The ML-based sensor data deception targeting cyber–physical systems: A review

IF 13.3 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Nektaria Kaloudi , Jingyue Li
{"title":"The ML-based sensor data deception targeting cyber–physical systems: A review","authors":"Nektaria Kaloudi ,&nbsp;Jingyue Li","doi":"10.1016/j.cosrev.2025.100753","DOIUrl":null,"url":null,"abstract":"<div><div>The security of cyber–physical systems is crucial due to their critical applications. The increasing success of machine learning (ML) has raised growing concerns about its impact on the cybersecurity of cyber–physical systems. Although several studies have assessed the cybersecurity of cyber–physical systems, there remains a lack of systematic understanding of how ML techniques can contribute to the use of deception on these systems. In this study, we aim to systematize findings on the use of ML for sensor data deception in both attack and defense scenarios. We analyzed 13 offensive and 3 defensive approaches that leverage ML for sensor data deception targeting cyber–physical systems. We summarized the offensive and defensive sensor data deception implementations with impact on cyber–physical systems at the system level, and the mechanisms to defend offensive deception. Additionally, we provide key insights and outline challenges intended to guide future research on defending against ML-based cyber deception in cyber–physical systems.</div></div>","PeriodicalId":48633,"journal":{"name":"Computer Science Review","volume":"57 ","pages":"Article 100753"},"PeriodicalIF":13.3000,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Science Review","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1574013725000292","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The security of cyber–physical systems is crucial due to their critical applications. The increasing success of machine learning (ML) has raised growing concerns about its impact on the cybersecurity of cyber–physical systems. Although several studies have assessed the cybersecurity of cyber–physical systems, there remains a lack of systematic understanding of how ML techniques can contribute to the use of deception on these systems. In this study, we aim to systematize findings on the use of ML for sensor data deception in both attack and defense scenarios. We analyzed 13 offensive and 3 defensive approaches that leverage ML for sensor data deception targeting cyber–physical systems. We summarized the offensive and defensive sensor data deception implementations with impact on cyber–physical systems at the system level, and the mechanisms to defend offensive deception. Additionally, we provide key insights and outline challenges intended to guide future research on defending against ML-based cyber deception in cyber–physical systems.
针对网络物理系统的基于ml的传感器数据欺骗:综述
由于网络物理系统的关键应用,其安全性至关重要。机器学习(ML)的日益成功引起了人们对其对网络物理系统的网络安全影响的日益关注。尽管有几项研究评估了网络物理系统的网络安全,但对于机器学习技术如何有助于在这些系统上使用欺骗,仍然缺乏系统的理解。在这项研究中,我们的目标是将机器学习在攻击和防御场景中用于传感器数据欺骗的研究结果系统化。我们分析了13种进攻和3种防御方法,这些方法利用ML进行针对网络物理系统的传感器数据欺骗。从系统层面总结了对网络物理系统影响的进攻性和防御性传感器数据欺骗实现,以及防御进攻性欺骗的机制。此外,我们提供了关键的见解和概述挑战,旨在指导未来在网络物理系统中防御基于ml的网络欺骗的研究。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computer Science Review
Computer Science Review Computer Science-General Computer Science
CiteScore
32.70
自引率
0.00%
发文量
26
审稿时长
51 days
期刊介绍: Computer Science Review, a publication dedicated to research surveys and expository overviews of open problems in computer science, targets a broad audience within the field seeking comprehensive insights into the latest developments. The journal welcomes articles from various fields as long as their content impacts the advancement of computer science. In particular, articles that review the application of well-known Computer Science methods to other areas are in scope only if these articles advance the fundamental understanding of those methods.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信