Submitted:
18 May 2025
Posted:
19 May 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Background: Cyber-Physical Integration in Modern Power Systems
1.2. Limitations of Detection-Only Paradigms and FDIA-Focused Reviews
- Narrow Threat Coverage: Detection methods often target specific attack models, such as linear FDIA formulations, without addressing broader multi-vector and coordinated threats that exploit multiple system layers.
- Lack of Coordinated Response: Detection alone does not guarantee effective response or recovery. Without coordinated defense mechanisms that involve both automated systems and human operators, detected attacks may still cause significant operational disruptions [22].
- Insufficient Integration with Operational Objectives: Detection methods rarely account for the broader mission objectives of power system operators, such as maintaining service reliability, economic efficiency, and regulatory compliance under attack conditions [26].
1.3. Why Mission-Centric, Coordinated, and Human-in-the-Loop Defense Matters
- The ultimate goal of cyber defense is not merely to detect attacks but to maintain the safe and reliable operation of the power grid, even in the presence of ongoing cyber-physical disruptions [2].
- Human operators play an indispensable role in interpreting complex situations, making informed decisions, and executing response actions that automated systems alone may not be capable of handling. Therefore, human-in-the-loop defense mechanisms that provide situational awareness, explainable AI support, and cognitive load management are essential for effective cyber-physical security [36].
1.4. Contributions of This Review
- Holistic Characterization of Evolving Cyber-Physical Threats:This review broadens the traditional FDIA-focused perspective by systematically analyzing multi-stage, AI-enhanced, and cross-layer coordinated attacks, including adversarial exploitation of human factors. It highlights the need to move beyond isolated detection toward integrated defense strategies that address threats across the cyber, physical, market, and human layers.
- Architectural and Mechanistic Foundations for Coordinated and Explainable Defense: The review proposes mission-centric architectural design principles, incorporating redundancy, diversity, modularity, and cross-layer trust mechanisms to enhance system resilience. It further synthesizes state-of-the-art multi-agent coordination, edge-cloud collaboration, and explainable AI techniques, providing actionable pathways for achieving distributed and operator-trustworthy defense mechanisms.
- Integration of Human-in-the-Loop and Post-Attack Recovery Strategies: Recognizing the critical role of human operators in complex grid operations, this review emphasizes situational awareness enhancement, cognitive engineering, and human-machine teaming. It also addresses post-attack recovery, including data reconstruction, operational reconfiguration, and the integration of resilience metrics to sustain mission assurance even under cyber-physical disruptions.
- Research Roadmap and Cross-Sector Collaboration Agenda:Finally, the review identifies key research gaps, standardization needs, and policy challenges, proposing a collaborative roadmap that unites academia, industry, and regulatory bodies to operationalize scalable, trustworthy, and human-aware cyber-physical defense for future energy systems.
1.5. Structure of This Review
2. Evolution of Cyber-Physical Threats in Power CPS
2.1. From Isolated FDIAs to Coordinated Multi-Stage, Multi-Agent Attacks
2.1.1. Limitations of Early FDIA Models
- The attacker having full knowledge of the system’s topology and parameters.
- The attacker having unrestricted access to all measurement channels.
- The attack targeting a single objective, such as load redistribution or topology masking.
2.1.2. Examples of Multi-Stage, Coordinated Attacks
- Conducted long-term reconnaissance using phishing and malware (BlackEnergy).
- Compromised operator credentials to gain remote access to Supervisory Control and Data Acquisition (SCADA) systems [52].
- Simultaneously manipulated circuit breakers in multiple substations.
- Deployed disk-wiping malware (KillDisk) to hinder recovery efforts.
2.2. AI-Enhanced Adversarial Attacks and Model Poisoning Risks
- Craft adversarial examples that exploit blind spots in ML-based detection models.
- Train surrogate models to simulate the defender’s detection system.
- Optimize attack strategies using reinforcement learning or evolutionary algorithms to maximize stealth and impact [61].
2.3. Human Factor Exploitation and Social Engineering
- Phishing Emails: Trick users into revealing credentials or downloading malware.
- Impersonation: Exploit trust relationships to gain unauthorized access.
- Physical Intrusion: Manipulate on-site personnel to bypass security controls.
- Misinterpret or ignore alerts due to excessive false positives.
- Delay response due to uncertainty or lack of actionable insights.
- Overlook coordinated attacks that span cyber, physical, and market layers.
2.4. Cross-Layer Propagation Across ICT, OT, and Market Operations
- Information and Communication Technology (ICT) networks, such as public and private telecommunication infrastructures [79].
- Energy markets, where economic signals influence operational decisions.
- Telecom Outages: Disrupt operator situational awareness during grid emergencies.
- Market Manipulation: Inject false data to trigger price spikes or imbalance penalties [86].
2.5. Summary of Emerging Threat Characteristics and Gaps
3. Design Foundations of Mission-Centric Cyber-Physical Defense
3.1. Defining Mission-Centric Resilience: Beyond Asset Protection
- Mission First: Prioritize maintaining core grid operations (e.g., frequency stability, voltage regulation, black start capabilities) over perfect asset security.
- Graceful Degradation: Design systems to continue operating in a degraded but safe state if parts of the system are compromised.
- Resilience over Robustness: Enable the system to adapt and recover from attacks, rather than merely resisting them through static barriers.
3.2. Cross-Layer Defense Architecture: Cyber, Physical, Market, Human
3.3. Redundancy, Diversity, and Modularity for Systemic Resilience
- Sensing Redundancy: Deploy multiple, independent measurement sources (e.g., PMUs, smart meters) to cross-validate data.
- Communication Redundancy: Utilize diverse communication channels (e.g., fiber, LTE/5G, satellite) to maintain data flow during disruptions.
- Control Logic Redundancy: Implement fallback control strategies on edge devices to maintain safe operation if centralized control is compromised [126].
- Vendor Diversity: Avoid reliance on single suppliers for critical hardware or software.
- Software and Firmware Diversity: Deploy varying versions or configurations to prevent system-wide exploitation of a single vulnerability.
- Regional Control Zones: Partition the grid into semi-autonomous areas with localized situational awareness and response capabilities.
- Network Segmentation: Enforce strict separation between critical operational networks and corporate IT environments [131].
3.4. Secure Sensing and Communication: From Cryptography to Trustworthy Learning
- Cryptographic Techniques: Use Message Authentication Codes (MACs), digital signatures, and end-to-end encryption to protect data integrity and confidentiality.
- Standards Compliance: Implement protocols such as IEC 62351 to secure power system communications [132].
- Physics-Informed Learning: Validate data consistency with physical laws (e.g., Kirchhoff’s laws) to detect manipulation [136].
- Behavioral Baselines: Use machine learning to establish normal operational profiles and flag deviations.
