Proceedings of the 2011 American Control Conference 2011
DOI: 10.1109/acc.2011.5991188
|View full text |Cite
|
Sign up to set email alerts
|

Risk-sensitive control under a class of denial-of-service attack models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 20 publications
0
25
0
Order By: Relevance
“…Three classes of attacks have been investigated: denial-of-service (DoS) attacks, replay attacks, and deception (or false data injection) attacks. Denial-of-service attacks destroy data availability in control systems, and see [16][17][18]. Replay attacks maliciously repeat transmitted data, and their impact to control systems was first studied in [23].…”
Section: Notesmentioning
confidence: 99%
See 1 more Smart Citation
“…Three classes of attacks have been investigated: denial-of-service (DoS) attacks, replay attacks, and deception (or false data injection) attacks. Denial-of-service attacks destroy data availability in control systems, and see [16][17][18]. Replay attacks maliciously repeat transmitted data, and their impact to control systems was first studied in [23].…”
Section: Notesmentioning
confidence: 99%
“…Consider the class of denial-of-service (DoS) attacks; e.g., in [16][17][18]. In particular, adversary i produces a DoS attack by erasing the control commands sent from operator i, and vehicle i receives nothing at this time.…”
Section: Resilience To Denial-of-service Attacksmentioning
confidence: 99%
“…As for attack-resilient control, the papers [2], [32], [33] are devoted to studying deception attacks, where attackers intentionally modify measurements and control commands. Denial-of-service (DoS) attacks destroy the data availability in control systems and are tackled in recent papers [1], [3], [4], [9]. More specifically, the papers [1], [9] formulate finite-horizon LQG control problems as dynamic zero-sum games between the controller and the jammer.…”
Section: Edu) S Martínez Is With the Department Of Mechanical And Amentioning
confidence: 99%
“…Denial-of-service attacks, destroying the data availability in control systems, are entailed in recent papers [2], [4], [6], [16]. Another important class of cyber attacks, namely false data injection, compromises the data integrity of state estimation and is attracting considerable effort; an incomplete reference list includes [21], [28], [34], [37].…”
Section: Introductionmentioning
confidence: 98%