Resilient control under Denial-of-Service: Robust design
نویسندگان
چکیده
منابع مشابه
Resilient Control under Denial-of-Service
We investigate resilient control strategies for linear systems under Denial-of-Service (DoS) attacks. By DoS attacks we mean interruptions of communication on measurement (sensor-to-controller) and control (controller-to-actuator) channels carried out by an intelligent adversary. We characterize the duration of these interruptions under which stability of the closed-loop system is preserved. Th...
متن کاملSecure Networked Control Systems under Denial of Service Attacks
This paper addresses the security issue of networked control systems (NCSs) under DoS attacks. According to the level of attacks, DoS attacks are classified into two types: weak attacks and strong attacks. A recursive networked predictive control (RNPC) method based on round-trip time delay is proposed to compensate for the adverse effects introduced by the weak DoS attacks as well as the netwo...
متن کاملTowards Denial-of-Service-Resilient Key Agreement Protocols
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet. There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models. Many protocols have been argued to be denial-of-service-resilient, only to be subsequently b...
متن کاملRe-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks
The appliance of wireless sensor networks to a broad variety of applications doubtlessly requires end-user acceptance. End-users from various computer network unrelated disciplines like for example from the agriculture sector, geography, health care, or biology will only use wireless sensor networks to support their daily work if the overall benefit beats the overhead when getting in touch with...
متن کاملFragility of the Robust Security Network: 802.11 Denial of Service
The upcoming 802.11w amendment to the 802.11 standard eliminates the 802.11 deauthentication and disassociation Denial of Service (DoS) vulnerabilities. This paper presents two other DoS vulnerabilities: one vulnerability in draft 802.11w implementations discovered by IEEE 802.11 TGw, and one new vulnerability in 802.11, which is still present in the 802.11w amendment. Attacks exploiting the fi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Automatica
سال: 2017
ISSN: 0005-1098
DOI: 10.1016/j.automatica.2017.01.031