In this survey, attacks in the closed loop controlled systems are detected. Nowadays, closed loop controlled systems fully depend on wireless networks, so malicious activities such as cyber attacks can occur in the system which leads to system vulnerabilities, loss and degradation. Denial of service attacks is the common attack in the closed loop controlled system. The goal of this paper is to provide a general overview of cyber attacks in wireless networked closed loop controlled system. It covers relevant works, different detection techniques, discriminate types of attacks and typical prevention techniques. Challenges associated with comparing several techniques are also highlighted.
CITATION STYLE
Benisha, R. B., & Raja Ratna, S. (2019). Hierarchical View on Detection of Attacks in Closed Loop Control Systems. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 26, pp. 220–226). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-03146-6_23
Mendeley helps you to discover research relevant for your work.