2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2018
DOI: 10.1109/cybermatics_2018.2018.00138
|View full text |Cite
|
Sign up to set email alerts
|

Design and Evaluation of Jamming Resilient Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 21 publications
0
17
0
Order By: Relevance
“…Adepu and Mathur [61] investigated single-point cyber-attacks against SWaT testbed and proposed attack detection based on system response to the attacks. Adepu et al [62] and Tomic et al [63] investigated jamming attacks against wireless communications in water systems. In [62], researchers carried out attacks against different parts of the SWaT testbed and, in [63], researchers used the Waterbox testbed [51] to investigate the robustness of process control schemes against jamming attacks using different attack strategies.…”
Section: Cyber-attack Modelsmentioning
confidence: 99%
“…Adepu and Mathur [61] investigated single-point cyber-attacks against SWaT testbed and proposed attack detection based on system response to the attacks. Adepu et al [62] and Tomic et al [63] investigated jamming attacks against wireless communications in water systems. In [62], researchers carried out attacks against different parts of the SWaT testbed and, in [63], researchers used the Waterbox testbed [51] to investigate the robustness of process control schemes against jamming attacks using different attack strategies.…”
Section: Cyber-attack Modelsmentioning
confidence: 99%
“…Dec , as a function of the duration L of the learning phase for three different control policies: I) unauthenticated control signalŪ k 1 = −aY k for all k, II) authenticated control signal (16), where Γ k are i.i.d. Gaussian N (0, 9), III) authenticated control signal (16), where Γ k are i.i.d. Gaussian N (0, 16).…”
Section: Privacy-enhancing Signalmentioning
confidence: 99%
“…Remark 9]. Here, we introduced the privacyenhancing signal (16) to impede the learning process of the attacker and decrease the deception probability. Another technique that has been developed in the literature to counter attacks, where the attacker has full system knowledge, is having the controller covertly introduce virtual state variables unknown to the attacker but that are correlated with the ordinary state variables, so that modification of the original states will impact the extraneous states.…”
Section: E Moving Target Defensementioning
confidence: 99%
“…The performance of periodic and event-triggering networked control approaches under different types of jamming attacks was investigated in [ 58 ].…”
Section: An Overview Of Literature On Denial-of-service In Controlmentioning
confidence: 99%
“…We note that, among the different control approaches used for networked control systems under DoS attacks, event-triggered control (see, e.g., [ 25 , 38 , 48 , 54 , 58 ], and the references therein) appears to be the most commonly considered approach. We discuss the resiliency of event-triggering approaches against DoS attacks further in Section 5.1.1 .…”
Section: An Overview Of Literature On Denial-of-service In Controlmentioning
confidence: 99%