{"id":"https://openalex.org/W2966416799","doi":"https://doi.org/10.1109/jiot.2019.2931349","title":"Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System","display_name":"Stealthy Attack Against Redundant Controller Architecture of Industrial Cyber-Physical System","publication_year":2019,"publication_date":"2019-07-26","ids":{"openalex":"https://openalex.org/W2966416799","doi":"https://doi.org/10.1109/jiot.2019.2931349","mag":"2966416799"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2019.2931349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2931349","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056524306","display_name":"Rongkuan Ma","orcid":"https://orcid.org/0000-0002-4791-6847"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rongkuan Ma","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051951845","display_name":"Peng Cheng","orcid":"https://orcid.org/0000-0002-4221-2162"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Cheng","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4221-2162","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035143434","display_name":"Zhenyong Zhang","orcid":"https://orcid.org/0000-0003-0950-1525"},"institutions":[{"id":"https://openalex.org/I4391767838","display_name":"State Key Laboratory of Industrial Control Technology","ror":"https://ror.org/03a33a786","country_code":null,"type":"facility","lineage":["https://openalex.org/I4391767838","https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyong Zhang","raw_affiliation_strings":["State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0003-0950-1525","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4391767838"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100343168","display_name":"Wenwen Liu","orcid":"https://orcid.org/0000-0002-0092-4276"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wenwen Liu","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006029284","display_name":"Qingxian Wang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qingxian Wang","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000792418","display_name":"Qiang Wei","orcid":"https://orcid.org/0000-0002-7207-6691"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiang Wei","raw_affiliation_strings":["State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-7207-6691","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056524306"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.717,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.95388941,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"6","issue":"6","first_page":"9783","last_page":"9793"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.8431726098060608},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.7085651755332947},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6591030359268188},{"id":"https://openalex.org/keywords/industrial-control-system","display_name":"Industrial control system","score":0.5962060689926147},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5711150169372559},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5431146025657654},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5231053829193115},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5177023410797119},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5093029737472534},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5088241696357727},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.49158725142478943},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.47734740376472473},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36147943139076233},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.34454143047332764},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3397625684738159},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.2578964829444885},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21201542019844055},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.18197789788246155}],"concepts":[{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.8431726098060608},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.7085651755332947},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6591030359268188},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.5962060689926147},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5711150169372559},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5431146025657654},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5231053829193115},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5177023410797119},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5093029737472534},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5088241696357727},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.49158725142478943},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.47734740376472473},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36147943139076233},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.34454143047332764},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3397625684738159},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2578964829444885},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21201542019844055},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.18197789788246155},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2019.2931349","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2019.2931349","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6299999952316284,"id":"https://metadata.un.org/sdg/6","display_name":"Clean water and sanitation"}],"awards":[{"id":"https://openalex.org/G5065734402","display_name":null,"funder_award_id":"61833015","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5206708238","display_name":null,"funder_award_id":"2018YFB0803501","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W152620456","https://openalex.org/W2002578057","https://openalex.org/W2019553608","https://openalex.org/W2039427951","https://openalex.org/W2039984414","https://openalex.org/W2043118292","https://openalex.org/W2071992589","https://openalex.org/W2077699686","https://openalex.org/W2119812052","https://openalex.org/W2145185087","https://openalex.org/W2330650066","https://openalex.org/W2340384825","https://openalex.org/W2406734572","https://openalex.org/W2514382028","https://openalex.org/W2578943040","https://openalex.org/W2596636257","https://openalex.org/W2613412685","https://openalex.org/W2619405973","https://openalex.org/W2768196418","https://openalex.org/W2771494169","https://openalex.org/W2782780792","https://openalex.org/W2798332289","https://openalex.org/W2806888779","https://openalex.org/W6606141063","https://openalex.org/W6678042037","https://openalex.org/W6713987737","https://openalex.org/W6746046538","https://openalex.org/W6752134535"],"related_works":["https://openalex.org/W2265199518","https://openalex.org/W2215365983","https://openalex.org/W2516092834","https://openalex.org/W2309980522","https://openalex.org/W2995370509","https://openalex.org/W2187618570","https://openalex.org/W2184855233","https://openalex.org/W2198908836","https://openalex.org/W2801513872","https://openalex.org/W3123953333"],"abstract_inverted_index":{"In":[0,103],"an":[1,92],"industrial":[2,46],"cyber-physical":[3],"system":[4],"(iCPS),":[5],"the":[6,44,85,89,108,112,138,147,164],"controller":[7,19,59,114,125,166],"plays":[8],"a":[9,22,118,129],"critical":[10,45],"role":[11],"in":[12,67,128],"guaranteeing":[13,79],"reliability":[14,80],"and":[15,32,36,42,64,81,116,144],"stability.":[16],"Therefore,":[17],"redundant":[18,113,124,165],"architecture":[20,60,99,115,126,167],"is":[21],"well-adopted":[23],"approach":[24],"by":[25],"distributed":[26],"control":[27,31,43],"systems":[28,127,175],"(DCS),":[29],"supervisory":[30],"data":[33],"acquisition":[34],"(SCADA),":[35],"other":[37],"typical":[38],"iCPSs.":[39],"They":[40],"monitor":[41],"process,":[47],"such":[48],"as":[49],"power":[50],"generation,":[51],"chemical":[52],"industry,":[53],"water":[54],"treatment":[55],"plant,":[56],"etc.":[57],"Redundant":[58],"has":[61],"been":[62],"designed":[63],"largely":[65],"implemented":[66],"response":[68],"to":[69,171],"unpredictable":[70],"mechanical":[71],"failures.":[72],"However,":[73],"this":[74,98,104,183],"structure":[75],"initially":[76],"proposed":[77],"for":[78,100,181],"safety":[82],"may":[83,94],"expand":[84],"cyber-attack":[86],"surface,":[87],"posing":[88],"risk":[90],"that":[91,163],"attacker":[93],"take":[95],"advantage":[96],"of":[97,137,159],"stealthy":[101,130],"attacks.":[102],"article,":[105],"we":[106],"analyze":[107],"vulnerability":[109],"arising":[110],"from":[111,141],"propose":[117],"combined":[119,148],"attack":[120,149],"methodology":[121],"against":[122],"these":[123,151],"manner.":[131],"We":[132,177],"find":[133],"several":[134],"0-day":[135],"vulnerabilities":[136],"real-world":[139,160],"devices":[140,161],"three":[142],"manufacturers":[143],"further":[145],"implement":[146],"over":[150,156],"devices.":[152],"Our":[153],"experimental":[154],"results":[155],"various":[157],"types":[158],"show":[162],"can":[168],"be":[169],"exploited":[170],"compromise":[172],"all":[173],"tested":[174],"stealthily.":[176],"also":[178],"present":[179],"guidelines":[180],"mitigating":[182],"risk.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
