/openUrl.xqy?doi=10.3390/s24123815
PMID 38931599
PQID 3072727022
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_c37b03228aec4ad489f3c09ba9157529
pubmedcentral_primary_oai_pubmedcentral_nih_gov_11207848
proquest_miscellaneous_3072813185
proquest_journals_3072727022
gale_infotracacademiconefile_A799653686
pubmed_primary_38931599
crossref_primary_10_3390_s24123815
crossref_citationtrail_10_3390_s24123815
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20240613
PublicationDateYYYYMMDD 2024-06-13
PublicationDate_xml – month: 6
  year: 2024
  text: 20240613
  day: 13
PublicationDecade 2020
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2024
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Kazemi (ref_30) 2021; 52
Lu (ref_46) 2017; 417
ref_58
ref_56
ref_11
Geng (ref_54) 2023; 17
Berger (ref_15) 2016; 41
ref_53
Shalini (ref_33) 2023; 79
Wang (ref_8) 2010; 25
ref_19
ref_17
Gao (ref_14) 2020; 113
Kazemi (ref_42) 2020; 14
Amin (ref_26) 2021; 9
Yang (ref_31) 2022; 142
Wang (ref_48) 2022; 32
Yuan (ref_52) 2015; 13
Dibaji (ref_2) 2019; 47
Sun (ref_55) 2019; 16
ref_25
ref_23
Li (ref_16) 2020; 66
Chen (ref_18) 2017; 48
Combastel (ref_43) 2020; 93
Dai (ref_28) 2020; 7
Pasqualetti (ref_6) 2013; 58
Joerger (ref_32) 2016; 52
Su (ref_41) 2020; 17
Dafflon (ref_5) 2021; 113
Wu (ref_63) 2020; 66
Huang (ref_40) 2022; 14
Fei (ref_61) 2024; 361
Jha (ref_13) 2021; 27
Alguliyev (ref_3) 2018; 100
Kumari (ref_37) 2022; 9
Chen (ref_44) 2021; 52
ref_35
Kumar (ref_36) 2020; 15
Liu (ref_34) 2023; 142
Alsariera (ref_38) 2021; 12
Poudel (ref_20) 2018; 18
Duo (ref_27) 2022; 9
Wu (ref_51) 2021; 9
Negri (ref_10) 2017; 11
Pan (ref_4) 2022; 30
Baheti (ref_1) 2011; 12
Liu (ref_57) 2020; 93
Ma (ref_47) 2024; 54
Reji (ref_39) 2023; 44
Abbaspour (ref_49) 2019; 67
Fei (ref_62) 2024; 2
Padmanabhan (ref_21) 2017; 6
Kuvshinkova (ref_22) 2003; 1
Ma (ref_29) 2022; 589
Silva (ref_12) 2015; 15
ref_9
Ma (ref_59) 2023; 633
Choraria (ref_45) 2022; 17
ref_7
Zhao (ref_60) 2020; 8
Shih (ref_24) 2016; 1
Wang (ref_50) 2024; 20
References_xml – volume: 48
  start-page: 1862
  year: 2017
  ident: ref_18
  article-title: Secure fusion estimation for bandwidth constrained cyber-physical systems under replay attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2017.2716115
– volume: 66
  start-page: 3773
  year: 2020
  ident: ref_63
  article-title: Zero-sum game-based optimal secure control under actuator attacks
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.3029342
– volume: 79
  start-page: 10353
  year: 2023
  ident: ref_33
  article-title: Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test
  publication-title: J. Supercomput.
– volume: 25
  start-page: 85
  year: 2010
  ident: ref_8
  article-title: The emergence of intelligent enterprises: From CPS to CPSs
  publication-title: IEEE Intell. Syst.
  doi: 10.1109/MIS.2010.104
– volume: 100
  start-page: 212
  year: 2018
  ident: ref_3
  article-title: Cyber-physical systems and their security issues
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2018.04.017
– volume: 17
  start-page: 670
  year: 2022
  ident: ref_45
  article-title: Design of false data injection attack on distributed process estimation
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2022.3146078
– volume: 30
  start-page: 4359
  year: 2022
  ident: ref_4
  article-title: Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme
  publication-title: IEEE Trans. Fuzzy Syst.
  doi: 10.1109/TFUZZ.2022.3148875
– volume: 66
  start-page: 4303
  year: 2020
  ident: ref_16
  article-title: Active security control approach against DoS attacks in cyber-physical systems
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.3032598
– volume: 1
  start-page: 5
  year: 2003
  ident: ref_22
  article-title: SQL Slammer worm lessons learned for consideration by the electricity sector
  publication-title: N. Am. Electr. Reliab. Counc.