- Cross-Domain Anomaly Detection: Correlate cyber, physical, and market data streams to detect coordinated attacks [137].
- Model Explainability: Ensuring that AI-driven detection models provide interpretable results for operator validation.
- Adversarial Robustness: Hardening learning-based models against adversarial manipulation and model poisoning.
- Computational Feasibility: Deploying real-time learning and detection capabilities on edge devices with limited resources.
4. Coordinated and Explainable Defense Mechanisms
4.1. Multi-Agent and Distributed Defense Architectures
4.1.1. Limitations of Centralized Defense
4.1.2. Advantages of Multi-Agent Defense Systems
4.1.3. Key Design Considerations
4.2. Edge and Cloud-Based Real-Time Defense Coordination
4.2.1. Role of Edge Computing
4.2.2. Role of Cloud Computing
4.2.3. Hybrid Edge-Cloud Defense Framework
4.3. Explainable AI for Operator-Trustworthy Defense Decision Support
4.3.1. Challenges of Black-Box AI Models
4.3.2. Role of Explainable AI in Enhancing Operator Trust
4.3.3. Human-AI Interaction in Defense Operations
4.4. Attack Attribution and Accountability in Distributed Defense
4.4.1. Importance of Attack Attribution for Coordinated Response
4.4.2. Methods for Attribution in Power CPS Environments
4.4.3. Accountability and Legal Considerations in Multi-Stakeholder Defense
5. Human-in-the-Loop and Operator-Centered Defense Strategies
5.1. Human-Machine Teaming in Cyber-Physical Defense Operations
5.2. Situational Awareness and Cognitive Load Management
5.3. Operator Training, Decision Support Tools, and Incident Response Readiness
5.4. Integrating Human Factors into Security Engineering and Policy
6. Post-Attack Recovery and Mission Assurance
6.1. Data Reconstruction, System Restoration, and Operational Continuity
6.2. Adaptive Reconfiguration and Mission-Aware Control Strategies
6.3. Integration of Resilience Metrics in Grid Operations and Market Mechanisms
6.4. Lessons from Real-World Incidents and Simulated Benchmarks
7. Future Research and Cross-Sector Collaboration Directions
7.1. Toward Cyber-Physical-Human Co-Resilience Modeling and Validation
7.2. Bridging Policy, Regulation, and Operational Practices
7.3. Building Open Testbeds and Benchmarks for Realistic Evaluation
7.4. Roadmap for Cross-Sector and International Collaboration
8. Conclusions
References
- Bakirtzis, G.; Carter, B.T.; Fleming, C.H.; et al. MISSION AWARE: Evidence-based, mission-centric cybersecurity analysis. arXiv preprint arXiv:1712.01448, 2017.
- Beling, P.A.; Clifford, M.M.; Sherburne, T.; et al. The “Mission Aware” Concept for Design of Cyber-Resilience. Systems engineering for the digital age: Practitioner perspectives. 2023, 507–521. [Google Scholar]
- Qu, Z.; Zhao, T.; Zhang, Y.; et al. Determination Method of Network Risk Propagation Threshold in Power CPS Based on Percolation Theory. Automation of Electric Power Systems, 2020, 44, 16–23. [Google Scholar]
- Haque, M.A.; Shetty, S.; Kamhoua, C.A.; et al. Integrating mission-centric impact assessment to operational resiliency in cyber-physical systems. GLOBECOM 2020-2020 IEEE Global Communications Conference; IEEE, 2020; pp. 1–7. [Google Scholar]
- Wang, L.; Qu, Z.; Li, Y.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal-Topological Correlation. IEEE Access. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Qin, B.; Liu, D. Research Progress and Prospects on Analysis and Control of Power Grid Cyber-Physical Systems. Proceedings of the CSEE, 2020, 40, 5816–5826. [Google Scholar]
- Barrère, M.; Hankin, C.; O’Reilly, D. Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. Computers & security 2023, 132, 103348. [Google Scholar]
- Pecharich, J.L.; Viswanathan, A.; Stathatos, S.; et al. Mission-centric cyber security assessment of critical systems. AIAA SPACE 2016, 2016, 5603. [Google Scholar]
- Barrère, M.; Hankin, C.; O’Reilly, D. Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. Computers & security 2023, 132, 103348. [Google Scholar]
- Sherburne, T.; Clifford, M.M.; Horowitz, B.M.; et al. The Cyber Security Requirements Methodology and Meta-Model for Design of Cyber-Resilience. Systems engineering for the digital age: Practitioner perspectives 2023, 539–554. [Google Scholar]
- Cao, J.; Wang, Q.; Qu, Z.; et al. Method for identifying false data injection attacks in power grid based on improved CNN-LSTM. Electrical Engineering 2025, 1–26. [Google Scholar] [CrossRef]
- Hoenig, A.; Roy, K.; Acquaah, Y.T.; et al. Explainable AI for cyber-physical systems: Issues and challenges. IEEE access 2024, 12, 73113–73140. [Google Scholar] [CrossRef]
- Zhao, J.; An, K.; Wang, X. Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network. Journal of Cyber Security and Mobility 2024, 1331–1356. [Google Scholar] [CrossRef]
- Jiang, Y.; Wu, S.; Ma, R.; et al. Monitoring and defense of industrial cyber-physical systems under typical attacks: From a systems and control perspective. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 192–207. [Google Scholar] [CrossRef]
- Li, Y.; Cao, J.; Xu, Y.; et al. Deep learning based on Transformer architecture for power system short-term voltage stability assessment with class imbalance. Renewable and Sustainable Energy Reviews 2024, 189, 113913. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Quantitative Assessment of Survivability of Power CPS Considering Load Optimization and Reconfiguration. Automation of Electric Power Systems, 2019, 43, 15–24. [Google Scholar]
- Bo, X.; Chen, X.; Li, H.; et al. Modeling Method for the Coupling Relations of Microgrid Cyber-Physical Systems Driven by Hybrid Spatiotemporal Events. IEEE Access 2021, 9, 19619–19631. [Google Scholar] [CrossRef]
- Batewela, S.; Liyanage, M.; Zeydan, E.; et al. Security Orchestration in 5G and Beyond Smart Network Technologies. IEEE Open Journal of the Computer Society 2025. [Google Scholar] [CrossRef]
- Wang, L.; Xu, P.; Qu, Z.; et al. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. Frontiers in Energy Research 2021, 9, 666130. [Google Scholar] [CrossRef]
- Miao, B.; Wang, H.; Liu, Y.J.; et al. Adaptive security control against false data injection attacks in cyber-physical systems. IEEE Journal on Emerging and Selected Topics in Circuits and Systems, 2023, 13, 743–751. [Google Scholar] [CrossRef]
- Qu, Z.; Xie, Q.; Liu, Y.; et al. Power Cyber-Physical System Risk Area Prediction Using Dependent Markov Chain and Improved Grey Wolf Optimization. IEEE Access 2020, 8, 82844–82854. [Google Scholar] [CrossRef]
- Wang, T.; Sun, C.; Gu, X.; et al. Modeling of Power Communication Coupled Networks and Their Vulnerability Analysis. Proceedings of the CSEE, 2018, 38, 3556–3567. [Google Scholar]
- Yang, T.; Liu, Y.; Li, W. Attack and defence methods in cyber-physical power system. IET Energy Systems Integration, 2022, 4, 159–170. [Google Scholar] [CrossRef]
- Yao, P.; Yan, B.; Yang, Q. Game Theoretical Decision-Making of Dynamic Defense in Cyber-Physical Power Systems under Cyber-Attacks. ACM Transactions on Cyber-Physical Systems, 2025, 9, 1–21. [Google Scholar] [CrossRef]
- Bo, X.; Qu, Z.; Liu, Y.; et al. Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective. Energy Reports 2022, 8, 11235–11248. [Google Scholar] [CrossRef]
- Chen, J.; Zhu, Q. A cross-layer design approach to strategic cyber defense and robust switching control of cyber-physical wind energy systems. IEEE Transactions on Automation Science and Engineering, 2022, 20, 624–635. [Google Scholar] [CrossRef]
- Xin, S.; Guo, Q.; Sun, H.; et al. Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems. IEEE Transactions on Smart Grid, 2015, 6, 2375–2385. [Google Scholar] [CrossRef]
- Wang, W.; Di Maio, F.; Zio, E. Adversarial risk analysis to allocate optimal defense resources for protecting cyber–physical systems from cyber attacks. Risk Analysis, 2019, 39, 2766–2785. [Google Scholar] [CrossRef]
- Liu, X.; Wu, Z. Research on Online Defense against Stealthy Data Injection Attacks in Smart Grids. Proceedings of the CSEE, 2020, 40, 2546–2558. [Google Scholar]
- Mitchell, R.; Chen, R. Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Transactions on Reliability, 2015, 65, 350–358. [Google Scholar] [CrossRef]
- Yu, W.; Xue, Y.; Luo, J.; et al. An UHV Grid Security and Stability Defense System: Considering the Risk of Power System Communication. IEEE Transactions on Smart Grid, 2016, 7, 491–500. [Google Scholar] [CrossRef]
- Liu, Y.; Ning, P.; Reiter, M. False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Transactions on Information and System Security (TISSEC), 2011, 14, 1–16. [Google Scholar] [CrossRef]
- Qu, Z.; Zhang, Y.; Qu, N.; et al. Method for Quantitative Estimation of the Risk Propagation Threshold in Electric Power CPS Based on Seepage Probability. IEEE Access 2018, 6, 68813–68823. [Google Scholar] [CrossRef]
- Shukla, S.K. Cyber security of cyber physical systems: Cyber threats and defense of critical infrastructures. 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID); IEEE, 2016; pp. 30–31. [Google Scholar]
- Xu, S.; Xia, Y.; Shen, H.L. Cyber protection for malware attack resistance in cyber-physical power systems. IEEE Systems Journal, 2022, 16, 5337–5345. [Google Scholar] [CrossRef]
- Li, Y.; Li, Z.; Chen, L. Dynamic State Estimation of Generators Under Cyber Attacks. IEEE Access 2019, 7, 125252–125267. [Google Scholar] [CrossRef]
- Ni, M.; Li, M.; Li, J.; et al. Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks. Journal of Modern Power Systems and Clean Energy, 2020, 9, 477–484. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Li, Y.; et al. Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach. Applied Energy 2024, 360, 122736. [Google Scholar] [CrossRef]
- Li, Y.; Wei, X.; Li, Y.; et al. Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach. IEEE Transactions on Smart Grid, 2022, 13, 4862–4872. [Google Scholar] [CrossRef]
- Wang, L.; Qu, Z.; Li, Y.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation. Mathematical Problems in Engineering 2019, 2019, 2817586. [Google Scholar] [CrossRef]
- Qu, Z.; Qu, N.; Zhou, Y.; et al. Extraction of Typical Operating Scenarios of New Power System Based on Deep Time Series Aggregation. CAAI Transactions on Intelligence Technology 2024, 1–17. [Google Scholar] [CrossRef]
- Niu, H.; Jagannathan, S. Optimal defense and control of dynamic systems modeled as cyber-physical systems. The Journal of Defense Modeling and Simulation, 2015, 12, 423–438. [Google Scholar] [CrossRef]
- Chen, L.; Gu, S.; Wang, Y.; et al. Stacked Autoencoder Framework of False Data Injection Attack Detection in Smart Grid. Mathematical Problems in Engineering, 2021, 2021, 2014345. [Google Scholar] [CrossRef]
- Li, Y.; Li, Z.; Chen, L.; et al. A false data injection attack method for generator dynamic state estimation. Transactions of China Electrotechnical Society 2019, 34, 3651–3660. [Google Scholar]
- Wang, Q.; Tai, W.; Tang, Y.; et al. A Review of False Data Injection Attack Research for Power Cyber-Physical Systems. Acta Automatica Sinica, 2019, 45, 72–83. [Google Scholar]
- Wang, J.; Li, Y.; Xu, T. Modeling of False Data Injection Attacks and Rapid Screening of Vulnerable Lines under Attacks. Electric Power Construction, 2022, 43, 104–112. [Google Scholar]
- Karamdel, S.; Liang, X.; Faried, S.O.; et al. Optimization models in cyber-physical power systems: A review. IEEE Access 2022, 10, 130469–130486. [Google Scholar] [CrossRef]
- Zang, T.; Tong, X.; Li, C.; et al. Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks. Energies, 2025, 18, 1479. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Chen, L. Dynamic state estimation of synchronous machines based on robust cubature Kalman filter under complex measurement noise conditions. transactions of china electrotechnical society, 2019, 34, 3651–3660. [Google Scholar]
- Shen, Y.; Zhang, W.; Ni, H.; et al. Guaranteed Cost Control of Networked Control Systems with DoS Attack and Time-varying Delay. International Journal of Control, Automation and Systems, 2019, 17, 811–821. [Google Scholar] [CrossRef]
- Liang, Y.; Wang, Y.; Liu, K.; et al. Fault Simulation of Distribution Grid CPS Considering Network Information Security. Power System Technology, 2020, 45, 235–242.
- Lian, Z.; Shi, P.; Chen, M. A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense and Design. IEEE Internet of Things Journal 2024. [Google Scholar] [CrossRef]
- Yang, T.; Cai, S.; Yan, P.; et al. Saturation defense method of a power cyber-physical system based on active cut set. IEEE Transactions on Smart Grid 2022. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, Y.; Zeng, J.; et al. Modeling and Reliability Assessment of Microgrid Cyber-Physical Systems for Fully Distributed Control. Power System Technology, 2019, 43, 2413–2421. [Google Scholar]
- Zhang, Z.; Huang, S.; Chen, Y.; et al. Cyber-physical coordinated risk mitigation in smart grids based on attack-defense game. IEEE Transactions on Power Systems, 2021, 37, 530–542. [Google Scholar] [CrossRef]
- Shi, J.; Chen, B.; Yu, L. Hidden FDIA Detection Based on Laplacian Eigenmap Learning. Acta Automatica Sinica, 2021, 47, 2494–2500. [Google Scholar]
- Jin, Z.; Liu, Y.; Diao, J.; et al. Covert False Data Injection Attacks on Remote State Estimation in Cyber-Physical Systems. Acta Automatica Sinica, 2025, 51, 1–10. [Google Scholar]
- Shu, H.; Yang, Y.; Zhao, H.; et al. Detection of False Data Injection Attacks in Power Grids Based on Adaptive Weighted Hybrid Prediction. Power System Technology, 2024, 49, 1246–1256. [Google Scholar]
- Liu, X.; Bao, Z.; Lu, D.; et al. Modeling of Local False Data Injection Attacks With Reduced Network Information. IEEE Transactions on Smart Grid, 2015, 6, 1686–1696. [Google Scholar] [CrossRef]
- Liu, S.; Tan, Y.; Zhao, F.; et al. Coupled Modeling Method for Power Information Systems. Journal of Power Systems and Automation, 2021, 33, 89–93. [Google Scholar]
- Ribas Monteiro, L.F.; Rodrigues, Y.R.; Zambroni de Souza, A.C. Cybersecurity in cyber–physical power systems. Energies, 2023, 16, 4556. [Google Scholar] [CrossRef]
- Long, X.; Ding, Y.; et al. Privacy-Preserving Graph Inference Network for Multi-Entity Wind Power Forecast: A Federated Learning Approach. IEEE Transactions on Network Science and Engineering 2025. [Google Scholar] [CrossRef]
- Li, Y.; He, S.; Li, Y.; et al. Federated multiagent deep reinforcement learning approach via physics-informed reward for multimicrogrid energy management. IEEE Transactions on Neural Networks and Learning Systems, 2024, 35, 5902–5914. [Google Scholar] [CrossRef] [PubMed]
- Li, Y.; Wang, R.; Li, Y.; et al. Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach. Applied Energy 2023, 329, 120291. [Google Scholar] [CrossRef]
- Liu, S.; Martínez, S.; Cortés, J. Stabilization of linear cyber-physical systems against attacks via switching defense. IEEE Transactions on Automatic Control, 2023, 68, 7326–7341. [Google Scholar] [CrossRef]
- Qu, Z.; Bo, X.; Yu, T.; et al. Active and Passive Hybrid Detection Method for Power CPS False Data Injection Attacks with Improved AKF and GRU-CNN. IET Renewable Power Generation 2022, 16, 1490–1508. [Google Scholar] [CrossRef]
- Shafae, M.S.; Wells, L.J.; Purdy, G.T. Defending against product-oriented cyber-physical attacks on machining systems. The International Journal of Advanced Manufacturing Technology 2019, 105, 3829–3850. [Google Scholar] [CrossRef]
- Cai, X.; Wang, Q.; Huang, J.; et al. Dual-Layer Cyber-Physical Collaborative Emergency Control Method for Power System Network Attacks. Global Energy Interconnection, 2020, 3, 560–568. [Google Scholar]
- Wang, Y.; Lin, Z.; Liang, X.; et al. On modeling of electrical cyber-physical systems considering cyber security. Frontiers of Information Technology & Electronic Engineering, 2016, 17, 465–478. [Google Scholar]
- Banik, S.; Ramachandran, T.; Bhattacharya, A.; et al. Automated adversary-in-the-loop cyber-physical defense planning. ACM Transactions on Cyber-Physical Systems, 2023, 7, 1–25. [Google Scholar] [CrossRef]
- Jain, H.; Kumar, M.; Joshi, A.M. Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection. Electrical Engineering, 2022, 104, 331–346. [Google Scholar] [CrossRef]
- Zhu, W.; Tang, Y.; Wei, X.; et al. Defense Methods Against Adversarial Attacks on Data-Driven Algorithms in Power CPS. Electric Power, 2024, 57, 32–40. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proceedings of the IEEE, 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Wang, J.; Li, Y.; Xu, T. False Data Detection in Smart Grids Based on Extended Kalman Filtering. Smart Power, 2022, 50, 50–56. [Google Scholar]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM-GAB algorithm. Energy Reports, 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Huang, H.; Wlazlo, P.; Mao, Z.; et al. Cyberattack defense with cyber-physical alert and control logic in industrial controllers. IEEE Transactions on Industry Applications, 2022, 58, 5921–5934. [Google Scholar] [CrossRef]
- Qu, Z.; Shi, H.; Wang, Y.; et al. Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability. Processes, 2022, 10, 1351. [Google Scholar] [CrossRef]
- Wang, Z.; Chen, Y.; Liu, F.; et al. Power System Security Under False Data Injection Attacks With Exploitation and Exploration Based on Reinforcement Learning. IEEE Access 2018, 6, 48785–48796. [Google Scholar] [CrossRef]
- Chen, Y.; Huang, S.; Liu, F.; et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control. IEEE Transactions on Smart Grid, 2019, 10, 2158–2169. [Google Scholar] [CrossRef]
- Liu, Y.; Wang, Y. Evolution Mechanism and Active Defense Exploration of Cross-Domain Cascading Failures in New Power Systems. Electric Power, 2022, 55, 62–72. [Google Scholar]
- Xia, Y.; Wang, Y.; Zhou, L.; et al. Detection Method for False Data Injection Attacks Based on Improved Generative Adversarial Networks. Electric Power Construction, 2022, 43, 58–65. [Google Scholar]
- Sun, J.; et al. Indicator & crowding distance-based evolutionary algorithm for combined heat and power economic emission dispatch. Applied Soft Computing 2020, 90, 106158. [Google Scholar]
- Yang, F.; Wang, J.; Pan, Q.; et al. Resilient Event-Triggered Control for Cyber-Physical Integrated Power Systems Under Network Attacks. Acta Automatica Sinica, 2019, 45, 110–119. [Google Scholar]
- Chen, L.; Li, Y.; Huang, M.; et al. Robust Dynamic State Estimator of Integrated Energy Systems Based on Natural Gas Partial Differential Equations. IEEE Transactions on Industry Applications, 2022, 58, 3303–3312. [Google Scholar] [CrossRef]
