{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:52:20Z","timestamp":1760147540001,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T00:00:00Z","timestamp":1675900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Program of the National Natural Science Foundation of China","award":["61333008","JG2018-119"],"award-info":[{"award-number":["61333008","JG2018-119"]}]},{"name":"Key Discipline Construction Projects of Henan Provincial Education Department in the ninth batch (Detection Technology and Automation Device)","award":["61333008","JG2018-119"],"award-info":[{"award-number":["61333008","JG2018-119"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Stealthy attacks in sensor and actuator loops are the research priorities in the security of cyber-physical systems. Existing attacks define the stealthiness conditions against the Chi-square or Kullback-Leibler divergence detectors and parameterize the attack model based on additive signals. Such conditions ignore the potential anomalies of the vulnerable outputs in the control layer, and the attack sequences need to be generated online, increasing the hardware and software costs. This paper investigates a type of multiplicative attack with essential stealthiness where the employed model is a novel form. The advantage is that the parameters can be designed in a constant form without having to be generated online. An essential stealthiness condition is proposed for the first time and complements the existing ones. Two sufficient conditions for the existence of constant attack matrices are given in the form of theorems, where two methods for decoupling the unknown variables are particularly considered. A quadruple-tank process, an experimental platform for attack and defense, is developed to verify the theoretical results. The experiments indicate that the proposed attack strategy can fulfill both the attack performance and stealthiness conditions.<\/jats:p>","DOI":"10.3390\/s23041957","type":"journal-article","created":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T02:09:59Z","timestamp":1675994999000},"page":"1957","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multiplicative Attacks with Essential Stealthiness in Sensor and Actuator Loops against Cyber-Physical Systems"],"prefix":"10.3390","volume":"23","author":[{"given":"Jingzhao","family":"Chen","sequence":"first","affiliation":[{"name":"Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China"},{"name":"School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2372-9024","authenticated-orcid":false,"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China"},{"name":"School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China"}]},{"given":"Tengfei","family":"Li","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Metallurgical Automation and Measurement Technology, Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China"},{"name":"School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China"}]},{"given":"Yong","family":"Hu","sequence":"additional","affiliation":[{"name":"Science and Technology on Space Intelligent Control Laboratory, Beijing Institute of Control Engineering, Beijing 100190, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,9]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.arcontrol.2019.04.011","article-title":"A systems and control perspective of CPS security","volume":"47","author":"Dibaji","year":"2019","journal-title":"Annu. Rev. Control"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.isatra.2021.01.036","article-title":"A survey on attack detection, estimation and control of industrial cyber\u2013physical systems","volume":"116","author":"Zhang","year":"2021","journal-title":"ISA Trans."},{"key":"ref_3","unstructured":"Falliere, N., Murchu, L.O., and Chien, E. (2022, December 01). W32. Stuxnet Dossier. White Paper, Symantec Corp., Security Response. Available online: https:\/\/pax0r.com\/hh\/stuxnet\/Symantec-Stuxnet-Update-Feb-2011.pdf."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in industrial control systems","volume":"9","author":"Knowles","year":"2015","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/MCS.2016.2643239","article-title":"Design and implementation of attack-resilient cyber-physical systems: With a focus on attack-resilient state estimators","volume":"37","author":"Pajic","year":"2017","journal-title":"IEEE Control Syst. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bernieri, G., Conti, M., and Pascucci, F. (2018, January 10\u201313). A novel architecture for cyber-physical security in industrial control networks. Proceedings of the 4th International Forum on Research and Technology for Society and Industry (RTSI), Palermo, Italy.","DOI":"10.1109\/RTSI.2018.8548438"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Cervini, J., Rubin, A., and Watkins, L. (2022, January 17\u201318). Don\u2019t drink the cyber: Extrapolating the possibilities of Oldsmar\u2019s water treatment cyberattack. Proceedings of the International Conference on Cyber Warfare and Security, Albany, NY, USA.","DOI":"10.34190\/iccws.17.1.29"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhang, T.Y., and Ye, D. (2020). False data injection attacks with complete stealthiness in cyber\u2013physical systems: A self-generated approach. Automatica, 120.","DOI":"10.1016\/j.automatica.2020.109117"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"11539","DOI":"10.1109\/TCYB.2021.3068220","article-title":"Kullback-Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems","volume":"52","author":"Ren","year":"2021","journal-title":"IEEE Trans. Cybern."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.automatica.2017.03.016","article-title":"Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design","volume":"81","author":"Nozari","year":"2017","journal-title":"Automatica"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1083","DOI":"10.1109\/TSG.2018.2872252","article-title":"Resilient cooperative control of DC microgrids","volume":"10","author":"Abhinav","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"10277","DOI":"10.1016\/j.jfranklin.2018.04.001","article-title":"Security-based resilient event-triggered control of networked control systems under denial of service attacks","volume":"356","author":"Sun","year":"2019","journal-title":"J. Franklin Inst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2338","DOI":"10.1109\/TCYB.2019.2915124","article-title":"Summation detector for false data-injection attack in cyber-physical systems","volume":"50","author":"Ye","year":"2019","journal-title":"IEEE Trans. Cybern."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Liu, B., Chen, J., and Hu, Y. (2022). Mode division-based anomaly detection against integrity and availability attacks in industrial cyber-physical systems. Comput. Ind., 137.","DOI":"10.1016\/j.compind.2022.103609"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"3020","DOI":"10.1109\/TCYB.2018.2837874","article-title":"Data-driven methods for stealthy attacks on TCP\/IP-based networked control systems equipped with attack detectors","volume":"49","author":"Wang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.automatica.2017.11.018","article-title":"Worst-case stealthy innovation-based linear attack on remote state estimation","volume":"89","author":"Guo","year":"2018","journal-title":"Automatica"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7412","DOI":"10.1109\/TII.2021.3052182","article-title":"Stealthy sensor attack detection and real-time performance recovery for resilient CPS","volume":"17","author":"Kim","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1109\/TII.2017.2676005","article-title":"Covert attacks in cyber-physical control systems","volume":"13","author":"Machado","year":"2017","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"6454","DOI":"10.1016\/j.jfranklin.2018.05.046","article-title":"A data-driven covert attack strategy in the closed-loop cyber-physical systems","volume":"355","author":"Li","year":"2018","journal-title":"J. Franklin Inst."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","article-title":"A secure control framework for resource-limited adversaries","volume":"51","author":"Teixeira","year":"2015","journal-title":"Automatica"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1016\/j.ins.2019.01.001","article-title":"Optimal stealthy false data injection attacks in cyber-physical systems","volume":"481","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3911","DOI":"10.1109\/TAC.2019.2949877","article-title":"Malicious attacks on state estimation against distributed control systems","volume":"65","author":"Lu","year":"2019","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.ifacol.2018.06.298","article-title":"Detectable and undetectable network attack security of cyber-physical systems","volume":"51","author":"Lima","year":"2018","journal-title":"IFAC-PapersOnLine"},{"key":"ref_24","unstructured":"Mo, Y., and Sinopoli, B. (2010, January 12). False data injection attacks in control systems. Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, Sweden. Available online: https:\/\/ptolemy.berkeley.edu\/projects\/truststc\/conferences\/10\/CPSWeek\/papers\/scs1_paper_7.pdf."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/MCS.2014.2364724","article-title":"Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs","volume":"35","author":"Mo","year":"2015","journal-title":"IEEE Control Syst. Mag."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.neucom.2019.05.085","article-title":"Design of data-injection attacks for cyber-physical systems based on Kullback\u2013Leibler divergence","volume":"361","author":"Li","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"6082","DOI":"10.1109\/TAC.2021.3125430","article-title":"Worst-case stealthy innovation-based linear attacks on remote state estimation under Kullback-Leibler divergence","volume":"67","author":"Shang","year":"2021","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.automatica.2017.04.047","article-title":"Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs","volume":"82","author":"Bai","year":"2017","journal-title":"Automatica"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3495534","article-title":"Detection and mitigation of sensor and CAN bus attacks in vehicle anti-lock braking systems","volume":"6","author":"Kang","year":"2022","journal-title":"ACM Trans. on Cyber-Phys. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3242","DOI":"10.1109\/TIE.2016.2535119","article-title":"Two-channel false data injection attacks against output tracking control of networked systems","volume":"63","author":"Pang","year":"2016","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.sysconle.2015.08.007","article-title":"Robust static output feedback H\u221e control design for linear systems with polytopic uncertainties","volume":"85","author":"Chang","year":"2015","journal-title":"Syst. Control Lett."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.isatra.2019.05.008","article-title":"Observer-based output feedback H\u221e control for cyber\u2013physical systems under randomly occurring packet dropout and periodic DoS attacks","volume":"95","author":"Su","year":"2019","journal-title":"ISA Trans."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"4574","DOI":"10.1109\/TCYB.2020.3030503","article-title":"Finite-time extended dissipative filtering for singular T-S fuzzy systems with nonhomogeneous Markov jumps","volume":"52","author":"Tian","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.isatra.2018.09.006","article-title":"Robust H\u221e control for networked control systems with randomly occurring uncertainties: Observer-based case","volume":"83","author":"Li","year":"2018","journal-title":"ISA Trans."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/1957\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:29:04Z","timestamp":1760120944000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/1957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,9]]},"references-count":34,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["s23041957"],"URL":"https:\/\/doi.org\/10.3390\/s23041957","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,2,9]]}}}