{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T06:23:42Z","timestamp":1761719022718,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T00:00:00Z","timestamp":1612224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A large-scale Cyber-Physical System (CPS) such as a smart grid usually provides service to a vast number of users as a public utility. Security is one of the most vital aspects in such critical infrastructures. The existing CPS security usually considers the attack from the information domain to the physical domain, such as injecting false data to damage sensing. Social Collective Attack on CPS (SCAC) is proposed as a new kind of attack that intrudes into the social domain and manipulates the collective behavior of social users to disrupt the physical subsystem. To provide a systematic description framework for such threats, we extend MITRE ATT&amp;CK, the most used cyber adversary behavior modeling framework, to cover social, cyber, and physical domains. We discuss how the disinformation may be constructed and eventually leads to physical system malfunction through the social-cyber-physical interfaces, and we analyze how the adversaries launch disinformation attacks to better manipulate collective behavior. Finally, simulation analysis of SCAC in a smart grid is provided to demonstrate the possibility of such an attack.<\/jats:p>","DOI":"10.3390\/s21030991","type":"journal-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T05:44:42Z","timestamp":1612244682000},"page":"991","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8670-3086","authenticated-orcid":false,"given":"Peidong","family":"Zhu","sequence":"first","affiliation":[{"name":"Department of Electronic Information and Electrical Engineering, Changsha University, Changsha 410022, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5225-6118","authenticated-orcid":false,"given":"Peng","family":"Xun","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3086-0218","authenticated-orcid":false,"given":"Yifan","family":"Hu","sequence":"additional","affiliation":[{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5402-8389","authenticated-orcid":false,"given":"Yinqiao","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Electronic Information and Electrical Engineering, Changsha University, Changsha 410022, China"},{"name":"College of Computer, National University of Defense Technology, Changsha 410073, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,2,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/TSMC.2015.2452897","article-title":"Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants","volume":"46","author":"Cho","year":"2016","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.future.2015.06.006","article-title":"Robust Cyber-Physical Systems: Concept, models, and implementation","volume":"56","author":"Hu","year":"2016","journal-title":"Future Gener. Comput. Syst. FGCS"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/TR.2015.2406860","article-title":"Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems","volume":"65","author":"Mitchell","year":"2016","journal-title":"IEEE Trans. Reliab."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1016\/j.cose.2012.02.009","article-title":"SCADA security in the light of Cyber-Warfare","volume":"31","author":"Nicholson","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Liu, Y., Ning, P., and Reiter, M.K. (2011). False Data Injection Attacks against State Estimation in Electric Power Grids. ACM Trans. Inf. Syst. Secur., 14.","DOI":"10.1145\/1952982.1952995"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.cose.2016.01.001","article-title":"False sequential logic attack on SCADA system and its physical impact analysis","volume":"58","author":"Li","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/COMST.2019.2959013","article-title":"Cyber-Physical-Social Systems: A State-of-the-Art Survey, Challenges and Opportunities","volume":"22","author":"Zhou","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MWC.2016.7553022","article-title":"Social-aware energy harvesting device-to-device communications in 5G networks","volume":"23","author":"Jiang","year":"2016","journal-title":"IEEE Wirel. Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2516","DOI":"10.1109\/TSG.2016.2546181","article-title":"Data-Driven Power Outage Detection by Social Sensors","volume":"7","author":"Sun","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/JAS.2015.7152667","article-title":"Cyber-physical-social system in intelligent transportation","volume":"2","author":"Xiong","year":"2015","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TPWRS.2010.2048223","article-title":"Decentralized Demand-Side Contribution to Primary Frequency Control","volume":"26","author":"Bouffard","year":"2011","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Noureddine, M., Keefe, K., Sanders, W.H., and Bashir, M. (2015, January 21\u201322). Quantitative Security Metrics with Human in the Loop. Proceedings of the 2015 Symposium and Bootcamp on the Science of Security\u2014HotSoS\u201915, Urbana, IL, USA.","DOI":"10.1145\/2746194.2746215"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1016\/j.cose.2012.08.004","article-title":"Power to the people? The evolving recognition of human aspects of security","volume":"31","author":"Furnell","year":"2012","journal-title":"Comput. Secur."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.1109\/TSG.2015.2509945","article-title":"Price Modification Attack and Protection Scheme in Smart Grid","volume":"8","author":"Mishra","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_15","unstructured":"Soltan, S., Mittal, P., and Poor, H.V. (2018, January 15\u201317). BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid. Proceedings of the 27th USENIX Conference on Security Symposium\u2014SEC\u201918, Baltimore, MD, USA."},{"key":"ref_16","unstructured":"(2020, December 26). Mitre ATT&CK Knowledge Base. Available online: https:\/\/attack.mitre.org."},{"key":"ref_17","unstructured":"(2020, December 26). ATT&CK for Industrial Control Systems. Available online: https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page."},{"key":"ref_18","unstructured":"(2020, December 26). Adversarial Misinformation and Influence Tactics and Techniques. Available online: https:\/\/github.com\/misinfosecproject\/amitt_framework."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Al Faruque, M.A., Chhetri, S.R., Canedo, A., and Wan, J. (2016, January 11\u201314). Acoustic Side-Channel Attacks on Additive Manufacturing Systems. Proceedings of the 2016 ACM\/IEEE 7th International Conference on Cyber-Physical Systems (ICCPS), Vienna, Austria.","DOI":"10.1109\/ICCPS.2016.7479068"},{"key":"ref_20","unstructured":"(2020, December 26). The Spread of WeChat Rumors Should Be Cautious. (In Chinese)."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Negenborn, R.R., Lukszo, Z., and Hellendoorn, H. (2010). Social and Cyber Factors Interacting over the Infrastructures: A MAS Framework for Security Analysis. Intelligent Infrastructures, Springer.","DOI":"10.1007\/978-90-481-3598-1"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Karnouskos, S. (2011, January 7\u201310). Stuxnet worm impact on industrial cyber-physical system security. Proceedings of the IECON 2011\u201437th Annual Conference of the IEEE Industrial Electronics Society, Melbourne, Australia.","DOI":"10.1109\/IECON.2011.6120048"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, S., Wang, D., Su, L., Kaplan, L., and Abdelzaher, T.F. (2014, January 2\u20135). Towards Cyber-Physical Systems in Social Spaces: The Data Reliability Challenge. Proceedings of the 2014 IEEE Real-Time Systems Symposium, Rome, Italy.","DOI":"10.1109\/RTSS.2014.19"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"80491","DOI":"10.1109\/ACCESS.2019.2923578","article-title":"Resilience of Smart Power Grids to False Pricing Attacks in the Social Network","volume":"7","author":"Tang","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2219","DOI":"10.1109\/TPWRS.2014.2307474","article-title":"A Distributed Direct Load Control Approach for Large-Scale Residential Demand Response","volume":"29","author":"Chen","year":"2014","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1109\/TSG.2015.2431324","article-title":"Demand Response Management in the Smart Grid in a Large Population Regime","volume":"7","author":"Maharjan","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_27","unstructured":"University of Oxford (2020, November 16). Social Media Manipulation Rising Globally, New Report Warns. Available online: http:\/\/comprop.oii.ox.ac.uk\/research\/cybertroops2018\/."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"2862","DOI":"10.1109\/TSG.2016.2622686","article-title":"Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes","volume":"9","author":"Amini","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"16774","DOI":"10.1109\/ACCESS.2017.2738565","article-title":"Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid","volume":"5","author":"Pan","year":"2017","journal-title":"IEEE Access"},{"key":"ref_30","unstructured":"Mahmoud, M.S. (2017). Chapter 7\u2014Demand Side Management in Microgrid Control Systems. Microgrid, Butterworth-Heinemann."},{"key":"ref_31","unstructured":"(2020, November 16). Earthhour. Available online: http:\/\/www.earthhour.org."},{"key":"ref_32","first-page":"1","article-title":"A social diffusion model of misinformation and disinformation for understanding human information behaviour","volume":"18","author":"Karlova","year":"2013","journal-title":"Inf. Res."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Tambuscio, M., Ruffo, G., Flammini, A., and Menczer, F. (2015, January 18\u201322). Fact-Checking Effect on Viral Hoaxes: A Model of Misinformation Spread in Social Networks. Proceedings of the 24th International Conference on World Wide Web\u2014WWW\u201915 Companion, Florence, Italy.","DOI":"10.1145\/2740908.2742572"},{"key":"ref_34","unstructured":"Miller, D.L. (2013). Introduction to Collective Behavior and Collective Action, Waveland Press."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1016\/j.physleta.2007.01.094","article-title":"Influence of network structure on rumor propagation","volume":"368","author":"Zhou","year":"2007","journal-title":"Phys. Lett. A"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/TPWRS.2007.901489","article-title":"Stabilization of Grid Frequency Through Dynamic Demand Control","volume":"22","author":"Short","year":"2007","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3576","DOI":"10.1109\/TPWRS.2013.2261096","article-title":"Optimal Load Control via Frequency Measurement and Neighborhood Area Communication","volume":"28","author":"Zhao","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Mishra, S., Li, X., Kuhnle, A., Thai, M.T., and Seo, J. (May, January 26). Rate alteration attacks in smart grid. Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Kowloon, Hong Kong.","DOI":"10.1109\/INFOCOM.2015.7218623"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TSG.2015.2425222","article-title":"Electricity Theft Detection in AMI Using Customers\u2019 Consumption Patterns","volume":"7","author":"Jokar","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_40","unstructured":"Wasserman, S. (July, January 28). Network Science: An Introduction to Recent Statistical Approaches. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining\u2014KDD\u201909, Paris, France."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/991\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T05:18:41Z","timestamp":1760159921000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/3\/991"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,2]]},"references-count":40,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,2]]}},"alternative-id":["s21030991"],"URL":"https:\/\/doi.org\/10.3390\/s21030991","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,2,2]]}}}