- Susuki, Y.; Koo, T.; Ebina, H.; et al. A Hybrid System Approach to the Analysis and Design of Power Grid Dynamic Performance. Proceedings of the IEEE, 2012, 100, 225–239. [Google Scholar] [CrossRef]
- Zhang, Z.; Tian, Y.; Deng, R.; et al. A double-benefit moving target defense against cyber–physical attacks in smart grid. IEEE Internet of Things Journal, 2022, 9, 17912–17925. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z.; Shuai, Z.; et al. Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution. IEEE Transactions on Smart Grid, 2017, 8, 1023–1025. [Google Scholar] [CrossRef]
- Wei, L.; Zhang, Q. Detection of False Data Attacks in Smart Grids Based on Improved UKF. Journal of System Simulation, 2023, 35, 1508. [Google Scholar]
- Fu, J.; Hu, B.; Xie, K.; et al. Power System Generation-Transmission Expansion Stochastic Programming for Coordinated Attacks. Automation of Electric Power Systems, 2021, 45, 21–29. [Google Scholar]
- Sanjab, A.; Saad, W. Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective. IEEE Transactions on Smart Grid, 2016, 7, 2038–2049. [Google Scholar] [CrossRef]
- Zhou, Z.; Zhang, J.; Zhang, X. A review on defense mechanism against the denial of service and false data injection in cyber-physical power systems. 2023 IEEE 6th International Electrical and Energy Conference (CIEEC); IEEE, 2023; pp. 4539–4545. [Google Scholar]
- Chen, K.; Wen, F.; Tseng, C.L.; et al. A game theory-based approach for vulnerability analysis of a cyber-physical power system. Energies, 2019, 12, 3002. [Google Scholar] [CrossRef]
- Li, Y.; Yang, Z. Application of EOS-ELM with Binary Jaya-Based Feature Selection to Real-Time Transient Stability Assessment Using PMU Data. IEEE Access 2017, 5, 23092–23101. [Google Scholar] [CrossRef]
- Zhu, B.; Guo, Y.; Guo, C.; et al. A Review of Security Assessment and Defense for Power Cyber-Physical Systems Under Information Failure Threats. Power System Protection and Control, 2021, 49, 178–187. [Google Scholar]
- Kong, X.; Lu, Z.; Guo, X.; et al. Resilience evaluation of cyber-physical power system considering cyber attacks. IEEE Transactions on Reliability, 2023, 73, 245–256. [Google Scholar] [CrossRef]
- Tian, J.; Wang, B.; Li, T.; et al. TOTAL: Optimal protection strategy against perfect and imperfect false data injection attacks on power grid cyber–physical systems. IEEE Internet of Things Journal, 2020, 8, 1001–1015. [Google Scholar] [CrossRef]
- Luo, X.; He, J.; Wang, X.; et al. Topology Optimization for Resilient Defense Strategies Against False Data Injection Attacks in Smart Grids. Acta Automatica Sinica, 2023, 49, 1326–1338. [Google Scholar]
- Deng, R.; Zhuang, P.; Liang, H. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid. IEEE Transactions on Smart Grid, 2017, 8, 2420–2430. [Google Scholar] [CrossRef]
- Jiang, X.; Zhang, J.; Harding, B.; et al. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units. IEEE Transactions on Power Systems, 2013, 28, 3253–3262. [Google Scholar] [CrossRef]
- Risbud, P.; Gatsis, N.; Taha, A. Vulnerability Analysis of Smart Grids to GPS Spoofing. IEEE Transactions on Smart Grid, 2019, 10, 3535–3548. [Google Scholar] [CrossRef]
- Alabadi, M.; Albayrak, Z. Q-learning for securing cyber-physical systems: a survey. 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA); IEEE, 2020; pp. 1–13. [Google Scholar]
- Huang, D.; Wang, Y.; Hu, A.; et al. False Data Injection Attack Detection Combining Unsupervised and Supervised Learning. Electric Power Engineering Technology, 2024, 43, 134–141. [Google Scholar]
- Yin, H.; Liu, D.; Chen, G.; et al. Collaborative Network Attack Model and Cross-Space Fault Propagation Mechanism for Virtual Power Plants. Automation of Electric Power Systems, 2023, 47, 34–43. [Google Scholar]
- Giraldo, J.A.; El Hariri, M.; Parvania, M. Moving target defense for cyber–physical systems using iot-enabled data replication. IEEE Internet of Things Journal, 2022, 9, 13223–13232. [Google Scholar] [CrossRef]
- Chen, L.; Hui, X.; et al. Dynamic state estimation for integrated natural gas and electric power systems. 2021 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia); IEEE, 2021; pp. 397–402. [Google Scholar]
- Yang, T.; Xu, Z.; Zhao, Y.; et al. A Review of Attacks and Defense Methods for Digitalized New Power Systems. Automation of Electric Power Systems, 2024, 48, 112–126. [Google Scholar]
- Ali, M.; Sun, W. Securing Critical Infrastructures: Restoration from Cyber-Physical Attacks in Active Distribution Grids. 2024 IEEE Power & Energy Society General Meeting (PESGM); IEEE, 2024; pp. 1–5. [Google Scholar]
- Fan, Q.; Liu, D.; Wang, Y.; et al. Key Technologies and Progress in the Morphological Evolution of Power Cyber-Physical Systems. Proceedings of the CSEE, 2023, 44, 8341–8352. [Google Scholar]
- He, Z.; Gao, S.; Wei, X.; et al. Research on Attack-Defense Game Model of False Topology Attacks with Branch and Protection Coordination. Power System Technology, 2022, 46, 4346–4355. [Google Scholar]
- Li, X.; Yi, L.; Liu, C.; et al. Data-Driven Detection of False Data Injection Attacks in Power Systems. Smart Power, 2023, 51, 30–37. [Google Scholar]
- Weng, P.; Chen, B.; Yu, L. Fusion Estimation of False Data Injection Attack Signals. Acta Automatica Sinica, 2021, 47, 2292–2300. [Google Scholar]
- Patel, C.D.; Aggarwal, M.; Chaubey, N.K. Enhancing Cyber-Physical Systems Security Through Advanced Defense Mechanisms. In Advancing Cyber Security Through Quantum Cryptography; IGI Global, 2025; pp. 307–342. [Google Scholar]
- Krishnaveni, S.; Chen, T.M.; Sathiyanarayanan, M.; et al. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Cluster Computing, 2024, 27, 7273–7306. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, S.; Li, Y.; et al. PMU Measurements Based Short-Term Voltage Stability Assessment of Power Systems via Deep Transfer Learning. IEEE Transactions on Instrumentation and Measurement 2023, 72, 2526111. [Google Scholar] [CrossRef]
- Zhou, X.; Feng, J.; et al. Non-intrusive load decomposition based on CNN–LSTM hybrid deep learning model. Energy Reports 2021, 7, 5762–5771. [Google Scholar] [CrossRef]
- Yan, B.; Yao, P.; Wang, J.; et al. Game theoretical dynamic cybersecurity defense strategy for electrical cyber physical systems. 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2); IEEE, 2021; pp. 2392–2397. [Google Scholar]
- Li, Y.; Ma, W.; Li, Y.; et al. Enhancing Cyber-Resilience in Integrated Energy System Scheduling with Demand Response Using Deep Reinforcement Learning. Applied Energy 2025, 379, 124831. [Google Scholar] [CrossRef]
- Fahmeeda, S.; Bhagyashree, B.K. Detection and prevention of false data injection attack in cyber physical power system. 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC); IEEE, 2021; pp. 1–5. [Google Scholar]
- Yang, J. A controllable false data injection attack for a cyber physical system. IEEE Access 2021, 9, 6721–6728. [Google Scholar] [CrossRef]
- Xing, W.; Shen, J. Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey. Sensors, 2024, 24, 3815. [Google Scholar] [CrossRef] [PubMed]
- Yang, J. A controllable false data injection attack for a cyber physical system. IEEE Access 2021, 9, 6721–6728. [Google Scholar] [CrossRef]
- Chen, H.; Li, T.; Fan, X.; et al. Feature selection for imbalanced data based on neighborhood rough sets. Information Sciences 2019, 483, 1–20. [Google Scholar] [CrossRef]
- Wang, S.; Ko, R.K.L.; Bai, G.; et al. Evasion attack and defense on machine learning models in cyber-physical systems: A survey. IEEE communications surveys & tutorials, 2023, 26, 930–966. [Google Scholar]
- Hu, Y.; Zhu, P.; Xun, P.; et al. CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. Computers & Security 2021, 111, 102465. [Google Scholar]
- Xiao, K.; Zhu, C.; Xie, J.; et al. Dynamic defense against stealth malware propagation in cyber-physical systems: a game-theoretical framework. Entropy, 2020, 22, 894. [Google Scholar] [CrossRef]
- Zhao, Z.; Shang, Y.; Qi, B.; et al. Research on defense strategies for power system frequency stability under false data injection attacks. Applied Energy 2024, 371, 123711. [Google Scholar] [CrossRef]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM–GAB algorithm. Energy Reports 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Zhu, H.; Xu, L.; Bao, Z.; et al. Secure control against multiplicative and additive false data injection attacks. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 92–100. [Google Scholar] [CrossRef]
- Zhong, C.; Li, H.; Zhou, Y.; et al. Virtual synchronous generator of PV generation without energy storage for frequency support in autonomous microgrid. International Journal of Electrical Power & Energy Systems 2022, 134, 107343. [Google Scholar]
- Li, Y.; Zhang, M.; Chen, C. A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems. Applied Energy 2022, 308, 118347. [Google Scholar] [CrossRef]
- Costilla-Enriquez, N.; Weng, Y. Attack power system state estimation by implicitly learning the underlying models. IEEE Transactions on Smart Grid, 2022, 14, 649–662. [Google Scholar] [CrossRef]
- Chu, X.; Yi, Y.; Tang, M.; et al. Defensive resource allocation for cyber-physical systems in global energy interconnection. IOP Conference Series: Earth and Environmental Science. IOP Publishing, 2019, 227, 042002. [Google Scholar] [CrossRef]
- Khalid, H.; Peng, J. Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction. IEEE Transactions on Smart Grid, 2017, 8, 697–707. [Google Scholar] [CrossRef]
- Liu, X.; Chang, P.; Sun, Q. Detection of False Data Injection Attacks in Power Grids Based on XGBoost and Unscented Kalman Filter Adaptive Hybrid Prediction. Proceedings of the CSEE, 2021, 41, 5462–5476. [Google Scholar]
- Alsharif, G.O.; Anagnostopoulos, C.; Marnerides, A.K. Energy Market Manipulation via False-Data Injection Attacks. IEEE Access 2025. [Google Scholar] [CrossRef]
- Zhou, B.; Sun, B.; Zang, T.; et al. Security risk assessment approach for distribution network cyber physical systems considering cyber attack vulnerabilities. Entropy, 2022, 25, 47. [Google Scholar] [CrossRef] [PubMed]
- Le, J.; Lang, H.; Tan, T.; et al. A Review of Information Security Issues in Distributed Economic Dispatch of New Distribution Systems. Automation of Electric Power Systems, 2024, 48, 177–191. [Google Scholar]
- Jiang, Z.; Yao, P.; Yan, B.; et al. Cyber-physical system defense decision-making based on priori knowledge of traffic anomaly detection. 2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2); IEEE, 2023; pp. 5196–5201. [Google Scholar]
- Zideh, M.J.; Khalghani, M.R.; Solanki, S.K. An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids. Electric Power Systems Research 2024, 232, 110407. [Google Scholar] [CrossRef]
- Jahromi, A.A.; Kundur, D. Fundamentals of cyber-physical systems. Cyber-physical systems in the built environment; Springer International Publishing: Cham, 2020; pp. 1–13. [Google Scholar]
- Fan, X.; Du, L.; Duan, D. Synchrophasor Data Correction Under GPS Spoofing Attack: A State Estimation-Based Approach. IEEE Transactions on Smart Grid, 2018, 9, 4538–4546. [Google Scholar] [CrossRef]
- Dorbala, S.Y.; Bhadoria, R.S. Analysis for security attacks in cyber-physical systems. Cyber-Physical Systems: A Computational Perspective 2015, 395–414. [Google Scholar]
- Dorbala, S.Y.; Bhadoria, R.S. Analysis for security attacks in cyber-physical systems. Cyber-Physical Systems: A Computational Perspective 2015, 395–414. [Google Scholar]
- Mosaad, N.; Abdel-Rahim, O.; Rahouma, W.; et al. Identification and Alleviation of False Data Injection within the Cyber Layer of an Enhanced Distributed Secondary Control in DC Islanded Microgrids. IEEE Access 2025. [Google Scholar] [CrossRef]
- Lydia, M.; Prem Kumar, G.E.; Selvakumar, A.I. Securing the cyber-physical system: A review. Cyber-Physical Systems, 2023, 9, 193–223. [Google Scholar] [CrossRef]
- Hasan, K.; Shetty, S.; Islam, T.; et al. Predictive cyber defense remediation against advanced persistent threat in cyber-physical systems. 2022 International Conference on Computer Communications and Networks (ICCCN); IEEE, 2022; pp. 1–10. [Google Scholar]
- Kang, B.G.; Seo, K.M.; Kim, T.G. Model-based design of defense cyber-physical systems to analyze mission effectiveness and network performance. IEEE Access 2019, 7, 42063–42080. [Google Scholar] [CrossRef]
- Chen, B.; Li, M. Research on a Data-Driven Framework for Defending Against False Data Injection Attacks in Power Systems. Electric Measurement & Instrumentation, 2024, 61, 10–16. [Google Scholar]
