Abstract
Modern control systems are now combining advanced network technology for control optimization and efficiency, but, on the other side, induce network attack as a new threat to control security. A typical network attack targeting control systems is Denial of Service (DoS) jamming attack. This attack can disable control operations by simply flooding network traffic to the control-network channels, and therefore is easy to deploy and hard to defend. In this paper, we conduct a comprehensive review on this attack and report our results in three aspects: the attacking strategies of jamming attack, the defending solutions to this attack and the arms race between them. To this end, we also discuss the potential research directions on this topic.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Pieprzyca, J., Merder, T., Saternus, M., Kania, H.: The change of liquid steel flow control system in the tundish – modelling research/Zmiana Systemu Kontroli Przepływu Ciekłej Stali W Kadzi Pośredniej – Badania Modelowe. Arch. Metall. Mater. 59, 1433–1440 (2015)
Chen, C.T., Peng, S.T.: Design of a sliding mode control system for chemical processes. J. Process Control 15, 515–530 (2005)
Fan, H.M.: Design of flexiable manufacturing system based on practical application of engineering training. Appl. Mech. Mater. (2014)
Achanta, S.D.: Advanced submarine integrated weapon control system. Adv. Submar. Integr. Weapon Control Syst. 8, 1–5 (2015)
Huang, F.: The design of the gateway based on arm and its application in the intelligent fire control system. Int. J. Digit. Content Technol. Appl. 6, 275–282 (2012)
Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: The, International Conference on Distributed Computing Systems Workshops, pp. 495–500. IEEE Computer Society (2008)
Zhang, X., Han, Q.L., Yu, X.: Survey on recent advances in networked control systems. IEEE Tran. Ind. Inform. 1 (2015)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16, 266–282 (2014)
Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53, 23–40 (2011)
Gao, Y., Feng, Y., Kawamoto, J., et al.: A machine learning based approach for detecting DRDoS attacks and its performance evaluation. In: Asia Joint Conference on Information Security, pp. 80–86. IEEE Computer Society (2016)
Vrat, B., Aggarwal, N., Venkatesan, S.: Anomaly detection in IPv4 and IPv6 networks using machine learning. In: IEEE India Conference, pp. 1–6. IEEE (2015)
Tsiatsikas, Z., Fakis, A., Papamartzivanos, D., et al.: Battling against DDoS in SIP is machine learning-based detection an effective weapon? In: The, International Conference on Security and Cryptography (2015)
Agarwal, M., Biswas, S., Nandi, S.: Detection of de-authentication DoS attacks in Wi-Fi networks: a machine learning approach. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 246–251. IEEE (2015)
Zhang, H., Cheng, P., Shi, L., et al.: Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American Control Conference - ACC, pp. 3996–4001 (2014)
Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31–45. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00602-9_3
Tang, H., Lu, Z., Zhang, L., et al.: LQG control under denial-of-service attacks: an experimental study. In: Conference on Emerging Technologies and Factory Automation, pp. 1–7. IEEE (2015)
Liu, S., Liu, X.P., Saddik, A.E.: Denial-of-service (dos) attacks on load frequency control in smart grids. In: Innovative Smart Grid Technologies, pp. 1–6. IEEE (2013)
Zhang, H., Cheng, P., Shi, L., et al.: Optimal DoS attack policy against remote state estimation. In: Decision and Control, pp. 5444–5449. IEEE (2013)
Anguluri, R., Gupta, V., Pasqualetti, F.: Periodic coordinated attacks against cyber-physical systems: detectability and performance bounds. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 5079–5084. IEEE (2016)
Brown, T.X., James, J.E., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006, Florence, Italy, May, pp. 120–130. DBLP (2006)
Xu, W., Trappe, W., Zhang, Y., et al.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46–57. ACM (2005)
Xu, W., Ma, K., Trappe, W., et al.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20, 41–47 (2006)
Yuan, Y., Zhu, Q., Sun, F., et al.: Resilient control of cyber-physical systems against denial-of-service attacks. In: International Symposium on Resilient Control Systems, pp. 54–59 (2013)
Feng, S., Tesi, P.: Resilient control under denial-of-service: robust design. Automatica 79, 42–51 (2017)
Foroush, H.S., Martínez, S.: On event-triggered control of linear systems under periodic denial-of-service jamming attacks. In: Decision and Control, pp. 2551–2556. IEEE (2012)
Nur, A.Y., Tozal, M.E.: Defending cyber-physical systems against DoS attacks. In: IEEE International Conference on Smart Computing, pp. 1–3. IEEE Computer Society (2016)
De Persis, C., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60, 2930–2944 (2015)
Raj, A.B., Ramesh, M.V., Kulkarni, R.V., et al.: Security enhancement in wireless sensor networks using machine learning. In: IEEE, International Conference on High Performance Computing and Communication and 2012 IEEE, International Conference on Embedded Software and Systems, pp. 1264–1269. IEEE (2012)
Gill, K., Yang, S.H., Wang, W.: Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems. Wirel. Sens. Syst. IET 2, 361–368 (2012)
Zuba, M., Shi, Z., Peng, Z., et al.: Launching denial-of-service jamming attacks in underwater sensor networks. In: ACM International Workshop on Underwater Networks, p. 12. ACM (2011)
Li, Y., Shi, L., Cheng, P., et al.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60, 2831–2836 (2015)
Yuan, Y., Yuan, H., Guo, L., et al.: Resilient control of networked control system under DoS attacks: a unified game approach. IEEE Trans. Ind. Inform. (2016)
Gupta, A., Langbort, C., Başar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: Decision and Control, pp. 1096–1101. IEEE Xplore (2010)
Chen, L., Leneutre, J.: A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4, 165–178 (2009)
Huang, J.Y., Liao, I.E., Chung, Y.F., et al.: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inf. Sci. 231, 32–44 (2013)
Chen, L., Leneutre, J.: Fight jamming with jamming – a game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput. Netw. 55, 2259–2270 (2011)
Kantzavelou, I., Katsikas, S.: A game-based intrusion detection mechanism to confront internal attackers. Comput. Secur. 29, 859–874 (2010)
Zhou, P., Jiang, S., Irissappane, A., et al.: Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 10(3), 613–625 (2015)
Zhou, P., Gu, X., Zhang, J., et al.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97–106 (2015)
Acknowledgement
This work was partially supported by the National Natural Science Foundation of China (Nos. 61502293, 61633016 and 61673255), the Shanghai Young Eastern Scholar Program (No. QD2016030), the Young Teachers’ Training Program for Shanghai College and University, the Science and Technology Commission of Shanghai Municipality (Nos. 17511107002 and 15411953502) and the Shanghai Key Laboratory of Power Station Automation Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dong, Y., Zhou, P. (2017). Jamming Attacks Against Control Systems: A Survey. In: Yue, D., Peng, C., Du, D., Zhang, T., Zheng, M., Han, Q. (eds) Intelligent Computing, Networked Control, and Their Engineering Applications. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 762. Springer, Singapore. https://doi.org/10.1007/978-981-10-6373-2_57
Download citation
DOI: https://doi.org/10.1007/978-981-10-6373-2_57
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6372-5
Online ISBN: 978-981-10-6373-2
eBook Packages: Computer ScienceComputer Science (R0)