Next Article in Journal
Dynamic Analysis of the Coracohumeral Ligament Using Ultra-Sonography in Shoulder Contracture
Next Article in Special Issue
Optimal Linear Filter Based on Feedback Structure for Sensing Network with Correlated Noises and Data Packet Dropout
Previous Article in Journal
Cross-Modality Person Re-Identification via Local Paired Graph Attention Network
Previous Article in Special Issue
Improved Optimization Strategy Based on Region Division for Collaborative Multi-Agent Coverage Path Planning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks

1
Department of Systems Science, School of Mathematics, Southeast University, Nanjing 210096, China
2
Yonsei Frontier Lab, Yonsei University, Seoul 03722, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(8), 4013; https://doi.org/10.3390/s23084013
Submission received: 14 February 2023 / Revised: 8 April 2023 / Accepted: 13 April 2023 / Published: 15 April 2023
(This article belongs to the Special Issue Intelligent Sensing, Control and Optimization of Networks)

Abstract

:
Complex cyber–physical networks combine the prominent features of complex networks and cyber–physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital infrastructures, such as electrical power grids, can be effectively modeled as complex cyber–physical networks. Given the growing importance of complex cyber–physical networks, the issue of their cybersecurity has become a significant concern in both industry and academic fields. This survey is focused on some recent developments and methodologies for secure control of complex cyber–physical networks. Besides the single type of cyberattack, hybrid cyberattacks are also surveyed. The examination encompasses both cyber-only hybrid attacks and coordinated cyber–physical attacks that leverage the strengths of both physical and cyber attacks. Then, special focus will be paid to proactive secure control. Reviewing existing defense strategies from topology and control perspectives aims to proactively enhance security. The topological design allows the defender to resist potential attacks in advance, while the reconstruction process can aid in reasonable and practical recovery from unavoidable attacks. In addition, the defense can adopt active switching-based control and moving target defense strategies to reduce stealthiness, increase the cost of attacks, and limit the attack impacts. Finally, conclusions are drawn and some potential research topics are suggested.

1. Introduction

The integration of complex network principles with those of cyber–physical systems (CPSs) results in the formation of complex cyber–physical networks, in which the interactions between the cyber and physical components exert a substantial influence on the network’s regular functioning [1]. The field of current research on complex cyber–physical networks has evolved to encompass a holistic perspective that considers both the physical infrastructure and cyberspace components. Figure 1 depicts a general framework for such complex cyber–physical networks, where cyber and physical spaces are tightly interconnected. As the information age progresses, an increasing number of vital infrastructures can be considered complex cyber–physical networks due to such integration of cyber elements with the physical layer, such as power grid systems, transportation networks, the Internet of things (IoT), etc. The social and economic significance of these complex cyber–physical networks has become increasingly pronounced, leading to an enormous increase in research from a variety of fields [2,3,4].
The issue of high reliability is a paramount consideration and a significant challenge in configuring complex cyber–physical networks. The successful deployment of these networks into social applications, such as smart city construction and medical care systems, dramatically depends on improvements in reliability and safety. However, integrating cyber-communication components also presents a risk of malicious attacks via cyber channels. Some most notable cyberattacks on CPSs in recent decades include but are not limited to the following issues. Since its discovery in 2010, Stuxnet has gained recognition for its disruptive impact on Iran’s nuclear program. The malware was designed to specifically target the Supervisory Control and Data Acquisition (SCADA) systems, resulting in substantial harm to the program [5]. The Ukraine power outage in 2015 was the first known successful cyberattack on a power grid, causing widespread power outages in Ukraine. The attack was carried out by malware that infiltrated the control systems of power distribution companies, causing widespread blackouts [6]. By continually propagating to poorly configured Internet of Things (IoT) devices, Mirai produces a distributed denial of service (DDoS) to a group of target servers. Notably, one in October 2016 targeting service provider Dyn knocked hundreds of websites down for several hours, including Twitter, Netflix, Reddit, and GitHub [7]. The SolarWinds hack was a major cyberattack that occurred in 2020 [8], where hackers deployed malicious code into the company’s Orion software, which was widely used by various organizations globally. The attack caused widespread disruption and raised significant concerns about the security of supply chain software and the potential for future attacks. These incidents emphasize the importance of enhanced security safeguards to protect these systems from cyber threats and remind people to have in-depth analysis and take proactive defense methodologies.
Current computer and information technology methods focus the security issue mainly on cyber-protection methods such as encryption, building firewalls, or developing antivirus software [9]. These methods are primarily based on the fundamental confidentiality, integrity, and availability (CIA) triad rules [10]. Although these works can defend against certain specific network communication attacks, they are restricted mainly to the information space and only consider data security and network communication security, with the primary goal of protecting data privacy and normal network communication. Furthermore, how the considered CPSs can survive to function in a relatively satisfactory way is rarely emphasized therein. Deep integration with physical space and comprehensive considerations on the complex dynamics of physical systems still need to be included. The implementation of cybersecurity measures derived from information and communication technology would result in a reasonable solution that may appear plausible. However, the unique characteristics of complex cyber–physical networks mean that it is insufficient to consider the CIA view of the system solely. The safeguard of complex cyber–physical networks encompasses not only the protection of data and communication, but also the assurance of secure and unencumbered functioning of the physical systems with interconnected agents.
Table 1 illustrates some recent surveys or overviews on the security issues in multi-agent systems (MASs) [11,12,13], networked control systems [14,15], or CPSs [16]. The authors note that, at the time of writing, there is a scarcity of comprehensive surveys that examine the state-of-the-art advances and novel methodologies in secure control for complex cyber–physical networks. Such surveys should consider both realistic and advanced attacks, as well as proactive defense mechanisms that provide both pre-emptive protection and post-recovery or mitigation strategies.
In light of the motivations discussed above, this paper is concerned with the most recent advances in single-type classical cyberattacks, which mainly focus on DoS attacks, FDI attack, and the newly emerged hybrid cyberattacks that can be more intricate, collusive, and intelligent. Hybrid attacks that only happen in cyberspace and the coordinated cyber–physical attack that combines the advantages of the physical attack and cyberattack are delved into. Existing reactive defense strategies are first given, where the defense strategies are mainly based on the specific characteristics of the cyberattacks, usually with control parameters directly related to the attack indexes. This indicates that the defense is carried out reactively. Although reactive defense methods, such as attack intrusion detection, have made substantial efforts to safeguard a system or network, their reactive nature is limited when confronted with more persistent, sophisticated, and unsuspected attacks. Thus, subsequently, some recent secure control methodologies of a proactive nature are surveyed based on topology and control views. The topology design allows the defender to resist potential attacks beforehand, while the reconstruction method can contribute to a rapid recovery from unavoidable attacks. Active switching-based control and moving target defense ideas are also reviewed. The defender can proactively choose alternative control policies such that the stealthiness is reduced, the attack budget is increased, and the attack impact is mitigated. The organization of the survey is illustrated in Figure 2.

2. Attack Models and Reactive Defense Strategies in Complex Cyber–Physical Networks

2.1. Single Type Classical Cyberattacks

2.1.1. Denial-of-Service (DoS) Attacks

Attackers with inadequate knowledge of the target system may resort to DoS attacks that prevent sending control and measurement data packets. DoS attacks aim to impede the normal operation of a system by inundating its communication channel with excessive amounts of data traffic or requests, thus leading to the disruption of normal functioning and resulting in significant consequences if not addressed in a timely manner. To address these issues, the first step one needs to take is to propose proper ways to define attack occurrences.
In [18], the authors characterize the occurrence of DoS signals using the Bernoulli process and time-homogeneous Markov chain. A time-inhomogeneous Markov chain was also introduced, so the network difference between consecutive packet transmission instants can be incorporated. Furthermore, noting that, in contrast to traditional packet losses that are described as random occurrences, a stochastic characterization of DoS attacks would be intrinsically restrictive since it would fail to reflect an attacker’s hostile and sophisticated feature. In [19], the authors suggested a model that permits DoS attacks to occur in any sequence provided that the total duration of attacks in a certain time interval be limited by some function of the interval’s length. The following assumption is introduced for describing DoS attacks regarding the total attack interval:
Assumption 1.
There exist nonnegative constant κ and positive constant τ such that DoS sequence { h n } , n N satisfying:
| Ξ ( t ) | κ + t τ , t 0 ,
where Ξ ( t ) denotes the total interval of DoS attacks from t = 0 up to the current time t.
Afterwards, it was found that, in order to resist and tolerate DoS attacks to maintain stability, suitable conditions must be imposed on both DoS frequency and duration [20]. By utilizing the concept of average dwell-time in hybrid systems [21], the following assumptions on DoS signals were proposed:
Assumption 2
(DoS Frequency). There exist nonnegative constant η and positive constant τ D (greater than the minimum possible sampling rate) such that
n ( τ , t ) η + t τ τ D ,
for all τ , t 0 with any τ satisfying: τ t , where n ( τ , t ) denotes the number of DoS off/on transitions in time interval [ τ , t ] .
Assumption 3
(DoS Duration). There exist nonnegative constant κ and positive constant T such that
| Ξ ( τ , t ) | κ + t τ T ,
for all τ , t 0 with any τ satisfying τ t , where Ξ ( τ , t ) denotes the set of time instants with denied communication within [ τ , t ] . Note that (2) is the generalized form of (1) and can effectively deal with a system whose dynamics contain disturbances [22].
Some interesting resilient control results on DoS attacks have been reported in recent years. It was shown in [23] that consensus in MASs could be attained with randomized transmissions if the average attack time is constrained, irrespective of attack frequency. In [24], the authors studied the consensus tracking problem under DoS attacks that occurred in the communication network connecting the physical and cyber layers, and those launched among cyber communication links within the cyber layer were both considered. The timely updating of control inputs is impacted by the first type of attack, while the second type alters the link weights in the cyber communication graph. The fully distributed cooperative control of MASs in the presence of distributed denial-of-service (DDoS) attacks was further explored in [25]. In [26], the secure consensus problem for multiple-input-multiple-output (MIMO) linear MASs subject to DoS attacks was investigated. An unknown input observer (UIO) was newly introduced, based upon which a resilient consensus controller was designed with only relative outputs.
Another method to model DoS attacks was given in [27], where power-constrained pulse-width modulated (PWM) DoS signals were introduced in single-input controllable linear systems, and the attacker repeats cycles of jamming and sleeping as the following rules:
u jmd ( t ) = 0 , T n 1 t T n 1 + T off n 1 , 1 , T n 1 + T off n 1 < t < T n ,
Concerning the dynamic interactions between the attacker and defender, researchers have obtained optimal DoS attack and defense schemes in various problem settings with a game-theoretic approach. For instance, the interactive process of choosing to communicate and attacking time was investigated for both the attacker and the sensor [28] in the context of energy restrictions:
k = 1 T γ k M , k = 1 T λ k N ,
where γ k = 1 indicates that the system sends the data packet at time k, λ k = 1 denotes that the attacker launches a DoS signal at time k, and M and N give the upper bounds of the energy limitations of the defender and the attacker, respectively. With the use of a game-theoretic framework, it was demonstrated that the best action to take for each side results in a Nash equilibrium in a zero-sum game. A Stackelberg game with SINR-based formulation for wireless networked control systems was also considered by [29]. Strong and normal types of DoS jamming signals were studied in [30], where attacks can cut off communication edges in the network and divide the agents into clusters. Meanwhile, the defender seeks to recover selected edges with increased transmission power. The repeated games between the attacker and the defense were derived, where the two players’ best strategies were determined by a rolling horizon and based on the cluster sizes.
By the above brief check of the related works on DoS attacks from a control perspective, one can know that inadequately informed attackers may opt to carry out such DoS attacks, which hinder the transmission of control and measurement data packets. These attacks are designed to hinder the standard operations of a system by overwhelming its communication channel with excessive data traffic or requests. Consequently, this disruption of regular functioning may have significant consequences if left unattended. Further research on this topic may focus on developing advanced techniques for accurately modeling intelligent DoS attacks, thus detecting and mitigating their effects. These methods can include the integration of machine learning algorithms to identify and mitigate attack instances in real time. Developing strategies to enhance system resilience to such attacks needs further exploration, which may include deploying redundant systems, backup communication channels, or communication-saving secure control strategies to tackle potential DoS attacks.

2.1.2. False Data Injection (FDI) Attack

A false data injection (FDI) attack is the type of cyberattack that injects false data into the vital measurements in the system intending to disrupt or alter the normal operation of the original system [31,32,33]. Note that replay attacks are also classified as special deception attacks since they use recorded data to falsify current transmission states [34]. It should be noticed that the impacts of an FDI attack can be amplified in complex cyber–physical networks. Thus, much effort should be devoted to investigating FDI attacks therein. Many interesting works have been conducted in recent years, including attack detection [35,36,37,38,39], resilient control strategies [40,41,42,43], and survey articles [15,44,45]. The following are some representative works on this subject since this subsection is not the primary focus; for more details, one may refer to the specialized survey paper on this topic listed above.
In [36], the authors considered the FDI attack in the DC microgrids with the following form:
y i , j c ( t ) = y j ( t ) + g ( t T a ) ϕ i , j ( t ) ,
where ϕ i , j ( t ) is the injected vector designed by the attacker and g ( t T a ) is the step function with delay T a , which means that the attack starts at time instants T a and remains silent before T a . The full-order UIO-based detectors were utilized for detection and, based on the estimated average point of common coupling voltage (PCC) voltage, a distributed countermeasure against cyberattacks was also given. In [37], the authors proposed a FDI detection strategy based on secure federated deep learning, based on which, a collaborative training of a detection model is performed using data from all nodes while maintaining the privacy of the data by retaining it locally throughout the training process. In [38], a novel method for detecting FDI attacks in a distributed manner was proposed, requiring only communication between neighboring nodes. The feedback mechanism, which utilizes a dynamic time-wrapping distance, was designed to handle delayed communication and varying attack signals. In [39], the authors designed a FDI detection approach relying on a graph neural network that considers changes in a power grid architecture. Using a gated graph neural network (GGNN), the approach collects spatial information from both the power grid structure and operational data. An attention technique was used to allocate aggregation weights to neighboring nodes to improve node representation.
Recently, in the resilient control against FDI attacks, an attack-free protocol was designed in [40] for cooperative tracking with only relative output measurement. FDI attack can be well resisted in such a setting since the proposed protocol requires no communication information exchange among neighboring agents. In [41], the authors studied the resilient control problem for a DC microgrid in current sharing and voltage restoration. The FDI attack was modeled with impulsive signals at specific time instants that aim to manipulate the set points. Using the stability analysis from the hybrid system, the sufficient condition was derived by using the average dwell time of FDI attacks therein. The resilient consensus problem in DC microgrids under FDI attacks was tackled in [42], where FDI attacks can be isolated by the employed distributed bank of sliding mode observers and the impacts of attack in the control protocol can be eliminated.
Through the above brief review on FDI attacks, one can see that this type of attack differs from DoS attacks in both goals and methods of operation. An FDI attack usually alters or disrupts the regular operation of a system by injecting false data, and the attacker’s goal is to cause harm to the system or cause it to behave in unexpected ways. In contrast, a DoS attack aims to disrupt the normal functioning of a system by overwhelming the communication channel with data traffic or requests. Both FDI and DoS attacks may have severe consequences for the operation of control systems, system misbehavior, physical equipment damage, and financial losses. Compared with DoS attacks, FDI attacks can be designed to be more sophisticated and highly stealthy. Some existing works pose certain restrictions on the mathematical forms, attack indexes, or attack abilities for FDI attacks. However, these assumptions may face certain limitations when confronted with more powerful or intelligent attacks. Thus, more effort is still needed to immunize complex cyber–physical networks under such attacks from new perspectives.

2.2. Hybrid Intricate Cyberattacks

2.2.1. Hybrid Attacks in the Cyberspace

Hybrid attacks with various types of cyberattacks may realize more attack goals simultaneously and have more extensive attack impacts when compared with the signal type of attacks. A batch of results appeared concerning the hybrid attacks that combine the DoS and FDI attacks.
In [43], the authors considered the distributed event-based control strategy for thermostatically controlled loads (TCLs) to realize fair sharing of both power states and comfort states. The communication network of TCLs is subjected to hybrid attacks composed of DoS and FDI attacks, whose attacking strategy is blocking the information transmission even though the event-triggered condition is satisfied and tampering with the values of control inputs, respectively. Sufficient conditions regarding the attack parameters, including the DoS duration and frequency indexes, and the FDI degree parameters were derived to achieve a fair sharing goal. Furthermore, the collusive effects of such hybrid cyberattacks and the overall effects were revealed. Mean-square exponential consensus under event-triggered impulsive control strategy was studied in [46] for MASs with nonlinear dynamics and under hybrid attacks, where Bernoulli distribution variables were introduced to describe the successful DoS attack and a successful FDI attack. Sufficient conditions were given to ensure the consensus of the MAS and a lower bound of the impulsive sequence was provided to avoid the Zeno behaviors. The secure control of the connected vehicle system was investigated in [47], with DoS attacks described by attack frequency and length rate and FDI attacks with unknown potential deception attack signals and occurrence probabilities. The conditions of controller gains and the upper bounds of DoS attack indexes were calculated to ensure the asymptotic tracking of follower vehicles. The synthesis of hybrid cyberattacks was studied in [48] for the network control system with heterogeneous agents, and the attack is a combination of FDI and DoS attacks. The attack synthesis problem for choosing proper injection attack vector u a ( t ) and vehicle selection matrix B a was given as
find B a , u a ( t ) , such that x ˙ ( t ) = A G ( t ) x ( t ) + B a u a ( t ) , t * t 1 where x i ( t * ) x j ( t * ) 2 d * , u a ( t ) 2 ρ for all t t 1 ,
where A G ( t ) = diag { A i + B i K i i } i V + B i K i j L G ( t ) , ρ denotes the FDI budget and d * denotes the targeted separation distance of the attacker. To disrupt the formation, a sustained DoS attack was also carried out on certain agents such that underlying communication links will be disrupted into a disconnected graph. It was revealed in the example of unmanned aerial vehicles (UAVs) that a combined attack could lead to more severe performance degeneration, and both the formation and trajectory tracking goals failed. Recently, several researchers also explored the hybrid attacks composed of DoS and deception attacks for load frequency control (LFC) issues in smart grids [49,50].
Some published works further consider hybrid attacks, where at least three types of cyberattacks were comprehensively considered, for instance, a hybrid attack model composed of stochastic deception attacks, replay attacks, and DoS attacks all occurring in the communication network [51].
Sometimes, hybrid attacks with attacks in more than one channel may happen in CPSs. For example, the sensor-to-controller and controller-to-actuator channels are both subjected to cyberattacks. Differing from traditional observer-based control problems for complex dynamical networks and multi-agent systems, the scenario was explored that the communication channels for controllers and observers were both subjected to malicious attacks that aim to destroy the communication links among the agents [52]. The attacks on different communication networks are assumed to be independent and effective security control strategies with properly selected feedback gains, and coupling strengths were derived. Later on, the case where DoS attacks can occur in the controllers’ and observers’ communication networks in different time instants, namely asynchronous attacks, was further explored in [53]. Furthermore, regarding asynchronous attacks, [54] studied the asynchronous attacks made of connection attacks on network connections and DoS attacks in control channels for complex networks. In [55], the authors studied the consensus for two-layered MASs subject to asynchronous attacks on communication edges, where the communication edges among the leaders and those among the follower layer may be attacked at different moments. Two switching signals were introduced to characterize such asynchronous attacks. When combined with a new type of multiple Lyapunov function (MLF) based on a bisection search method, criteria were established under which the node-to-node consensus error will asymptotically converge into a bounded set. In [56], the authors considered the hybrid attack composed of deception attacks and DoS attacks, which occur in the sensor-to-observer channel and observer-to-controller channel, respectively. Dynamic event-triggered schemes were given, and sufficient conditions were derived to guarantee the resulted closed-loop system can be asymptotically mean-square stable with a prescribed H performance. The hybrid attack composed of distributed DoS (DDoS) and FDI attacks was considered in [57] for discrete-time CPSs, where DDoS attack causes delays with Bernoulli distributions in both sensor-to-controller channel and controller-to-actuator channel. Due to its straightforward construction, low cost, and high-impact features, the DDoS attack may be more easily organized by utilizing many hacked devices. An event-triggering control scheme was designed for the compromised CPSs with random delays in measurements and actuation signals.
From the attacker’s view, the optimal scheduling for hybrid attacks that are composed of DoS attacks and stealthy attacks on remote state estimation was studied in [58], with the attacker aiming to maximize average error with stated energy restriction. The ideal hybrid attack schedule is derived theoretically after examining average error under carefully determined cases.

2.2.2. Coordinated Cyber–Physical Attacks

The previous examination centered on hybrid attacks that occur exclusively in cyberspace. It is essential to acknowledge, however, the emergence of a novel form of attack referred to as coordinated cyber–physical attacks (CCPAs), in domains such as smart grids, has become increasingly prevalent in recent years, characterized by the integration of both cyber and physical attacks. These attacks are distinctive due to their ability to mask physical attacks with cyber assaults, leading to severe and often undetectable consequences. The 2015 attack on the Ukrainian electrical grid is a notable example of the destructive effects of CCPAs. The physical attack involved opening circuit breakers and caused widespread power outages affecting 225,000 consumers. Telephonic flooding and server wiping further exacerbated the crisis by concealing the extent of the attack and prolonging the outages [59,60,61].
CCPA can be classified into two categories based on the nature of physical attacks. The first category encompasses stealthy physical attacks that are initiated with the goal of compromising components of power systems, followed by a cyberattack aimed at disguising the physical attack, resulting in a covert CCPA. The second category encompasses cyber–physical attacks that may not be stealthy and the attackers aim to achieve a combined effect that is more pronounced than the sum of their individual actions, regardless of the detectability of the physical attack. It is important to highlight that both of these categories of CCPA can result in more severe consequences than single attacks. This hybrid attack mode has garnered the attention of researchers, leading to the development of various countermeasures.
A comprehensive framework for modeling cyber–physical attacks in dynamic power networks was presented in [60]. Research has shown that even local cyberattacks, executed with limited network information, can effectively mask transmission line failures [62,63]. In [61], the authors conducted a study on two specific types of cyber–physical attacks, replay and optimized attacks, in smart grid systems. The authors demonstrated that these attacks can effectively conceal transmission line failures by replaying meter readings and manipulating PMU measurements. Additionally, the necessary capability of an attacker to carry out these attacks was established and, based on this, countermeasures to detect such attacks were proposed.
On the one hand, in the works [61,62,63], the physical attack was conducted first and then cyberattacks were performed subsequently to cover the single line outage. With such a masking, a more severe consequence can be induced such as cascading failures. On the other hand, the physical attack cannot be stealthy to the operator [64]. In [64], the two types of CCPAs in electric power systems were studied, including the coordination between load redistribution (LR) attack and attacking generators, and the coordination between LR attack and attacking lines. Bilevel optimization problems were generated to formulate these CCPAs, where the defense at the lower level attempts to increase load reduction while the attacker at the upper level strives to minimize it. Further discussion on the misleading function of a cyberattack in CCPAs was presented in [65], where the attacker alters the measurement data to create a fake overload event that leads the dispatcher to believe that a transmission line that is routinely running is overloaded. Consequently, the irrational dispatching strategies employed by the dispatcher would negatively impact the profitability of the CPS, thereby compromising its operational efficiency. A defense strategy for CCPAs was employed in [66] by utilizing distributed flexible AC transmission system devices and actively perturbing the grid’s transmission line reactances, such that the necessary knowledge that the attackers aim to mask the effects of the physical attack can be made invalid. A tri-level optimization model was formulated in [67] to describe the interactions among defender, attacker, and operator in a 24-h horizon. The proposed model is capable of analyzing the protective measures against attacks that result in component failure within a matter of hours, as opposed to previous studies that focused on attacks that resulted in component degradation over several days.
Additionally, in the realm of cyberattacks, the attacker may consider not only the coordination between cyber and physical attacks, but also the interaction between availability and integrity attacks in order to maximize the impact of the attack. CCPAs combined with DoS attacks in smart grids were studied in [68], where mathematical models were constructed for two types of the CCPAs. With regards to the stealthy one, it has been demonstrated that the attack objectives can be accomplished with fewer resources if DoS signals are also introduced. In the case of the non-stealthy type, it has been established that significant effects can be achieved, and a bilevel optimization technique was employed to determine an optimal attack strategy.
By a brief survey of CCPAs, one could know that such attacks differ dramatically from the previous works that focused solely on hybrid attacks in cyberspace. It is crucial to recognize that a new type of attack has become increasingly prevalent in recent years, especially in domains such as smart grids. CCPAs are characterized by integrating both cyber and physical attacks, making them distinct from traditional attacks. Thus, traditional cybersecurity measures may not be sufficient to protect against CCPAs since they involve physical attacks. Hence, there is a need to integrate physical security measures with cybersecurity measures to ensure comprehensive protection. This will call for multidisciplinary approaches to work together to develop effective countermeasures to CCPAs. A deeper understanding is also required to reveal the technical, organizational, and human factors contributing to CCPAs, which can contribute to effective prevention and mitigation strategies.

3. Recent Proactive Defense Strategies for Securing Complex Cyber–Physical Networks

In the above section, the modeling of several cyberattacks and corresponding reactive defense strategies have been briefly surveyed. However, when confronted with more sophisticated and smart attacks whose characteristics or attack parameters cannot be predicted in advance, the traditional reactive defense strategies may only have limited functions. Thus, it is urgently desirable to develop secure control algorithms of a proactive nature that can sustain or recover a specific system’s performance in the face of unforeseen attacks. To mitigate cyberattacks’ impacts on cooperative systems, a range of resilient cooperative control algorithms have been presented in the literature. These methods mainly need specific knowledge about the considered attack, such as the upper bound of the maximum number of attacks, the attack’s duration, or the attacker’s budget. Furthermore, some restrictions on the communication network architecture are needed for certain types of cyberattacks. For instance, when a certain number of agents are attacking and being adversarial, with a specific resilient control scheme, such as mean-subsequence reduced (MSR) algorithms, sufficient conditions regarding the robustness of graphs are derived aiming to mitigate the negative impacts from the adversarial and resilient consensus [13]. Notably, MSR and double-integrator position based MSR (DP-MSR) algorithms were investigated in [69], where some necessary and sufficient conditions regarding the topology restrictions were given for resilient consensus of NASs with time-varying communication graphs and under scenarios with misbehaving agents. A notion of joint robustness was innovatively proposed to characterize the graph robustness properties.
This section will first report some recent works on the active defense from the network or topology view, by elaborately designed dynamic networks or communication networks, or activating effective topology reconstruction strategies to mitigate the negative impacts induced by the attacker. Additionally, with ideas brought from the hybrid system and computer science, research has investigated the application of the concepts of active switching-based control and moving target defense, which can proactively adopt alternate control techniques to reduce stealthiness, increase the cost of attacks, and limit their impacts.

3.1. Secure Defense Leveraging Network or Topology Design

Firstly, a resilient control algorithm was proposed in [70] for leaderless consensus by artificially constructing a virtual network. The main feature of such a virtual-network-assisted framework is that no assumptions on the maximum number of attacks is required. Different kinds of attack cases were also handled based on this strategy, such as attacking actuator, sensor, and/or communication network [71,72]. Furthermore, many researchers employed this method in different applications with various network settings, including formation containment control [72], networked heterogeneous systems [71], resilient control of AC microgrids [73], distributed economic dispatch [74], and connected vehicles [75]. The event-trigger control version was further given in [76] for general linear multi-agent systems to realize the leader–follower consensus under unknown attacks. For a dynamic time-varying leader, the introducing of a virtual network could ensure that followers track the leader’s state with tolerable errors [77]. In [78], the authors explored the attack scenario where an adversary can also temper the information exchanged among the virtual network; a new virtual network with time-varying weights was given to make it more difficult for the attacker to launch a stealthy attack compared to the virtual network with constant weights:
x ˙ ( t ) = L s ( x d ) + β L s Γ ( t ) z , z ˜ ( t ) = H z β Γ ( t ) L s x ,
with matrices given by
H = L s + I n , Γ ( t ) = diag { [ α 1 ( t ) , , α n ( t ) ] T } ,
where z ( t ) R n is the state of the introduced virtual network, β is the positive constant parameter to be determined (usually taking sufficiently large values), L s the Laplacian matrix corresponding to the original cooperative system, d ( t ) R n denotes the unknown exogenous injections, and d i ( t ) 0 represents that the information received from node i is being compromised and the local state feedback of node i is corrupted. The dynamic weights of the Laplacian matrices associated with the virtual network Σ h are given by Γ ( t ) with α i > 0 .
Some work seeks to design a more resilient network structure to resist potential general attacks by introducing some indexes and formulating the corresponding optimization problems. A current work [79] gave a structural survivability index regarding the variance of node degree, based on which a two-stage optimization approach was derived for the communication topology design of microgrids, where resilience and network dynamic performance are jointly optimized.
By utilizing the adaptive method, an adaptive consensus protocol was proposed in [80] to coordinate the states of incremental costs in the distributed economic dispatch when unknown uncertainties exist in the communication network:
ζ ˙ i ( t ) = 2 c j N i [ a i j ( t ) + ω i j ( t ) ] [ ζ j ( t ) ζ i ( t ) ] , a ˙ i j ( t ) = h i j [ ζ i ( t ) ζ j ( t ) ] 2 , j N i ,
where ω i j are the unknown uncertainties, h i j = h i j are the positive constants related with the adaptive speed of time-varying weighted adjacency matrix A ( t ) = [ a i j ( t ) ] N × N . It is assumed that ω i j ( t ) = ω j i ( t ) , j N i ( t ) , i , j = 1 , 2 , , N , and
| ω i j ( t ) | σ i j , t 0 ,
with σ i j being positive scalars which could be unknown. Thus, the introduced uncertainty could also be used to describe edge manipulation attacks with unknown attack intensity. It was rigorously proved that optimal economic dispatch can be solved by such an adaptive weight-adjustment technique. Further considering the event-triggered framework, the countermeasures for such an edge attack case were investigated in [81]. It was assumed that the unknown uncertainties induced by the malicious cyberattacks on communication edges alter the ideal weights a i j into a ˜ i j ( t ) in both distributed control protocols and also the event-triggered conditions. First, the consensus-based event-triggered protocol was given as:
x ˙ i ( t ) = 2 γ i j N i a ˜ i j ( t ) x j ( t k j ( t ) j ) x i ( t k i ( t ) i ) , a ˜ i j ( t ) = c i j ( t ) + ω i j ( t ) , c ˙ i j ( t ) = h i j ( x ˜ i ( t ) x ˜ j ( t ) ) T ( x ˜ i ( t ) x ˜ j ( t ) ) ,
with x i ( t ) R n , and there exists a nonnegative constant ω ¯ such that ω i j ( t ) ω ¯ , with event-trigger condition implemented by agent i given by:
t k i ( t ) + 1 i = inf { t | t > t k i ( t ) i , ψ i ( t ) 0 } ,
with event-trigger condition
ψ i ( t ) = [ 4 ρ 2 + η 1 ( 12 + 4 ρ 1 ) ] j N i a ˜ i j e i T e i ( t ) σ 2 j N i a ˜ i j [ x ˜ i ( t ) x ˜ j ( t ) ] T [ x ˜ i ( t ) x ˜ j ( t ) ] μ e ν t ,
with e i ( t ) = x ˜ i ( t ) x i ( t ) being the estimation error, and other free-weight parameters were also determined such that the stability of the closed-loop system can be achieved and Zeno behavior could be avoided.

3.2. Secure Defense by Topology Reconstruction

Research has been conducted on network topology reconstruction after cyberattacks, such as the ability to recover from an attack quickly being crucial in maintaining the stability and security of a network. These attacks often result in unpredictable and complex network structure changes, making them difficult to defend against. Network topology reconstruction aims to quickly and accurately detect these changes and restore the network to its normal state. Various methods have been utilized to achieve this goal, including machine learning algorithms and network analysis techniques.
In [82], for an attack that targets the cutting nodes and edges among the directed nonlinear multi-agent systems, the corresponding recovery strategies to reconnect these components and fast convergence speed were developed. An objective function was selected to identify the unique solution:
f G ( G ˜ ) = a ( G ˜ ) 1 + v i V ( d i ( G ˜ d i ( G ) ) ) ,
where a ( G ˜ ) is the algebraic connectivity of the recovered graph G ˜ . The attack that may cause the cut-agent and cut-link failures in multi-agent systems was studied in [83]. Different measures were taken to restore the connectivity of multi-agent systems in the event of different failures with the aim of restoring consensus among agents. The proposed recovery strategies focus on improving the convergence speed of the network in reaching consensus as the main goal and revealed the trade-off between the convergence speed and robustness of the resulting networks. In [84], the authors present a consensus recovery algorithm for multi-agent systems with nonlinear dynamics that can handle node failure. The algorithm utilizes local information of the failed node and its neighbors to re-establish connections and recover consensus. The algorithm has been proven to be effective through rigorous mathematical proof and has the advantage of preserving the consensus magnitude before failure even after recovery. A recovery approach was proposed in [85] to protect MASs from the impact of agent failure in hostile environments where repair is not possible. The approach aims to achieve faster consensus by creating new connections with agents with high node degrees. A cost function is introduced to maximize the uniqueness of the recovery solution. The authors provide mathematical proof for the convergence of the algorithm, showing that, after failure, the algorithm leads to faster consensus by improving the network’s algebraic connectivity.
In the application of formation control, the topology recovery problem for multi mobile robots was investigated in [86]. A connectivity recovery scheme was proposed under the situations where the communication link has failed. Two theorems were obtained to illustrate the guarantees for the success of topology recovery. The problem of robust synchronization control in complex cyber–physical networks that face mixed attacks was explored in [87]. The control input signals and information channels were considered to be independent and both can be compromised by frequent attacks. To address this, a repairing cell is immediately activated to restore the communication topology and sufficient conditions were established to ensure robust synchronization. In [3], the authors studied an efficient secure control technique based on “reconstruction + repairing” in the face of malicious node attacks to achieve global pinning synchronization of complex CPS networks. Two attack mitigation strategies for distributed event-triggered control for TCL regarding the two edge manipulation attack cases were proposed, respectively, in [88]. According to the degree of attack intensities, two categories of edge manipulation attacks were first discussed. For the mild edge attack case where the communication network’s connectivity is preserved and some communication links may have been tampered with, a mitigation strategy utilizing the superposition graph concept was given to improve the convergence rate of realizing fair power state sharing. For the severe attack case where the connectivity of the communication network fails to be retained, two alternatives from the building-cluster level and within-building level were newly designed to reconstruct connected communication topologies. For the distributed consensus tracking problem of networked agent systems with directed topologies under DoS attacks, two connectivity restoration strategies to reduce the impacts of the attack in the cyber layer were developed [24]. According to the intensity of the DoS attack, the strategy with distributed perspective or that with a global perspective can be freely chosen. The strategy with distributed perspective includes the method of active reserved links and adding bidirectional links connecting all of these isolated nodes to their neighbors, while the one with a global perspective can be applied by adding bidirectional links between each pair of nodes to resist severe attacks.
In [89], the authors investigated a distributed framework for network recovery for MASs. Based on the algebraic connectivity (reflecting the reconstructed network’s performance) and | E ˜ ϕ ( t k ) | (the set of added edges reflecting the reconstruction budget), the evaluation function was proposed as:
P ( S ) = λ 2 ( G k ) λ 2 ( G ˜ k ) 1 + | E ˜ ϕ ( t k ) |
where s is the type of reconstruction strategy. The rest of the agents without attack will reconstruct the network and restore the connectivity by following the proposed communication strategy in a distributed fashion. A method for identifying faults in uncertain MASs was proposed in [90]. The method includes a filter-based approach and a topology reconstruction-based fault isolation strategy to improve the fault identification performance. The use of a cooperative fault detection system was proposed to enhance the effectiveness of the proposed topology reconstruction and logic-table-based fault identification scheme. A learning strategy was employed in [91] to restore connectivity coping with loss of inter-agent communication in the formation control multi-agent system. This was a decentralized learning technique for mobile agents where each agent uses only local information and trains to handle the risk of connectivity loss. This training involves agents making coordinated movements based on consensus dynamics, with a lost agent able to predict its way back to the fleet while other agents continue their formation.
The reconstruction of network topology after an unknown cyberattack is crucial to cybersecurity for complex cyber–physical networks. The above brief survey in this subsection aims to ensure that the network returns to its normal state in the shortest possible time. Attacks on network structures can lead to the emergence of unpredictable changes that require timely detection and remediation. The use of machine learning algorithms and network analysis techniques demonstrates their particularly promising roles in facilitating fast and accurate network topology reconstruction. Future research could focus on enhancing these methods’ efficiency, effectiveness, and distributed framework for large-scale complex cyber–physical networks, and exploring new avenues to achieve faster recovery times.

3.3. Secure Defense with Active Switching

A subset of stealthy attacks known as zero-dynamics attack (ZDA) has gained much importance in recent years. The attacker’s objective consists of two components: one is avoiding the detection by maintaining the monitoring outputs unchanged, so it is “stealthy” and, more significantly, it aims to alter the system to accept the tampered bad data that differs dramatically from the real data such that some specified system’s states can deviate from expected values. The two most notable characteristics of earlier works are either placing restrictions on the size of the misbehaving-agent set and the connectivity of network topology or demanding the defender side be aware of misbehaving agents and the attack starting time in order to detect attacks. A topology switching strategy technique was suggested in [92] to eliminate the above restrictions and unreasonable assumptions. A defense strategy that consists of strategic topology switching and strategic output observing was proposed to combat this difficult stealthy attack in coupled harmonic oscillators. With this defense strategy, cooperative zero-dynamics attacks are still possible but do not affect steady-state value or system stability. For general linear systems, the topology switching technique was developed in [93] to solve the issue of which topologies to adopt to identify ZDA. Based on Luenberger observers, an algorithm to determine the switching signal of candidate communication topology was proposed. The essence of the defense method suggested above is to alter system dynamics by switching communication topology, so that the ZDA is no longer achievable. Generally, the corresponding dynamics of system under attacks are given by:
z ˜ ˙ ( t ) = A z ˜ + B g ( t ) , y ˜ ( t ) = C z ˜ + D g ( t ) ,
where g ( t ) is that attack signal.
The attack signal with attack-starting time instant ρ :
g ( t ) = g e η ( t ρ ) , t [ ρ , ) , 0 , t [ 0 , ρ ) ,
is called the zero-dynamics attack, if 0 n ¯ z ˜ ( 0 ) z ( 0 ) R n ¯ , 0 o ¯ g ( ρ ) R o ¯ , ρ 0 and η C satisfy:
z ˜ ( 0 ) z ( 0 ) ker ( O ) , e A ρ ( z ˜ ( 0 ) z ( 0 ) ) g ( ρ ) ker η 1 n ¯ × n ¯ A B C D ,
where O C T , ( C A ) T , , ( C A n ¯ 1 ) T T . It also verified that, under the ZDA (18) and (19), the states and monitored outputs of original system satisfy:
y ( t ) = y ˜ ( t ) , for all t 0 , z ( t ) = e A t z ˜ ( 0 ) , t [ 0 , ρ ) , z ( t ) + ( z ˜ ( ρ ) z ( ρ ) ) e η ( t ρ ) , t [ ρ , ) ,
In [94], the authors investigated the switched-based secure control design for attacks with intermittent communication faults satisfying specified frequency and duration restrictions. By assuming that the switching law for faults is unknown to the considered CPS, a switching law for updating the control parameters was developed based on the designed inequality, including the Lyapunov-form functions. Then, sufficient conditions were given, under which the original system with the switched-based control laws could realize global asymptotic stability. A switching-like event-triggered communication strategy is well-built to increase communication efficiency by fully utilizing the DoS attack capabilities in [95]. With the acknowledgment character (ACK) technique, the plant can know whether the transmitted data are lost. Then, one could actively select the proper event-triggered parameters to minimize the amount of communicated packets. The tracking control problem for multi-agent systems under sensor attacks with s-sparse vector was studied in [96]. A cooperative attack tolerant tracking control strategy based on a switching scheme was designed to ensure that the global tracking error maintained uniformity and was ultimately bounded. To search all of the attacked sensors, a common switching function matrix is employed for each node, such that the matrix switches in response to the switching index change when the attack is detected.
Note that the traditional control theoretic framework usually produces a stabilization protocol that is passive in the face of cyber threats and conservative in terms of the specified degree of resilience. A fully heterogeneous interconnected MAS is described in [97], where the modeling uncertainties and nonvanishing perturbations on the agent layer exist, and distributed DoS attacks happen over the control layer. No assumptions were made to limit the DoS attack class by average dwell time or probability distribution. A distributed switching control protocol with candidate communication graphs was proposed as follows:
u i ( t ) = j N i c σ ( t ) a i j c σ ( t ) ( v i ( t ) v j ( t ) ) + s i c σ ( t ) v i ( t ) , v i ( t ) = K i x i ( t ) ,
where i = 1 , 2 , , M , M 1 denotes the number of control sublayers, a i j c σ ( t ) 0 denotes the edge weights of a control sublayer’s undirected graph with regard to the switching signal σ ( t ) , s i c σ ( t ) > 0 denotes that there exists selfloop weights of control node i, and s i c σ ( t ) = 0 otherwise. K i is the feedback control gain to be designed for agent i. When the control layer employed the arbitrarily fast switching, it has been proved that the robust input-to-state stability (ISS) of the two-layer interconnected MAS with the proposed proactive cyber defense strategy can be assured.
Wind energy systems in power grids including the SCADA system, communication networks, wind farm local servers, etc., can be viewed as a typical networked cyber–physical system, and a cyber-aware robust and resilient switching controller was given in [98]. The following output feedback controller based on a Markov jump linear system was proposed:
x ˙ F = A F ( ϑ t ) x F ( t ) + B F ( ϑ t ) y ( t ) , u ( t ) = C F ( ϑ t ) x F ( t ) ,
where A F ( i ) = A F i , B F ( i ) = B F i , and C F ( i ) = C F i are system matrices to be determined by solving the derived linear matrix inequalities (LMIs), x F ( t ) is the designed controller’s state, i F = { 1 , 2 , , S } , and { ϑ t , t 0 } is a right-continuous Markov chain regarding the various operating conditions of wind energy system. Then, a system-of-systems approach for a holistic design was developed, where the system robustness, security, and resilience were all taken into account. A strategic defensive mechanism for the cyber-layer operator was developed by introducing the non-cooperative game theory. It was proved that the proposed switching controller is resilient and the system-of-systems equilibrium was calculated utilizing an iterative technique by bi-linear programming.

