Advanced Search
Turn off MathJax
Article Contents
MIAO Jinzhao, LIU Jinliang, SUN Le, ZHA Lijuan, TIAN Engang. A Learning-Based Security Control Method for Cyber-Physical Systems Based on False Data Detection[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250537
Citation: MIAO Jinzhao, LIU Jinliang, SUN Le, ZHA Lijuan, TIAN Engang. A Learning-Based Security Control Method for Cyber-Physical Systems Based on False Data Detection[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT250537

A Learning-Based Security Control Method for Cyber-Physical Systems Based on False Data Detection

doi: 10.11999/JEIT250537 cstr: 32379.14.JEIT250537
Funds:  The National Natural Science Foundation of China (62373252, 62273174)
  • Rev Recd Date: 2025-09-16
  • Available Online: 2025-09-23
  •   Objective  Cyber-Physical Systems (CPS) constitute the backbone of critical infrastructures and industrial applications, but the tight coupling of cyber and physical components renders them highly susceptible to cyberattacks. False data injection attacks are particularly dangerous because they compromise sensor integrity, mislead controllers, and can trigger severe system failures. Existing control strategies often assume reliable sensor data and lack resilience under adversarial conditions. Furthermore, most conventional approaches decouple attack detection from control adaptation, leading to delayed or ineffective responses to dynamic threats. To overcome these limitations, this study develops a unified secure learning control framework that integrates real-time attack detection with adaptive control policy learning. By enabling the dynamic identification and mitigation of false data injection attacks, the proposed method enhances both stability and performance of CPS under uncertain and adversarial environments.  Methods  To address false data injection attacks in CPS, this study proposes an integrated secure control framework that combines attack detection, state estimation, and adaptive control strategy learning. A sensor grouping-based security assessment index is first developed to detect anomalous sensor data in real time without requiring prior knowledge of attacks. Next, a multi-source sensor fusion estimation method is introduced to reconstruct the system’s true state, thereby improving accuracy and robustness under adversarial disturbances. Finally, an adaptive learning control algorithm is designed, in which dynamic weight updating via gradient descent approximates the optimal control policy online. This unified framework enhances both steady-state performance and resilience of CPS against sophisticated attack scenarios. Its effectiveness and security performance are validated through simulation studies under diverse false data injection attack settings.  Results and Discussions  Simulation results confirm the effectiveness of the proposed secure adaptive learning control framework under multiple false data injection attacks in CPS. As shown in Fig. 1, system states rapidly converge to steady values and maintain stability despite sensor attacks. Fig. 2 demonstrates that the fused state estimator tracks the true system state with greater accuracy than individual local estimators. In Fig. 3, the compensated observation outputs align closely with the original, uncorrupted measurements, indicating precise attack estimation. Fig. 4 shows that detection indicators for sensor groups 2–5 increase sharply during attack intervals, while unaffected sensors remain near zero, verifying timely and accurate detection. Fig. 5 further confirms that the estimated attack signals closely match the true injected values. Finally, Fig. 6 compares different control strategies, showing that the proposed method achieves faster stabilization and smaller state deviations. Together, these results demonstrate robust control, accurate state estimation, and real-time detection under unknown attack conditions.  Conclusions  This study addresses secure perception and control in CPS under false data injection attacks by developing an integrated adaptive learning control framework that unifies detection, estimation, and control. A sensor-level anomaly detection mechanism is introduced to identify and localize malicious data, substantially enhancing attack detection capability. The fusion-based state estimation method further improves reconstruction accuracy of true system states, even when observations are compromised. At the control level, an adaptive learning controller with online weight adjustment enables real-time approximation of the optimal control policy without requiring prior knowledge of the attack model. Future research will extend the proposed framework to broader application scenarios and evaluate its resilience under diverse attack environments.
  • loading
  • [1]
    YU Rongrong, ZHAO Xu, LU Si, et al. Intelligent game-theoretic approach for resilient robust control design of cyber-physical systems: Application to intelligent transportation systems[J]. IEEE Transactions on Intelligent Transportation Systems, 2024, 25(11): 16072–16083. doi: 10.1109/TITS.2024.3407721.
    [2]
    杨挺, 刘亚闯, 刘宇哲, 等. 信息物理系统技术现状分析与趋势综述[J]. 电子与信息学报, 2021, 43(12): 3393–3406. doi: 10.11999/JEIT211135.

    YANG Ting, LIU Yachuang, LIU Yuzhe, et al. Review on cyber-physical system: Technology analysis and trends[J]. Journal of Electronics & Information Technology, 2021, 43(12): 3393–3406. doi: 10.11999/JEIT211135.
    [3]
    ZHOU Yuanqiang, VAMVOUDAKIS K G, HADDAD W M, et al. A secure control learning framework for cyber-physical systems under sensor and actuator attacks[J]. IEEE Transactions on Cybernetics, 2021, 51(9): 4648–4660. doi: 10.1109/TCYB.2020.3006871.
    [4]
    张志鹏, 许倩, 夏承遗. 基于矩阵半张量积的信息物理融合系统状态不透明性分析与控制[J]. 电子与信息学报, 2021, 43(12): 3434–3441. doi: 10.11999/JEIT210492.

    ZHANG Zhipeng, XU Qian, and XIA Chengyi. Semi-tensor product of matrices-based approach to the opacity analysis of cyber physical systems[J]. Journal of Electronics & Information Technology, 2021, 43(12): 3434–3441. doi: 10.11999/JEIT210492.
    [5]
    金增旺, 刘茵, 刁靖东, 等. 针对信息物理系统远程状态估计的隐蔽虚假数据注入攻击[J]. 自动化学报, 2025, 51(2): 356–365. doi: 10.16383/j.aas.c240527.

    JIN Zengwang, LIU Yin, DIAO Jingdong, et al. Stealthy false data injection attacks on remote state estimation of cyber-physical systems[J]. Acta Automatica Sinica, 2025, 51(2): 356–365. doi: 10.16383/j.aas.c240527.
    [6]
    WANG Zhe, ZHANG Heng, YANG Chaoqun, et al. Improved zero-dynamics attack scheduling with state estimation[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(2): 472–474. doi: 10.1109/JAS.2024.124737.
    [7]
    ZHU Panpan, JIN Shangtai, BU Xuhui, et al. Model-free adaptive control for a class of MIMO nonlinear cyberphysical systems under false data injection attacks[J]. IEEE Transactions on Control of Network Systems, 2023, 10(1): 467–478. doi: 10.1109/TCNS.2022.3203354.
    [8]
    GAO Yang, MA Jiali, WANG Jiaqi, et al. Event-triggered adaptive fixed-time secure control for nonlinear cyber-physical system with false data-injection attacks[J]. IEEE Transactions on Circuits and Systems II: Express Briefs, 2023, 70(1): 316–320. doi: 10.1109/TCSII.2022.3217823.
    [9]
    LIU Yifa, CHENG Long, and YE Dan. Stealthy false data injection attacks against the summation detector in cyber-physical systems[J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2: 391–403. doi: 10.1109/TICPS.2024.3446469.
    [10]
    GUIBENE K, MESSAI N, AYAIDA M, et al. A pattern mining-based false data injection attack detector for industrial cyber-physical systems[J]. IEEE Transactions on Industrial Informatics, 2024, 20(2): 2969–2978. doi: 10.1109/TII.2023.3297139.
    [11]
    ZHANG Qiang and HE Dakuo. Adaptive neural control of nonlinear cyber–physical systems against randomly occurring false data injection attacks[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023, 53(4): 2444–2455. doi: 10.1109/TSMC.2022.3212391.
    [12]
    LI Tongxiang, CHEN Bo, LIU Shichao, et al. Fast attack detection for cyber–physical systems using dynamic data encryption[J]. IEEE Transactions on Cybernetics, 2024, 54(5): 3251–3264. doi: 10.1109/TCYB.2023.3332079.
    [13]
    REN Yan, ZHANG Heng, YANG Wen, et al. Transferable adversarial attack against deep reinforcement learning-based smart grid dynamic pricing system[J]. IEEE Transactions on Industrial Informatics, 2024, 20(6): 9015–9025. doi: 10.1109/TII.2024.3379645.
    [14]
    SOLEIMANI E, SEDIGH A K, and NIKOOFARD A. Data-driven reinforcement learning-based forgetting factor iterative learning control[J]. IEEE Transactions on Automation Science and Engineering, 2025, 22: 12245–12256. doi: 10.1109/TASE.2025.3540699.
    [15]
    FEI Cheng, SHEN Jun, QIU Hongling, et al. Learning secure control design for cyber-physical systems under false data injection attacks[J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2024, 2: 60–68. doi: 10.1109/TICPS.2024.3373715.
    [16]
    LI Jinyan, LI Xiaomeng, CHEN Guangdeng, et al. Optimal tracking control for cyber-physical systems under mixed attacks via game-theoretical Q-learning[J]. IEEE Transactions on Automation Science and Engineering, 2025, 22: 11944–11954. doi: 10.1109/TASE.2025.3540401.
    [17]
    LI Xiaohang, CHADLI M, TIAN Zhaoyang, et al. Resilient-learning control of cyber-physical systems against mixed-type network attacks[J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2024, 54(9): 5692–5703. doi: 10.1109/TSMC.2024.3408413.
    [18]
    SHEN Hao, WANG Yun, WU Jiacheng, et al. Secure control for Markov jump cyber-physical systems subject to malicious attacks: A resilient hybrid learning scheme[J]. IEEE Transactions on Cybernetics, 2024, 54(11): 7068–7079. doi: 10.1109/TCYB.2024.3448407.
    [19]
    REN Hongru, LONG Yinren, LI Hongyi, et al. Data-driven group formation control of cyber-physical systems via distributed cloud computing[J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2025, 3: 341–350. doi: 10.1109/TICPS.2025.3561726.
    [20]
    SUO Yuhan, CHAI Runqi, CHAI Senchun, et al. Attack detection and secure state estimation of collectively observable cyber-physical systems under false data injection attacks[J]. IEEE Transactions on Automatic Control, 2024, 69(3): 2067–2074. doi: 10.1109/TAC.2023.3316160.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)

    Article Metrics

    Article views (24) PDF downloads(1) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return