– volume: 142
  start-page: 478
  year: 2023
  ident: ref_34
  article-title: Dynamic event-triggered fault detection for rotary steerable systems with unknown time-varying noise covariances
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2023.08.018
– volume: 13
  start-page: 1423
  year: 2015
  ident: ref_52
  article-title: Resilient control in the presence of DoS attack: Switched system approach
  publication-title: Int. J. Control. Autom. Syst.
  doi: 10.1007/s12555-014-0261-7
– volume: 20
  start-page: 7832
  year: 2024
  ident: ref_50
  article-title: Resilient Control of CPSs Under Mixed DoS Attacks: A Type-Dependent ADT Approach
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2024.3363091
– ident: ref_56
  doi: 10.1109/JSYST.2024.3384372
– ident: ref_25
  doi: 10.3390/app11093751
– volume: 17
  start-page: 650
  year: 2020
  ident: ref_41
  article-title: A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids
  publication-title: IEEE Trans. Ind. Inform.
– ident: ref_23
– volume: 52
  start-page: 726
  year: 2016
  ident: ref_32
  article-title: Fault detection and exclusion using solution separation and chi-squared ARAIM
  publication-title: IEEE Trans. Aerosp. Electron. Syst.
  doi: 10.1109/TAES.2015.140589
– volume: 113
  start-page: 2395
  year: 2021
  ident: ref_5
  article-title: The challenges, approaches, and used techniques of CPS for manufacturing in Industry 4.0: A literature review
  publication-title: Int. J. Adv. Manuf. Technol.
  doi: 10.1007/s00170-020-06572-4
– volume: 8
  start-page: 19271
  year: 2020
  ident: ref_60
  article-title: Co-design of dual security control and communication for nonlinear CPS under DoS attack
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2966281
– volume: 142
  start-page: 110345
  year: 2022
  ident: ref_31
  article-title: Sliding mode-based adaptive resilient control for Markovian jump cyber–physical systems in face of simultaneous actuator and sensor attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2022.110345
– ident: ref_58
  doi: 10.1109/TSMC.2024.3378700
– ident: ref_17
  doi: 10.3390/s23031683
– volume: 14
  start-page: 2367
  year: 2022
  ident: ref_40
  article-title: Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system
  publication-title: IEEE Trans. Smart Grid
  doi: 10.1109/TSG.2022.3217060
– volume: 44
  start-page: 4245
  year: 2023
  ident: ref_39
  article-title: An intrusion detection system based on hybrid machine learning classifier
  publication-title: J. Intell. Fuzzy Syst.
  doi: 10.3233/JIFS-222427
– volume: 54
  start-page: 2685
  year: 2024
  ident: ref_47
  article-title: Distributed Secure Estimation Against Sparse False Data Injection Attacks
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
  doi: 10.1109/TSMC.2023.3344876
– volume: 14
  start-page: 3526
  year: 2020
  ident: ref_42
  article-title: Efficient resilient dynamic co-estimation framework for cyber-physical systems under sensor attacks
  publication-title: IET Control Theory Appl.
  doi: 10.1049/iet-cta.2020.0867
– volume: 93
  start-page: 1907
  year: 2020
  ident: ref_57
  article-title: Event-triggered resilient control for cyber-physical system under denial-of-service attacks
  publication-title: Int. J. Control
  doi: 10.1080/00207179.2018.1537518
– volume: 12
  start-page: 597
  year: 2021
  ident: ref_38
  article-title: Detecting generic network intrusion attacks using tree-based machine learning methods
  publication-title: Int. J. Adv. Comput. Sci. Appl.
– volume: 6
  start-page: 1753
  year: 2017
  ident: ref_21
  article-title: Scalable and distributed detection analysis on wormhole links in wireless sensor networks for networked systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2780188
– ident: ref_53
  doi: 10.1109/MITS.2023.3305643
– volume: 361
  start-page: 106715
  year: 2024
  ident: ref_61
  article-title: Data driven secure control for cyber–physical systems under hybrid attacks: A Stackelberg game approach
  publication-title: J. Frankl. Inst.
  doi: 10.1016/j.jfranklin.2024.106715
– volume: 27
  start-page: 2595
  year: 2021
  ident: ref_13
  article-title: Smart grid cyber-physical systems: Communication technologies, standards and challenges
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-021-02579-1
– volume: 589
  start-page: 790
  year: 2022
  ident: ref_29
  article-title: Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.01.009
– volume: 16
  start-page: 4920
  year: 2019
  ident: ref_55
  article-title: Resilient model predictive control of cyber–physical systems under DoS attacks
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2019.2963294
– volume: 58
  start-page: 2715
  year: 2013
  ident: ref_6
  article-title: Attack detection and identification in cyber-physical systems
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2013.2266831
– ident: ref_11
  doi: 10.3390/s23031634
– volume: 9
  start-page: 775
  year: 2021
  ident: ref_51
  article-title: Secure control for cyber-physical systems under malicious attacks
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2021.3094782
– volume: 52
  start-page: 13557
  year: 2021
  ident: ref_44
  article-title: Delay-dependent distributed Kalman fusion estimation with dimensionality reduction in cyber-physical systems
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2021.3119461
– volume: 113
  start-page: 108687
  year: 2020
  ident: ref_14
  article-title: State estimation and self-triggered control of CPSs against joint sensor and actuator attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108687
– volume: 9
  start-page: 38571
  year: 2021
  ident: ref_26
  article-title: CPS attacks mitigation approaches on power electronic systems with security challenges for smart grid applications: A review
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3063229
– volume: 32
  start-page: 2760
  year: 2022
  ident: ref_48
  article-title: Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case
  publication-title: Int. J. Robust Nonlinear Control
  doi: 10.1002/rnc.5831
– ident: ref_9
  doi: 10.23919/ChiCC.2019.8866688
– volume: 9
  start-page: 784
  year: 2022
  ident: ref_27
  article-title: A survey of cyber attacks on cyber physical systems: Recent advances and challenges
  publication-title: IEEE/CAA J. Autom. Sin.
  doi: 10.1109/JAS.2022.105548
– volume: 1
  start-page: 3
  year: 2016
  ident: ref_24
  article-title: Designing CPS/IoT applications for smart buildings and cities
  publication-title: IET Cyber-Phys. Syst. Theory Appl.
  doi: 10.1049/iet-cps.2016.0025
– volume: 417
  start-page: 454
  year: 2017
  ident: ref_46
  article-title: Secure state estimation for cyber-physical systems under sparse sensor attacks via a switched Luenberger observer
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2017.07.029
– volume: 7
  start-page: 3212
  year: 2020
  ident: ref_28
  article-title: Distributed reinforcement learning for cyber-physical system with multiple remote state estimation under DoS attacker
  publication-title: IEEE Trans. Netw. Sci. Eng.
  doi: 10.1109/TNSE.2020.3018871
– volume: 15
  start-page: 256
  year: 2020
  ident: ref_36
  article-title: Detection of DoS attacks using machine learning techniques
  publication-title: Int. J. Veh. Auton. Syst.
  doi: 10.1504/IJVAS.2020.116448
– volume: 9
  start-page: 56
  year: 2022
  ident: ref_37
  article-title: Detecting Denial of Service attacks using machine learning algorithms
  publication-title: J. Big Data
  doi: 10.1186/s40537-022-00616-0
– volume: 47
  start-page: 394
  year: 2019
  ident: ref_2
  article-title: A systems and control perspective of CPS security
  publication-title: Annu. Rev. Control
  doi: 10.1016/j.arcontrol.2019.04.011
– volume: 2
  start-page: 60
  year: 2024
  ident: ref_62
  article-title: Learning Secure Control Design for Cyber-Physical Systems under False Data Injection Attacks
  publication-title: IEEE Trans. Ind. Cyber-Phys. Syst.
