2019
DOI: 10.1109/tcyb.2018.2817249
|View full text |Cite
|
Sign up to set email alerts
|

Security Research on Wireless Networked Control Systems Subject to Jamming Attacks

Abstract: In this paper, a countermeasure for wireless networked control systems suffering from jamming attacks is studied by a variable sampling approach. A Stackelberg game framework is utilized to analyze interactions between a smart jammer and a legitimate user. The variable sampling approach is exploited to deal with data packets dropout between a sensor and a controller. Moreover, a resilient variable sampling controller is designed by a delta operator method. Besides, stability conditions are provided for systems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 33 publications
0
17
0
Order By: Relevance
“…A game with SINR-based formulation for wireless networked control systems was also considered by Yang et al [ 81 ]. The players in the game are: (1) the user who decides the power of transmissions from the controller to the plant; and (2) the jamming attacker who decides the jamming interference power.…”
Section: Deterministic and Game-theoretical Approaches To Denial-omentioning
confidence: 99%
See 3 more Smart Citations
“…A game with SINR-based formulation for wireless networked control systems was also considered by Yang et al [ 81 ]. The players in the game are: (1) the user who decides the power of transmissions from the controller to the plant; and (2) the jamming attacker who decides the jamming interference power.…”
Section: Deterministic and Game-theoretical Approaches To Denial-omentioning
confidence: 99%
“…The players in the game are: (1) the user who decides the power of transmissions from the controller to the plant; and (2) the jamming attacker who decides the jamming interference power. In particular, Yang et al [ 81 ] explored a Stackelberg game , where the user is the leader and acts first; the action of the user is then followed by that of the jamming attacker. In the problem setting in [ 81 ], the utilities of the user and the attacker depend directly on the SINR.…”
Section: Deterministic and Game-theoretical Approaches To Denial-omentioning
confidence: 99%
See 2 more Smart Citations
“…As a result, the security issues of WNCSs have aroused so much interest from researchers [6] [7]. Attackers study how to attack WNCSs, while defenders study how to detect attacks [8] [9]. Generally speaking, there are four types of network attacks [10]: space hiding-time hiding attacks, such as system simulation attacks, Stuxnet-type replay attacks, etc.…”
Section: Introductionmentioning
confidence: 99%