4.6 Review

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Event-triggered resilient control for cyber-physical system under denial-of-service attacks

Shan Liu et al.

INTERNATIONAL JOURNAL OF CONTROL (2020)

Article Automation & Control Systems

Analysis of Stochastic Switched Systems With Application to Networked Control Under Jamming Attacks

Ahmet Cetinkaya et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2019)

Article Automation & Control Systems

Security Research on Wireless Networked Control Systems Subject to Jamming Attacks

Hongjiu Yang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Computer Science, Software Engineering

State of the art of cyber-physical systems security: An automatic control perspective

Yuriy Zacchia Lun et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2019)

Article Engineering, Electrical & Electronic

Packet-Based State Feedback Control Under DoS Attacks in Cyber-Physical Systems

Shaoyu Lai et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2019)

Article Automation & Control Systems

A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Automation & Control Systems

Input-to-State Stabilizing Control for Cyber-Physical Systems With Multiple Transmission Channels Under Denial of Service

An-Yang Lu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)

Article Automation & Control Systems

Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks

Jiahu Qin et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2018)

Article Automation & Control Systems

DoS attack in centralised sensor network against state estimation

Chao Yang et al.

IET CONTROL THEORY AND APPLICATIONS (2018)

Article Automation & Control Systems

THE EFFECT OF TIME-VARYING JAMMING INTERFERENCE ON NETWORKED STABILIZATION

Ahmet Cetinkaya et al.

SIAM JOURNAL ON CONTROL AND OPTIMIZATION (2018)

Article Automation & Control Systems

Exponential convergence under distributed averaging integral frequency control

Erik Weitenberg et al.

AUTOMATICA (2018)

Article Automation & Control Systems

A Jamming-Resilient Algorithm for Self-Triggered Network Coordination

Danial Senejohnny et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)

Article Automation & Control Systems

DoS Attack Energy Management Against Remote State Estimation

Heng Zhang et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks

Yanpeng Guan et al.

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS (2018)

Article Automation & Control Systems

TESTING AND DEFENDING METHODS AGAINST DOS ATTACK IN STATE ESTIMATION

Heng Zhang et al.

ASIAN JOURNAL OF CONTROL (2017)

Article Automation & Control Systems

Networked Control Under Random and Malicious Packet Losses

Ahmet Cetinkaya et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)

Article Engineering, Electrical & Electronic

Resilient Event-Triggering H∞ Load Frequency Control for Multi-Area Power Systems With Energy-Limited DoS Attacks

Chen Peng et al.

IEEE TRANSACTIONS ON POWER SYSTEMS (2017)

Article Automation & Control Systems

Networked control systems under Denial-of-Service: Co-located vs. remote architectures

S. Feng et al.

SYSTEMS & CONTROL LETTERS (2017)

Review Computer Science, Information Systems

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

Tasnuva Mahjabin et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2017)

Proceedings Paper Automation & Control Systems

A sub-optimal method for routing redundancy design over lossy networks

F. Smarra et al.

IFAC PAPERSONLINE (2017)

Article Automation & Control Systems

SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach

Yuzhe Li et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

Resilient control under Denial-of-Service: Robust design

Shuai Feng et al.

AUTOMATICA (2017)

Article Automation & Control Systems

A multi-channel transmission schedule for remote state estimation under DoS attacks

Kemi Ding et al.

AUTOMATICA (2017)

Article Automation & Control Systems

Event-Triggered Control Systems Under Denial-of-Service Attacks

V. S. Dolk et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

Optimal Linear Cyber-Attack on Remote State Estimation

Ziyang Guo et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

Resilient stabilization of Multi-Hop Control Networks subject to malicious attacks

Alessandro D'Innocenzo et al.

AUTOMATICA (2016)

Article Automation & Control Systems

ON TRIGGERING CONTROL OF SINGLE-INPUT LINEAR SYSTEMS UNDER PULSE-WIDTH MODULATED DOS SIGNALS

Hamed Shisheh Foroush et al.

SIAM JOURNAL ON CONTROL AND OPTIMIZATION (2016)

Article Automation & Control Systems

Networked control of nonlinear systems under Denial-of-Service

C. De Persis et al.

SYSTEMS & CONTROL LETTERS (2016)

Proceedings Paper Automation & Control Systems

Deception-based Sensor Scheduling for Remote Estimation under DoS Attacks

Kemi Ding et al.

IFAC PAPERSONLINE (2016)

Article Automation & Control Systems

A secure control framework for resource-limited adversaries

Andre Teixeira et al.

AUTOMATICA (2015)

Article Automation & Control Systems

Input-to-State Stabilizing Control Under Denial-of-Service

Claudio De Persis et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Automation & Control Systems

Optimal Denial-of-Service Attack Scheduling With Energy Constraint

Heng Zhang et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Automation & Control Systems

Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies

Getachew K. Befekadu et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Automation & Control Systems

Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach

Yuzhe Li et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2015)

Article Computer Science, Information Systems

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Tao Shu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Article Automation & Control Systems

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

Hamza Fawzi et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2014)

Article Automation & Control Systems

Stabilization of Uncertain Systems With Finite Data Rates and Markovian Packet Losses

Kunihisa Okano et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2014)

Article Computer Science, Information Systems

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Automation & Control Systems

Fault Tolerant Control of Multi-Hop Control Networks

Alessandro D'Innocenzo et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2013)

Article Mathematics, Applied

JAMMING IN MOBILE NETWORKS: A GAME-THEORETIC APPROACH

Sourabh Bhattacharya et al.

NUMERICAL ALGEBRA CONTROL AND OPTIMIZATION (2013)

Article Computer Science, Hardware & Architecture

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Alejandro Proano et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)

Article Computer Science, Information Systems

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2011)

Article Computer Science, Hardware & Architecture

Protection Against Denial of Service Attacks: A Survey

Georgios Loukas et al.

COMPUTER JOURNAL (2010)

Article Automation & Control Systems

Limitations in remote stabilization over unreliable channels without acknowledgements

Hideaki Ishii

AUTOMATICA (2009)

Article Automation & Control Systems

Optimal Output Feedback Control Using Two Remote Sensors Over Erasure Channels

Vijay Gupta et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2009)

Article Computer Science, Theory & Methods

Detecting Malicious Packet Losses

Alper T. Mizrak et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2009)

Article Computer Science, Theory & Methods

CHEMAS: Identify suspect nodes in selective forwarding attacks

Bin Xiao et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2007)

Article Engineering, Electrical & Electronic

Foundations of control and estimation over lossy networks

Luca Schenato et al.

PROCEEDINGS OF THE IEEE (2007)

Article Engineering, Electrical & Electronic

A survey of recent results in networked control systems

Joao P. Hespanha et al.

PROCEEDINGS OF THE IEEE (2007)

Article Computer Science, Hardware & Architecture

Jamming sensor networks: Attack and defense strategies

Wenyuan Xu et al.

IEEE NETWORK (2006)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)