Next Article in Journal
An Intuitionistic Evidential Method for Weight Determination in FMEA Based on Belief Entropy
Next Article in Special Issue
Data-Rate Constrained Observers of Nonlinear Systems
Previous Article in Journal
Quantum Pumping with Adiabatically Modulated Barriers in Three-Band Pseudospin-1 Dirac–Weyl Systems
Previous Article in Special Issue
On the Relation between Topological Entropy and Restoration Entropy
Article Menu
Issue 2 (February) cover image

Export Article

Open AccessReview
Entropy 2019, 21(2), 210; https://doi.org/10.3390/e21020210

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

1
Department of Computer Science, Tokyo Institute of Technology, Yokohama 226-8502, Japan
2
Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo 152-8552, Japan
*
Author to whom correspondence should be addressed.
Received: 29 January 2019 / Revised: 16 February 2019 / Accepted: 19 February 2019 / Published: 22 February 2019
(This article belongs to the Special Issue Entropy in Networked Control)
Full-Text   |   PDF [579 KB, uploaded 22 February 2019]   |  

Abstract

In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols. View Full-Text
Keywords: networked control; cyber-security; denial-of-service; jamming attacks; probabilistic failure models; stability analysis; resilient control systems; multi-agent systems networked control; cyber-security; denial-of-service; jamming attacks; probabilistic failure models; stability analysis; resilient control systems; multi-agent systems
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Cetinkaya, A.; Ishii, H.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top