3.4. Moving Target Defense for Securing Complex Cyber–Physical Networks

Moving Target Defense (MTD) has surfaced as a fundamental approach for increasing uncertainty regarding a system’s state or execution, prohibiting attackers from having predictable effects with their attacks. The core idea of MTD originated from the computer science field by cyber resilience or agility techniques, which proactively change network communication paths to make the routing topology difficult to predict and, thus, rescue the attacked traffic [99]. By introducing uncertainty into the parameters of the complex cyber–physical networks, MTD has been applied in several CPS scenarios in recent years and most of these applications can be roughly clarified into three types: (1) attack detection; (2) complicating and raising the cost of attackers gathering system information and executing successful attacks; and (3) mitigating the impact of cyberattacks.
Firstly, in the application field of detecting attacks, the security of an MTD strategy for improving the detectability of cyberattacks was analyzed in [100]. The MTD algorithm is effective in detecting a particular class of stealthy attacks. These attacks are characterized by the attacker’s knowledge of the system dynamics, detection strategies, and access to all sensors and control inputs. A sufficient condition has been established that allows for detecting these stealthy attacks through implementing the proposed MTD algorithm while simultaneously minimizing the impact of such attacks. A detection method based on the MTD framework was proposed in [101], in which data regarding the system’s changing operating point was utilized to cluster measurements based on their transfer function characteristics. A series of similarity tests between measurements within the same cluster are used to find the attacks’ occurrence. The suggested technique may identify intelligent cyberattacks that are knowledgeable in system parameters, models, and detection rules. In [102], a switching-based MTD strategy was developed to detect malicious FDI attacks described by the average dwell-time feature, an ET mechanism was also applied to reduce the cost of data transmission. Even if attacks may remain stealthy when the MTD mechanism is adopted, the impacts of these stealthy attacks on the system performance can be kept to a minimum level. To defend against deception attacks, a MTD strategy based on converters with perturbed primary control gains was proposed in [103]. The impact of perturbed control gains on the voltage stability in DC microgrids was studied, and sufficient conditions of the perturbation magnitude and frequency were derived to ensure voltage stability. It was shown that detectability could be improved under such a scheme and conditions to successfully detect such attacks were provided. By employing the distributed flexible AC transmission system (D-FACTS), the correlation between the developed MTD and detection for FDI attacks was demonstrated in [104]. The results also offered a heuristic technique to determine a near-optimal solution for the deployment of D-FACTS devices to decrease the amount of measurements the attacker can change after MTD.
By causing additional difficulty or cost for attackers, MTD has also been applied in both the estimation and control of complex CPSs. In applying the power grid, the state estimations are often utilized to generate optimal power flow and perform contingency analysis; false estimations will directly impact the economic and system operations. In [105], randomization was mainly on the set of measurements in state estimation and line admittances were applied such that information uncertainty would be generated, which contributes to the limitation of the potential attack space of undetected false data injection attacks.
MTD was also used in [106] for AC state estimation, where an extended MTD approach was presented by changing series reactance and parallel susceptance of lines in coordination. Furthermore, how the proposed MTD method influences the electricity market was also discussed. The cost of system defense was modeled as integrating the locational marginal price, the variation of active power loss, and the cost of devices for executing MTD. The optimal MTD parameter was given balancing the defense unity and cost.
For a secure control perspective, a proactive and reactive defense mechanism by applying the idea of MTD was proposed in [107], where a stochastic switching structure is designed to dynamically and continually adjust system settings while impeding the attacker’s capacity to perform system reconnaissance successfully. By introducing the candidate actuating operating mode B i , i { 1 , , card ( B c ) } , the following linear system with candidate controllers can be derived:
x ˙ ( t ) = A x ( t ) + B i u i ( t ) , t 0 ,
with B c = { B j 2 B : rank ( [ B j A B j A n 1 B j ] ) = n } . Based on maximizing the information entropy, which is commonly used as a standard practice in MTD, the probability p i that each controller is employed is developed as:
p i = e V i * ϵ 1 ϵ log e 1 i = 1 N e V i * ϵ ,
where
V i * ( x ( t 0 ) ) = min u i t 0 ( x T Q i x + u i T R i u i ) d τ , x ( t 0 ) ,
with Q i 0 , R > 0 , and ϵ 0 reflecting the weight on unpredictability during the optimization process. It is proved that under attack-free scenarios, an asymptotically stable equilibrium point for every switching signal can be ensured if the average dwell time is bounded by a given number. The detection signal with a certain time window T was also designed:
e ( t ) = V i ^ ( x c ( t T ) ) V i ^ ( x c ( t ) ) t T t ( x c T Q i x c + u i * T R i u i * ) d τ .
where V i ^ ( · ) = x c T P i x c , with x c denoting the state at the sampling instants, and u i * ( x ) = R i 1 B i T P i x . The core idea therein is that the switching probabilities are chosen to optimize the entropy induced by the switching strategy while guaranteeing that the controller cost is kept to a minimal level. The event-triggered control version was further developed in [108]. The event function was given to determine the triggered instants and the inter-event time’s lower bound was also derived concerning the event-triggered parameters. A corresponding intrusion detection algorithm was then given to reveal actuator intrusions. Immediately after the results in [108], the metaheuristic method based on the particle swarm optimization was further used in [109] to tune the controllers therein and improve their control performance.
Randomized switching methodology under the adaptive framework was developed in [110] where, at run-time, the performance of several parallel controller implementations were examined to adjust the probability of switching to each controller. Different from simple switch strategies, such as round-robin protocol, a time-division multiplexer was introduced, where the misbehaving controller nodes can be turned off based on observation of their performance but the controller will be rechecked for evaluation after some point, even if the likelihood of switching to a certain controller becomes low. Ref. [111] proposed the moving target defense strategy based on a completely model-free framework for a discrete-time system. Approximate dynamic programming (ADP) was used to develop intrusion detection based on Bellman error, such that policy for optimal regulation and tracking can be learned. Switching rules are leveraged to force proactive and reactive defense mechanisms defending against actuator and sensor attacks and guarantee the equilibrium point’s stability. A MTD and reinforcement learning strategy was proposed in [112], where several controllable pairs that can alter the system’s dynamics were introduced with unpredictable switching probabilities. Attack detection and isolation methods were developed to accurately locate and exclude the compromised actuators from the candidate sequence and, when no subsystem can be utilized, a defense control based on reinforcement learning was also given. In [113], the authors investigated the security control for time-varying delay systems. The Lyapunov stability analysis approach is used to jointly generate sufficient requirements for the stability of the observer and control system, in which a moving defensive strategy is based on anomaly detection and random switching, along with an optimization problem for computing the correct switching probability of each potential actuator–controller combination.
Different from work [107] focusing on the entropy, considering the minimizing of impacts caused by the attack, random communication topologies for multi-vehicle systems as a MTD were used in [114], while also maintaining control performance under attack-free cases. The attacker under consideration can intercept interactions between two agents and falsify the information being conveyed. An MTD is designed by introducing the time-varying graph G ( k ) = ( V , E ( k ) , A ( k ) ) with a i j ( k ) = 1 being a Bernoulli random variable with probability 0 p i j 1 and the connection probability matrix P R n × n can be defined with:
P i j = p i j , i j , 0 , i = j .
For the modified Erdös–Rényi graph with 0 < p < 1 , a necessary and sufficient condition for the union of graphs was derived such that the introduced MTD strategy does not influence the consensus state under an attack-free situation, and the expected convergence rate is explicitly given by
R ¯ M T D = 1 1 p μ 2 μ n ,
with μ 1 = 0 μ 2 μ n being the eigenvalues of supergraph G T (with all possible communication links among agents). More interestingly, by introducing the attack impact index as lim k x ( k ) x c , the impact of the attack can be given by
F ¯ = p μ n n ( 2 p 2 + 2 p + 1 ) .
It is revealed that trade-offs exist between the convergence rate and the attack impacts. Interestingly, the results can guide system designers so that the amount of possible communication channels can be increased such that smaller p can be picked without causing substantial performance reduction while ensuring strong resistance to attacks. A MTD strategy that leverages the versatility of IoT networks to reinforce the security of CPSs was presented in [115]. This strategy entails the replication of crucial sensory and control signals, leading to the creation of two layers of unpredictability, thus diminishing the capability of adversaries to conduct successful cyberattacks without affecting the normal performance of the system.
From the above brief survey in this subsection, one can see that this proactive technique involves introducing uncertainty into the parameters of complex networks, thereby rendering them more resilient to attacks by three main reasons: Firstly, MTD can be utilized for the purpose of detecting attacks. Secondly, it can be employed to increase the difficulty and cost for attackers attempting to obtain system information and execute successful attacks. Finally, MTD is used to mitigate the impact of cyberattacks. Further research is required to explore the effectiveness and limitations of MTD in the context of different scenarios. It is crucial to identify the potential risks and challenges associated with this approach, such as the possibility of introducing unintended vulnerabilities or impacts into the system. Additionally, future studies may investigate the optimal implementation of MTD techniques, considering the system’s specific characteristics under certain operating situations. There is also a need to develop standardized methodologies for evaluating the effectiveness of MTD approaches, which can help compare the performance of different MTD techniques and assess their suitability for different applications.

4. Conclusions and Discussions

This survey has examined the most recent advancements and proactive defense strategies in complex cyber–physical networks. For single-type classical cyberattacks, advances for modeling and tackling DoS attacks and FDI attacks have been mainly explored. The newly emerging hybrid cyberattacks that are more stealthy and collusive have been investigated in depth, including those that only occur in cyberspace and the coordinated cyber–physical attacks that combine the benefits of physical and cyberattacks. Based on topology and control viewpoints, several existing defense strategies have been reviewed for a more proactive defense goal. The topological design enables the defender to anticipate future attacks, while the reconstruction process can contribute to the recovery from inevitable attacks. Works that employ the ideas of active switching-based control and moving target defense have also been addressed. The defense can adopt alternate control strategies proactively to minimize stealthiness, raise the attack budget, and limit attack impact.
Despite the abundant reporting of significant outcomes in recent years, it is imperative to acknowledge the critical limitations of current secure control methods due to their stringent assumptions and particular demands. The widespread adoption of artificial intelligence (AI) technology, coupled with the continuous evolution of network defense, has opened up new avenues for future research that offer substantial theoretical and practical significance. The following areas are particularly intriguing and warrant further investigation.
(1)
AI-aided secure control and applications. Many existing secure control schemes assume that either the system knowledge is known to the attackers or that the attack scheme is known to the defenders. However, the presence of system uncertainties, either internal or external, makes these assumptions unrealistic in many real complex cyber–physical networks. AI techniques, such as machine learning, and reinforcement learning, when combined with existing system dynamics models, could offer a promising way to address such environmental uncertainties and improve the security of CPSs.
(2)
Game-theoretic framework for secure control. The utilization of game theory in the secure control design of CPSs involves modeling an attacker and a defender as rational decision-makers, thus enabling the analysis of their interactions to determine optimal strategies for both sides. The defender strives to create a secure control system that reduces the likelihood of a successful attack, while the attacker endeavors to compromise the system’s normal functioning. One challenge is the intricate nature of complex cyber–physical networks. The interactions between the physical and cyber components will complicate the prediction of the effects of certain control actions, and also poses difficulties in designing a control system when both security and performance objectives are considered. Game theory provides a valuable framework for the security of CPSs and technical challenges still remain in addressing the uncertainty and complexity intrinsic therein.
(3)
Distributed mitigation and recovery approaches for complex cyber–physical networks. It is imperative to note that, in order to implement effective recovery or reconstruction strategies in complex cyber–physical networks, a significant amount of global information about the system is needed in most existing works. However, such requirements violate the distributed nature of complex cyber–physical networks and limit the potential applications of mitigation and recovery methods. Hence, it is essential to conduct in-depth discussions on how to realize the mitigation and recovery approaches in a fully distributed manner, optimize the recovered network while considering practical cost indexes, and consider the possibility of various sophisticated cyberattacks with attacking impacts.

Author Contributions

Writing—original draft preparation, Y.W.; writing—review and editing, Y.W. and J.C.; visualization, Y.W.; supervision, J.C.; project administration, Y.W. and J.C.; funding acquisition, Y.W. and J.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62106042, the Natural Science Foundation of Jiangsu Province of China under Grant BK20210211, and the ZhiShan Youth Scholar Program from Southeast University of China under Grant No. 2242022R40011.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lee, E.A. Cyber Physical Systems: Design Challenges. In Proceedings of the 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), Orlando, FL, USA, 5–7 May 2008; pp. 363–369. [Google Scholar]
  2. Jazdi, N. Cyber Physical Systems in the Context of Industry 4.0. In Proceedings of the 2014 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, 22–24 May 2014; pp. 1–4. [Google Scholar]
  3. Wen, G.; Yu, W.; Yu, X.; Lü, J. Complex Cyber-Physical Networks: From Cyber security to Security Control. J. Syst. Sci. Complex. 2017, 30, 46–67. [Google Scholar] [CrossRef]
  4. Wen, G.; Yu, W.; Lv, Y.; Wang, P. Cooperative Control of Complex Network Systems with Dynamic Topologies, 1st ed.; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  5. Chen, T.M.; Abu-Nimeh, S. Lessons from Stuxnet. Computer 2011, 44, 91–93. [Google Scholar] [CrossRef]
  6. Whitehead, D.E.; Owens, K.; Gammel, D.; Smith, J. Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. In Proceedings of the 2017 70th Annual Conference for Protective Relay Engineers (CPRE), College Station, TX, USA, 3–6 April 2017; pp. 1–8. [Google Scholar]
  7. Kolias, C.; Kambourakis, G.; Stavrou, A.; Voas, J. DDoS in the IoT: Mirai and Other Botnets. Computer 2017, 50, 80–84. [Google Scholar] [CrossRef]
  8. Huddleston, J.; Ji, P.; Bhunia, S.; Cogan, J. How VMware Exploits Contributed to SolarWinds Supply-Chain Attack. In Proceedings of the 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 15–17 December 2021; pp. 760–765. [Google Scholar]
  9. Hundley, H.O.; Anderson, R.H. Emerging Challenge: Security and Safety in Cyberspace. IEEE Technol. Soc. Mag. 1995, 14, 19–28. [Google Scholar] [CrossRef]
  10. Samonas, S.; Coss, D. The CIA strikes back: Redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 2014, 10, 21–45. [Google Scholar]
  11. Zhang, D.; Feng, G.; Shi, Y.; Srinivasan, D. Physical Safety and Cyber Security Analysis of Multi-Agent Systems: A Survey of Recent Advances. IEEE/CAA J. Autom. Sin. 2021, 8, 319–333. [Google Scholar] [CrossRef]
  12. He, W.; Xu, W.; Ge, X.; Han, Q.-L.; Du, W.; Qian, F. Secure Control of Multiagent Systems Against Malicious Attacks: A Brief Survey. IEEE Trans. Ind. Inform. 2022, 18, 3595–3608. [Google Scholar] [CrossRef]
  13. Ishii, H.; Wang, Y.; Feng, S. An Overview on Multi-Agent Consensus under Adversarial Attacks. Annu. Rev. Control 2022, 53, 252–272. [Google Scholar] [CrossRef]
  14. Sandberg, H.; Gupta, V.; Johansson, K.H. Secure Networked Control Systems. Annu. Rev. Control Robot. Auton. Syst. 2022, 5, 445–464. [Google Scholar] [CrossRef]
  15. Pang, Z.-H.; Fan, L.-Z.; Guo, H.; Shi, Y.; Chai, R.; Sun, J.; Liu, G.-P. Security of Networked Control Systems Subject to Deception Attacks: A Survey. Int. J. Syst. Sci. 2022, 53, 3577–3598. [Google Scholar] [CrossRef]
  16. Duo, W.; Zhou, M.; Abusorrah, A. A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges. IEEE/CAA J. Autom. Sin. 2022, 9, 784–800. [Google Scholar] [CrossRef]
  17. Wu, J.; Peng, C.; Yang, H.; Wang, Y.-L. Recent Advances in Event-Triggered Security Control of Networked Systems: A Survey. Int. J. Syst. Sci. 2022, 53, 2624–2643. [Google Scholar] [CrossRef]
  18. Cetinkaya, A.; Ishii, H.; Hayakawa, T. Networked Control Under Random and Malicious Packet Losses. IEEE Trans. Autom. Control 2017, 62, 2434–2449. [Google Scholar] [CrossRef] [Green Version]
  19. De Persis, C.; Tesi, P. Resilient Control under Denial-of-Service. IFAC Proc. Vol. 2014, 47, 134–139. [Google Scholar] [CrossRef] [Green Version]
  20. De Persis, C.; Tesi, P. Input-to-State Stabilizing Control Under Denial-of-Service. IEEE Trans. Autom. Control 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  21. Liberzon, D.; Morse, A.S. Basic Problems in Stability and Design of Switched Systems. IEEE Control Syst. Mag. 1999, 19, 59–70. [Google Scholar]
  22. Cetinkaya, A.; Ishii, H.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210. [Google Scholar] [CrossRef] [Green Version]
  23. Kikuchi, K.; Cetinkaya, A.; Hayakawa, T.; Ishii, H. Stochastic Communication Protocols for Multi-Agent Consensus under Jamming Attacks. In Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC), Melbourne, VIC, Australia, 12–15 December 2017; pp. 1657–1662. [Google Scholar]
  24. Wan, Y.; Wen, G.; Yu, X.; Huang, T. Distributed Consensus Tracking of Networked Agent Systems Under Denial-of-Service Attacks. IEEE Trans. Syst. Man, Cybern. Syst. 2021, 51, 6183–6196. [Google Scholar] [CrossRef]
  25. Xu, W.; Hu, G.; Ho, D.W.C.; Feng, Z. Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries. IEEE Trans. Cybern. 2020, 50, 3458–3467. [Google Scholar] [CrossRef]
  26. Wen, G.; Wang, P.; Lv, Y.; Chen, G.; Zhou, J. Secure Consensus of Multi-Agent Systems under Denial-of-Service Attacks. Asian J. Control 2023, 25, 695–709. [Google Scholar] [CrossRef]
  27. Foroush, H.S.; Martínez, S. On Triggering Control of Single-Input Linear Systems Under Pulse-Width Modulated DoS Signals. SIAM J. Control. Optim. 2016, 54, 3084–3105. [Google Scholar] [CrossRef] [Green Version]
  28. Li, Y.; Shi, L.; Cheng, P.; Chen, J.; Quevedo, D.E. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach. IEEE Trans. Autom. Control 2015, 60, 2831–2836. [Google Scholar] [CrossRef]
  29. Yang, H.; Shi, M.; Xia, Y.; Zhang, P. Security Research on Wireless Networked Control Systems Subject to Jamming Attacks. IEEE Trans. Cybern. 2019, 49, 2022–2031. [Google Scholar] [CrossRef]
  30. Nugraha, Y.; Cetinkaya, A.; Hayakawa, T.; Ishii, H.; Zhu, Q. Rolling Horizon Games of Resilient Networks with Non-Uniform Horizons. Eur. J. Control 2022, 68, 100693. [Google Scholar] [CrossRef]
  31. Liu, Y.; Ning, P.; Reiter, M.K. False Data Injection Attacks Against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 2011, 14, 1–33. [Google Scholar] [CrossRef]
  32. Rawat, D.B.; Bajracharya, C. Detection of False Data Injection Attacks in Smart Grid Communication Systems. IEEE Signal Process. Lett. 2015, 22, 1652–1656. [Google Scholar] [CrossRef]
  33. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
  34. Mo, Y.; Sinopoli, B. Secure Control against Replay Attacks. In Proceedings of the 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 30 September–2 October 2009; pp. 911–918. [Google Scholar]
  35. Ye, D.; Zhang, T.-Y. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems. IEEE Trans. Cybern. 2020, 50, 2338–2345. [Google Scholar] [CrossRef]
  36. Liu, M.; Zhao, C.; Deng, R.; Cheng, P.; Chen, J. False Data Injection Attacks and the Distributed Countermeasure in DC Microgrids. IEEE Trans. Control. Netw. Syst. 2022, 9, 1962–1974. [Google Scholar] [CrossRef]
  37. Li, Y.; Wei, X.; Li, Y.; Dong, Z.; Shahidehpour, M. Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach. IEEE Trans. Smart Grid 2022, 13, 4862–4872. [Google Scholar] [CrossRef]
  38. Cao, G.; Gu, W.; Lou, G.; Sheng, W.; Liu, K. Distributed Synchronous Detection for False Data Injection Attack in Cyber-Physical Microgrids. Int. J. Electr. Power Energy Syst. 2022, 137, 107788. [Google Scholar] [CrossRef]
  39. Li, X.; Wang, Y.; Lu, Z. Graph-Based Detection for False Data Injection Attacks in Power Grid. Energy 2023, 263, 125865. [Google Scholar] [CrossRef]
  40. Lv, Y.; Wen, G.; Huang, T.; Duan, Z. Adaptive Attack-Free Protocol for Consensus Tracking with Pure Relative Output Information. Automatica 2020, 117, 108998. [Google Scholar] [CrossRef]
  41. Liu, X.-K.; Wen, C.; Xu, Q.; Wang, Y.-W. Resilient Control and Analysis for DC Microgrid System Under DoS and Impulsive FDI Attacks. IEEE Trans. Smart Grid 2021, 12, 3742–3754. [Google Scholar] [CrossRef]
  42. Barzegari, Y.; Zarei, J.; Razavi-Far, R.; Saif, M.; Palade, V. Resilient Consensus Control Design for DC Microgrids against False Data Injection Attacks Using a Distributed Bank of Sliding Mode Observers. Sensors 2022, 22, 2644. [Google Scholar] [CrossRef]
  43. Wan, Y.; Long, C.; Deng, R.; Wen, G.; Yu, X.; Huang, T. Distributed Event-Based Control for Thermostatically Controlled Loads Under Hybrid Cyber Attacks. IEEE Trans. Cybern. 2021, 51, 5314–5327. [Google Scholar] [CrossRef]
  44. Deng, R.; Xiao, G.; Lu, R.; Liang, H.; Vasilakos, A.V. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey. IEEE Trans. Ind. Inform. 2017, 13, 411–423. [Google Scholar] [CrossRef]
  45. Wang, Q.; Tai, W.; Tang, Y.; Ni, M. Review of the False Data Injection Attack against the Cyber-Physical Power System. IET Cyber-Phys. Syst. Theory Appl. 2019, 4, 101–107. [Google Scholar] [CrossRef]
  46. Zhu, J.; He, W.; Ge, X. Distributed Event-Triggered Impulsive Consensus Control of Nonlinear Multi-Agent Systems Under Malicious Attacks. In Proceedings of the IECON 2022—48th Annual Conference of the IEEE Industrial Electronics Society, Brussels, Belgium, 17–20 October 2022; pp. 1–6. [Google Scholar]
  47. Xu, Y.; Guo, G. Event Triggered Control of Connected Vehicles under Multiple Cyber Attacks. Inf. Sci. 2022, 582, 778–796. [Google Scholar] [CrossRef]
  48. Thapliyal, O.; Hwang, I. Data-Driven Cyberattack Synthesis against Network Control Systems. arXiv 2022, arXiv:2211.05203. [Google Scholar]
  49. Cheng, Z.; Hu, S.; Yue, D.; Dou, C.; Shen, S. Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 7–18. [Google Scholar] [CrossRef]
  50. Chen, P.; Zhang, D.; Yu, L.; Yan, H. Dynamic Event-Triggered Output Feedback Control for Load Frequency Control in Power Systems With Multiple Cyber Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 6246–6258. [Google Scholar] [CrossRef]
  51. Liu, J.; Wang, Y.; Zha, L.; Xie, X.; Tian, E. An Event-Triggered Approach to Security Control for Networked Systems Using Hybrid Attack Model. Int. J. Robust Nonlinear Control 2021, 31, 5796–5812. [Google Scholar] [CrossRef]
  52. Wan, Y.; Cao, J.; Chen, G.; Huang, W. Distributed Observer-Based Cyber-Security Control of Complex Dynamical Networks. IEEE Trans. Circuits Syst. Regul. Pap. 2017, 64, 2966–2975. [Google Scholar] [CrossRef]
  53. Wan, Y.; Cao, J. Observer-Based Tracking Control for Heterogeneous Dynamical Systems under Asynchronous Attacks. In Proceedings of the 2017 International Workshop on Complex Systems and Networks (IWCSN), Doha, Qatar, 8–10 December 2017; pp. 224–229. [Google Scholar]
  54. Liu, D.; Ye, D. Observer-Based Synchronization Control for Complex Networks against Asynchronous Attacks. Inf. Sci. 2021, 546, 753–768. [Google Scholar] [CrossRef]
  55. Wen, G.; Wang, P.; Huang, T.; Lü, J.; Zhang, F. Distributed Consensus of Layered Multi-Agent Systems Subject to Attacks on Edges. IEEE Trans. Circuits Syst. I Regul. Pap. 2020, 67, 3152–3162. [Google Scholar] [CrossRef]
  56. Zha, L.; Liao, R.; Liu, J.; Xie, X.; Tian, E.; Cao, J. Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks. IEEE Trans. Cybern. 2022, 52, 13800–13808. [Google Scholar] [CrossRef] [PubMed]
  57. Hamdan, M.M.; Mahmoud, M.S.; Baroudi, U.A. Event-Triggering Control Scheme for Discrete Time Cyber physical Systems in the Presence of Simultaneous Hybrid Stochastic Attacks. ISA Trans. 2022, 122, 1–12. [Google Scholar] [CrossRef]
  58. Xu, S.; Wan, Y.; Liu, G.; Niu, M. Optimal Hybrid Attacks Scheduling on Remote State Estimation with Energy Constraint. Proceedings of 2021 5th Chinese Conference on Swarm Intelligence and Cooperative Control, Shenzhen, China, 19–22 November 2021; Springer Nature: Singapore, July 2022; pp. 802–812. [Google Scholar]
  59. Case, D.U. Analysis of the Cyber Attack on the Ukrainian Power Grid. Electr. Inf. Shar. Anal. Cent. (E-ISAC) 2016, 388, 1–29. [Google Scholar]
  60. Pasqualetti, F.; Dorfler, F.; Bullo, F. Cyber-Physical Attacks in Power Networks: Models, Fundamental Limitations and Monitor Design. In Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, FL, USA, 12–15 December 2011; pp. 2195–2201. [Google Scholar]
  61. Deng, R.; Zhuang, P.; Liang, H. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid. IEEE Trans. Smart Grid 2017, 8, 2420–2430. [Google Scholar] [CrossRef]
  62. Li, Z.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems. IEEE Trans. Smart Grid 2016, 7, 2260–2272. [Google Scholar] [CrossRef]
  63. Li, Z.; Shahidehpour, M.; Alabdulwahab, A.; Abusorrah, A. Analyzing Locally Coordinated Cyber-Physical Attacks for Undetectable Line Outages. IEEE Trans. Smart Grid 2018, 9, 35–47. [Google Scholar] [CrossRef]
  64. Xiang, Y.; Wang, L.; Liu, N. Coordinated Attacks on Electric Power Systems in a Cyber-Physical Environment. Electr. Power Syst. Res. 2017, 149, 156–168. [Google Scholar] [CrossRef]
  65. Yang, J.; Sun, G.; Yin, J. Coordinated Cyber-Physical Attack Considering False Overload of Lines. Prot. Control Mod. Power Syst. 2022, 7, 44. [Google Scholar] [CrossRef]
  66. Lakshminarayana, S.; Belmega, E.V.; Poor, H.V. Moving-Target Defense for Detecting Coordinated Cyber-Physical Attacks in Power Grids. In Proceedings of the 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Beijing, China, 21–23 October 2019; pp. 1–7. [Google Scholar]
  67. Lai, K.; Illindala, M.; Subramaniam, K. A Tri-Level Optimization Model to Mitigate Coordinated Attacks on Electric Power Systems in a Cyber-Physical Environment. Appl. Energy 2019, 235, 204–218. [Google Scholar] [CrossRef]
  68. Tian, J.; Wang, B.; Li, T.; Shang, F.; Cao, K. Coordinated Cyber-Physical Attacks Considering DoS Attacks in Power Systems. Int. J. Robust Nonlinear Control 2020, 30, 4345–4358. [Google Scholar] [CrossRef]
  69. Wen, G.; Lv, Y.; Zheng, W.X.; Zhou, J.; Fu, J. Joint Robustness of Time-Varying Networks and Its Applications to Resilient Consensus. IEEE Trans. Autom. Control 2023. to be published. [Google Scholar] [CrossRef]
  70. Gharesifard, B.; Başar, T. Resilience in Consensus Dynamics via Competitive Interconnections. IFAC Proc. Vol. 2012, 45, 234–239. [Google Scholar] [CrossRef]
  71. Huang, X.; Dong, J. Reliable Cooperative Control and Plug-and-Play Operation for Networked Heterogeneous Systems under Cyber–Physical Attacks. ISA Trans. 2020, 104, 62–72. [Google Scholar] [CrossRef]
  72. Zuo, S.; Yue, D. Resilient Output Formation Containment of Heterogeneous Multigroup Systems Against Unbounded Attacks. IEEE Trans. Cybern. 2022, 52, 1902–1910. [Google Scholar] [CrossRef]
  73. Zuo, S.; Beg, O.A.; Lewis, F.L.; Davoudi, A. Resilient Networked AC Microgrids Under Unbounded Cyber Attacks. IEEE Trans. Smart Grid 2020, 11, 3785–3794. [Google Scholar] [CrossRef]
  74. Zuo, Z.; Cao, X.; Wang, Y. Stealthy Attack Mitigation of Consensus-Based Distributed Economic Dispatch. In Proceedings of the 2019 Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; pp. 5652–5657. [Google Scholar]
  75. Liu, Y.; Li, Z.; Shen, Z. Resilient Consensus of Discrete-Time Connected Vehicle Systems with Interaction Network against Cyber-Attacks. J. Frankl. Inst. 2021, 358, 2780–2800. [Google Scholar] [CrossRef]
  76. Zhang, T.; Li, Z. Event-Triggered Resilient Network-Level Control of Multi-Agent Systems under Cyber Attacks. In Proceedings of the 2021 36th Youth Academic Annual Conference of Chinese Association of Automation (YAC), Nanchang, China, 28–30 May 2021; pp. 690–695. [Google Scholar]
  77. Dong, H.; Li, C.; Zhang, Y. Resilient Consensus of Multi-Agent Systems against Malicious Data Injections. J. Frankl. Inst. 2020, 357, 2217–2231. [Google Scholar] [CrossRef]
  78. Gusrialdi, A.; Qu, Z. Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification. In Proceedings of the 2022 American Control Conference (ACC), Atlanta, GA, USA, 8–10 June 2022; pp. 330–335. [Google Scholar]
  79. Sheng, L.; Lou, G.; Gu, W.; Lu, S.; Ding, S.; Ye, Z. Optimal Communication Network Design of Microgrids Considering Cyber-Attacks and Time-Delays. IEEE Trans. Smart Grid 2022, 13, 3774–3785. [Google Scholar] [CrossRef]
  80. Wen, G.; Yu, X.; Liu, Z.-W.; Yu, W. Adaptive Consensus-Based Robust Strategy for Economic Dispatch of Smart Grids Subject to Communication Uncertainties. IEEE Trans. Ind. Inform. 2018, 14, 2484–2496. [Google Scholar] [CrossRef]
  81. Wan, Y.; Long, C.; Deng, R.; Wen, G.; Yu, X. Adaptive Event-Triggered Strategy for Economic Dispatch in Uncertain Communication Networks. IEEE Trans. Control. Netw. Syst. 2021, 8, 1881–1891. [Google Scholar] [CrossRef]
  82. Shang, Y. Consensus Recovery from Intentional Attacks in Directed Nonlinear Multi-Agent Systems. Int. J. Nonlinear Sci. Numer. Simul. 2013, 14, 355–361. [Google Scholar] [CrossRef]
  83. Zhang, J.; Xu, X.; Hong, L.; Yan, Y. Consensus Recovery of Multi-Agent Systems Subjected to Failures. Int. J. Control 2012, 85, 280–286. [Google Scholar] [CrossRef]
  84. Li, L.; Ho, D.W.C.; Lu, J. A Consensus Recovery Approach to Nonlinear Multi-Agent System under Node Failure. Inf. Sci. 2016, 367–368, 975–989. [Google Scholar] [CrossRef]
  85. Acharya, D.S.; Mishra, S.K. Optimal Consensus Recovery of Multi-Agent System Subjected to Agent Failure. Int. J. Artif. Intell. Tools 2020, 29, 2050017. [Google Scholar] [CrossRef]
  86. Li, Y.; Wang, H.; He, J.; Guan, X. Optimal Topology Recovery Scheme for Multi-Robot Formation Control. In Proceedings of the 2019 IEEE 28th International Symposium on Industrial Electronics (ISIE), Vancouver, BC, Canada, 12–14 June 2019; pp. 1847–1852. [Google Scholar]
  87. Song, Z.; Liu, Y.; Tan, M. Robust Pinning Synchronization of Complex Cyberphysical Networks under Mixed Attack Strategies. Int. J. Robust Nonlinear Control 2019, 29, 1265–1278. [Google Scholar] [CrossRef]
  88. Wan, Y.; Wen, G. Edge Manipulation Attacks for Distributed Control of TCLs in Microgrid: Impacts and Mitigation. In Proceedings of the 2020 Chinese Automation Congress (CAC), Shanghai, China, 6–8 November 2020; pp. 1766–1771. [Google Scholar]
  89. Feng, Y.; Wang, F.; Liu, Z.; Chen, Z. Distributed Network Reconstruction Strategy for Multi-Agent Systems. IFAC-PapersOnLine 2022, 55, 119–124. [Google Scholar] [CrossRef]
  90. Zhu, J.-W.; Zhou, Q.-Q.; Wu, L.-B.; Xu, J.-M.; Wang, X. Topology Reconstruction Based Fault Identification for Uncertain Multi-Agent Systems with Application to Multi-Axis Motion Control System. Appl. Math. Comput. 2021, 399, 126000. [Google Scholar] [CrossRef]
  91. Dutta, R.; Kandath, H.; Jayavelu, S.; Xiaoli, L.; Sundaram, S.; Pack, D. A Decentralized Learning Strategy to Restore Connectivity during Multi-Agent Formation Control. Neurocomputing 2023, 520, 33–45. [Google Scholar] [CrossRef]
  92. Mao, Y.; Akyol, E. Detectability of Cooperative Zero-Dynamics Attack. In Proceedings of the 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 2–5 October 2018; pp. 227–234. [Google Scholar]
  93. Mao, Y.; Akyol, E.; Zhang, Z. Strategic Topology Switching for Security-Part II: Detection & Switching Topologies. arXiv 2019, arXiv:1711.11181. [Google Scholar]
  94. Huang, X.; Dong, J. Learning-Based Switched Reliable Control of Cyber-Physical Systems with Intermittent Communication Faults. IEEE/CAA J. Autom. Sin. 2020, 7, 711–724. [Google Scholar] [CrossRef]
  95. Peng, C.; Sun, H. Switching-Like Event-Triggered Control for Networked Control Systems Under Malicious Denial of Service Attacks. IEEE Trans. Autom. Control 2020, 65, 3943–3949. [Google Scholar] [CrossRef]
  96. Zhu, J.-W.; Yang, Y.-P.; Zhang, W.-A.; Yu, L.; Wang, X. Cooperative Attack Tolerant Tracking Control for Multi-Agent System with a Resilient Switching Scheme. Neurocomputing 2020, 409, 372–380. [Google Scholar] [CrossRef]
  97. Rezaei, V.; Jafarian, J.H.; Sicker, D.C. Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective. In Proceedings of the 2022 American Control Conference (ACC), Atlanta, GA, USA, 8–10 June 2022; pp. 336–341. [Google Scholar]
  98. Chen, J.; Zhu, Q. A System-of-Systems Approach to Strategic Cyber-Defense and Robust Switching Control Design for Cyber-Physical Wind Energy Systems. In Security and Resilience of Control Systems: Theory and Applications; Springer International Publishing: Cham, Switzerland, 2022; pp. 177–202. [Google Scholar]
  99. Lei, C.; Zhang, H.-Q.; Tan, J.-L.; Zhang, Y.-C.; Liu, X.-H. Moving Target Defense Techniques: A Survey. Secur. Commun. Netw. 2018, 2018, e3759626. [Google Scholar] [CrossRef] [Green Version]
  100. Giraldo, J.; Cardenas, A.; Sanfelice, R.G. A Moving Target Defense to Detect Stealthy Attacks in Cyber-Physical Systems. In Proceedings of the 2019 American Control Conference (ACC), Philadelphia, PA, USA, 10–12 July 2019; pp. 391–396. [Google Scholar]
  101. Jevtić, A.; Ilić, M. A Moving-Target Cyber-Attack Detection Strategy for Large-Scale Power Systems Using Dynamic Clustering. arXiv 2020, arXiv:2004.03838. [Google Scholar]
  102. Liu, H.; Wang, S.; Li, Y. Event-Triggered Control and Proactive Defense for Cyber–Physical Systems. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 6305–6313. [Google Scholar] [CrossRef]
  103. Liu, M.; Zhao, C.; Zhang, Z.; Deng, R.; Cheng, P.; Chen, J. Converter-Based Moving Target Defense Against Deception Attacks in DC Microgrids. IEEE Trans. Smart Grid 2022, 13, 3984–3996. [Google Scholar] [CrossRef]
  104. Zhang, Z.; Deng, R.; Cheng, P.; Chow, M.-Y. Strategic Protection Against FDI Attacks With Moving Target Defense in Power Grids. IEEE Trans. Control Netw. Syst. 2022, 9, 245–256. [Google Scholar] [CrossRef]
  105. Rahman, M.A.; Al-Shaer, E.; Bobba, R.B. Moving Target Defense for Hardening the Security of the Power System State Estimation. In Proceedings of the First ACM Workshop on Moving Target Defense, MTD’14, Scottsdale, AZ, USA, 7 November 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 59–68. [Google Scholar]
  106. Zhang, M.; Fan, X.; Lu, R.; Shen, C.; Guan, X. Extended Moving Target Defense for AC State Estimation in Smart Grids. IEEE Trans. Smart Grid 2022. [Google Scholar] [CrossRef]
  107. Kanellopoulos, A.; Vamvoudakis, K.G. A Moving Target Defense Control Framework for Cyber-Physical Systems. IEEE Trans. Autom. Control 2020, 65, 1029–1043. [Google Scholar] [CrossRef]
  108. Tamba, T.A.; Hu, B.; Nazaruddin, Y.Y. On Event-Triggered Implementation of Moving Target Defense Control. IFAC-PapersOnLine 2020, 53, 3539–3544. [Google Scholar] [CrossRef]
  109. Tamba, T.A. A PSO-Based Moving Target Defense Control Optimization Scheme. In Proceedings of the 2021 SICE International Symposium on Control Systems (SICE ISCS), Tokyo, Japan, 2–4 March 2021. [Google Scholar]
  110. Krishnamurthy, P.; Khorrami, F. Adaptive Randomized Controller Switching for Resilient Cyber-Physical Systems. In Proceedings of the 2020 IEEE Conference on Control Technology and Applications (CCTA), Montreal, QC, Canada, 24–26 August 2020; pp. 738–743. [Google Scholar]
  111. Zhai, L.; Vamvoudakis, K.G. Data-Based and Secure Switched Cyber–Physical Systems. Syst. Control Lett. 2021, 148, 104826. [Google Scholar] [CrossRef]
  112. Wu, C.; Yao, W.; Pan, W.; Sun, G.; Liu, J.; Wu, L. Secure Control for Cyber-Physical Systems Under Malicious Attacks. IEEE Trans. Control Netw. Syst. 2022, 9, 775–788. [Google Scholar] [CrossRef]
  113. Zhong, F. Resilient Control for Time-Delay Systems in Cyber-Physical Environment Using State Estimation and Switching Moving Defense. In Proceedings of the 2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI), Nanjing, China, 23–25 September 2022; pp. 204–212. [Google Scholar]
  114. Giraldo, J.; Cardenas, A.A. Moving Target Defense for Attack Mitigation in Multi-Vehicle Systems. In Proactive and Dynamic Network Defense; Wang, C., Lu, Z., Eds.; Advances in Information Security; Springer International Publishing: Cham, Switzerland, 2019; Volume 74, pp. 163–190. [Google Scholar]
  115. Giraldo, J.A.; El Hariri, M.; Parvania, M. Moving Target Defense for Cyber–Physical Systems Using IoT-Enabled Data Replication. IEEE Internet Things J. 2022, 9, 13223–13232. [Google Scholar] [CrossRef]
Figure 1. General framework of complex cyber–physical networks.
Figure 1. General framework of complex cyber–physical networks.
Sensors 23 04013 g001
Figure 2. The main structure of this survey.
Figure 2. The main structure of this survey.
Sensors 23 04013 g002
Table 1. Brief summary and comparisons of several existing survey papers.
Table 1. Brief summary and comparisons of several existing survey papers.
YearReferencesMain Focus or ContributionsScenarios Considered
2021 [11]Deception attack, DoS attack, Physical fault estimation, detection and diagnosis, and fault tolerant controlHomogeneous/heterogeneous multi-agent systems
2022 [16]Availability, integrity, and confidentiality attacks for time-driven and event-driven systemsCyber physical system
2022 [12]DoS attack, deception attack, attacks on agentsMulti-agent systems
2022 [13]Mean subsequence reduced (MSR) algorithms for FDI attack, DoS attackMulti-agent systems
2022 [14]DoS attack, FDI attack, replay attack, attack spaceNetworked control systems
2022 [17]DoS attack, deception attack, hybrid attack, event-triggered secure controlNetworked control systems
2022 [15]Deception attackNetworked control systems
This surveySingle type classical cyberattacks, hybrid intricate cyberattacks, recent proactive defense strategies from topology and control viewComplex cyber–physical networks
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wan, Y.; Cao, J. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks. Sensors 2023, 23, 4013. https://doi.org/10.3390/s23084013

AMA Style

Wan Y, Cao J. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks. Sensors. 2023; 23(8):4013. https://doi.org/10.3390/s23084013

Chicago/Turabian Style

Wan, Ying, and Jinde Cao. 2023. "A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber–Physical Networks" Sensors 23, no. 8: 4013. https://doi.org/10.3390/s23084013

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop