{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:28:49Z","timestamp":1775068129656,"version":"3.50.1"},"reference-count":59,"publisher":"Annual Reviews","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annu. Rev. Control Robot. Auton. Syst."],"published-print":{"date-parts":[[2022,5,3]]},"abstract":"<jats:p> Cyber-vulnerabilities are being exploited in a growing number of control systems. As many of these systems form the backbone of critical infrastructure and are becoming more automated and interconnected, it is of the utmost importance to develop methods that allow system designers and operators to do risk analysis and develop mitigation strategies. Over the last decade, great advances have been made in the control systems community to better understand cyber-threats and their potential impact. This article provides an overview of recent literature on secure networked control systems. Motivated by recent cyberattacks on the power grid, connected road vehicles, and process industries, a system model is introduced that covers many of the existing research studies on control system vulnerabilities. An attack space is introduced that illustrates how adversarial resources are allocated in some common attacks. The main part of the article describes three types of attacks: false data injection, replay, and denial-of-service attacks. Representative models and mathematical formulations of these attacks are given along with some proposed mitigation strategies. The focus is on linear discrete-time plant models, but various extensions are presented in the final section, which also mentions some interesting research problems for future work. <\/jats:p>","DOI":"10.1146\/annurev-control-072921-075953","type":"journal-article","created":{"date-parts":[[2021,11,11]],"date-time":"2021-11-11T00:28:16Z","timestamp":1636590496000},"page":"445-464","source":"Crossref","is-referenced-by-count":72,"title":["Secure Networked Control Systems"],"prefix":"10.1146","volume":"5","author":[{"given":"Henrik","family":"Sandberg","sequence":"first","affiliation":[{"name":"School of Electrical Engineering and Computer Science and Digital Futures, KTH Royal Institute of Technology, Stockholm, Sweden;,"}]},{"given":"Vijay","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of Notre Dame, Notre Dame, Indiana, USA;"}]},{"given":"Karl H.","family":"Johansson","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science and Digital Futures, KTH Royal Institute of Technology, Stockholm, Sweden;,"}]}],"member":"22","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2000.839316"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2417501"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"B5","author":"Zetter K.","year":"2016","journal-title":"Wired"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1002\/9781119644682"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010756"},{"key":"B8","doi-asserted-by":"crossref","unstructured":"Mokube I, Adams M. 2007. Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th Annual Southeast Regional Conference, pp. 321\u201326. New York: ACM","DOI":"10.1145\/1233341.1233399"},{"key":"B9","volume-title":"Encyclopedia of Cryptography and Security","author":"Petitcolas FAP","year":"2011"},{"key":"B10","author":"Cybersecur. Infrastruct. Secur. Agency","year":"2016","journal-title":"Cybersecurity and Infrastructure Security Agency"},{"key":"B11","doi-asserted-by":"crossref","unstructured":"Liu Y, Reiter MK, Ning P. 2009. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 21\u201332. New York: ACM","DOI":"10.1145\/1653662.1653666"},{"key":"B12","doi-asserted-by":"crossref","unstructured":"Teixeira A, Amin S, Sandberg H, Johansson KH, Sastry SS. 2010. Cyber-security analysis of state estimators in electric power systems. In 49th IEEE Conference on Decision and Control, pp. 5991\u201398. Piscataway, NJ: IEEE","DOI":"10.1109\/CDC.2010.5717318"},{"key":"B13","doi-asserted-by":"crossref","unstructured":"Liu S, Liu XP, El Saddik A. 2013. Denial-of-Service (DoS) attacks on load frequency control in smart grids. In 2013 IEEE PES Innovative Smart Grid Technologies Conference. Piscataway, NJ: IEEE. https:\/\/doi.org\/10.1109\/ISGT.2013.6497846","DOI":"10.1109\/ISGT.2013.6497846"},{"key":"B14","volume-title":"Remote exploitation of an unaltered passenger vehicle","author":"Miller C","year":"2015"},{"key":"B15","author":"Greenberg A.","year":"2015","journal-title":"Wired"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2511446"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2019.2925226"},{"key":"B18","volume-title":"Model-Based Fault Diagnosis Techniques: Design Schemes, Algorithms, and Tools","author":"Ding SX.","year":"2008","edition":"1"},{"key":"B19","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"Basseville M","year":"1993"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1976.1101146"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1109\/18.737522"},{"key":"B22","first-page":"76","volume":"51","author":"Giraldo J","year":"2018","journal-title":"ACM Comput. Surv."},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2013.2280899"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1002\/rnc.4375"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2013.2266831"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2573741"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2014.10.067"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2714903"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.04.047"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2016.2565379"},{"key":"B31","doi-asserted-by":"crossref","unstructured":"Umsonst D, Sandberg H. 2018. A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks. In 2018 IEEE Conference on Decision and Control, pp. 5975\u201381. Piscataway, NJ: IEEE","DOI":"10.1109\/CDC.2018.8619338"},{"key":"B32","doi-asserted-by":"crossref","unstructured":"Chong MS, Wakaiki M, Hespanha JP. 2015. Observability of linear systems under adversarial attacks. In 2015 American Control Conference, pp. 2439\u201344. Piscataway, NJ: IEEE","DOI":"10.1109\/ACC.2015.7171098"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2303233"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2019.2921989"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3002689"},{"key":"B36","doi-asserted-by":"crossref","unstructured":"Weerakkody S, Sinopoli B. 2015. Detecting integrity attacks on control systems using a moving target approach. In 2015 54th IEEE Conference on Decision and Control, pp. 5820\u201326. Piscataway, NJ: IEEE","DOI":"10.1109\/CDC.2015.7403134"},{"key":"B37","doi-asserted-by":"crossref","unstructured":"Teixeira A, Ferrari RM. 2018. Detection of sensor data injection attacks with multiplicative watermarking. In 2018 European Control Conference, pp. 338\u201343. Piscataway, NJ: IEEE","DOI":"10.23919\/ECC.2018.8550114"},{"key":"B38","doi-asserted-by":"crossref","unstructured":"Mo Y, Sinopoli B. 2009. Secure control against replay attacks. In Proceedings of the 47th Annual Allerton Conference on Communication, Control, and Computing, pp. 911\u201318. Piscataway, NJ: IEEE","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2014.2364724"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2575064"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.1502"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.3390\/e21020210"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77653-6_3"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416924"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2016.07.007"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00602-9_3"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"B48","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2549640"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2015.2416926"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120709"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32430-8_26"},{"key":"B52","doi-asserted-by":"crossref","unstructured":"Trejo KK, Clempner JB, Poznyak AS. 2016. Adapting strategies to dynamic environments in controllable stackelberg security games. In 2016 IEEE 55th Conference on Decision and Control, pp. 5484\u201389. Piscataway, NJ: IEEE","DOI":"10.1109\/CDC.2016.7799111"},{"key":"B53","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.2971994"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1201\/b10867"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2836950"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2714646"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2088690"},{"key":"B58","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2017.2668901"},{"key":"B59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44184-5_100112"}],"container-title":["Annual Review of Control, Robotics, and Autonomous Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.annualreviews.org\/doi\/pdf\/10.1146\/annurev-control-072921-075953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,3]],"date-time":"2022-05-03T16:06:36Z","timestamp":1651593996000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.annualreviews.org\/doi\/10.1146\/annurev-control-072921-075953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,3]]},"references-count":59,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,5,3]]}},"alternative-id":["10.1146\/annurev-control-072921-075953"],"URL":"https:\/\/doi.org\/10.1146\/annurev-control-072921-075953","relation":{},"ISSN":["2573-5144","2573-5144"],"issn-type":[{"value":"2573-5144","type":"print"},{"value":"2573-5144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,3]]}}}