  doi: 10.1109/TICPS.2024.3373715
– ident: ref_35
  doi: 10.32604/cmc.2024.046396
– volume: 17
  start-page: 3551
  year: 2023
  ident: ref_54
  article-title: Observer-Based MPC for Interval Type-2 Fuzzy Cyber–Physical Systems Against Multichannel Jamming Attacks
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2023.3287528
– ident: ref_7
  doi: 10.3390/s20216123
– volume: 67
  start-page: 7951
  year: 2019
  ident: ref_49
  article-title: Resilient control design for load frequency control system under false data injection attacks
  publication-title: IEEE Trans. Ind. Electron.
  doi: 10.1109/TIE.2019.2944091
– volume: 12
  start-page: 161
  year: 2011
  ident: ref_1
  article-title: Cyber-physical systems
  publication-title: Impact Control Technol.
– ident: ref_19
  doi: 10.1109/TII.2024.3383520
– volume: 11
  start-page: 939
  year: 2017
  ident: ref_10
  article-title: A review of the roles of digital twin in CPS-based production systems
  publication-title: Procedia Manuf.
  doi: 10.1016/j.promfg.2017.07.198
– volume: 18
  start-page: 235
  year: 2018
  ident: ref_20
  article-title: Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2018.2883057
– volume: 15
  start-page: 27625
  year: 2015
  ident: ref_12
  article-title: A model-based approach to support validation of medical cyber-physical systems
  publication-title: Sensors
  doi: 10.3390/s151127625
– volume: 52
  start-page: 4950
  year: 2021
  ident: ref_30
  article-title: Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
  doi: 10.1109/TSMC.2021.3106228
– volume: 41
  start-page: 638
  year: 2016
  ident: ref_15
  article-title: Characterization of cyber-physical sensor systems
  publication-title: Procedia Cirp
  doi: 10.1016/j.procir.2015.12.019
– volume: 633
  start-page: 504
  year: 2023
  ident: ref_59
  article-title: Neural network-based secure event-triggered control of uncertain industrial cyber-physical systems against deception attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2023.03.088
– volume: 93
  start-page: 2596
  year: 2020
  ident: ref_43
  article-title: A distributed Kalman filter with symbolic zonotopes and unique symbols provider for robust state estimation in CPS
  publication-title: Int. J. Control
  doi: 10.1080/00207179.2019.1707278
SSID ssj0023338
Score 2.4583423
SecondaryResourceType review_article
Snippet Cyber–physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal...
Cyber-physical systems (CPSs), which combine computer science, control systems, and physical elements, have become essential in modern industrial and societal...
SourceID doaj
pubmedcentral
proquest
gale
pubmed
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
Enrichment Source
StartPage 3815
SubjectTerms Communication
Computer science
Control systems
cyber attack
Cyberterrorism
cyber–physical system
Denial of service attacks
Investment analysis
Markov analysis
Nuclear energy
Nuclear power plants
Review
Safety and security measures
security control
Security management
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Na9wwEBUlp_ZQ-l23SVBLob2Y2JJsS7ltloYQaCmkgdyEPmmheMPGW8it_6H_sL-kM5bWrGmhl14tGcYzkuY9rHlDyJsoY9N1kpeBKVYK6-vSRiFKD9nauzrGVmLt8IeP7dmlOL9qrnZafeGdsCQPnBx35HhnK1h10gQnjBdSRe4qZY2qAWmwsXQPct6WTGWqxYF5JR0hDqT-6AbyFOamZpZ9RpH-P4_inVw0vye5k3hOH5D7GTHSRbL0IbkT-kfk3o6O4GNyfpG70NFlunlOV5Eub21Y__rx81OOBM3i5BTLxtZpmC6GAYvsj-mCXmzW38PtE3J5-v7z8qzMTRJKB7l-KJ0TygjlPNBKpxouui4Y5YBnBYyPt6yxkYUAUCoGLo13ogohWiuAOqkY-VOy16_68JxQj9yibV1nuyB4pUxrvYG3axZ9FRpZkHdb52mXFcSxkcU3DUwC_awnPxfk9TT1Oslm_G3SCUZgmoBK1-MDiL_O8df_in9B3mL8NO5HMMaZXFYAn4TKVnrRAaNreCvbguxvQ6zzRr3RcMSxDmvyWEFeTcOwxfC_ienDapPmyBrLzAvyLK2IyWbEe4AIwQw5Wyuzj5qP9F-_jDLegHQBnwn54n-44SW5ywBu4SW2mu-TvWG9CQcAlwZ7OO6M31pGFQU
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Nb9QwELWgXOCA-CalIIOQ4BI1iZ3E5oKWFUtVCYRUKvVm-ROQUNJms0i98R_4h_wSZhJv2AjEde2VHM_Y814y84aQ50GEsq4FS30hi5Qbl6cmcJ46iNbO5iFUAmuH33-ojk758Vl5Fl-4rWNa5fZOHC5q11p8R34IvljUWDxVvD6_SLFrFH5djS00rpJrOUQaTOkSq3cT4WLAv0Y1IQbU_nAN0QojVDmLQYNU_98X8k5EmmdL7oSf1S1yM-JGuhgNfZtc8c0dcmNHTfAuOT6Jvejocsw_p22gy0vju18_fn6M9qBRopxi8Vg3DtNF32Op_Su6oCeb7ru_vEdOV28_LY_S2CohtRDx-9RaLjWX1gG5tLJkvK69lhbYlkcrOVOUJhTeA6AKngntLM-8D8ZwIFAyBHaf7DVt4x8S6pBhVJWtTe05y6SujNPw77wILvOlSMjL7eYpG3XEsZ3FNwV8AvdZTfuckGfT1PNRPONfk96gBaYJqHc9_NB2n1U8Psqy2mRw9wjtLdeOCxmYzaTRMge8WciEvED7KTyVsBirY3EBPBLqW6lFDbyuZJWoEnKwNbGKx3Wt_jhXQp5Ow3DQ8OuJbny7GeeIHIvNE_Jg9IhpzYj6ABfCMsTMV2YPNR9pvn4ZxLwB7wJK42L__-t6RK4XAKcwSS1nB2Sv7zb-McCh3jwZfP43OiwMtw
  priority: 102
  providerName: ProQuest
Title Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey
URI https://www.ncbi.nlm.nih.gov/pubmed/38931599
https://www.proquest.com/docview/3072727022
https://www.proquest.com/docview/3072813185
https://pubmed.ncbi.nlm.nih.gov/PMC11207848
https://doaj.org/article/c37b03228aec4ad489f3c09ba9157529
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3bitRAEC328qIP4t3oOkQR9CWapDvpbkFkdthxWdhlcR2Yt5C-qbBkNDsjzpv_4B_6JVYlmTDBxZchTFeg09XddU7SdQrghZc-E0KyyKUqjbi2SaQ955HFaG1N4n0uKXf49Cw_nvGTeTbfgU2NzW4Ar66ldlRPalZfvv75ff0eF_w7YpxI2d9cYRSiyJPtwj5eCipkcMr7jwkpQxrWigoNzQehqFHs_3df3gpMw0OTW1FoehtudfAxHLf-vgM7rroLN7dEBe_ByUVXki6ctMfQw4UPJ2vt6j-_fp93bgk7pfKQcsjqtjkcL5eUcf82HIcXq_qHW9-H2fTo0-Q46iomRAYD_zIyhquSK2ORYxqVMS6EK5VB0uXIWVanmfapc4irvGOytIbHznmtOfIo5T17AHvVonKPILRENPLcCC0cZ7Eqc21LvDtJvY1dJgN4tRm8wnRy4lTV4rJAWkHjXPTjHMDz3vRbq6FxndEheaA3INnr5o9F_bnoVlFhmNAxbkGydIaXlkvlmYmVLlWCsDNVAbwk_xU0XbAzpuxyDPCRSOaqGAukdxnLZR7AwcbFxWbSFbjfpYIS9NIAnvXNuN7oI0pZucWqtZEJ5ZwH8LCdEX2fCfwhPMRuyMFcGTzUsKX6-qXR9EbYi2CNy8f_79cTuJEiqqKzagk7gL1lvXJPERUt9Qh2xVzgr5x-GMH-4dHZ-cdR84Zh1KyGv4epEoQ
linkProvider Scholars Portal
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiDeBAgaB4BI1sZ3ERkJoWVi2TyG1lXoL8atFQrtlH6C98R_4H_wofgkzm2zYFYhbr7ET2Z7xfN_EnhmAp0GFrCiUiD3XPJbGpbEJUsYO0drZNIRcUezw3n7eP5Lbx9nxGvxcxMLQtcqFTZwbaje09I98E3WRFxQ8xV-ffYmpahSdri5KaNRqseNn39BlG7_aeovyfcZ5791htx83VQVii-A4ia2VupLaOvTDrM6ELApfaYuOiacJOcMzE7j3yD2CF6pyVibeB2Mk-ho6BIHfvQAXpUAkp8j03vvWwRPo79XZi7Ax2RwjOhIiZiuYNy8N8DcALCHg6u3MJbjrXYOrDU9lnVqxrsOaH9yAK0vZC2_C9kFT-4516_vubBhYd2b86Nf3Hx8a-bMmJTqjYLVR3cw6kwmF9r9kHXYwHX31s1twdC6LeBvWB8OBvwvMkUeT57YwhZci0VVuXIVvpzy4xGcqgheLxSttk7ecymd8LtF_oXUu23WO4Enb9axO1vGvTm9IAm0Hyq89fzAcnZTNdi2tKEyCtk5V3srKSaWDsIk2lU6R33IdwXOSX0lWAAdjqyaYAadE-bTKToF-ZCZylUewsRBx2ZiHcflHmSN43DbjxqbTmmrgh9O6j0opuD2CO7VGtGMmlok8FIehVnRlZVKrLYNPp_Pk4civkRVKde__43oEl_qHe7vl7tb-zn24zJHK0QW5VGzA-mQ09Q-Qik3Mw7n-M_h43hvuN5HmTHs
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3ZbtNAFB2VVELwgNgxFBgQCF6s2DNjewYJoTRt1AWiiFKpb8aztUgoKVlAeeMf-Bs-hy_h3nhiEoF466tnYs1yl3PiuxDyzEufFYXksWOKxULbNNZeiNiCt7Ym9T6XmDv8rp_vHYuDk-xkg_xc5sJgWOXSJi4MtR0Z_I-8DbLICkyeYm0fwiIGO703519i7CCFX1qX7TRqETl0829A3yav93fgrp8z1tv90N2LQ4eB2ICjnMbGCFUJZSxwMqMyLorCVcoASXG4OatZpj1zDnCId1xW1ojEOa-1AN6hvOfw3ktks0BW1CKb27v9wfuG7nFgf3UtI85V0p6Ar0T_mK15wEWjgL_dwYo_XI_VXHF-vevkWkCttFOL2Q2y4YY3ydWVWoa3yMFR6IRHu3X0Ox152p1rN_71_ccgSAMNBdIppq6N62HamU4x0f8V7dCj2firm98mxxdyjHdIazgaunuEWuQ3eW4KXTjBE1Xl2lbw65R5m7hMRuTl8vBKE6qYYzONzyWwGTznsjnniDxtpp7XpTv-NWkbb6CZgNW2Fw9G49MyKG9peKETsHyyckZUVkjluUmUrlQKaJepiLzA-yvRJsBiTBVSG2BLWF2r7BTAKjOeyzwiW8srLoOxmJR_RDsiT5phUHP8dlMN3WhWz5EpprpH5G4tEc2aEXMCKoVlyDVZWdvU-sjw09milDigbcCIQt7__7oek8ugbOXb_f7hA3KFAa7DaLmUb5HWdDxzDwGXTfWjoACUfLxonfsNNbJSDQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Security+Control+of+Cyber%E2%80%93Physical+Systems+under+Cyber+Attacks%3A+A+Survey&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Xing%2C+Wei&rft.au=Shen%2C+Jun&rft.date=2024-06-13&rft.pub=MDPI+AG&rft.eissn=1424-8220&rft.volume=24&rft.issue=12&rft.spage=3815&rft_id=info:doi/10.3390%2Fs24123815&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon