Bandwidth Allocation Strategy of Networked Control System under Denial-of-Service Attack

被引:1
|
作者
Wang, Zhi-Wen [1 ,2 ,3 ]
Cheng, Yang [1 ,2 ,3 ]
机构
[1] Lanzhou Univ Technol, Coll Elect & Informat Engn, Lanzhou, Peoples R China
[2] Lanzhou Univ Technol, Adv Control Ind Proc, Lanzhou, Peoples R China
[3] Lanzhou Univ Technol, Natl Demonstrat Ctr Expt Elect & Control Engn Edu, Lanzhou, Peoples R China
关键词
networked control system (NCS); denial of service attack; dynamic bandwidth allocation; CYBER-PHYSICAL SYSTEMS; SECURITY;
D O I
10.1109/ICNISC.2018.00018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, security of networked control system (NCS) under denial of service (DoS) attack is considered. Different from the existing literatures from the perspective of control systems, this paper considers a novel method of dynamic allocation of network bandwidth for NCS under DoS attack. Firstly, time-constrained DoS attack and its impact on the communication channel of NCS are introduced. Secondly, details for the proposed dynamic bandwidth allocation structure are presented along with an implementation, which is a bandwidth allocation strategy based on error between current state and equilibrium state and available bandwidth. Finally, a numerical example is given to demonstrate the effectiveness of the proposed bandwidth allocation approach.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [41] An efficient filter for denial-of-service bandwidth attacks
    Abdelsayed, S
    Glimsholt, D
    Leckie, C
    Ryan, S
    Shami, S
    GLOBECOM'03: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-7, 2003, : 1353 - 1357
  • [42] Optimal State Estimation Under the Denial-of-Service Attack: an Operator Approach
    Naghnaeian, Mohammad
    Xuan, Yu
    2020 AMERICAN CONTROL CONFERENCE (ACC), 2020, : 5334 - 5339
  • [43] Denial-of-Service attack Possibilities on NFC Technology
    Fahrianto, Feri
    Lubis, Muhammad Fadil
    Fiade, Andrew
    2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 228 - 232
  • [44] Denial-of-service attack-detection techniques
    Carl, G
    Kesidis, G
    Brooks, RR
    Rai, S
    IEEE INTERNET COMPUTING, 2006, 10 (01) : 82 - 89
  • [45] Resilient control under Denial-of-Service: Robust design
    Feng, Shuai
    Tesi, Pietro
    AUTOMATICA, 2017, 79 : 42 - 51
  • [46] On Resilient Control of Nonlinear Systems under Denial-of-Service
    De Persis, Claudio
    Tesi, Pietro
    2014 IEEE 53RD ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2014, : 5254 - 5259
  • [47] Resilient Control under Denial-of-Service: Robust Design
    Feng, Shuai
    Tesi, Pietro
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 4737 - 4742
  • [48] Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies
    Befekadu, Getachew K.
    Gupta, Vijay
    Antsaklis, Panos J.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (12) : 3299 - 3304
  • [49] Decentralized event-triggered resilient control for a class of networked control systems under denial-of-service attacks
    Torabi, Amir
    Zarei, Jafar
    Saif, Mehrdad
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (01) : 131 - 143
  • [50] Honeypot Scheme for Distributed Denial-of-Service Attack
    Das, Vinu V.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL : ICACC 2009 - PROCEEDINGS, 2009, : 497 - 501