Detection Of Methods for Enhancing Security in Cyber-Physical‎Systems Counteracting Zero Dynamic and False Information In‎jection Attacks

  • Authors

    • Peter Jose P Department of Computer Science, Mount Carmel College Autonomous, Bengaluru, Karnataka 560052, India
    • Teena KB Department of Information Science and Engineering, East point College of Engineering and Technology, Bengaluru, Karnataka 560049, ‎India
    • Shruti Tyagi Department of Problem Management, ServiceNow, 2225 Lawson Lane, Santa Clara, CA 95054, USA
    • D. Rosy Salomi Victoria Department of Information Technology, Chennai Institute of Technology, Kundrathur, Chennai, Tamil Nadu 600069, India
    • R . Vijayakumar Department of Computer Science and Engineering, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu 641022, India
    • S . Lakshminarasimhan Department of Artificial Intelligence and Data Science, J.J. College of Engineering and Technology, Tiruchirappalli, Tamil Nadu 620009, ‎India
    • Elangovan Balasubramanian Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh 522302, ‎India
    • P . Deepa Department of Computer Science and Engineering, Panimalar Engineering College, Chennai, Tamil Nadu 600123, India
    https://doi.org/10.14419/bd6zqx18

    Received date: May 11, 2025

    Accepted date: June 18, 2025

    Published date: June 30, 2025

  • Zero-Dynamics Attacks; Quanser Coupled Tank Plant; Irreversible Damage; Cyber-Physical Systems; Stealthy Intrusions
  • Abstract

    This research focuses on the design and implementation of Zero-Dynamics Attacks on a Quanser coupled tank plant and proposes a detection scheme to mitigate such cyber-physical threats. Zero-Dynamics Attacks are particularly insidious because they can initially remain ‎detected by conventional monitoring methods while causing significant disruption. The study begins by characterizing the plant through ‎control loop design and extracting its key parameters for accurate simulation. Simulations conducted in MATLAB demonstrate that Zero-Dynamics Attacks can remain hidden for extended periods, posing a critical risk. However, when transferred to a physical environment, ‎actuator saturation limits the effectiveness of these attacks, introducing an unexplored area in cyber-physical system security. This research ‎highlights how multi-frequency modeling can be leveraged to alter system dynamics and eliminate unstable zeros, improving the chances of ‎attack detection. Furthermore, the study proposes early detection algorithms tailored to identify the presence of Zero-Dynamics Attacks ‎before irreversible damage occurs. The results underscore the potential of saturation-aware defense strategies and open new directions for ‎securing cyber-physical systems against stealthy intrusions‎.

  • References

    1. Hu, P.; Gao, W.; Li, Y.; Wu, M.; Hua, F.; Qiao, L. Detection of false data injection attacks in smart grids based on expectation maximiza-tion. Sensors 2023, 23, 1683. https://doi.org/10.3390/s23031683.
    2. Zahid, F.; Kuo, M.M.; Sinha, R.; Funchal, G.; Pedrosa, T.; Leitao, P. Actively Detecting Multiscale Flooding Attacks & Attack Volumes in Re-source-Constrained ICPS. IEEE Trans. Ind. Inform. 2024. https://doi.org/10.1109/TII.2024.3383520.
    3. Amin, M.; El-Sousy, F.F.; Aziz, G.A.A.; Gaber, K.; Mohammed, O.A. CPS attacks mitigation approaches on power electronic systems with securi-ty challenges for smart grid applications: A review. IEEE Access 2021, 9, 38571–38601. https://doi.org/10.1109/ACCESS.2021.3063229.
    4. Duo, W.; Zhou, M.; Abusorrah, A. A survey of cyber attacks on cyber physical systems: Recent advances and challenges. IEEE/CAA J. Autom. Sin. 2022, 9, 784–800. https://doi.org/10.1109/JAS.2022.105548.
    5. Shih, C.S.; Chou, J.J.; Reijers, N.; Kuo, T.W. Designing CPS/IoT applications for smart buildings and cities. IET Cyber-Phys. Syst. Theory Appl. 2016, 1, 3–12. https://doi.org/10.1049/iet-cps.2016.0025.
    6. Wang, Z.; Xie, W.; Wang, B.; Tao, J.; Wang, E. A survey on recent advanced research of CPS security. Appl. Sci. 2021, 11, 3751. https://doi.org/10.3390/app11093751.
    7. Kazemi, Z.; Safavi, A.A.; Arefi, M.M.; Naseri, F. Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 4950–4959. https://doi.org/10.1109/TSMC.2021.3106228.
    8. Ma, Y.S.; Che, W.W.; Deng, C. Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks. Inf. Sci. 2022, 589, 790–801. https://doi.org/10.1016/j.ins.2022.01.009.
    9. Shalini, P.; Radha, V.; Sanjeevi, S.G. Early detection and mitigation of TCP SYN flood attacks in SDN using chi-square test. J. Supercom-put. 2023, 79, 10353–10385. https://doi.org/10.1007/s11227-023-05057-x.
    10. Yang, H.; Han, H.; Yin, S.; Han, H.; Wang, P. Sliding mode-based adaptive resilient control for Markovian jump cyber–physical systems in face of simultaneous actuator and sensor attacks. Automatica 2022, 142, 110345. https://doi.org/10.1016/j.automatica.2022.110345.
    11. Liu, S.; Gao, M.; Feng, Y.; Sheng, L. Dynamic event-triggered fault detection for rotary steerable systems with unknown time-varying noise covar-iances. ISA Trans. 2023, 142, 478–491. https://doi.org/10.1016/j.isatra.2023.08.018.
    12. Albalawi, T.; Ganeshkumar, P. CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detec-tion of Cyber-Attacks in IoT Systems. Comput. Mater. Contin. 2024, 78. https://doi.org/10.32604/cmc.2024.046396.
    13. Kumari, K.; Mrunalini, M. Detecting Denial of Service attacks using machine learning algorithms. J. Big Data 2022, 9, 56. https://doi.org/10.1186/s40537-022-00616-0.
    14. Reji, M.; Joseph, C.; Nancy, P.; Lourdes Mary, A. An intrusion detection system based on hybrid machine learning classifier. J. Intell. Fuzzy Syst. 2023, 44, 4245–4255. https://doi.org/10.3233/JIFS-222427.
    15. Huang, R.; Li, Y. Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE Trans. Smart Grid 2022, 14, 2367–2376. https://doi.org/10.1109/TSG.2022.3217060.
    16. Kavousi-Fard, A.; Su, W.; Jin, T. A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans. Ind. Inform. 2020, 17, 650–658. https://doi.org/10.1109/TII.2020.2964704.
    17. Combastel, C.; Zolghadri, A. A distributed Kalman filter with symbolic zonotopes and unique symbols provider for robust state estimation in CPS. Int. J. Control 2020, 93, 2596–2612. https://doi.org/10.1080/00207179.2019.1707278.
    18. Chen, B.; Ho, D.W.; Hu, G.; Yu, L. Delay-dependent distributed Kalman fusion estimation with dimensionality reduction in cyber-physical sys-tems. IEEE Trans. Cybern. 2021, 52, 13557–13571. https://doi.org/10.1109/TCYB.2021.3119461.
    19. Choraria, M.; Chattopadhyay, A.; Mitra, U.; Ström, E.G. Design of false data injection attack on distributed process estimation. IEEE Trans. Inf. Forensics Secur. 2022, 17, 670–683. https://doi.org/10.1109/TIFS.2022.3146078.
    20. Wang, X.; Ding, D.; Ge, X.; Han, Q.L. Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adap-tive event-triggered case. Int. J. Robust Nonlinear Control 2022, 32, 2760–2779. https://doi.org/10.1002/rnc.5831.
    21. Ma, R.; Hu, Z.; Xu, L.; Wu, L. Distributed Secure Estimation Against Sparse False Data Injection Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 2685–2697. https://doi.org/10.1109/TSMC.2023.3344876.
    22. Ma, K.; He, N.; Fan, Z. Resilient Self-Triggered Predictive Control for Nonlinear System under Dual-Channel Deception Attacks. Nonlinear Dyn. 2024, 112, 20081–20099. https://doi.org/10.1007/s11071-024-10080-5.
    23. Eslami, A.; Kazemi, M.G.; Khorasani, K. Event-Based Covert Cyber-Attack in Switching Cyber-Physical Systems: Design and Detection Mecha-nisms. In Proceedings of the 2024 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 15–18 April 2024; pp. 1–7. https://doi.org/10.1109/SysCon61195.2024.10553591.
    24. Qu, B.; Wang, Z.; Shen, B.; Dong, H.; Zhang, X. Secure Particle Filtering with Paillier Encryption-Decryption Scheme for Cyber-Physical Multi-Machine Power Grids. IEEE Trans. Smart Grid 2024, 15, 863–873. https://doi.org/10.1109/TSG.2023.3271949.
    25. Xin, L.; Long, Z.-Q. A Learning-Based Passive Resilient Controller for Cyber-Physical Systems: Countering Stealthy Deception Attacks and Com-plete Loss of Actuators Control Authority. IEEE/CAA J. Autom. Sin. 2024.
  • Downloads

  • How to Cite

    P, P. J., KB , T. ., Tyagi, S. ., Victoria, D. R. S. . ., Vijayakumar, R. ., Lakshminarasimhan, S. . ., Balasubramanian, E. ., & Deepa, P. . . (2025). Detection Of Methods for Enhancing Security in Cyber-Physical‎Systems Counteracting Zero Dynamic and False Information In‎jection Attacks. International Journal of Basic and Applied Sciences, 14(2), 470-483. https://doi.org/10.14419/bd6zqx18