Hierarchical View on Detection of Attacks in Closed Loop Control Systems

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this survey, attacks in the closed loop controlled systems are detected. Nowadays, closed loop controlled systems fully depend on wireless networks, so malicious activities such as cyber attacks can occur in the system which leads to system vulnerabilities, loss and degradation. Denial of service attacks is the common attack in the closed loop controlled system. The goal of this paper is to provide a general overview of cyber attacks in wireless networked closed loop controlled system. It covers relevant works, different detection techniques, discriminate types of attacks and typical prevention techniques. Challenges associated with comparing several techniques are also highlighted.

Cite

CITATION STYLE

APA

Benisha, R. B., & Raja Ratna, S. (2019). Hierarchical View on Detection of Attacks in Closed Loop Control Systems. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 26, pp. 220–226). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03146-6_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free