Submitted:
30 May 2025
Posted:
02 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Limitations of Static and Perimeter-Based Cyber Defenses in Power CPS
- Interconnectedness: Power CPS are increasingly connected to external networks, cloud services, and third-party platforms, making perimeter boundaries fluid and porous.
- Insider Threats: Compromised insiders or supply chain attacks can bypass perimeter defenses.
- Advanced Persistent Threats: Attackers often penetrate static defenses and maintain long-term stealthy presence.
- Static Configurations: Fixed system configurations provide attackers with stable targets to study, exploit, and compromise over time.
1.2. Concept and Relevance of Moving Target Defense
- Gather accurate system knowledge.
- Maintain persistent footholds.
- Launch successful, repeatable attacks.
- Physical Layer Variations: Changing grid topology or switching operational modes (e.g., islanded vs. grid-connected).
- Market Mechanism Dynamics: Introducing variability in market rules, pricing algorithms, or bidding processes to thwart economic manipulation.
- Human-Operator Engagement: Involving operators in orchestrating and validating MTD strategies to ensure safety and operational feasibility.
1.3. Contributions and Structure of This Review
- Identification of Static Configuration Vulnerabilities: Analyzing how fixed system parameters in cyber, physical, and market layers create exploitable attack surfaces.
- Systematic Classification of MTD Techniques: Categorizing MTD strategies across multiple domains and evaluating their applicability to Power CPS.
- Design Trade-Off Analysis: Discussing the operational costs, security benefits, and coordination challenges of deploying MTD.
- Human-in-the-Loop and AI-Augmented MTD Orchestration: Proposing frameworks for integrating human oversight and AI-driven decision support in MTD management.
- Validation Platforms and Deployment Considerations: Reviewing simulation tools, resilience metrics, and practical challenges in operationalizing MTD.
- Future Research Agenda: Highlighting open research questions, regulatory considerations, and cross-sector collaboration needs.
2. Threat Surfaces and Defense Challenges in Power CPS
2.1. Static Configuration Vulnerabilities in Cyber, Physical, and Market Layers
2.1.1. Cyber Layer Vulnerabilities
- Fixed IP Addresses and Network Topologies: These provide stable targets for attackers to map and exploit through scanning and reconnaissance.
- Unchanging Authentication Credentials or Keys: Static passwords or cryptographic keys are susceptible to brute-force attacks, credential theft, and reuse attacks.
- Predefined Control Paths and Protocol Configurations: Predictable control command paths and protocol settings make it easier for attackers to craft protocol-specific exploits or man-in-the-middle attacks [31].
2.1.2. Physical Layer Vulnerabilities
- Fixed Grid Topologies: Long-standing transmission and distribution network structures that, once mapped, reveal critical dependencies and single points of failure [36].
- Unchanging Load Profiles or Dispatch Patterns: Repetitive scheduling patterns that adversaries can exploit to time their attacks for maximum disruption [39].
2.1.3. Market Layer Vulnerabilities
- Fixed Market Rules and Pricing Algorithms: These can be reverse-engineered by attackers to manipulate price signals or create artificial congestion.
- Predictable Bidding Patterns: Attackers can mimic or disrupt legitimate market participants by exploiting consistent bidding behaviors [42].
- Unchanging Demand Response Schedules: Static schedules make it easier for adversaries to predict and exploit load control events.
2.2. Cross-Layer Attack Propagation and Systemic Risk Amplification
- Cyber-Physical Attacks: An attacker exploits a cyber vulnerability to inject false data into grid control systems, causing physical instability or equipment damage.
- Cyber-Market Manipulation: Compromised market data streams lead to incorrect pricing, which in turn drives grid imbalances and operational risks [45].
- Physical-Cyber Reconnaissance: Physical monitoring of substations or DER installations provides attackers with insights to craft cyber exploits targeting those assets [46].
- Triggering cascading outages across interconnected grids.
- Exploiting market dynamics to amplify financial impact.
- Overwhelming operators with misleading or conflicting information.
2.3. Gaps in Existing Defense Mechanisms
- Static Defense Posture: Most security measures are configured once and remain unchanged, making them vulnerable to long-term reconnaissance and exploitation [48].
- Siloed Defense Layers: Cyber, physical, and market defenses are often developed and managed in isolation, missing cross-layer attack correlations.
- Reactive Detection Focus: Existing systems prioritize detecting known attack signatures or anomalies after they occur, rather than proactively disrupting attacker reconnaissance and planning [49].
- Operator Overload: Static rule-based systems generate high volumes of alerts, many of which are false positives, overwhelming human operators.
3. Principles of Moving Target Defense for Power CPS
3.1. Conceptual Foundations and Classification of MTD Techniques
3.1.1. Definition and Core Philosophy of Moving Target Defense
3.1.2. Core Objectives and Strategic Benefits of MTD
3.1.3. Systematic Classification and Application Domains of MTD
- Spatial MTD: This category focuses on dynamically adjusting the spatial configurations of the system, including network topologies or physical resource allocations. In the context of Power CPS, spatial MTD strategies might involve dynamically rerouting network traffic, periodically changing grid interconnection patterns, or reconfiguring the operational boundaries of microgrids. Such alterations complicate attackers’ spatial reasoning, hindering targeted exploitation of specific components or locations [66].
- Temporal MTD: Temporal MTD methods periodically vary operational parameters and configurations over time, such as regularly rotating cryptographic keys, authentication credentials, or even control logic modes. By introducing unpredictability into the timing and duration of operational states, temporal MTD substantially narrows attackers’ opportunities to exploit any specific operational mode, reducing the likelihood of sustained system compromise [67,68].
- Behavioral MTD: Behavioral approaches aim to introduce controlled randomness or unpredictability into system responses and actions, such as varying control signal outputs, operational setpoints, or market transaction parameters. Behavioral variability disrupts attackers’ attempts to accurately predict system responses, undermining their ability to design effective manipulation or deception-based attacks [69].
- Information MTD: This approach focuses on altering the visibility, accuracy, or representation of system data accessible to potential adversaries. Information MTD could involve deceptive data streams, dynamic obfuscation of monitoring outputs, or the strategic dissemination of misleading information during reconnaissance phases [70]. These techniques significantly impede attackers’ ability to confidently assess system status and vulnerabilities, compelling them to expend substantial resources distinguishing genuine system states from deceptive signals [71,72].
3.1.4. Trade-Offs and Considerations in MTD Implementation
3.2. Multi-Domain MTD: Cyber, Physical, Market, and Human Layer Dynamics
3.2.1. Cyber Layer MTD
3.2.2. Physical Layer MTD
3.2.3. Market Layer MTD
3.2.4. Human Layer MTD
3.3. Design Trade-Offs: Security Gains vs. Operational Overhead
3.3.1. Security Benefits of Implementing MTD
3.3.2. Operational Challenges Associated with MTD
3.3.3. Strategically Balancing Defense Effectiveness and Operational Integrity
4. MTD Strategies for Cyber Layer Protection
4.1. Dynamic Network Reconfiguration and IP Randomization
4.1.1. Conceptual Rationale and Importance
4.1.2. Technical Implementation and Methodologies
- IP Hopping: Periodically assigning new IP addresses to networked devices at randomized intervals, preventing attackers from reliably tracking device locations over time and disrupting persistent targeted attacks [147].
- Network Address Translation (NAT) Randomization: Continuously modifying external-to-internal IP mappings while ensuring internal network consistency. This approach complicates attacker attempts at accurately identifying and targeting critical assets through external scanning [148].
- Topology Obfuscation: Altering logical network architectures, such as shifting among mesh, ring, star, or hybrid topologies. Regularly changing network structures prevents attackers from forming durable models of the system's communication pathways and dependencies, significantly complicating network-based attacks [149,150].
4.1.3. Operational Considerations and Practical Challenges
4.2. Rotating Authentication and Key Management Protocols
4.2.1. Conceptual Rationale and Security Justification
4.2.2. Advanced Technical Implementation Strategies
- Time-Based Key Rotation: Implementing scheduled and predictable rotations of cryptographic keys to ensure that any compromised credentials swiftly become obsolete, minimizing exploitation windows [164].
- Event-Driven Key Changes: Triggering immediate and proactive key updates in response to identified anomalies, potential security breaches, or significant policy modifications, thereby containing emergent threats swiftly [165].
4.2.3. Operational Considerations and Management Challenges
4.3. Control Path Diversity and Switching Strategies
4.3.1. Conceptual Rationale and Necessity
4.3.2. Innovative Techniques and Implementation Approaches
- Multi-Channel Control Communication: Employing parallel and redundant communication channels (e.g., fiber optics, LTE, satellite) for the transmission of critical control signals, ensuring resilience against single-channel failures or targeted disruptions [173].
- Random Path Selection: Dynamically and probabilistically selecting communication routes based on real-time network conditions, threat intelligence, or randomized policies, thereby continuously invalidating attackers' surveillance and path interception efforts [174].
- Protocol Switching: Alternating among secure communication protocol variants (such as IEC 60870-5-104 and DNP3 Secure Authentication) to prevent attackers from reliably exploiting known protocol-specific vulnerabilities, forcing adversaries to continuously adapt their attack methodologies [175].
4.3.3. Operational Considerations and Deployment Challenges
4.4. Adaptive Service Virtualization and Obfuscation
4.4.1. Conceptual Rationale and Security Advantages
4.4.2. Implementation Strategies and Tactical Techniques
- Moving Target Honeypots: Deploying dynamically configurable decoy systems designed to imitate real assets and attract attackers' attention, effectively diverting adversarial efforts away from genuine critical infrastructure [182].
- Service Masking: Regularly altering identifiable characteristics of network services—such as banners, port assignments, and signature identifiers—to prevent accurate fingerprinting and complicate attackers' attempts to associate services with known vulnerabilities.
- Protocol Behavior Variability: Introducing subtle and controlled randomness into protocol-level interactions and responses to thwart automated exploitation scripts and confuse attackers attempting protocol-specific reconnaissance or exploitation [183].
4.4.3. Operational Risks and Strategic Management Considerations
5. MTD Strategies for Physical and Market Layer Protection
5.1. Reconfigurable Grid Topologies and Virtual Islanding
5.1.1. Conceptual Rationale and Strategic Significance
5.1.2. Advanced Techniques and Implementation Approaches
- Dynamic Tie-Line Management: This involves real-time activation or deactivation of interconnection lines based on ongoing threat assessments or system operational conditions. By strategically controlling these connections, operators can dynamically alter the grid's electrical connectivity, preventing attackers from reliably predicting network states and significantly mitigating cascading failure propagation [196].
- Virtual Islanding of Microgrids: Temporarily transitioning microgrids between connected and autonomous islanded states allows localized management of disturbances. By enabling autonomous operation, islanded segments maintain critical functions independently, reducing the potential for widespread disruption and aiding in rapid post-event recovery [197].
- Reconfigurable Protection Schemes: Adaptively adjusting protective relay settings and system control policies to match dynamically changing grid topologies. This technique ensures consistent, reliable, and context-sensitive protection across varying operational configurations, safeguarding against erroneous relay actions or protection failures resulting from rapid topological changes [198].
5.1.3. Operational Considerations and Practical Challenges
5.2. Dynamic Market Mechanism Variations to Thwart Economic Attacks
5.2.1. Conceptual Rationale and Economic Security Implications
5.2.2. Technical Approaches and Implementation Techniques
- Variable Market Clearing Intervals: Strategically varying the timing and frequency of market clearing processes disrupts attackers' synchronization, complicating the precise timing required for manipulative bidding or price influencing schemes, and thereby preserving market integrity.
- Rotating Pricing Algorithms: Regularly alternating between distinct locational marginal pricing (LMP) methodologies or congestion management strategies prevents adversaries from effectively reverse-engineering and exploiting predictable pricing structures. Such rotations significantly impair attackers' strategic planning capabilities and reduce economic attack feasibility [205].
- Randomized Demand Response Signals: Introducing controlled randomization into the timing, duration, and magnitude of demand response (DR) events significantly hinders attackers attempting to exploit predictable load-shifting patterns. This unpredictability safeguards the reliability of demand response mechanisms, ensuring their effectiveness in maintaining grid stability.
5.2.3. Operational Considerations and Stakeholder Implications
5.3. Adaptive Resource Dispatch and Control Mode Switching
5.3.1. Conceptual Rationale and Operational Necessity
5.3.2. Advanced Implementation Techniques
- Dynamic DER Mode Switching: Alternating DER operational modes—such as voltage regulation, frequency support, and power factor correction—in response to real-time grid conditions and threat intelligence. This variability significantly complicates adversarial targeting, while simultaneously optimizing grid performance under fluctuating conditions.
- Adaptive Dispatch Scheduling: Introducing controlled yet systematic variability into power generation dispatch orders and ramping sequences to prevent attackers from exploiting fixed or repetitive scheduling patterns. This approach enhances operational security without significantly compromising dispatch efficiency.
- Real-Time Re-Optimization: Continuously updating Optimal Power Flow (OPF) solutions based on real-time situational assessments, threat intelligence, and changing operational objectives. This approach maintains optimized and secure grid operation in dynamically evolving threat landscapes, ensuring robustness against targeted disruptions.
5.3.3. Operational Challenges and Practical Implementation Issues
6. Human-in-the-Loop and AI-Augmented MTD Coordination
6.1. Operator-Centered MTD Orchestration Platforms
6.1.1. Significance of Human Oversight
6.1.2. Key Functional Capabilities of Operator-Centric Platforms
-
Situational Awareness Dashboards:Advanced visualization platforms present operators with real-time, intuitive displays of current system conditions, active MTD strategies, operational risks, and evolving threat landscapes. These dashboards significantly enhance operators' capability to rapidly comprehend complex dynamics, enabling swift and informed decision-making.
-
MTD Playbook Management:Interactive tools allow operators to select, tailor, and deploy pre-validated dynamic defense strategies quickly and effectively. These playbooks support structured yet adaptable defense execution, empowering operators to respond proactively while ensuring consistency and reliability in operational processes.
-
Risk-Benefit Analysis Tools:Decision-support modules systematically evaluate the operational implications and defensive effectiveness of potential MTD actions, providing transparent, data-driven recommendations. These tools enable operators to explicitly weigh operational risks against anticipated security benefits, thereby facilitating informed and strategic decision-making.
-
Collaboration and Communication Platforms:Integrated platforms foster seamless coordination and effective communication among diverse teams spanning cyber-security, operational control, and market management domains. These collaborative tools enhance shared situational understanding, streamlining the coordinated implementation of complex, multi-layered MTD actions.
6.2. AI-Driven Attack Surface Monitoring and Adaptive Strategy Selection
6.2.1. Real-Time Attack Surface Monitoring
6.2.2. Adaptive Selection of MTD Strategies
6.2.3. Human-in-the-Loop Validation for Strategic Decision-Making
6.3. Explainable MTD Recommendations for Operator Trust and Validation
6.3.1. Necessity of Explainable AI (XAI) in Critical Environments
6.3.2. Innovative Techniques for Providing Explainability
- Feature Attribution Analysis: Clearly identifying and visualizing specific system parameters, configurations, or threat indicators that significantly influenced the AI’s recommendation. Operators thus clearly understand the decision-making factors and can quickly assess recommendation validity.
- Counterfactual Scenario Analysis: Demonstrating hypothetical alternative outcomes if different defense actions had been selected or avoided. This analysis provides operators with comparative insights, enabling them to clearly grasp the necessity and potential consequences of chosen strategies.
- Visual Impact Simulations: Graphically illustrating projected system states before and after implementing recommended MTD actions. Visual simulations facilitate intuitive understanding of potential operational impacts and enable effective risk assessment by operators.
- Interactive What-If Tools: Allowing operators to dynamically explore alternative MTD actions and their implications in a controlled, virtual environment. Such interactive exploration empowers operators to systematically evaluate and confidently validate recommended actions, significantly enhancing operational trust and decision-making effectiveness [220].
6.4. Feedback Loops for Continuous MTD Refinement
6.4.1. Integration of Operator Feedback
6.4.2. Adaptive AI Learning from Feedback
7. Validation Platforms, Metrics, and Real-World Deployment Challenges
7.1. Digital Twin and Co-Simulation-Based MTD Validation
7.1.1. Strategic Role of Digital Twins in MTD Evaluation
7.1.2. Multi-Domain Co-Simulation Frameworks
7.1.3. Representative Validation Scenarios
- Topology Reconfiguration Stress Tests: Evaluating the stability implications and grid performance under frequent and dynamic switching of grid topology and virtual islanding configurations, highlighting critical thresholds for operational reliability and safety.
- Market Manipulation Defense Simulations: Testing robustness of randomized market mechanisms against sophisticated economic attacks and manipulative behaviors, providing insights into trade-offs between economic efficiency and defensive variability.
- Human-AI Collaboration Exercises: Examining operator acceptance, decision effectiveness, and operational efficiency in scenarios involving explainable AI recommendations, ensuring seamless integration of human judgment and AI-driven defense strategies.
7.1.4. Challenges to Realism in Simulation
7.2. Resilience and Effectiveness Metrics for MTD Strategies
- Security Effectiveness: Evaluating attacker time-to-compromise, required attacker resources, and degree of disruption to adversarial planning and operational effectiveness, providing a nuanced measure of defensive success.
- Operational Impact: Quantifying service continuity and stability under dynamic defense conditions, including performance degradation indices, latency impacts, and overall operational resilience during defense activations.
- Adaptability and Flexibility: Tracking the frequency and effectiveness of successful defense adaptations to evolving threats, as well as measuring system learning rates and responsiveness to new operational contexts.
- Human Factors: Gauging operator acceptance, decision confidence levels, cognitive workload, and usability metrics, ensuring that dynamic defense implementations remain practically manageable and operationally accepted.
7.3. Scalability, Performance, and Usability Considerations for Deployment
7.3.1. Addressing Scalability Challenges
7.3.2. Ensuring Real-Time Performance
7.3.3. Prioritizing Usability and Human Factors
7.4. Regulatory and Standardization Barriers
7.4.1. Alignment with Industry Standards
7.4.2. Certification and Validation Pathways
7.4.3. Recommendations for Policy Evolution and Industry Collaboration
8. Future Research Directions and Cross-Sector Collaboration
8.1. Theoretical and Practical Gaps in Multi-Domain MTD
8.1. Need for Unified Multi-Domain MTD Frameworks
- Capturing and modeling interconnected dependencies among infrastructure layers.
- Balancing the often conflicting objectives of cybersecurity, grid reliability, and economic efficiency.
- Incorporating human-in-the-loop coordination to ensure the practical feasibility and operator acceptance of dynamic strategies.
8.2. Formal Modeling of MTD Effectiveness and Trade-Offs
- Characterize the evolution of attack surfaces as a function of deployed MTD techniques.
- Quantify security-performance trade-offs, evaluating how changes in configuration improve security while affecting system latency, cost, or service quality.
- Simulate adversarial adaptation dynamics, enabling defenders to anticipate how intelligent attackers may respond and evolve in the presence of moving targets.
8.3. Standardization and Benchmarking of Resilience Metrics
- Core MTD effectiveness metrics, such as attacker resource cost, disruption potential, and exploit longevity.
- Benchmarking frameworks that enable comparative evaluations of different MTD architectures under standardized test scenarios.
- Performance baselines for various grid configurations and threat models to support reproducibility and cross-institutional comparison.
8.2. Integration with Regulatory and Market Frameworks
8.2.1. Challenges to Regulatory Acceptance
8.2.2. Policy Recommendations for Enabling MTD Adoption
- Collaborative Policy Development: Early engagement with regulators, utilities, and researchers is essential to co-develop MTD-specific guidelines that clarify acceptable practices, define boundaries, and integrate dynamic security into regulatory frameworks.
- Operational Demonstrations and Pilots: Field trials and sandbox demonstrations provide empirical evidence of MTD’s operational benefits and feasibility. These pilots can serve as reference models to inform policy and encourage incremental regulatory inclusion.
- Regulatory Sandbox Environments: Regulatory sandboxes allow utilities to test and refine MTD strategies in controlled, consequence-free settings, enabling iterative learning and reducing the risk of penalties while innovation occurs.
8.3. Roadmap for Cross-Sector Implementation and Standardization
8.3.1. Multi-Stakeholder Collaboration Models
- Industry-Academic Consortia: Joint research centers that focus on applied MTD development, supported by utility testbeds and academic expertise.
- Public-Private Partnerships: Government-backed initiatives that fund operational MTD pilots and foster cross-sector knowledge transfer.
- Standards Development Organizations: Bodies such as IEEE, IEC, and NERC must be actively engaged to formalize MTD best practices, develop interoperable protocols, and define certification criteria.
8.3.2. Knowledge-Sharing Platforms and Open Innovation
- Threat Intelligence Sharing: Establishing secure, cross-sector platforms for disseminating information about emerging attack patterns, MTD case studies, and deployment lessons learned.
- Open-Source MTD Toolkits: Supporting community-driven development of reusable MTD components—such as simulation frameworks, playbooks, and orchestration engines—to lower adoption barriers and accelerate innovation.
8.3.3. International Cooperation and Grid Resilience Alignment
- Alignment of Global Standards: Harmonizing MTD definitions, metrics, and compliance requirements across jurisdictions to support multinational grid operations.
- Cross-Border Resilience Programs: Joint development of transnational defense strategies for interconnected grids vulnerable to spillover effects from cross-border cyber or physical attacks.
8.4. Emerging Research Opportunities
8.4.1. AI-Driven MTD Strategy Optimization
8.4.2. Behavioral MTD and Human Deception Engineering
8.4.3. Federated MTD for Distributed Grids
8.4.4. Digital Twin-Enhanced Operator Training and Simulation
9. Conclusion
References
- Han, K.; Zhang, K.; Wang, Z.P.; et al. Resilient predictive load frequency control of multi-area interconnected power systems with privacy preserving and active detection against stealthy cyber attacks. IEEE Internet of Things Journal 2024. [Google Scholar]
- Lakshminarayana, S.; Chen, Y.; Konstantinou, C.; et al. Survey of moving target defense in power grids: Design principles, tradeoffs, and future directions. arXiv 2024, arXiv:2409.18317. [Google Scholar]
- Qu, Z.; Zhao, T.; Zhang, Y.; et al. Determination Method of Network Risk Propagation Threshold in Power CPS Based on Percolation Theory. Automation of Electric Power Systems 2020, 44, 16–23. [Google Scholar]
- Hamada, A.; Hassan, S.M.; Samy, S.; et al. A Review: State-of-the-Art of Integrating AI Models with Moving-target Defense for Enhancing IoT Networks Security. In Proceedings of the 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON); IEEE, 2024; pp. 108–114. [Google Scholar]
- Li, Y.; Yang, Z.; et al. Optimal scheduling of an isolated microgrid with battery storage considering load and renewable generation uncertainties. IEEE Transactions on Industrial Electronics 2018, 66, 1565–1575. [Google Scholar] [CrossRef]
- Qin, B.; Liu, D. Research Progress and Prospects on Analysis and Control of Power Grid Cyber-Physical Systems. Proceedings of the CSEE 2020, 40, 5816–5826. [Google Scholar]
- Bo, X.; Chen, X.; Li, H.; et al. Modeling Method for the Coupling Relations of Microgrid Cyber-Physical Systems Driven by Hybrid Spatiotemporal Events. IEEE Access 2021, 9, 19619–19631. [Google Scholar] [CrossRef]
- Suprabhath Koduru, S.; Machina, V.S.P.; Madichetty, S. Cyber attacks in cyber-physical microgrid systems: A comprehensive review. Energies 2023, 16, 4573. [Google Scholar] [CrossRef]
- Li, Y.; He, S.; Li, Y.; et al. Federated multiagent deep reinforcement learning approach via physics-informed reward for multimicrogrid energy management. IEEE Transactions on Neural Networks and Learning Systems 2024, 35, 5902–5914. [Google Scholar] [CrossRef]
- Abdelkader, S.; Amissah, J.; Abdel-Rahim, O. Virtual power plants: an in-depth analysis of their advancements and importance as crucial players in modern power systems. Energy, Sustainability and Society 2024, 14, 52. [Google Scholar] [CrossRef]
- Cao, J.; Wang, Q.; Qu, Z.; et al. Method for identifying false data injection attacks in power grid based on improved CNN-LSTM. Electrical Engineering 2025, 1–26. [Google Scholar] [CrossRef]
- Hoenig, A.; Roy, K.; Acquaah, Y.T.; et al. Explainable AI for cyber-physical systems: Issues and challenges. IEEE access 2024, 12, 73113–73140. [Google Scholar] [CrossRef]
- Zhao, J.; An, K.; Wang, X. Research on Fast Early Warning of False Data Injection Attack in CPS of Electric Power Communication Network. Journal of Cyber Security and Mobility 2024, 1331–1356. [Google Scholar] [CrossRef]
- Jiang, Y.; Wu, S.; Ma, R.; et al. Monitoring and defense of industrial cyber-physical systems under typical attacks: From a systems and control perspective. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 192–207. [Google Scholar] [CrossRef]
- Li, Y.; Li, Z.; Chen, L.; et al. A false data injection attack method for generator dynamic state estimation. Transactions of China Electrotechnical Society 2019, 34, 3651–3660. [Google Scholar]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Quantitative Assessment of Survivability of Power CPS Considering Load Optimization and Reconfiguration. Automation of Electric Power Systems 2019, 43, 15–24. [Google Scholar]
- Zhang, D.; Li, X.; Zhou, L.; et al. The Control Strategy for Power CPS Microgrid under Network Attack. In Proceedings of the 2022 4th Asia Energy and Electrical Engineering Symposium (AEEES). IEEE; 2022; pp. 161–165. [Google Scholar]
- Soussi, W.; Christopoulou, M.; Xilouris, G.; et al. Moving target defense as a proactive defense element for beyond 5G. IEEE Communications Standards Magazine 2021, 5, 72–79. [Google Scholar] [CrossRef]
- Wang, L.; Xu, P.; Qu, Z.; et al. Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. Frontiers in Energy Research 2021, 9, 666130. [Google Scholar] [CrossRef]
- Li, T.; Pan, Y.; Zhu, Q. Decision-dominant strategic defense against lateral movement for 5g zero-trust multi-domain networks. In Network Security Empowered by Artificial Intelligence; Springer Nature: Cham, Switzerland, 2024; pp. 25–76. [Google Scholar]
- Qu, Z.; Xie, Q.; Liu, Y.; et al. Power Cyber-Physical System Risk Area Prediction Using Dependent Markov Chain and Improved Grey Wolf Optimization. IEEE Access 2020, 8, 82844–82854. [Google Scholar] [CrossRef]
- Wang, T.; Sun, C.; Gu, X.; et al. Modeling of Power Communication Coupled Networks and Their Vulnerability Analysis. Proceedings of the CSEE 2018, 38, 3556–3567. [Google Scholar]
- Seo, S.; Moon, H.; Lee, S.; et al. D3GF: A study on optimal defense performance evaluation of drone-type moving target defense through game theory. IEEE Access 2023, 11, 59575–59598. [Google Scholar] [CrossRef]
- Yao, P.; Yan, B.; Yang, Q. Game Theoretical Decision-Making of Dynamic Defense in Cyber-Physical Power Systems under Cyber-Attacks. ACM Transactions on Cyber-Physical Systems 2025, 9, 1–21. [Google Scholar] [CrossRef]
- Bo, X.; Qu, Z.; Liu, Y.; et al. Review of active defense methods against power cps false data injection attacks from the multiple spatiotemporal perspective. Energy Reports 2022, 8, 11235–11248. [Google Scholar] [CrossRef]
- Chen, J.; Zhu, Q. A cross-layer design approach to strategic cyber defense and robust switching control of cyber-physical wind energy systems. IEEE Transactions on Automation Science and Engineering 2022, 20, 624–635. [Google Scholar] [CrossRef]
- Soussi, W.; Christopoulou, M.; Gür, G.; et al. MERLINS–moving target defense enhanced with Deep-RL for NFV in-depth security. In Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE; 2023; pp. 65–71. [Google Scholar]
- Wang, W.; Di Maio, F.; Zio, E. Adversarial risk analysis to allocate optimal defense resources for protecting cyber–physical systems from cyber attacks. Risk Analysis 2019, 39, 2766–2785. [Google Scholar] [CrossRef]
- Barboni, A.; Rezaee, H.; Boem, F. Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach. IEEE Transactions on Automatic Control 2020, 65, 3728–3741. [Google Scholar] [CrossRef]
- Mitchell, R.; Chen, R. Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Transactions on Reliability 2015, 65, 350–358. [Google Scholar] [CrossRef]
- Wang, L.; Qu, Z.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal-Topological Correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, S.; Li, Y.; et al. PMU Measurements-Based Short-Term Voltage Stability Assessment of Power Systems via Deep Transfer Learning. IEEE Transactions on Instrumentation and Measurement 2023, 72, 2526111. [Google Scholar] [CrossRef]
- Qu, Z.; Zhang, Y.; Qu, N.; et al. Method for Quantitative Estimation of the Risk Propagation Threshold in Electric Power CPS Based on Seepage Probability. IEEE Access 2018, 6, 68813–68823. [Google Scholar] [CrossRef]
- Zhang, Y.; Ma, D.; Sun, X.; et al. Research on Moving Target Defense Technology Based on Cyberspace Deception. Journal of Information Security 2025, 10, 180–195. [Google Scholar]
- Li, Y.; Yang, Z. Application of EOS-ELM with Binary Jaya-Based Feature Selection to Real-Time Transient Stability Assessment Using PMU Data. IEEE Access 2017, 5, 23092–23101. [Google Scholar] [CrossRef]
- Hu, Y.; Zhu, P.; Xun, P.; et al. CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. Computers & Security 2021, 111, 102465. [Google Scholar]
- Li, Y.; Feng, B.; Li, G.; et al. Optimal distributed generation planning in active distribution networks considering integration of energy storage. Applied Energy 2018, 210, 1073–1081. [Google Scholar] [CrossRef]
- Ni, M.; Li, M.; Li, J.; et al. Concept and research framework for coordinated situation awareness and active defense of cyber-physical power systems against cyber-attacks. Journal of Modern Power Systems and Clean Energy 2020, 9, 477–484. [Google Scholar] [CrossRef]
- Wang, Y.; et al. Collaborative optimization of multi-microgrids system with shared energy storage based on multi-agent stochastic game and reinforcement learning. Energy 2023, 280, 128182. [Google Scholar] [CrossRef]
- Wang, L.; Qu, Z.; Li, Y.; et al. Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation. IEEE Access 2020, 8, 57260–57272. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Qu, N.; et al. Survivability Evaluation Method for Cascading Failure of Electric Cyber Physical System Considering Load Optimal Allocation. Mathematical Problems in Engineering 2019, 2019, 2817586. [Google Scholar] [CrossRef]
- Qu, Z.; Qu, N.; Zhou, Y.; et al. Extraction of Typical Operating Scenarios of New Power System Based on Deep Time Series Aggregation. CAAI Transactions on Intelligence Technology 2024, 1–17. [Google Scholar] [CrossRef]
- Niu, H.; Jagannathan, S. Optimal defense and control of dynamic systems modeled as cyber-physical systems. The Journal of Defense Modeling and Simulation 2015, 12, 423–438. [Google Scholar] [CrossRef]
- Chen, L.; Gu, S.; Wang, Y.; et al. Stacked Autoencoder Framework of False Data Injection Attack Detection in Smart Grid. Mathematical Problems in Engineering 2021, 2021, 2014345. [Google Scholar] [CrossRef]
- Li, Y.; Cao, J.; Xu, Y.; et al. Deep learning based on Transformer architecture for power system short-term voltage stability assessment with class imbalance. Renewable and Sustainable Energy Reviews 2024, 189, 113913. [Google Scholar] [CrossRef]
- Wang, Q.; Tai, W.; Tang, Y.; et al. A Review of False Data Injection Attack Research for Power Cyber-Physical Systems. Acta Automatica Sinica 2019, 45, 72–83. [Google Scholar]
- Wang, J.; Li, Y.; Xu, T. Modeling of False Data Injection Attacks and Rapid Screening of Vulnerable Lines under Attacks. Electric Power Construction 2022, 43, 104–112. [Google Scholar]
- Karamdel, S.; Liang, X.; Faried, S.O.; et al. Optimization models in cyber-physical power systems: A review. IEEE Access 2022, 10, 130469–130486. [Google Scholar] [CrossRef]
- Zang, T.; Tong, X.; Li, C.; et al. Research and Prospect of Defense for Integrated Energy Cyber–Physical Systems Against Deliberate Attacks. Energies 2025, 18, 1479. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Chen, L. Dynamic state estimation of synchronous machines based on robust cubature Kalman filter under complex measurement noise conditions. Transactions of china electrotechnical society 2019, 34, 3651–3660. [Google Scholar]
- Liu, C.; Li, Y.; Yang, M.; et al. A Review of Moving Target Defense for False Data Injection Attacks in Power Systems. Automation Instrumentation 2024, 45, 1–7. [Google Scholar]
- Lydia, M.; Prem Kumar, G.E.; Selvakumar, A.I. Securing the cyber-physical system: A review. Cyber-Physical Systems 2023, 9, 193–223. [Google Scholar] [CrossRef]
- Chen, L.; Jin, P.; Yang, J.; et al. Robust Kalman Filter-Based Dynamic State Estimation of Natural Gas Pipeline Networks. Mathematical Problems in Engineering 2021, 2021, 5590572. [Google Scholar] [CrossRef]
- Li, Q.; Wu, J. Optimizing the Effectiveness of Moving Target Defense in a Probabilistic Attack Graph: A Deep Reinforcement Learning Approach. Electronics 2024, 13, 3855–3855. [Google Scholar] [CrossRef]
- Fu, X.; Qiao, Z.; Xu, Z. Attack–defense strategy of UAV swarm based on DEP-SIQ in the active target defense scenario. Soft Computing 2024, 28, 10463–10473. [Google Scholar] [CrossRef]
- Chamana, M.; Bhatta, R.; Schmitt, K.; et al. An integrated testbed for power system cyber-physical operations training. Applied Sciences 2023, 13, 9451. [Google Scholar] [CrossRef]
- Jue, T.; Rui, T.; Xiaohong, G.; et al. Moving Target Defense Approach to Detecting Stuxnet-Like Attacks. IEEE Transactions on Smart Grid 2020, 11, 291–300. [Google Scholar]
- Dorbala, S.Y.; Bhadoria, R.S. Analysis for security attacks in cyber-physical systems. Cyber-Physical Systems: A Computational Perspective 2015, 395–414. [Google Scholar]
- Hu, Y.; Zhang, G.; Wang, X.; Xing, C.; Xu, B.; Ding, K.; Shi, W.; Ding, W. Controlled measurement set randomization–based moving target defense against coordinated cyber–physical attack in smart grids. Electric Power Systems Research 2023, 224, 109749. [Google Scholar] [CrossRef]
- Li, Y.; Wei, X.; Li, Y.; et al. Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach. IEEE Transactions on Smart Grid 2022, 13, 4862–4872. [Google Scholar] [CrossRef]
- Dantas Silva, F.S.; Neto, E.P.; Nunes, R.S.S.; et al. Securing Software-Defined Networks Through Adaptive Moving Target Defense Capabilities. Journal of Network and Systems Management 2023, 31, 61. [Google Scholar] [CrossRef]
- Tan, J.; Jin, H.; Hu, H.; et al. WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process. IEEE Transactions on Dependable and Secure Computing 2023, 20, 4719–4732. [Google Scholar] [CrossRef]
- Li, Y.; Bu, F.; Li, Y.; et al. Optimal scheduling of island integrated energy systems considering multi-uncertainties and hydrothermal simultaneous transmission: A deep reinforcement learning approach. Applied Energy 2023, 333, 120540. [Google Scholar] [CrossRef]
- Sun, S.; Hossain-McKenzie, S.; Al Homoud, L.; et al. An AI-based Approach for Scalable Cyber-Physical Optimal Response in Power Systems. In Proceedings of the 2024 IEEE Texas Power and Energy Conference (TPEC). IEEE; 2024; pp. 1–6. [Google Scholar]
- Fan, X.; Du, L.; Duan, D. Synchrophasor Data Correction Under GPS Spoofing Attack: A State Estimation-Based Approach. IEEE Transactions on Smart Grid 2018, 9, 4538–4546. [Google Scholar] [CrossRef]
- Wan, Y.; Cao, J. A brief survey of recent advances and methodologies for the security control of complex cyber–physical networks. Sensors 2023, 23, 4013. [Google Scholar] [CrossRef] [PubMed]
- Babadi, N.; Doustmohammadi, A. A moving target defence approach for detecting deception attacks on cyber-physical systems. Computers and Electrical Engineering 2022, 100, 107931. [Google Scholar] [CrossRef]
- Subhash, L.; Veronica, E.B.; Vincent, H.P. Moving-Target Defense Against Cyber-Physical Attacks in Power Grids via Game Theory. IEEE Transactions on Smart Grid 2021, 12, 5244–5257. [Google Scholar]
- Khaitan, S.K.; McCalley, J.D. Cyber physical system approach for design of power grids: A survey. In Proceedings of the 2013 IEEE Power & Energy Society General Meeting. IEEE; 2013; pp. 1–5. [Google Scholar]
- Bo, L.; Hongyu, W. Optimal Planning and Operation of Hidden Moving Target Defense for Maximal Detection Effectiveness. IEEE Transactions on Smart Grid 2021, 12, 4447–4459. [Google Scholar]
- Banik, S.; Ramachandran, T.; Bhattacharya, A.; et al. Automated adversary-in-the-loop cyber-physical defense planning. ACM Transactions on Cyber-Physical Systems 2023, 7, 1–25. [Google Scholar] [CrossRef]
- Jain, H.; Kumar, M.; Joshi, A.M. Intelligent energy cyber physical systems (iECPS) for reliable smart grid against energy theft and false data injection. Electrical Engineering 2022, 104, 331–346. [Google Scholar] [CrossRef]
- ERN; Frederic, C.; Boulahia, N.C.; et al. MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet Of Things Journal 2021, 8, 7818–7832. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber-Physical System Security for the Electric Power Grid. Proceedings of the IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Wang, B.; Chen, L.; Qian, Y.; et al. Moving Target Defense Against Adversarial Example Attacks. Journal of Network and Information Security 2021, 7, 113–120. [Google Scholar]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM-GAB algorithm. Energy Reports 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Huang, H.; Wlazlo, P.; Mao, Z.; et al. Cyberattack defense with cyber-physical alert and control logic in industrial controllers. IEEE Transactions on Industry Applications 2022, 58, 5921–5934. [Google Scholar] [CrossRef]
- Qu, Z.; Shi, H.; Wang, Y.; et al. Active and Passive Defense Strategies of Cyber-Physical Power System against Cyber Attacks Considering Node Vulnerability. Processes 2022, 10, 1351. [Google Scholar] [CrossRef]
- Presekal, A.; Ştefanov, A.; Semertzis, I.; et al. Spatio-temporal advanced persistent threat detection and correlation for cyber-physical power systems using enhanced GC-LSTM. IEEE Transactions on Smart Grid 2024. [Google Scholar] [CrossRef]
- Chen, Y.; Huang, S.; Liu, F.; et al. Evaluation of Reinforcement Learning-Based False Data Injection Attack to Automatic Voltage Control. IEEE Transactions on Smart Grid 2019, 10, 2158–2169. [Google Scholar] [CrossRef]
- Park, K.; Hong, J.; Su, W.; et al. Machine Learning based Post Event Analysis for Cybersecurity of Cyber-Physical System. In Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM). IEEE; 2024; pp. 1–5. [Google Scholar]
- Martin, H.; Fei, T.; Thomas, P. Stealthy MTD Against Unsupervised Learning-Based Blind FDI Attacks in Power Systems. IEEE Transactions on Information Forensics and Security 2021, 16, 1275–1287. [Google Scholar]
- Sun, J.; et al. Indicator & crowding distance-based evolutionary algorithm for combined heat and power economic emission dispatch. Applied Soft Computing 2020, 90, 106158. [Google Scholar]
- Yang, F.; Wang, J.; Pan, Q.; et al. Resilient Event-Triggered Control for Cyber-Physical Integrated Power Systems Under Network Attacks. Acta Automatica Sinica 2019, 45, 110–119. [Google Scholar]
- Chen, L.; Li, Y.; Huang, M.; et al. Robust Dynamic State Estimator of Integrated Energy Systems Based on Natural Gas Partial Differential Equations. IEEE Transactions on Industry Applications 2022, 58, 3303–3312. [Google Scholar] [CrossRef]
- Susuki, Y.; Koo, T.; Ebina, H.; et al. A Hybrid System Approach to the Analysis and Design of Power Grid Dynamic Performance. Proceedings of the IEEE 2012, 100, 225–239. [Google Scholar] [CrossRef]
- Zhang, Z.; Tian, Y.; Deng, R.; et al. A double-benefit moving target defense against cyber–physical attacks in smart grid. IEEE Internet of Things Journal 2022, 9, 17912–17925. [Google Scholar] [CrossRef]
- Liu, X.; Li, Z.; Shuai, Z.; et al. Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution. IEEE Transactions on Smart Grid 2017, 8, 1023–1025. [Google Scholar] [CrossRef]
- Wei, L.; Zhang, Q. Detection of False Data Attacks in Smart Grids Based on Improved UKF. Journal of System Simulation 2023, 35, 1508. [Google Scholar]
- Kanellopoulos, A.; Vamvoudakis, K.G. Moving Target Defense Control Framework for Cyber-Physical Systems. IEEE Transactions on Automatic Control 2020, 65, 1029–1043. [Google Scholar] [CrossRef]
- Sanjab, A.; Saad, W. Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective. IEEE Transactions on Smart Grid 2016, 7, 2038–2049. [Google Scholar] [CrossRef]
- Li, Y.; Ma, W.; Li, Y.; et al. Enhancing Cyber-Resilience in Integrated Energy System Scheduling with Demand Response Using Deep Reinforcement Learning. Applied Energy 2025, 379, 124831. [Google Scholar] [CrossRef]
- Cho, J.-H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; et al. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Communications Surveys Tutorials 2020, 22, 709–745. [Google Scholar] [CrossRef]
- Xu, S.; Xia, Y.; Shen, H.L. Cyber protection for malware attack resistance in cyber-physical power systems. IEEE Systems Journal 2022, 16, 5337–5345. [Google Scholar] [CrossRef]
- Alvarez-Alvarado, M.S.; Apolo-Tinoco, C.; Ramirez-Prado, M.J.; et al. Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectives. Computers and Electrical Engineering 2024, 116, 109149. [Google Scholar] [CrossRef]
- Kong, X.; Lu, Z.; Guo, X.; et al. Resilience evaluation of cyber-physical power system considering cyber attacks. IEEE Transactions on Reliability 2023, 73, 245–256. [Google Scholar] [CrossRef]
- Chen, L.; Wang, B. Robustness assessment of weakly coupled cyber-physical power systems under multi-stage attacks. Electric Power Systems Research 2024, 231, 110325. [Google Scholar] [CrossRef]
- Luo, X.; He, J.; Wang, X.; et al. Topology Optimization for Resilient Defense Strategies Against False Data Injection Attacks in Smart Grids. Acta Automatica Sinica 2023, 49, 1326–1338. [Google Scholar]
- Deng, R.; Zhuang, P.; Liang, H. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid. IEEE Transactions on Smart Grid 2017, 8, 2420–2430. [Google Scholar] [CrossRef]
- Lakshminarayana, S.; Chen, Y.; Konstantinou, C.; et al. Survey of moving target defense in power grids: Design principles, tradeoffs, and future directions. arXiv 2024, arXiv:2409.18317. [Google Scholar]
- Risbud, P.; Gatsis, N.; Taha, A. Vulnerability Analysis of Smart Grids to GPS Spoofing. IEEE Transactions on Smart Grid 2019, 10, 3535–3548. [Google Scholar] [CrossRef]
- Alabadi, M.; Albayrak, Z. Q-learning for securing cyber-physical systems: a survey. In Proceedings of the 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA); IEEE, 2020; pp. 1–13. [Google Scholar]
- Huang, D.; Wang, Y.; Hu, A.; et al. False Data Injection Attack Detection Combining Unsupervised and Supervised Learning. Electric Power Engineering Technology 2024, 43, 134–141. [Google Scholar]
- Mortlock, T.; Al Faruque, M.A. Adaptive Data Fusion for State Estimation and Control of Power Grids Under Attack. IEEE Transactions on Industrial Informatics 2024. [Google Scholar] [CrossRef]
- Giraldo, J.A.; El Hariri, M.; Parvania, M. Moving target defense for cyber–physical systems using iot-enabled data replication. IEEE Internet of Things Journal 2022, 9, 13223–13232. [Google Scholar] [CrossRef]
- Chen, L.; Hui, X.; et al. Dynamic state estimation for integrated natural gas and electric power systems. In Proceedings of the 2021 IEEE/IAS Industrial and Commercial Power System Asia (I&CPS Asia). IEEE; 2021; pp. 397–402. [Google Scholar]
- Tian, J.; Tan, R.; Guan, X.; et al. Enhanced Hidden Moving Target Defense in Smart Grids. IEEE Transactions on Smart Grid 2019, 10, 2208–2223. [Google Scholar] [CrossRef]
- Ali, M.; Sun, W. Securing Critical Infrastructures: Restoration from Cyber-Physical Attacks in Active Distribution Grids. In Proceedings of the 2024 IEEE Power & Energy Society General Meeting (PESGM). IEEE; 2024; pp. 1–5. [Google Scholar]
- Fan, Q.; Liu, D.; Wang, Y.; et al. Key Technologies and Progress in the Morphological Evolution of Power Cyber-Physical Systems. Proceedings of the CSEE 2023, 44, 8341–8352. [Google Scholar]
- He, Z.; Gao, S.; Wei, X.; et al. Research on Attack-Defense Game Model of False Topology Attacks with Branch and Protection Coordination. Power System Technology 2022, 46, 4346–4355. [Google Scholar]
- Li, X.; Yi, L.; Liu, C.; et al. Data-Driven Detection of False Data Injection Attacks in Power Systems. Smart Power 2023, 51, 30–37. [Google Scholar]
- Weng, P.; Chen, B.; Yu, L. Fusion Estimation of False Data Injection Attack Signals. Acta Automatica Sinica 2021, 47, 2292–2300. [Google Scholar]
- Patel, C.D.; Aggarwal, M.; Chaubey, N.K. Enhancing Cyber-Physical Systems Security Through Advanced Defense Mechanisms. In Advancing Cyber Security Through Quantum Cryptography; IGI Global, 2025; pp. 307–342. [Google Scholar]
- Krishnaveni, S.; Chen, T.M.; Sathiyanarayanan, M.; et al. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems. Cluster Computing 2024, 27, 7273–7306. [Google Scholar] [CrossRef]
- Purohit, S.; Neupane, R.; Bhamidipati, N.R.; et al. Cyber threat intelligence sharing for co-operative defense in multi-domain entities. IEEE Transactions on Dependable and Secure Computing 2022, 20, 4273–4290. [Google Scholar] [CrossRef]
- Zhou, X.; Feng, J.; et al. Non-intrusive load decomposition based on CNN–LSTM hybrid deep learning model. Energy Reports 2021, 7, 5762–5771. [Google Scholar] [CrossRef]
- Yan, B.; Yao, P.; Wang, J.; et al. Game theoretical dynamic cybersecurity defense strategy for electrical cyber physical systems. In Proceedings of the 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2). IEEE; 2021; pp. 2392–2397. [Google Scholar]
- Zhou, Z.; Zhang, J.; Zhang, X. A review on defense mechanism against the denial of service and false data injection in cyber-physical power systems. In Proceedings of the 2023 IEEE 6th International Electrical and Energy Conference (CIEEC). IEEE; 2023; pp. 4539–4545. [Google Scholar]
- Fahmeeda, S.; Bhagyashree, B.K. Detection and prevention of false data injection attack in cyber physical power system. In Proceedings of the 2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE; 2021; pp. 1–5. [Google Scholar]
- Yang, J. A controllable false data injection attack for a cyber physical system. IEEE Access 2021, 9, 6721–6728. [Google Scholar] [CrossRef]
- Xing, W.; Shen, J. Security Control of Cyber–Physical Systems under Cyber Attacks: A Survey. Sensors 2024, 24, 3815. [Google Scholar] [CrossRef]
- Yang, J. A controllable false data injection attack for a cyber physical system. IEEE Access 2021, 9, 6721–6728. [Google Scholar] [CrossRef]
- Chen, H.; Li, T.; Fan, X.; et al. Feature selection for imbalanced data based on neighborhood rough sets. Information Sciences 2019, 483, 1–20. [Google Scholar] [CrossRef]
- Wang, S.; Ko, R.K.L.; Bai, G.; et al. Evasion attack and defense on machine learning models in cyber-physical systems: A survey. IEEE communications surveys & tutorials 2023, 26, 930–966. [Google Scholar]
- Li, Y.; Li, Z.; Chen, L. Dynamic State Estimation of Generators Under Cyber Attacks. IEEE Access 2019, 7, 125252–125267. [Google Scholar] [CrossRef]
- Xiao, K.; Zhu, C.; Xie, J.; et al. Dynamic defense against stealth malware propagation in cyber-physical systems: a game-theoretical framework. Entropy 2020, 22, 894. [Google Scholar] [CrossRef]
- Zhao, Z.; Shang, Y.; Qi, B.; et al. Research on defense strategies for power system frequency stability under false data injection attacks. Applied Energy 2024, 371, 123711. [Google Scholar] [CrossRef]
- Xiong, X.; Hu, S.; Sun, D.; et al. Detection of false data injection attack in power information physical system based on SVM–GAB algorithm. Energy Reports 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
- Zhu, H.; Xu, L.; Bao, Z.; et al. Secure control against multiplicative and additive false data injection attacks. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 92–100. [Google Scholar] [CrossRef]
- Zhong, C.; Li, H.; Zhou, Y.; et al. Virtual synchronous generator of PV generation without energy storage for frequency support in autonomous microgrid. International Journal of Electrical Power & Energy Systems 2022, 134, 107343. [Google Scholar]
- Li, Y.; Zhang, M.; Chen, C. A deep-learning intelligent system incorporating data augmentation for short-term voltage stability assessment of power systems. Applied Energy 2022, 308, 118347. [Google Scholar] [CrossRef]
- Costilla-Enriquez, N.; Weng, Y. Attack power system state estimation by implicitly learning the underlying models. IEEE Transactions on Smart Grid 2022, 14, 649–662. [Google Scholar] [CrossRef]
- Chu, X.; Yi, Y.; Tang, M.; et al. Defensive resource allocation for cyber-physical systems in global energy interconnection. IOP Conference Series: Earth and Environmental Science 2019, 227, 042002. [Google Scholar] [CrossRef]
- Khalid, H.; Peng, J. Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction. IEEE Transactions on Smart Grid 2017, 8, 697–707. [Google Scholar] [CrossRef]
- Liu, X.; Chang, P.; Sun, Q. Detection of False Data Injection Attacks in Power Grids Based on XGBoost and Unscented Kalman Filter Adaptive Hybrid Prediction. Proceedings of the CSEE 2021, 41, 5462–5476. [Google Scholar]
- Alsharif, G.O.; Anagnostopoulos, C.; Marnerides, A.K. Energy Market Manipulation via False-Data Injection Attacks. IEEE Access 2025. [Google Scholar] [CrossRef]
- Zhou, B.; Sun, B.; Zang, T.; et al. Security risk assessment approach for distribution network cyber physical systems considering cyber attack vulnerabilities. Entropy 2022, 25, 47. [Google Scholar] [CrossRef]
- Le, J.; Lang, H.; Tan, T.; et al. A Review of Information Security Issues in Distributed Economic Dispatch of New Distribution Systems. Automation of Electric Power Systems 2024, 48, 177–191. [Google Scholar]
- Jiang, Z.; Yao, P.; Yan, B.; et al. Cyber-physical system defense decision-making based on priori knowledge of traffic anomaly detection. In Proceedings of the 2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2). IEEE; 2023; pp. 5196–5201. [Google Scholar]
- Zideh, M.J.; Khalghani, M.R.; Solanki, S.K. An unsupervised adversarial autoencoder for cyber attack detection in power distribution grids. Electric Power Systems Research 2024, 232, 110407. [Google Scholar] [CrossRef]
- Zhang, Z.; Huang, S.; Chen, Y.; et al. Cyber-physical coordinated risk mitigation in smart grids based on attack-defense game. IEEE Transactions on Power Systems 2021, 37, 530–542. [Google Scholar] [CrossRef]
- Shafae, M.S.; Wells, L.J.; Purdy, G.T. Defending against product-oriented cyber-physical attacks on machining systems. The International Journal of Advanced Manufacturing Technology 2019, 105, 3829–3850. [Google Scholar] [CrossRef]
- Long, X.; Ding, Y.; et al. Privacy-Preserving Graph Inference Network for Multi-Entity Wind Power Forecast: A Federated Learning Approach. IEEE Transactions on Network Science and Engineering 2025. [Google Scholar] [CrossRef]
- Lian, Z.; Shi, P.; Chen, M. A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense and Design. IEEE Internet of Things Journal 2024. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Li, Y.; et al. Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach. Applied Energy 2024, 360, 122736. [Google Scholar] [CrossRef]
- Liu, S.; Tan, Y.; Zhao, F.; et al. Coupled Modeling Method for Power Information Systems. Journal of Power Systems and Automation 2021, 33, 89–93. [Google Scholar]
- Yang, T.; Cai, S.; Yan, P.; et al. Saturation defense method of a power cyber-physical system based on active cut set. IEEE Transactions on Smart Grid 2022. [Google Scholar] [CrossRef]
- Liu, X.; Bao, Z.; Lu, D.; et al. Modeling of Local False Data Injection Attacks With Reduced Network Information. IEEE Transactions on Smart Grid 2015, 6, 1686–1696. [Google Scholar] [CrossRef]
- Li, Y.; Wang, R.; Li, Y.; et al. Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach. Applied Energy 2023, 329, 120291. [Google Scholar] [CrossRef]
- Khanna, K.; Govindarasu, M. Resiliency-driven cyber–physical risk assessment and investment planning for power substations. IEEE Transactions on Control Systems Technology 2024, 32, 1743–1754. [Google Scholar] [CrossRef]
- Sun, S.; Huang, H.; Payne, E.; et al. A graph embedding-based approach for automatic cyber-physical power system risk assessment to prevent and mitigate threats at scale. IET Cyber-Physical Systems: Theory & Applications 2024, 9, 435–453. [Google Scholar]
- Jin, Z.; Liu, Y.; Diao, J.; et al. Covert False Data Injection Attacks on Remote State Estimation in Cyber-Physical Systems. Acta Automatica Sinica 2025, 51, 1–10. [Google Scholar]
- Shi, J.; Chen, B.; Yu, L. Hidden FDIA Detection Based on Laplacian Eigenmap Learning. Acta Automatica Sinica 2021, 47, 2494–2500. [Google Scholar]
- Ribas Monteiro, L.F.; Rodrigues, Y.R.; Zambroni de Souza, A.C. Cybersecurity in cyber–physical power systems. Energies 2023, 16, 4556. [Google Scholar] [CrossRef]
- Qu, Z.; Bo, X.; Yu, T.; et al. Active and Passive Hybrid Detection Method for Power CPS False Data Injection Attacks with Improved AKF and GRU-CNN. IET Renewable Power Generation 2022, 16, 1490–1508. [Google Scholar] [CrossRef]
- Shen, Y.; Zhang, W.; Ni, H.; et al. Guaranteed Cost Control of Networked Control Systems with DoS Attack and Time-varying Delay. International Journal of Control, Automation and Systems 2019, 17, 811–821. [Google Scholar] [CrossRef]
- Liu, S.; Martínez, S.; Cortés, J. Stabilization of linear cyber-physical systems against attacks via switching defense. IEEE Transactions on Automatic Control 2023, 68, 7326–7341. [Google Scholar] [CrossRef]
- Liang, Y.; Wang, Y.; Liu, K.; et al. Fault Simulation of Distribution Grid CPS Considering Network Information Security. Power System Technology 2020, 45, 235–242. [Google Scholar]
- Barrère, M.; Hankin, C.; O’Reilly, D. Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. Computers & security 2023, 132, 103348. [Google Scholar]
- Manias, D.M.; Saber, A.M.; Radaideh, M.I.; et al. Trends in Smart Grid Cyber-Physical Security: Components, Threats and Solutions. IEEE Access 2024. [Google Scholar] [CrossRef]
- Fu, Y.; Chen, L.; Ma, Z.; et al. Preventive Control of Power Systems Including Data-Driven Stability Constraints. Proceedings of the CSEE 2022, 42, 5417–5430. [Google Scholar]
- Feng, Y.; Huang, R.; Zhao, W.; et al. A survey on coordinated attacks against cyber–physical power systems: Attack, detection, and defense methods. Electric Power Systems Research 2025, 241, 111286. [Google Scholar] [CrossRef]
- Li, B.; Xiao, Y.; Shi, Y.; et al. Anti-honeypot enabled optimal attack strategy for industrial cyber-physical systems. IEEE Open Journal of the Computer Society 2020, 1, 250–261. [Google Scholar] [CrossRef]
- Li, T.; Zhao, H.; Wang, S.; et al. Attack and Defense Strategy of Distribution Network Cyber-Physical System Considering EV Source-Charge Bidirectionality. Electronics 2021, 10, 2973. [Google Scholar] [CrossRef]
- Lei, C.; Bu, S.; Wang, Q.; et al. Observability defense-constrained distribution network reconfiguration for cyber-physical security enhancement. IEEE Transactions on Smart Grid 2023, 15, 2379–2382. [Google Scholar] [CrossRef]
- Fang, S.W.; Portante, A.; Husain, M.I. Moving target defense mechanisms in cyber-physical systems. Securing Cyber-Physical Systems 2015. [Google Scholar]
- Cui, Y.; et al. Deep reinforcement learning based optimal energy management of multi-energy microgrids with uncertainties. CSEE Journal of Power and Energy Systems 2024. [Google Scholar] [CrossRef]
- Ao, W.; Song, Y.; Wen, C. Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory & Applications 2016, 10, 1458–1468. [Google Scholar]
- Yang, X.; et al. Gaussian Mixture Model Uncertainty Modeling for Power Systems Considering Mutual Assistance of Latent Variables. IEEE Transactions on Sustainable Energy 2024. [Google Scholar] [CrossRef]
- Barrère, M.; Hankin, C.; O’Reilly, D. Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. Computers & security 2023, 132, 103348. [Google Scholar]
- Setitra, M.; Fan, M.; Benkhaddra, I. DoS/DDoS Attacks in Software Defined Networks: Current Situation, Challenges and Future Directions. Computers and Communications 2024, 222, 77–96. [Google Scholar] [CrossRef]
- Wei, J.; Yan, X.; Zhu, X.; Xu, M.; Ma, R.; Du, H. New Stability Conditions of CPSs with Multiple Transportation Channels under DoS Attacks. Science China Information Sciences 2022, 65, 219202. [Google Scholar] [CrossRef]
- Xiao, Y.; Chai, S.; Dai, L.; Xia, Y.; Chai, R. Stochastic Tube-Based Model Predictive Control for Cyber-Physical Systems under False Data Injection Attacks with Bounded Probability. arXiv 2025, arXiv:2503.07385. [Google Scholar]
- Alguliyev, R.; Imamverdiyev, Y.; Sukhostat, L. Cyber-Physical Systems and Their Security Issues. Computers in Industry 2018, 100, 212–223. [Google Scholar] [CrossRef]
- Jeong, S.; Baek, Y.; Son, S. Component-Based Interactive Framework for Intelligent Transportation Cyber-Physical Systems. Sensors 2020, 20, 264. [Google Scholar] [CrossRef]
- Song, S.; Park, J.H.; Zhang, B.; Song, X. Event-Based Adaptive Fuzzy Fixed-Time Secure Control for Nonlinear CPSs Against Unknown False Data Injection and Backlash-Like Hysteresis. IEEE Transactions on Fuzzy Systems 2022, 30, 1939–1951. [Google Scholar] [CrossRef]
- Li, Y.; Wei, X.; Li, Y.; Dong, Z.; Shahidehpour, M. Detection of False Data Injection Attacks in Smart Grid: A Secure Federated Deep Learning Approach. arXiv 2022, arXiv:2209.00778. [Google Scholar] [CrossRef]
- Zhao, H.J.; Li, Q.Z.; Zeng, X.; Liu, Z.M. Safe Reinforcement Learning Algorithm and Its Application in Intelligent Control for CPS. International Journal of Software and Informatics 2022, 12, 453–483. [Google Scholar] [CrossRef]
- Hasan, M.; Habib, A.; Shukur, Z.; Ibrahim, F.; Islam, S.; Razzaque, M.A. Review on Cyber-Physical and Cyber-Security System in Smart Grid: Standards, Protocols, Constraints, and Recommendations. Journal of Network and Computer Applications 2023, 209, 103540. [Google Scholar] [CrossRef]
- Fan, X.; Lin, W.; Liu, Z.; Zhao, L. Reachable Set Control for Nonlinear Markov Jump Cyber-Physical Systems with False Data Injection Attacks. Journal of The Franklin Institute 2024, 361, 224–233. [Google Scholar] [CrossRef]
- Ye, D.; Zhang, T. Summation Detector for False Data-Injection Attack in Cyber-Physical Systems. IEEE Transactions on Cybernetics 2019, 50, 2338–2345. [Google Scholar] [CrossRef]
- Eslami, A.; Khorasani, K. Zero Dynamics Attack Detection and Isolation in Cyber-Physical Systems with Event-Triggered Communication. arXiv 2025, arXiv:2505.06070. [Google Scholar]
- Razaque, A.; Amsaad, F.H.; Abdulgader, M.; Alotaibi, B.; Alsolami, F.; Gulsezim, D. A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare. IEEE Internet of Things Journal 2022, 9, 22434–22452. [Google Scholar] [CrossRef]
- Xue, K. Securing Power Cyber-Physical Systems Against False Data Injection Attacks: Trends, Techniques, and Future Directions. Preprints 2025. [Google Scholar]
- Chattopadhyay, A.; Mitra, U. Security Against False Data-Injection Attack in Cyber-Physical Systems. IEEE Transactions on Control of Network Systems 2019, 7, 1015–1027. [Google Scholar] [CrossRef]
- Koley, I.; Adhikary, S.; Dey, S. An RL-Based Adaptive Detection Strategy to Secure Cyber-Physical Systems. arXiv 2021, arXiv:2103.02872. [Google Scholar]
- Zhang, X.; Han, H. Event-Triggered Finite-Time Filtering for Nonlinear Networked System with Quantization and DoS Attacks. IEEE Access 2024, 12, 1308–1320. [Google Scholar] [CrossRef]
- Rieger, C.G.; Gertman, D.I.; McQueen, M.A. Resilient Control Systems: Next Generation Design Research. In Proceedings of the 2nd IEEE Conference on Human System Interaction; 2009; pp. 632–636. [Google Scholar]
- Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, Understanding and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine 2001, 21, 11–25. [Google Scholar]
- Rinaldi, S.M.; Peerenboom, J.P.; Kelly, T.K. Identifying, Understanding and Analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine 2001, 21, 11–25. [Google Scholar]
- Sun, C.; Su, Q.; Li, J. Secure Tracking Control and Attack Detection for Power Cyber-Physical Systems based on Integrated Control Decision. IEEE Transactions on Information Forensics and Security 2024. [Google Scholar] [CrossRef]
- Wang, P.; Zhang, R.; He, X. New Approaches to Detection and Secure Control for Cyber-physical Systems Against False Data Injection Attacks. International Journal of Control, Automation and Systems 2025, 23, 332–345. [Google Scholar] [CrossRef]
- Kaloudi, N.; Li, J. The ML-based sensor data deception targeting cyber–physical systems: A review. Computer Science Review 2025, 57, 100753. [Google Scholar] [CrossRef]
- Busari, W.A.; Bello, A.A. Security, Trust, and Privacy in Cyber-physical Systems (CPS). In Proceedings of the 2024 2nd International Conference on Cyber Physical Systems, Power Electronics and Electric Vehicles (ICPEEV); IEEE, 2024; pp. 1–6. [Google Scholar]
- Noor, U.; Shahid, S.; Kanwal, R.; et al. A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks. arXiv 2023, arXiv:2307.10252. [Google Scholar]
- Samad, T. Human-in-the-loop control and cyber–physical–human systems: applications and categorization. Cyber–physical–human systems: fundamentals and applications 2023. [Google Scholar]
- Gil, M.; Albert, M.; Fons, J.; et al. Engineering human-in-the-loop interactions in cyber-physical systems. Information and software technology 2020, 126, 106349. [Google Scholar] [CrossRef]
- Iyenghar, P. Clever Hans in the Loop? A Critical Examination of ChatGPT in a Human-in-the-Loop Framework for Machinery Functional Safety Risk Analysis. Eng 2025, 6, 31. [Google Scholar] [CrossRef]
- Adil, M.; Farouk, A.; Abulkasim, H.; et al. NG-ICPS: Next Generation Industrial-CPS, Security Threats in the Era of Artificial Intelligence, Open Challenges With Future Research Directions. IEEE Internet of Things Journal 2024. [Google Scholar] [CrossRef]
- Agarwal, M.; Venkateswaran, S.K.; Sivakumar, R. Human-in-the-loop rl with an eeg wearable headset: On effective use of brainwaves to accelerate learning. In Proceedings of the 6th ACM Workshop on Wearable Systems and Applications; 2020; pp. 25–30. [Google Scholar]
- Nguyen, T.T.; Kadavil, R.; Hooshyar, H. A Real-time Cyber-Physical Simulation Testbed for Cybersecurity Assessment of Large-Scale Power Systems. IEEE Transactions on Industry Applications 2024. [Google Scholar] [CrossRef]
- Li, P.; Fu, J.; Xie, K.; et al. A Defense Planning Model for a Power System Against Coordinated Cyber-Physical Attack. Protection and Control of Modern Power Systems 2024, 9, 84–95. [Google Scholar] [CrossRef]
- Ravikumar, G.; Hyder, B.; Babu, J.R.; et al. Cps testbed architectures for wampac using industrial substation and control center platforms and attack-defense evaluation. In Proceedings of the 2021 IEEE Power & Energy Society General Meeting (PESGM). IEEE; 2021; pp. 1–5. [Google Scholar]
- Jiang, Y.; Wu, S.; Ma, R.; et al. Monitoring and defense of industrial cyber-physical systems under typical attacks: From a systems and control perspective. IEEE Transactions on Industrial Cyber-Physical Systems 2023, 1, 192–207. [Google Scholar] [CrossRef]
- Fan, Y.; Li, J.; Zhang, D.; et al. Supporting sustainable maintenance of substations under cyber-threats: An evaluation method of cybersecurity risk for power CPS. Sustainability 2019, 11, 982. [Google Scholar] [CrossRef]
- Chen, Y.; Li, T.; Long, Y.; Bai, W. Attacks Detection and Security Control for Cyber-Physical Systems under False Data Injection Attacks. Journal of The Franklin Institute 2023, 360, 10476–10498. [Google Scholar] [CrossRef]
- Abdelmalak, M. Effects of Unobservable Bus States on Detection and Localization of False Data Injection Attacks in Smart Grids. University of South Florida, 2024. [Google Scholar]
- Feng, H.; Han, Y.; Si, F.; Zhao, Q. Detection of False Data Injection Attacks in Cyber-Physical Power Systems: An Adaptive Adversarial Dual Autoencoder with Graph Representation Learning Approach. IEEE Transactions on Instrumentation and Measurement 2024, 73, 1–11. [Google Scholar] [CrossRef]
- Guan, Y.; Ge, X. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks. IEEE Transactions on Signal and Information Processing over Networks 2017, 4, 48–59. [Google Scholar] [CrossRef]
- Barboni, A.; Rezaee, H.; Boem, F.; Parisini, T. Detection of Covert Cyber-Attacks in Interconnected Systems: A Distributed Model-Based Approach. IEEE Transactions on Automatic Control 2020, 65, 3728–3741. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Wang, Y. Privacy-preserving spatiotemporal scenario generation of renewable energies: A federated deep generative learning approach. IEEE Transactions on Industrial Informatics 2021, 18, 2310–2320. [Google Scholar] [CrossRef]
- Hu, Y. Research on moving target defense for smart grid cyber-physical security. National University of Defense Technology, 2021. [Google Scholar]
- Yan, K.; Liu, X.; Lu, Y.; et al. A cyber-physical power system risk assessment model against cyberattacks. IEEE Systems Journal 2022, 17, 2018–2028. [Google Scholar] [CrossRef]
- Kausar, F.; Deo, S.; Hussain, S.; et al. Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems. Energies 2024, 17, 5337. [Google Scholar] [CrossRef]
- Fang, Z.; Zhao, D.; Chen, C.; et al. Nonintrusive Appliance Identification with Appliance-Specific Networks. IEEE Transactions on Industry Applications 2020, 56, 3443–3452. [Google Scholar]
- BaSin, D.; Cremers, C.; Kim, T.; et al. Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure. IEEE Transactions on Dependable and Secure Computing 2016, 15, 393–408. [Google Scholar] [CrossRef]
- Li, Y.; Li, J.; Qi, J.; et al. Robust Cubature Kalman Filter for Dynamic State Estimation of Synchronous Machines Under Unknown Measurement Noise Statistics. IEEE Access 2019, 7, 29139–29148. [Google Scholar] [CrossRef]
- Bai, M.; Liu, P.; Lv, F.; et al. Adversarial Attack against Intrusion Detectors in Cyber-Physical Systems With Minimal Perturbations. In Proceedings of the 2024 IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). IEEE; 2024; pp. 816–825. [Google Scholar]
- Preeti, G.; Sanjeev Kumar, P. A Blockchain Based Decentralized Application System for Vanet FDIA Detection. In International Conference on Computing and Communication Networks; Springer Nature: Singapore, 2023; pp. 95–119. [Google Scholar]
- Xu, K.; Niu, Y. Decentralized attack detection for multi-area power systems via interconnection-decoupled sliding mode observer. International Journal of Robust and Nonlinear Control 2023, 33, 6697–6714. [Google Scholar] [CrossRef]
- Dong, Z.; Tang, M.; Tian, M. Allocating defense resources for spatial cyber-physical power systems based on deep reinforcement learning. In Proceedings of the 2023 IEEE 6th International Conference on Industrial Cyber-Physical Systems (ICPS). IEEE; 2023; pp. 1–6. [Google Scholar]
- Yu, J.; Li, Q.; Li, L. Localization of coordinated cyber-physical attacks in power grids using moving target defense and machine learning. Electronics 2024, 13, 2256. [Google Scholar] [CrossRef]
- Ullrich, J.; Weippl, E.R. CyPhySec: Defending cyber-physical systems. ERCIM News 2015, 102, 18–18. [Google Scholar]
- Zhang, F.; Huang, Z.; Kou, L.; et al. Data Encryption Based on a 9D Complex Chaotic System with Quaternion for Smart Grid. Chinese Physics B 2023, 32, 010502. [Google Scholar] [CrossRef]
- Zhong, X.; xin Li, G.; Zhng, C. False data injection in power smart grid and identification of the most vulnerable bus; a case study 14 IEEE bus network. Energy Reports 2021, 7, 8476–8484. [Google Scholar] [CrossRef]
- Qu, Z.; Dong, Y.; Mugemanyi, S.; et al. Dynamic Exploitation Gaussian Bare-Bones Bat Algorithm for Optimal Reactive Power Dispatch to Improve the Safety and Stability of Power System. IET Renewable Power Generation 2022, 16, 1401–1424. [Google Scholar] [CrossRef]
- Keçeci, C.; Davis, K.R.; Serpedin, E. Federated learning based distributed localization of false data injection attacks on smart grids. arXiv 2023, arXiv:2306.10420. [Google Scholar]
- Mansour, R.F. Artificial intelligence based optimization with deep learning model for blockchain enabled intrusion detection in CPS environment. Scientific Reports 2022, 12, 12937. [Google Scholar] [CrossRef] [PubMed]
- Ding, X.; Wang, H.; Zhang, X.; et al. Dual nature of cyber–physical power systems and the mitigation strategies. Reliability Engineering & System Safety 2024, 244, 109958. [Google Scholar]
- Kesici, M.; Pal, B.; Yang, G. Detection of false data injection attacks in distribution networks: A vertical federated learning approach. IEEE Transactions on Smart Grid 2024. [Google Scholar] [CrossRef]
- Mitchell, S.M.; Mannan, M.S. Designing Resilient Engineered Systems. Chemical Engineering Progress 2006, 102, 33–39. [Google Scholar]
- Wing, J. Cyber-Physical Systems Research Charge. In Proceedings of the Cyber-Physical Systems Summit; 2008. [Google Scholar]
- McJunkin, T.R.; Rieger, C.G.; Johnson, B.K.; Naidu, D.S.; Gardner, J.F.; Beaty, L.H.; Ray, I.; Le Blanc, K.L.; Guryan, M. Interdisciplinary Education through “Edu-tainment”: Electric Grid Resilient Control Systems Course. In Proceedings of the ASEE Annual Conference and Exposition; 2015. [Google Scholar]
- Hahn, E.M.; Perez, M.; Schewe, S.; Somenzi, F. Model-Free Reinforcement Learning for Branching Markov Decision Processes. Computer Aided Verification 2021, 12760, 651–673. [Google Scholar]
- van Hasselt, H.; Guez, A.; Silver, D. Deep Reinforcement Learning with Double Q-Learning. AAAI Conference on Artificial Intelligence 2016, 30, 2094–2100. [Google Scholar] [CrossRef]
| Layer | Static Configuration Vulnerabilities | Resulting Risks |
|---|---|---|
| Cyber Layer | Fixed IPs, static credentials, predictable control paths | Long-term reconnaissance, targeted exploitation, persistent threats |
| Physical Layer | Fixed grid topologies, static control modes, load patterns | Cascading failures, equipment damage, grid instability |
| Market Layer | Unchanging rules, bidding patterns, demand response schedules | Market manipulation, artificial scarcity, financial losses |
| Cross-Layer | Coupled cyber-physical-market dependencies | Systemic risk amplification, operator confusion, widespread impact |
| MTD Domain | Example Strategies | Security Benefits | Operational Challenges |
|---|---|---|---|
| Cyber Layer | IP randomization, dynamic routing, rotating keys | Disrupts reconnaissance and persistence | Network management complexity, potential latency impacts |
| Physical Layer | Grid reconfiguration, DER mode switching, virtual islanding | Localizes disruptions, prevents single-point-of-failure attacks | Grid stability risks, coordination with physical operations |
| Market Layer | Variable market rules, dynamic clearing times | Thwarts market manipulation attempts | Regulatory compliance, market participant acceptance |
| Human Layer | Adaptive playbooks, operator-in-the-loop control | Ensures oversight and reduces automation risks | Training and cognitive load on operators |
| MTD Strategy | Security Benefits | Operational Considerations |
|---|---|---|
| Dynamic Network Reconfiguration | Disrupts attacker reconnaissance and persistence | Requires synchronization and may impact session continuity |
| Rotating Authentication and Keys | Limits credential reuse and theft | Requires secure and seamless key distribution mechanisms |
| Control Path Diversity and Switching | Prevents predictable attack paths | Increases complexity in managing network and protocol diversity |
| Service Virtualization and Obfuscation | Misleads attackers and absorbs attack attempts | Requires careful management to avoid operational confusion |
| MTD Strategy | Security Benefits | Operational Considerations |
|---|---|---|
| Reconfigurable Grid Topologies & Islanding | Limits propagation of failures; invalidates attacker topology models | Requires careful stability management and cross-layer coordination |
| Dynamic Market Mechanism Variations | Disrupts economic manipulation attempts | Must balance fairness, transparency, and market efficiency |
| Adaptive Dispatch & Control Mode Switching | Reduces predictability of operational behaviors | Increases control and optimization complexity; requires operator oversight |
| Coordination Component | Key Capabilities | Operational Benefits |
|---|---|---|
| Operator-Centered Orchestration Platforms | Interactive dashboards, playbooks, and decision support tools | Ensures human oversight and cross-domain coordination |
| AI-Driven Monitoring and Strategy Selection | Real-time attack surface mapping and adaptive MTD recommendations | Enhances defense agility while balancing operational constraints |
| Explainable MTD Interfaces | Transparent explanations, impact simulations, and what-if analysis | Builds operator trust and facilitates informed decision-making |
| Feedback Loops for Continuous Refinement | Integration of operator feedback into AI learning processes | Improves long-term system resilience and human-AI collaboration |
| Metric Category | Example Metrics |
|---|---|
| Security Effectiveness | Attacker time-to-compromise, attacker resource cost |
| Operational Impact | Service continuity rate, performance degradation index |
| Adaptability and Flexibility | Frequency of successful defense adaptations, learning rate |
| Human Factors | Operator acceptance rate, decision confidence levels |
| Validation and Deployment Aspect | Key Considerations |
|---|---|
| Validation Platforms | Digital twins, co-simulation, scenario-based testing |
| Resilience Metrics | Effectiveness, operational continuity, adaptability, human factors |
| Scalability and Performance | Real-time responsiveness, computational efficiency, large-scale applicability |
| Usability and Human Factors | Operator training, cognitive load management, stakeholder coordination |
| Regulatory and Standardization Alignment | Compliance with industry standards, development of certification pathways |
| Priority Area | Key Actions |
|---|---|
| Unified MTD Framework Development | Model cross-layer dynamics, establish standardized metrics |
| Regulatory and Market Integration | Collaborate on policy evolution, demonstrate operational benefits |
| Cross-Sector Collaboration | Build consortia, share knowledge, develop open-source toolkits |
| Emerging Research Directions | Optimize AI-driven MTD, explore behavioral deception, advance digital twin platforms |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).