Special Section on Advanced Control Theory and Techniques based on Data Fusion

International Journal of Control, Automation and Systems 2015; 13(3): 513-520

Published online March 28, 2015

https://doi.org/10.1007/s12555-014-0316-9

© The International Journal of Control, Automation, and Systems

Data Fusion-based Resilient Control System under DoS Attacks: A Game Theoretic Approach

Yuan Yuan* and Fuchun Sun

Tsinghua University

Abstract

In this paper, the resilient control under the Denial-of-Service (DoS) attack is rebuilt within the framework of Joint Directors of Laboratories (JDL) data fusion model. The JDL data fusion process is characterized by the so-called Game-in-Game approach, where decisions are made at different layers. The interactions between different JDL levels are considered which take the form of Packet Delivery Rate of the communication channel. Some criterions to judge whether the cyber defense system is able to protect the underlying control system is provided. Finally, a numerical example is proposed to verify the validity of the proposed method.

Keywords Data fusion, DoS attack, game theory, JDL fusion model, resilient control system.

Article

Special Section on Advanced Control Theory and Techniques based on Data Fusion

International Journal of Control, Automation and Systems 2015; 13(3): 513-520

Published online June 1, 2015 https://doi.org/10.1007/s12555-014-0316-9

Copyright © The International Journal of Control, Automation, and Systems.

Data Fusion-based Resilient Control System under DoS Attacks: A Game Theoretic Approach

Yuan Yuan* and Fuchun Sun

Tsinghua University

Abstract

In this paper, the resilient control under the Denial-of-Service (DoS) attack is rebuilt within the framework of Joint Directors of Laboratories (JDL) data fusion model. The JDL data fusion process is characterized by the so-called Game-in-Game approach, where decisions are made at different layers. The interactions between different JDL levels are considered which take the form of Packet Delivery Rate of the communication channel. Some criterions to judge whether the cyber defense system is able to protect the underlying control system is provided. Finally, a numerical example is proposed to verify the validity of the proposed method.

Keywords: Data fusion, DoS attack, game theory, JDL fusion model, resilient control system.

IJCAS
March 2025

Vol. 23, No. 3, pp. 683~972

Stats or Metrics

Share this article on

  • line

Related articles in IJCAS

IJCAS

eISSN 2005-4092
pISSN 1598-6446