{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T14:36:35Z","timestamp":1764945395272,"version":"3.46.0"},"reference-count":36,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Emerg. Technol. Comput. Syst."],"published-print":{"date-parts":[[2026,1,31]]},"abstract":"<jats:p>\n                    An attacker can modify the actuator inputs, sensor observations, and state of the physical system in a cyber-physical system (CPS), causing errors in the system\u2019s proper functioning. It is crucial to investigate a CPS in the presence of all possible attack types to make it resilient. For this, all possible attack sequences must be known. This article focuses on designing false data injection (FDI) attacks on the physical system, actuator input, and sensor measurement in a CPS, individually and in their combined locations. Each attack sequence follows a Gaussian distribution. We study a discrete linear time-invariant (LTI) CPS with a single sensor and actuator. The system also includes a Kalman filter and a Chi-square (\n                    <jats:inline-formula content-type=\"math\/tex\">\n                      <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(\\chi^{2}\\)<\/jats:tex-math>\n                    <\/jats:inline-formula>\n                    ) detector. With a\n                    <jats:inline-formula content-type=\"math\/tex\">\n                      <jats:tex-math notation=\"LaTeX\" version=\"MathJax\">\\(\\chi^{2}\\)<\/jats:tex-math>\n                    <\/jats:inline-formula>\n                    detector and possible known system parameters, we have proposed seven types of FDI attacks at vulnerable locations based on Kullback-Leibler (KL) divergence. The attacker can remain undetected by carefully planning the attack sequences. The attack increases the state estimation error (SER), and degrades the system\u2019s proper operation. The effect of attacks on the detection result and the difference between SER with and without attack is simulated through two examples from the LTI system.\n                  <\/jats:p>","DOI":"10.1145\/3764929","type":"journal-article","created":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T13:01:23Z","timestamp":1756731683000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of False Data Injection Attacks in a Cyber-Physical System Using Gaussian Distribution"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8735-3172","authenticated-orcid":false,"given":"Sushree","family":"Padhan","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1087-2027","authenticated-orcid":false,"given":"Ashok Kumar","family":"Turuk","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela, India"}]}],"member":"320","published-online":{"date-parts":[[2025,12,5]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.04.005"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2021.3113265"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2023.3253781"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3146078"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685684"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"391","DOI":"10.23919\/ACC.2019.8815274","volume-title":"2019 American Control Conference (ACC)","author":"Giraldo Jairo","year":"2019","unstructured":"Jairo Giraldo, Alvaro Cardenas, and Ricardo G. Sanfelice. 2019. A moving target defense to detect stealthy attacks in cyber-physical systems. In 2019 American Control Conference (ACC). IEEE, 391\u2013396."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2017.2749959"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.02.045"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2023.123441"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.11.018"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.06.015"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2023.03.052"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2022.3206717"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2019.2909357"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.05.085"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.11.001"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.23919\/CCC52363.2021.9549940"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2022.3171786"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2022.3161259"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2498708"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.06.082"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2023.1454"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSII.2021.3073724"},{"key":"e_1_3_1_26_2","article-title":"The Matrix Cookbook","author":"Petersen Kaare Brandt","year":"2008","unstructured":"Kaare Brandt Petersen and Michael Syskind Pedersen. 2008. The Matrix Cookbook. Technical University of Denmark.","journal-title":"Technical University of Denmark"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2022.112423"},{"key":"e_1_3_1_28_2","first-page":"5708","volume-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems","author":"Shen Xin-Yu","year":"2019","unstructured":"Xin-Yu Shen and Xiao-Jian Li. 2019. Data-driven output-feedback LQ secure control for unknown cyber-physical systems against sparse actuator attacks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 9 (2019), 5708\u20135720."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096958"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2019.02.010"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2022.105178"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2959083"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.11.079"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3029861"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2915124"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2409905"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eng.2019.07.015"}],"container-title":["ACM Journal on Emerging Technologies in Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3764929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T14:33:02Z","timestamp":1764945182000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3764929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,5]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1,31]]}},"alternative-id":["10.1145\/3764929"],"URL":"https:\/\/doi.org\/10.1145\/3764929","relation":{},"ISSN":["1550-4832","1550-4840"],"issn-type":[{"type":"print","value":"1550-4832"},{"type":"electronic","value":"1550-4840"}],"subject":[],"published":{"date-parts":[[2025,12,5]]},"assertion":[{"value":"2024-03-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-22","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}