An overview on denial-of-service attacks in control systems: Attack models and security analyses
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
Resilient control under denial-of-service
C De Persis, P Tesi - IFAC proceedings Volumes, 2014 - Elsevier
We investigate resilient control strategies for linear systems under Denial-of-Service (DoS)
attacks. By DoS attacks we mean interruptions of communication on measurement (sensor …
attacks. By DoS attacks we mean interruptions of communication on measurement (sensor …
Safe and secure networked control systems under denial-of-service attacks
We consider the problem of security constrained optimal control for discrete-time, linear
dynamical systems in which control and measurement packets are transmitted over a …
dynamical systems in which control and measurement packets are transmitted over a …
A secure control framework for resource-limited adversaries
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this
paper. An attack space defined by the adversary's model knowledge, disclosure, and …
paper. An attack space defined by the adversary's model knowledge, disclosure, and …
Research challenges for the security of control systems.
In this paper we attempt to answer two questions:(1) Why should we be interested in the
security of control systems? And (2) What are the new and fundamentally different …
security of control systems? And (2) What are the new and fundamentally different …
Secure networked control systems
H Sandberg, V Gupta… - Annual Review of Control …, 2022 - annualreviews.org
Cyber-vulnerabilities are being exploited in a growing number of control systems. As many
of these systems form the backbone of critical infrastructure and are becoming more …
of these systems form the backbone of critical infrastructure and are becoming more …
Attack models and scenarios for networked control systems
A Teixeira, D Pérez, H Sandberg… - Proceedings of the 1st …, 2012 - dl.acm.org
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this
paper. An attack space defined by the adversary's system knowledge, disclosure, and …
paper. An attack space defined by the adversary's system knowledge, disclosure, and …
Jamming games in wireless networks with incomplete information
YE Sagduyu, RA Berry… - IEEE Communications …, 2011 - ieeexplore.ieee.org
Due to their broadcast nature, wireless networks are highly susceptible to jamming attacks
resulting in denial of service. Game theory provides powerful tools to model and analyze …
resulting in denial of service. Game theory provides powerful tools to model and analyze …
Resilient control of networked control system under DoS attacks: A unified game approach
Y Yuan, H Yuan, L Guo, H Yang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
We consider the problem of resilient control of networked control system (NCS) under denial-
of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra …
of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra …
Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …