A survey on security control and attack detection for industrial cyber-physical systems

Abstract Cyber-physical systems (CPSs), which are an integration of computation, networking, and physical processes, play an increasingly important role in critical infrastructure, government and everyday life. Due to physical constraints, embedded computers and networks may give rise to some additional security vulnerabilities, which results in losses of enormous economy benefits or disorder of social life. As a result, it is of significant to properly investigate the security issue of CPSs to ensure that such systems are operating in a safe manner. This paper, from a control theory perspective, presents an overview of recent advances on security control and attack detection of industrial CPSs. First, the typical system modeling on CPSs is summarized to cater for the requirement of the performance analysis. Then three typical types of cyber-attacks, i.e. denial-of-service attacks, replay attacks, and deception attacks, are disclosed from an engineering perspective. Moreover, robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks. The development on attack detection for industrial CPSs is reviewed according to the categories on detection approaches. Furthermore, the security control and state estimation are discussed in detail. Finally, some challenge issues are raised for the future research.

[1]  Tingwen Huang,et al.  Stabilization for sampled-data systems under noisy sampling interval , 2016, Autom..

[2]  Michael D. Lemmon,et al.  Distributed Switching Control to Achieve Almost Sure Safety for Leader-Follower Vehicular Networked Systems , 2015, IEEE Transactions on Automatic Control.

[3]  John Y. Hung,et al.  Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.

[4]  Taekyoung Kwon,et al.  An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks , 2010, IEEE Transactions on Industrial Informatics.

[5]  Dong Yue,et al.  To Transmit or Not to Transmit: A Discrete Event-Triggered Communication Scheme for Networked Takagi–Sugeno Fuzzy Systems , 2013, IEEE Transactions on Fuzzy Systems.

[6]  Long Zhao,et al.  Job Scheduling With Uncertain Local Generation in Smart Buildings: Two-Stage Robust Approach , 2014, IEEE Transactions on Smart Grid.

[7]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[8]  Quanyan Zhu,et al.  Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.

[9]  Anjan Bose,et al.  Decentralized Communication and Control Systems for Power System Operation , 2015, IEEE Transactions on Smart Grid.

[10]  YangQuan Chen,et al.  Cyber-physical systems as general distributed parameter systems: three types of fractional order models and emerging research opportunities , 2015, IEEE/CAA Journal of Automatica Sinica.

[11]  Zhong-Hua Pang,et al.  Secure Networked Control Systems under Denial of Service Attacks , 2011 .

[12]  Changyin Sun,et al.  An Event-Triggered Approach for Load Frequency Control With Supplementary ADP , 2017, IEEE Transactions on Power Systems.

[13]  Nirwan Ansari,et al.  Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.

[14]  Qing-Long Han,et al.  A Decentralized Event-Triggered Dissipative Control Scheme for Systems With Multiple Sensors to Sample the System Outputs , 2016, IEEE Transactions on Cybernetics.

[15]  Zidong Wang,et al.  Distributed H∞ state estimation with stochastic parameters and nonlinearities through sensor networks: The finite-horizon case , 2012, Autom..

[16]  Qing-Long Han,et al.  Event-triggered dynamic output feedback control for networked control systems , 2014 .

[17]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling in Cyber-Physical Systems ∗ , 2015 .

[18]  Cesare Alippi,et al.  Model-Free Fault Detection and Isolation in Large-Scale Cyber-Physical Systems , 2017, IEEE Transactions on Emerging Topics in Computational Intelligence.

[19]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.

[20]  Ling Shi,et al.  Causality Countermeasures for Anomaly Detection in Cyber-Physical Systems , 2018, IEEE Transactions on Automatic Control.

[21]  Qing-Long Han,et al.  Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[22]  Qing-Long Han,et al.  Achieving Cluster Formation of Multi-Agent Systems Under Aperiodic Sampling and Communication Delays , 2018, IEEE Transactions on Industrial Electronics.

[23]  Frank L. Lewis,et al.  Distributed Control Systems for Small-Scale Power Networks: Using Multiagent Cooperative Control Theory , 2014, IEEE Control Systems.

[24]  Deepa Kundur,et al.  A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.

[25]  Qing-Long Han,et al.  Event-Based Set-Membership Leader-Following Consensus of Networked Multi-Agent Systems Subject to Limited Communication Resources and Unknown-But-Bounded Noise , 2017, IEEE Transactions on Industrial Electronics.

[26]  Qing-Long Han,et al.  New stability criteria for linear systems with interval time-varying delay , 2008, Autom..

[27]  Bo Tang,et al.  Detection of false data injection attacks in smart grid under colored Gaussian noise , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[28]  Yan Song,et al.  Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks , 2016, Int. J. Gen. Syst..

[29]  Zidong Wang,et al.  H∞H∞ consensus control for multi-agent systems with missing measurements: The finite-horizon case , 2013, Syst. Control. Lett..

[30]  Romain Postoyan,et al.  A Lyapunov Redesign of Coordination Algorithms for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.

[31]  Holger Boche,et al.  Bayesian Mechanisms and Detection Methods for Wireless Network with Malicious Users , 2016, IEEE Transactions on Mobile Computing.

[32]  Paulo Tabuada,et al.  Event-Triggered State Observers for Sparse Sensor Noise/Attacks , 2013, IEEE Transactions on Automatic Control.

[33]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[34]  Fuad E. Alsaadi,et al.  Recent advances on filtering and control for cyber-physical systems under security and resource constraints , 2016, J. Frankl. Inst..

[35]  Takashi Hikihara,et al.  A Hybrid System Approach to the Analysis and Design of Power Grid Dynamic Performance , 2012, Proceedings of the IEEE.

[36]  Qing-Long Han,et al.  A Novel Event-Triggered Transmission Scheme and ${\cal L}_{2}$ Control Co-Design for Sampled-Data Control Systems , 2013, IEEE Transactions on Automatic Control.

[37]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[38]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[39]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[40]  György Dán,et al.  Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks , 2014, IEEE Journal on Selected Areas in Communications.

[41]  Francesco Bullo,et al.  Synchronization and power sharing for droop-controlled inverters in islanded microgrids , 2012, Autom..

[42]  Qing-Long Han,et al.  Network-based output tracking control for T-S fuzzy systems using an event-triggered communication scheme , 2015, Fuzzy Sets Syst..

[43]  Qing-Long Han,et al.  Distributed Formation Control of Networked Multi-Agent Systems Using a Dynamic Event-Triggered Communication Mechanism , 2017, IEEE Transactions on Industrial Electronics.

[44]  James Lam,et al.  Quasi-synchronization of heterogeneous dynamic networks via distributed impulsive control: Error estimation, optimization and design , 2015, Autom..

[45]  Huijun Gao,et al.  Event-Triggered State Estimation for Complex Networks With Mixed Time Delays via Sampled Data Information: The Continuous-Time Case , 2015, IEEE Transactions on Cybernetics.

[46]  Fumin Zhang,et al.  Task Scheduling for Control Oriented Requirements for Cyber-Physical Systems , 2008, 2008 Real-Time Systems Symposium.

[47]  Jun Hu,et al.  Estimation, filtering and fusion for networked systems with network-induced phenomena: New progress and prospects , 2016, Inf. Fusion.

[48]  Peter Willett,et al.  Bayesian Data Fusion for Distributed Target Detection in Sensor Networks , 2010, IEEE Transactions on Signal Processing.

[49]  Qing-Long Han,et al.  On Designing a Novel Self-Triggered Sampling Scheme for Networked Control Systems With Data Losses and Communication Delays , 2016, IEEE Transactions on Industrial Electronics.

[50]  Seddik Bacha,et al.  Design of Robust Distributed Control for Interconnected Microgrids , 2016, IEEE Transactions on Smart Grid.

[51]  David Ward,et al.  Vulnerable links and secure architectures in the stabilization of networks of controlled dynamical systems , 2012, 2012 American Control Conference (ACC).

[52]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[53]  Derui Ding,et al.  Event-triggered consensus control for discrete-time stochastic multi-agent systems: The input-to-state stability in probability , 2015, Autom..

[54]  Ling Shi,et al.  A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[55]  Qing-Long Han,et al.  Consensus of Multiagent Systems Subject to Partially Accessible and Overlapping Markovian Network Topologies , 2017, IEEE Transactions on Cybernetics.

[56]  Mo-Yuen Chow,et al.  Resilient Distributed Control in the Presence of Misbehaving Agents in Networked Control Systems , 2014, IEEE Transactions on Cybernetics.

[57]  Zhihua Qu,et al.  An Attack-Resilient Cooperative Control Strategy of Multiple Distributed Generators in Distribution Networks , 2016, IEEE Transactions on Smart Grid.

[58]  Qing Hui,et al.  Energy-Event-Triggered Hybrid Supervisory Control for Cyber-Physical Network Systems , 2015, IEEE Transactions on Automatic Control.

[59]  Bing Li,et al.  New stability criteria for linear systems with interval time-varying delay , 2013, Proceedings of 2013 2nd International Conference on Measurement, Information and Control.

[60]  Qing-Long Han,et al.  Abel lemma-based finite-sum inequality and its application to stability analysis for linear discrete time-delay systems , 2015, Autom..

[61]  Jin Wang,et al.  Stability analysis and controller design of DC microgrids with constant power loads , 2015, 2015 IEEE Applied Power Electronics Conference and Exposition (APEC).

[62]  Zidong Wang,et al.  A Constrained Optimization Approach to Dynamic State Estimation for Power Systems Including PMU and Missing Measurements , 2013, IEEE Transactions on Control Systems Technology.

[63]  Zidong Wang,et al.  H∞ state estimation with fading measurements, randomly varying nonlinearities and probabilistic distributed delays , 2015 .

[64]  Nand Kishor,et al.  Distributed Multi-Agent System-Based Load Frequency Control for Multi-Area Power System in Smart Grid , 2017, IEEE Transactions on Industrial Electronics.

[65]  Frank Vahid,et al.  A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems , 2014, KSII Trans. Internet Inf. Syst..

[66]  Yunghsiang Sam Han,et al.  Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.

[67]  H. T. Mouftah,et al.  Energy-Efficient Information and Communication Infrastructures in the Smart Grid: A Survey on Interactions and Open Issues , 2015, IEEE Communications Surveys & Tutorials.

[68]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[69]  Fuad E. Alsaadi,et al.  On scheduling of deception attacks for discrete-time networked systems equipped with attack detectors , 2017, Neurocomputing.

[70]  Huijun Gao,et al.  On H-infinity Estimation of Randomly Occurring Faults for A Class of Nonlinear Time-Varying Systems With Fading Channels , 2016, IEEE Transactions on Automatic Control.

[71]  Jinde Cao,et al.  Leader-Following Consensus of Nonlinear Multiagent Systems With Stochastic Sampling , 2017, IEEE Transactions on Cybernetics.

[72]  Panos J. Antsaklis,et al.  Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.

[73]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[74]  Insup Lee,et al.  Design and Implementation of Attack-Resilient Cyberphysical Systems: With a Focus on Attack-Resilient State Estimators , 2017, IEEE Control Systems.

[75]  Nand Kishor,et al.  Load Frequency Control with Communication Topology Changes in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.

[76]  Rick S. Blum,et al.  Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.

[77]  Danda B. Rawat,et al.  Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.

[78]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[79]  Jay Lee,et al.  Smart Agents in Industrial Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[80]  Zidong Wang,et al.  Event-triggered distributed ℋ ∞ state estimation with packet dropouts through sensor networks , 2015 .

[81]  Fuad E. Alsaadi,et al.  State estimation for a class of artificial neural networks with stochastically corrupted measurements under Round-Robin protocol , 2016, Neural Networks.

[82]  Derui Ding,et al.  Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks , 2017, Autom..

[83]  Qing-Long Han,et al.  A New $H_{{\bm \infty}}$ Stabilization Criterion for Networked Control Systems , 2008, IEEE Transactions on Automatic Control.

[84]  Qing-Long Han,et al.  Delay-dependent robust stability for uncertain linear systems with interval time-varying delay , 2006, Autom..

[85]  Gexiang Zhang,et al.  Power System Real-Time Monitoring by Using PMU-Based Robust State Estimation Method , 2016, IEEE Transactions on Smart Grid.

[86]  Donghua Zhou,et al.  Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems , 2016, IEEE Transactions on Industrial Electronics.

[87]  Xinghuo Yu,et al.  Survey on Recent Advances in Networked Control Systems , 2016, IEEE Transactions on Industrial Informatics.

[88]  Changyun Wen,et al.  Adaptive cyber-physical system attack detection and reconstruction with application to power systems , 2016 .

[89]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[90]  Haibo He,et al.  Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..

[91]  Qing-Long Han,et al.  An Overview and Deep Investigation on Sampled-Data-Based Event-Triggered Control and Filtering for Networked Systems , 2017, IEEE Transactions on Industrial Informatics.

[92]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[93]  Maria Domenica Di Benedetto,et al.  Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks , 2016, Autom..

[94]  Edward A. Lee,et al.  A Programming Model for Time-Synchronized Distributed Real-Time Systems , 2007, 13th IEEE Real Time and Embedded Technology and Applications Symposium (RTAS'07).

[95]  Jiming Chen,et al.  Privacy and performance trade-off in cyber-physical systems , 2016, IEEE Network.

[96]  Jia Wang,et al.  Event-Triggered Generalized Dissipativity Filtering for Neural Networks With Time-Varying Delays , 2016, IEEE Transactions on Neural Networks and Learning Systems.

[97]  Xinping Guan,et al.  A comprehensive overview of cyber-physical systems: from perspective of feedback system , 2016, IEEE/CAA Journal of Automatica Sinica.

[98]  Zhiwei Gao,et al.  From Model, Signal to Knowledge: A Data-Driven Perspective of Fault Detection and Diagnosis , 2013, IEEE Transactions on Industrial Informatics.

[99]  Bruno Sinopoli,et al.  Detecting Integrity Attacks on SCADA Systems , 2011 .

[100]  Zhu Han,et al.  Data Traffic Scheduling for Cyber Physical Systems With Application in Voltage Control of Distributed Generations: A Hybrid System Framework , 2014, IEEE Systems Journal.

[101]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[102]  Lei Zou,et al.  Observer-based H∞ control of networked systems with stochastic communication protocol: The finite-horizon case , 2016, Autom..

[103]  Fuad E. Alsaadi,et al.  Receding horizon filtering for a class of discrete time-varying nonlinear systems with multiple missing measurements , 2015, Int. J. Gen. Syst..

[104]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[105]  Robert J. Elliott,et al.  On Finite-State Stochastic Modeling and Secure Estimation of Cyber-Physical Systems , 2017, IEEE Transactions on Automatic Control.

[106]  Qing-Long Han,et al.  Security control for a class of discrete-time stochastic nonlinear systems subject to deception attacks , 2016 .

[107]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[108]  Zidong Wang,et al.  Variance-constrained H∞ control for a class of nonlinear stochastic discrete time-varying systems: The event-triggered design , 2016, Autom..

[109]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[110]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[111]  W. P. M. H. Heemels,et al.  Event-Triggered Control Systems Under Denial-of-Service Attacks , 2017, IEEE Transactions on Control of Network Systems.

[112]  L. Nordstrom,et al.  A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis , 2014, IEEE Transactions on Power Delivery.

[113]  José M. F. Moura,et al.  Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[114]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[115]  Nand Kishor,et al.  Robust H-infinity load frequency control in hybrid distributed generation system , 2013 .

[116]  Minrui Fei,et al.  Decentralized event-triggered average consensus for multi-agent systems in CPSs with communication constraints , 2015, IEEE/CAA Journal of Automatica Sinica.

[117]  Daniel W. C. Ho,et al.  Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks , 2017, IEEE Transactions on Cybernetics.

[118]  Zidong Wang,et al.  Event-based security control for discrete-time stochastic systems , 2016 .

[119]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[120]  Xin Xu,et al.  MixCPS: Mixed Time/Event-Triggered Architecture of Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[121]  Mohsen Guizani,et al.  Securing Cognitive Radio Networks against Primary User Emulation Attacks , 2016, IEEE Network.

[122]  Saurabh Amin,et al.  In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.

[123]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[124]  Jing Lin,et al.  Modeling Cyber-Physical Systems with Semantic Agents , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.

[125]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[126]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[127]  Guo-Ping Liu,et al.  Design and Implementation of Secure Networked Predictive Control Systems Under Deception Attacks , 2012, IEEE Transactions on Control Systems Technology.

[128]  Qing-Long Han,et al.  An improved reciprocally convex inequality and an augmented Lyapunov-Krasovskii functional for stability of linear systems with time-varying delay , 2017, Autom..

[129]  Qing-Long Han,et al.  Global asymptotic stability analysis for delayed neural networks using a matrix-based quadratic convex approach , 2014, Neural Networks.

[130]  Paulo Tabuada,et al.  Towards Robustness for Cyber-Physical Systems , 2014, IEEE Transactions on Automatic Control.

[131]  Qing-Long Han,et al.  New Lyapunov-Krasovskii Functionals for Global Asymptotic Stability of Delayed Neural Networks , 2009, IEEE Trans. Neural Networks.

[132]  Sonia Martínez,et al.  On the Performance Analysis of Resilient Networked Control Systems Under Replay Attacks , 2013, IEEE Transactions on Automatic Control.

[133]  Yunghsiang Sam Han,et al.  Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data , 2014, IEEE Signal Processing Letters.

[134]  Radha Poovendran,et al.  A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems , 2013, IEEE Transactions on Automatic Control.

[135]  Anna Scaglione,et al.  Robust Decentralized State Estimation and Tracking for Power Systems via Network Gossiping , 2013, IEEE Journal on Selected Areas in Communications.

[136]  Q. Han,et al.  Event‐triggered H∞ control for a class of nonlinear networked control systems using novel integral inequalities , 2017 .

[137]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[138]  Feng Qian,et al.  Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control , 2017, Inf. Sci..

[139]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[140]  Jiming Chen,et al.  An Online Optimization Approach for Control and Communication Codesign in Networked Cyber-Physical Systems , 2013, IEEE Transactions on Industrial Informatics.

[141]  Issarachai Ngamroo,et al.  Robust LFC in a Smart Grid With Wind Power Penetration by Coordinated V2G Control and Frequency Controller , 2014, IEEE Transactions on Smart Grid.

[142]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[143]  Qing-Long Han,et al.  Distributed networked control systems: A brief overview , 2017, Inf. Sci..