2008 34th Annual Conference of IEEE Industrial Electronics 2008
DOI: 10.1109/iecon.2008.4758425
|View full text |Cite
|
Sign up to set email alerts
|

Performance assessment and compensation for secure networked control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…From the perspective of control systems, research into network security is still in its infancy. To date, most of the literature about network security issues focuses on security attacks (Gupta et al, 2007, Gupta and Chow, 2008), as shown in Figure 8. The attacker can launch various types of attacks on different components of the controlled system.…”
Section: Ncss With Network Securitymentioning
confidence: 99%
“…From the perspective of control systems, research into network security is still in its infancy. To date, most of the literature about network security issues focuses on security attacks (Gupta et al, 2007, Gupta and Chow, 2008), as shown in Figure 8. The attacker can launch various types of attacks on different components of the controlled system.…”
Section: Ncss With Network Securitymentioning
confidence: 99%
“…Finally, after the completion of an inverse accumulated generating operation in (16), the predicted value of ( ) at time (k+1), ̂( ) ( ) , becomes available and therefore,…”
Section: ) Original Grey Prediction Modelmentioning
confidence: 99%
“…Simulation platform of the security policy on system performance, and then present a trade-off model for system dynamic performance and system security. As well as Rachana A Gupta and Mo-Yuen Chow, in [16] addresses the issue of NCS information security as well its time-sensitive performance and their trade-off. [17] develop several attack scenarios and evaluate the impact of denial of service (DOS) attacks on scalar linear systems, while [18] analyze the performance of a proportional-integral controller (regulatory layer), and a model-based diagnostic scheme (supervisory layer) under a class of deception attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Some work on network security algorithms :In [3], DES (Data Encryption Standard), 3DES (Triple Data Encryption Standard), and AES (Advanced Encryption Standard) are integrated with the application to secure the sensor as well as control data flow on the network, then 1-D gain scheduler was designed and implemented to alleviate the adverse effect due to security. The encryption of the data transmitted on the network is also realized by DES in [4], and they add message digest 5 (MD5) to detect the data integrity.…”
Section: Introductionmentioning
confidence: 99%