Cargando…

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and mul...

Descripción completa

Detalles Bibliográficos
Autores principales: Cetinkaya, Ahmet, Ishii, Hideaki, Hayakawa, Tomohisa
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514691/
https://www.ncbi.nlm.nih.gov/pubmed/33266925
http://dx.doi.org/10.3390/e21020210
_version_ 1783586646512369664
author Cetinkaya, Ahmet
Ishii, Hideaki
Hayakawa, Tomohisa
author_facet Cetinkaya, Ahmet
Ishii, Hideaki
Hayakawa, Tomohisa
author_sort Cetinkaya, Ahmet
collection PubMed
description In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols.
format Online
Article
Text
id pubmed-7514691
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75146912020-11-09 An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses Cetinkaya, Ahmet Ishii, Hideaki Hayakawa, Tomohisa Entropy (Basel) Review In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks. Our goal is to discuss the utility of different attack modeling and analysis techniques proposed in the literature for addressing feedback control, state estimation, and multi-agent consensus problems in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks. We discuss several modeling approaches that are employed for capturing the uncertainty in denial-of-service attack strategies. We give an outlook on deterministic constraint-based modeling ideas, game-theoretic and optimization-based techniques and probabilistic modeling approaches. A special emphasis is placed on tail-probability based failure models, which have been recently used for describing jamming attacks that affect signal to interference-plus-noise ratios of wireless channels as well as transmission failures on multi-hop networks due to packet-dropping attacks and non-malicious issues. We explain the use of attack models in the security analysis of networked systems. In addition to the modeling and analysis problems, a discussion is provided also on the recent developments concerning the design of attack-resilient control and communication protocols. MDPI 2019-02-22 /pmc/articles/PMC7514691/ /pubmed/33266925 http://dx.doi.org/10.3390/e21020210 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Cetinkaya, Ahmet
Ishii, Hideaki
Hayakawa, Tomohisa
An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title_full An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title_fullStr An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title_full_unstemmed An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title_short An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses
title_sort overview on denial-of-service attacks in control systems: attack models and security analyses
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7514691/
https://www.ncbi.nlm.nih.gov/pubmed/33266925
http://dx.doi.org/10.3390/e21020210
work_keys_str_mv AT cetinkayaahmet anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses
AT ishiihideaki anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses
AT hayakawatomohisa anoverviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses
AT cetinkayaahmet overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses
AT ishiihideaki overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses
AT hayakawatomohisa overviewondenialofserviceattacksincontrolsystemsattackmodelsandsecurityanalyses