- Li, Y.; Bu, F.; Li, Y.; et al. Optimal scheduling of island integrated energy systems considering multi-uncertainties and hydrothermal simultaneous transmission: A deep reinforcement learning approach. Applied Energy 2023, 333, 120540. [Google Scholar] [CrossRef]
- Farraj, A.; Hammad, E.; Kundur, D. A Distributed Control Paradigm for Smart Grid to Address Attacks on Data Integrity and Availability. IEEE Transactions on Signal and Information Processing over Networks, 2018, 4, 70–81. [Google Scholar] [CrossRef]
- Wan, Y.; Cao, J. A brief survey of recent advances and methodologies for the security control of complex cyber–physical networks. Sensors, 2023, 23, 4013. [Google Scholar] [CrossRef]
- Zheng, Y.; Mudhangulla, S.B.; Anubi, O.M. Moving-horizon false data injection attack design against cyber–physical systems. Control Engineering Practice 2023, 136, 105552. [Google Scholar] [CrossRef]
- Sun, C.; Liu, D.; Li, Q. Study on Dynamic Power Flow in Active Distribution Networks Integrated with Cyber-Physical Systems. Proceedings of the CSEE, 2016, 36, 1509–1516. [Google Scholar]
- Cao, K.; Li, R.; Zhang, X.; et al. Research on Uncertainty for Complex Event Streams in Cyber-Physical Systems. Computer Engineering and Science, 2015, 37, 415–421. [Google Scholar]
- Yin, Z.; Zhang, K.; Du, H.; et al. Event-Driven Modeling of Cyber-Physical Systems. Microelectronics & Computer, 2015, 32, 126–129. [Google Scholar]
- Chamana, M.; Bhatta, R.; Schmitt, K.; et al. An integrated testbed for power system cyber-physical operations training. Applied Sciences, 2023, 13, 9451. [Google Scholar] [CrossRef]
- Sun, S.; Hossain-McKenzie, S.; Al Homoud, L.; et al. An AI-based Approach for Scalable Cyber-Physical Optimal Response in Power Systems. 2024 IEEE Texas Power and Energy Conference (TPEC); IEEE, 2024; pp. 1–6. [Google Scholar]
- Chen, L.; Jin, P.; Yang, J.; et al. Robust Kalman Filter-Based Dynamic State Estimation of Natural Gas Pipeline Networks. Mathematical Problems in Engineering, 2021, 2021, 5590572. [Google Scholar] [CrossRef]
- Chen, J.; Wang, Q.; Tang, Y.; et al. Anomaly Detection Method for Power Cyber-Physical Systems Considering Bilateral Characteristics. Power System Technology, 2022, 46, 2339–2348. [Google Scholar]
- Fu, Y.; Chen, L.; Ma, Z.; et al. Preventive Control of Power Systems Including Data-Driven Stability Constraints. Proceedings of the CSEE, 2022, 42, 5417–5430. [Google Scholar]
- Feng, Y.; Huang, R.; Zhao, W.; et al. A survey on coordinated attacks against cyber–physical power systems: Attack, detection, and defense methods. Electric Power Systems Research 2025, 241, 111286. [Google Scholar] [CrossRef]
- Li, B.; Xiao, Y.; Shi, Y.; et al. Anti-honeypot enabled optimal attack strategy for industrial cyber-physical systems. IEEE Open Journal of the Computer Society 2020, 1, 250–261. [Google Scholar] [CrossRef]
- Li, T.; Zhao, H.; Wang, S.; et al. Attack and Defense Strategy of Distribution Network Cyber-Physical System Considering EV Source-Charge Bidirectionality. Electronics, 2021, 10, 2973. [Google Scholar] [CrossRef]
- Lei, C.; Bu, S.; Wang, Q.; et al. Observability defense-constrained distribution network reconfiguration for cyber-physical security enhancement. IEEE Transactions on Smart Grid, 2023, 15, 2379–2382. [Google Scholar] [CrossRef]
- Fang, S.W.; Portante, A.; Husain, M.I. Moving target defense mechanisms in cyber-physical systems. Securing Cyber-Physical Systems 2015, 63. [Google Scholar]
- Cui, Y.; et al. Deep reinforcement learning based optimal energy management of multi-energy microgrids with uncertainties. CSEE Journal of Power and Energy Systems 2024, 1–12. [Google Scholar] [CrossRef]
- Ao, W.; Song, Y.; Wen, C. Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory & Applications, 2016, 10, 1458–1468. [Google Scholar]
- Yang, X.; et al. Gaussian Mixture Model Uncertainty Modeling for Power Systems Considering Mutual Assistance of Latent Variables. IEEE Transactions on Sustainable Energy 2024, 1–4. [Google Scholar] [CrossRef]
- Wang, Y.; et al. Collaborative optimization of multi-microgrids system with shared energy storage based on multi-agent stochastic game and reinforcement learning. Energy 2023, 280, 128182. [Google Scholar] [CrossRef]
- Ding, X.; Wang, H.; Zhang, X.; et al. Dual nature of cyber–physical power systems and the mitigation strategies. Reliability Engineering & System Safety 2024, 244, 109958. [Google Scholar]
- Mansour, R.F. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Scientific Reports, 2022, 12, 12937. [Google Scholar] [CrossRef]
- Zhang, F.; Huang, Z.; Kou, L.; et al. Data Encryption Based on a 9D Complex Chaotic System with Quaternion for Smart Grid. Chinese Physics B, 2023, 32, 010502. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Mugemanyi, S.; et al. Dynamic Exploitation Gaussian Bare-Bones Bat Algorithm for Optimal Reactive Power Dispatch to Improve the Safety and Stability of Power System. IET Renewable Power Generation 2022, 16, 1401–1424. [Google Scholar] [CrossRef]
- Fang, Z.; Zhao, D.; Chen, C.; et al. Nonintrusive Appliance Identification with Appliance-Specific Networks. IEEE Transactions on Industry Applications, 2020, 56, 3443–3452. [Google Scholar]
- Zhong, X.; xin Li, G.; Zhng, C. False data injection in power smart grid and identification of the most vulnerable bus; a case study 14 IEEE bus network. Energy Reports 2021, 7, 8476–8484. [Google Scholar] [CrossRef]
- BaSin, D.; Cremers, C.; Kim, T.; et al. Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure. IEEE Transactions on Dependable and Secure Computing, 2016, 15, 393–408. [Google Scholar] [CrossRef]
- Yan, K.; Liu, X.; Lu, Y.; et al. A cyber-physical power system risk assessment model against cyberattacks. IEEE Systems Journal, 2022, 17, 2018–2028. [Google Scholar] [CrossRef]
- Kesici, M.; Pal, B.; Yang, G. Detection of false data injection attacks in distribution networks: A vertical federated learning approach. IEEE Transactions on Smart Grid 2024. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Wang, Y. Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach. IEEE Transactions on Industrial Informatics, 2021, 18, 2310–2320. [Google Scholar] [CrossRef]
- Yu, J.; Li, Q.; Li, L. Localization of coordinated cyber-physical attacks in power grids using moving target defense and machine learning. Electronics, 2024, 13, 2256. [Google Scholar] [CrossRef]
- Keçeci, C.; Davis, K.R.; Serpedin, E. Federated learning based distributed localization of false data injection attacks on smart grids. arXiv preprint 2023, arXiv:2306.10420. [Google Scholar]
- Kausar, F.; Deo, S.; Hussain, S.; et al. Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems. Energies, 2024, 17, 5337. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Qi, J.; et al. Robust Cubature Kalman Filter for Dynamic State Estimation of Synchronous Machines Under Unknown Measurement Noise Statistics. IEEE Access 2019, 7, 29139–29148. [Google Scholar] [CrossRef]
- Xu, K.; Niu, Y. Decentralized attack detection for multi-area power systems via interconnection-decoupled sliding mode observer. International Journal of Robust and Nonlinear Control, 2023, 33, 6697–6714. [Google Scholar] [CrossRef]
- Preeti, G.; Sanjeev Kumar, P. A Blockchain Based Decentralized Application System for Vanet FDIA Detection. International Conference on Computing and Communication Networks; Springer Nature Singapore: Singapore, 2023; pp. 95–119. [Google Scholar]
- Bai, M.; Liu, P.; Lv, F.; et al. Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations. 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA); IEEE, 2024; pp. 816–825. [Google Scholar]
- Dong, Z.; Tang, M.; Tian, M. Allocating defense resources for spatial cyber-physical power systems based on deep reinforcement learning. 2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS); IEEE, 2023; pp. 1–6. [Google Scholar]
- Ullrich, J.; Weippl, E.R. CyPhySec: Defending cyber-physical systems. ERCIM News 2015, 102, 18. [Google Scholar]
- Xu, A.; Jiang, Y.; Zhang, Y.; et al. A Double-Layer Cyber Physical Cooperative Emergency Control Strategy Modification Method for Cyber-Attacks Against Power System. 2020 12th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC); IEEE, 2020; pp. 1–5. [Google Scholar]
- Sun, C.; Su, Q.; Li, J. Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems based on Integrated Control Decision. IEEE Transactions on Information Forensics and Security 2024. [Google Scholar] [CrossRef]
- Wang, P.; Zhang, R.; He, X. New Approaches to Detection and Secure Control for Cyber-physical Systems Against False Data Injection Attacks. International Journal of Control, Automation and Systems, 2025, 23, 332–345. [Google Scholar] [CrossRef]
- Kaloudi, N.; Li, J. The ML-based sensor data deception targeting cyber–physical systems: A review. Computer Science Review 2025, 57, 100753. [Google Scholar] [CrossRef]
- Busari, W.A.; Bello, A.A. Security, Trust, and Privacy in Cyber-physical Systems (CPS). 2024 2nd International Conference on Cyber Physical Systems, Power Electronics and Electric Vehicles (ICPEEV); IEEE, 2024; pp. 1–6. [Google Scholar]
- Noor, U.; Shahid, S.; Kanwal, R.; et al. A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks. arXiv preprint 2023, arXiv:2307.10252. [Google Scholar]
- Samad, T. Human-in-the-loop control and cyber–physical–human systems: applications and categorization. Cyber–physical–human systems: fundamentals and applications. 2023, 1–23. [Google Scholar]
- Gil, M.; Albert, M.; Fons, J.; et al. Engineering human-in-the-loop interactions in cyber-physical systems. Information and software technology 2020, 126, 106349. [Google Scholar] [CrossRef]
- Iyenghar, P. Clever Hans in the Loop? A Critical Examination of ChatGPT in a Human-in-the-Loop Framework for Machinery Functional Safety Risk Analysis. Eng, 2025, 6, 31. [Google Scholar]
- Adil, M.; Farouk, A.; Abulkasim, H.; et al. NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence, Open Challenges With Future Research Directions. IEEE Internet of Things Journal 2024. [Google Scholar] [CrossRef]
- Agarwal, M.; Venkateswaran, S.K.; Sivakumar, R. Human-in-the-loop rl with an eeg wearable headset: On effective use of brainwaves to accelerate learning. In Proceedings of the 6th ACM Workshop on Wearable Systems and Applications; 2020; pp. 25–30. [Google Scholar]
- Nguyen, T.T.; Kadavil, R.; Hooshyar, H. A Real-time Cyber-Physical Simulation Testbed for Cybersecurity Assessment of Large-Scale Power Systems. IEEE Transactions on Industry Applications 2024. [Google Scholar] [CrossRef]
- Li, P.; Fu, J.; Xie, K.; et al. A Defense Planning Model for a Power System Against Coordinated Cyber-Physical Attack. Protection and Control of Modern Power Systems, 2024, 9, 84–95. [Google Scholar] [CrossRef]
- Ravikumar, G.; Hyder, B.; Babu, J.R.; et al. Cps testbed architectures for wampac using industrial substation and control center platforms and attack-defense evaluation. 2021 IEEE Power & Energy Society General Meeting (PESGM); IEEE, 2021; pp. 1–5. [Google Scholar]
- Jiang, Y.; Wu, S.; Ma, R.; et al. Monitoring and defense of industrial cyber-physical systems under typical attacks: From a systems and control perspective. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 192–207. [Google Scholar] [CrossRef]
- Fan, Y.; Li, J.; Zhang, D.; et al. Supporting sustainable maintenance of substations under cyber-threats: An evaluation method of cybersecurity risk for power CPS. Sustainability, 2019, 11, 982. [Google Scholar] [CrossRef]
| Threat Dimension | Description | Defense Gap |
|---|---|---|
| Multi-Stage, Multi-Agent Attacks | Coordinated campaigns combining multiple attack vectors and objectives | Lack of holistic, coordinated detection and response mechanisms |
| AI-Enhanced Adversarial Attacks | Adaptive, stealthy attacks exploiting ML detection blind spots | Limited resilience of current ML models to adversarial manipulation |
| Federated Learning Poisoning | Compromising distributed learning frameworks through malicious model updates | Absence of robust aggregation and participant verification techniques |
| Human Factor Exploitation | Social engineering, cognitive overload, and operator misjudgment | Insufficient human-in-the-loop defense mechanisms and cognitive engineering support |
| Cross-Layer Propagation | Exploiting dependencies across ICT, OT, and market operations | Fragmented situational awareness and lack of cross-domain defense coordination |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).