An overview on denial-of-service attacks in control systems: Attack models and security analyses

A Cetinkaya, H Ishii, T Hayakawa - Entropy, 2019 - mdpi.com
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …

Resilient control under denial-of-service

C De Persis, P Tesi - IFAC proceedings Volumes, 2014 - Elsevier
We investigate resilient control strategies for linear systems under Denial-of-Service (DoS)
attacks. By DoS attacks we mean interruptions of communication on measurement (sensor …

Safe and secure networked control systems under denial-of-service attacks

S Amin, AA Cárdenas, SS Sastry - … , HSCC 2009, San Francisco, CA, USA …, 2009 - Springer
We consider the problem of security constrained optimal control for discrete-time, linear
dynamical systems in which control and measurement packets are transmitted over a …

A secure control framework for resource-limited adversaries

A Teixeira, I Shames, H Sandberg, KH Johansson - Automatica, 2015 - Elsevier
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this
paper. An attack space defined by the adversary's model knowledge, disclosure, and …

Research challenges for the security of control systems.

AA Cárdenas, S Amin, S Sastry - HotSec, 2008 - usenix.org
In this paper we attempt to answer two questions:(1) Why should we be interested in the
security of control systems? And (2) What are the new and fundamentally different …

Secure networked control systems

H Sandberg, V Gupta… - Annual Review of Control …, 2022 - annualreviews.org
Cyber-vulnerabilities are being exploited in a growing number of control systems. As many
of these systems form the backbone of critical infrastructure and are becoming more …

Attack models and scenarios for networked control systems

A Teixeira, D Pérez, H Sandberg… - Proceedings of the 1st …, 2012 - dl.acm.org
Cyber-secure networked control is modeled, analyzed, and experimentally illustrated in this
paper. An attack space defined by the adversary's system knowledge, disclosure, and …

Jamming games in wireless networks with incomplete information

YE Sagduyu, RA Berry… - IEEE Communications …, 2011 - ieeexplore.ieee.org
Due to their broadcast nature, wireless networks are highly susceptible to jamming attacks
resulting in denial of service. Game theory provides powerful tools to model and analyze …

Resilient control of networked control system under DoS attacks: A unified game approach

Y Yuan, H Yuan, L Guo, H Yang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
We consider the problem of resilient control of networked control system (NCS) under denial-
of-service (DoS) attack via a unified game approach. The DoS attacks lead to extra …

Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks

J Qin, M Li, L Shi, X Yu - IEEE Transactions on Automatic …, 2017 - ieeexplore.ieee.org
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In
this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically …