Skip to main content

Jamming Attacks Against Control Systems: A Survey

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 762))

Abstract

Modern control systems are now combining advanced network technology for control optimization and efficiency, but, on the other side, induce network attack as a new threat to control security. A typical network attack targeting control systems is Denial of Service (DoS) jamming attack. This attack can disable control operations by simply flooding network traffic to the control-network channels, and therefore is easy to deploy and hard to defend. In this paper, we conduct a comprehensive review on this attack and report our results in three aspects: the attacking strategies of jamming attack, the defending solutions to this attack and the arms race between them. To this end, we also discuss the potential research directions on this topic.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Pieprzyca, J., Merder, T., Saternus, M., Kania, H.: The change of liquid steel flow control system in the tundish – modelling research/Zmiana Systemu Kontroli Przepływu Ciekłej Stali W Kadzi Pośredniej – Badania Modelowe. Arch. Metall. Mater. 59, 1433–1440 (2015)

    Google Scholar 

  2. Chen, C.T., Peng, S.T.: Design of a sliding mode control system for chemical processes. J. Process Control 15, 515–530 (2005)

    Article  Google Scholar 

  3. Fan, H.M.: Design of flexiable manufacturing system based on practical application of engineering training. Appl. Mech. Mater. (2014)

    Google Scholar 

  4. Achanta, S.D.: Advanced submarine integrated weapon control system. Adv. Submar. Integr. Weapon Control Syst. 8, 1–5 (2015)

    Google Scholar 

  5. Huang, F.: The design of the gateway based on arm and its application in the intelligent fire control system. Int. J. Digit. Content Technol. Appl. 6, 275–282 (2012)

    Google Scholar 

  6. Cardenas, A.A., Amin, S., Sastry, S.: Secure control: towards survivable cyber-physical systems. In: The, International Conference on Distributed Computing Systems Workshops, pp. 495–500. IEEE Computer Society (2008)

    Google Scholar 

  7. Zhang, X., Han, Q.L., Yu, X.: Survey on recent advances in networked control systems. IEEE Tran. Ind. Inform. 1 (2015)

    Google Scholar 

  8. Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16, 266–282 (2014)

    Article  Google Scholar 

  9. Farwell, J.P., Rohozinski, R.: Stuxnet and the future of cyber war. Survival 53, 23–40 (2011)

    Article  Google Scholar 

  10. Gao, Y., Feng, Y., Kawamoto, J., et al.: A machine learning based approach for detecting DRDoS attacks and its performance evaluation. In: Asia Joint Conference on Information Security, pp. 80–86. IEEE Computer Society (2016)

    Google Scholar 

  11. Vrat, B., Aggarwal, N., Venkatesan, S.: Anomaly detection in IPv4 and IPv6 networks using machine learning. In: IEEE India Conference, pp. 1–6. IEEE (2015)

    Google Scholar 

  12. Tsiatsikas, Z., Fakis, A., Papamartzivanos, D., et al.: Battling against DDoS in SIP is machine learning-based detection an effective weapon? In: The, International Conference on Security and Cryptography (2015)

    Google Scholar 

  13. Agarwal, M., Biswas, S., Nandi, S.: Detection of de-authentication DoS attacks in Wi-Fi networks: a machine learning approach. In: IEEE International Conference on Systems, Man, and Cybernetics, pp. 246–251. IEEE (2015)

    Google Scholar 

  14. Zhang, H., Cheng, P., Shi, L., et al.: Optimal denial-of-service attack scheduling against linear quadratic gaussian control. In: American Control Conference - ACC, pp. 3996–4001 (2014)

    Google Scholar 

  15. Amin, S., Cárdenas, A.A., Sastry, S.S.: Safe and secure networked control systems under denial-of-service attacks. In: Majumdar, R., Tabuada, P. (eds.) HSCC 2009. LNCS, vol. 5469, pp. 31–45. Springer, Heidelberg (2009). doi:10.1007/978-3-642-00602-9_3

    Chapter  Google Scholar 

  16. Tang, H., Lu, Z., Zhang, L., et al.: LQG control under denial-of-service attacks: an experimental study. In: Conference on Emerging Technologies and Factory Automation, pp. 1–7. IEEE (2015)

    Google Scholar 

  17. Liu, S., Liu, X.P., Saddik, A.E.: Denial-of-service (dos) attacks on load frequency control in smart grids. In: Innovative Smart Grid Technologies, pp. 1–6. IEEE (2013)

    Google Scholar 

  18. Zhang, H., Cheng, P., Shi, L., et al.: Optimal DoS attack policy against remote state estimation. In: Decision and Control, pp. 5444–5449. IEEE (2013)

    Google Scholar 

  19. Anguluri, R., Gupta, V., Pasqualetti, F.: Periodic coordinated attacks against cyber-physical systems: detectability and performance bounds. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 5079–5084. IEEE (2016)

    Google Scholar 

  20. Brown, T.X., James, J.E., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing, MOBIHOC 2006, Florence, Italy, May, pp. 120–130. DBLP (2006)

    Google Scholar 

  21. Xu, W., Trappe, W., Zhang, Y., et al.: The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46–57. ACM (2005)

    Google Scholar 

  22. Xu, W., Ma, K., Trappe, W., et al.: Jamming sensor networks: attack and defense strategies. IEEE Netw. 20, 41–47 (2006)

    Article  Google Scholar 

  23. Yuan, Y., Zhu, Q., Sun, F., et al.: Resilient control of cyber-physical systems against denial-of-service attacks. In: International Symposium on Resilient Control Systems, pp. 54–59 (2013)

    Google Scholar 

  24. Feng, S., Tesi, P.: Resilient control under denial-of-service: robust design. Automatica 79, 42–51 (2017)

    Article  MathSciNet  Google Scholar 

  25. Foroush, H.S., Martínez, S.: On event-triggered control of linear systems under periodic denial-of-service jamming attacks. In: Decision and Control, pp. 2551–2556. IEEE (2012)

    Google Scholar 

  26. Nur, A.Y., Tozal, M.E.: Defending cyber-physical systems against DoS attacks. In: IEEE International Conference on Smart Computing, pp. 1–3. IEEE Computer Society (2016)

    Google Scholar 

  27. De Persis, C., Tesi, P.: Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 60, 2930–2944 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  28. Raj, A.B., Ramesh, M.V., Kulkarni, R.V., et al.: Security enhancement in wireless sensor networks using machine learning. In: IEEE, International Conference on High Performance Computing and Communication and 2012 IEEE, International Conference on Embedded Software and Systems, pp. 1264–1269. IEEE (2012)

    Google Scholar 

  29. Gill, K., Yang, S.H., Wang, W.: Scheme for preventing low-level denial-of-service attacks on wireless sensor network-based home automation systems. Wirel. Sens. Syst. IET 2, 361–368 (2012)

    Article  Google Scholar 

  30. Zuba, M., Shi, Z., Peng, Z., et al.: Launching denial-of-service jamming attacks in underwater sensor networks. In: ACM International Workshop on Underwater Networks, p. 12. ACM (2011)

    Google Scholar 

  31. Li, Y., Shi, L., Cheng, P., et al.: Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach. IEEE Trans. Autom. Control 60, 2831–2836 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  32. Yuan, Y., Yuan, H., Guo, L., et al.: Resilient control of networked control system under DoS attacks: a unified game approach. IEEE Trans. Ind. Inform. (2016)

    Google Scholar 

  33. Gupta, A., Langbort, C., Başar, T.: Optimal control in the presence of an intelligent jammer with limited actions. In: Decision and Control, pp. 1096–1101. IEEE Xplore (2010)

    Google Scholar 

  34. Chen, L., Leneutre, J.: A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Inf. Forensics Secur. 4, 165–178 (2009)

    Article  Google Scholar 

  35. Huang, J.Y., Liao, I.E., Chung, Y.F., et al.: Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining. Inf. Sci. 231, 32–44 (2013)

    Article  MathSciNet  Google Scholar 

  36. Chen, L., Leneutre, J.: Fight jamming with jamming – a game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput. Netw. 55, 2259–2270 (2011)

    Article  Google Scholar 

  37. Kantzavelou, I., Katsikas, S.: A game-based intrusion detection mechanism to confront internal attackers. Comput. Secur. 29, 859–874 (2010)

    Article  Google Scholar 

  38. Zhou, P., Jiang, S., Irissappane, A., et al.: Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inf. Forensics Secur. 10(3), 613–625 (2015)

    Article  Google Scholar 

  39. Zhou, P., Gu, X., Zhang, J., et al.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97–106 (2015)

    Article  Google Scholar 

Download references

Acknowledgement

This work was partially supported by the National Natural Science Foundation of China (Nos. 61502293, 61633016 and 61673255), the Shanghai Young Eastern Scholar Program (No. QD2016030), the Young Teachers’ Training Program for Shanghai College and University, the Science and Technology Commission of Shanghai Municipality (Nos. 17511107002 and 15411953502) and the Shanghai Key Laboratory of Power Station Automation Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Zhou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Dong, Y., Zhou, P. (2017). Jamming Attacks Against Control Systems: A Survey. In: Yue, D., Peng, C., Du, D., Zhang, T., Zheng, M., Han, Q. (eds) Intelligent Computing, Networked Control, and Their Engineering Applications. ICSEE LSMS 2017 2017. Communications in Computer and Information Science, vol 762. Springer, Singapore. https://doi.org/10.1007/978-981-10-6373-2_57

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6373-2_57

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6372-5

  • Online ISBN: 978-981-10-6373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics