Service Attack

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Jianhua Li - One of the best experts on this subject based on the ideXlab platform.

  • Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    IEEE Transactions on Industrial Electronics, 2010
    Co-Authors: Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li
    Abstract:

    By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions. The proposed remedy also prevents a kind of denial of Service Attack found in the original scheme. High performance and other good functionalities are preserved.

Xiangxue Li - One of the best experts on this subject based on the ideXlab platform.

  • Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    IEEE Transactions on Industrial Electronics, 2010
    Co-Authors: Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li
    Abstract:

    By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions. The proposed remedy also prevents a kind of denial of Service Attack found in the original scheme. High performance and other good functionalities are preserved.

Ling Shi - One of the best experts on this subject based on the ideXlab platform.

  • optimal denial of Service Attack scheduling with energy constraint over packet dropping networks
    IEEE Transactions on Automatic Control, 2018
    Co-Authors: Jiahu Qin, Ling Shi
    Abstract:

    The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper, denial-of-Service (DoS) Attack scheduling is investigated in depth. Specifically, we consider a system where a remote estimator receives the data packet sent by a sensor over a wireless network at each time instant, and an energy-constrained Attacker that cannot launch DoS Attacks all the time designs the optimal DoS Attack scheduling to maximize the Attacking effect on the remote estimation performance. Most of the existing works concerning DoS Attacks focus on the ideal scenario in which data packets can be received successfully if there is no DoS Attack. To capture the unreliability nature of practical networks, we study the packet-dropping network in which packet dropouts may occur even in the absence of Attack. We derive the optimal Attack scheduling scheme that maximizes the average expected estimation error, and the one which maximizes the expected terminal estimation error over packet-dropping networks. We also present some countermeasures against DoS Attacks, and discuss the optimal defense strategy, and how the optimal Attack schedule can serve for more effective and resource-saving countermeasures. We further investigate the optimal Attack schedule with multiple sensors. The optimality of the theoretical results is demonstrated by numerical simulations.

  • optimal denial of Service Attack scheduling with energy constraint
    IEEE Transactions on Automatic Control, 2015
    Co-Authors: Heng Zhang, Ling Shi, Peng Cheng, Jiming Chen
    Abstract:

    Security of Cyber-Physical Systems (CPS) has gained increasing attention in recent years. Most existing works mainly investigate the system performance given some Attacking patterns. In this technical note, we investigate how an Attacker should schedule its Denial-of-Service (DoS) Attacks to degrade the system performance. Specifically, we consider the scenario where a sensor sends its data to a remote estimator through a wireless channel, while an energy-constrained Attacker decides whether to jam the channel at each sampling time. We construct optimal Attack schedules to maximize the expected average estimation error at the remote estimator. We also provide the optimal Attack schedules when a special intrusion detection system (IDS) at the estimator is given. We further discuss the optimal Attack schedules when the sensor has energy constraint. Numerical examples are presented to demonstrate the effectiveness of the proposed optimal Attack schedules.

Kefei Chen - One of the best experts on this subject based on the ideXlab platform.

  • Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    IEEE Transactions on Industrial Electronics, 2010
    Co-Authors: Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li
    Abstract:

    By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions. The proposed remedy also prevents a kind of denial of Service Attack found in the original scheme. High performance and other good functionalities are preserved.

Dong Zheng - One of the best experts on this subject based on the ideXlab platform.

  • Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards
    IEEE Transactions on Industrial Electronics, 2010
    Co-Authors: Xiangxue Li, Dong Zheng, Kefei Chen, Jianhua Li
    Abstract:

    By exploiting a smart card, this paper presents a robust and efficient password-authenticated key agreement scheme. This paper strengthens the security of the scheme by addressing untraceability property such that any third party over the communication channel cannot tell whether or not he has seen the same (unknown) smart card twice through the authentication sessions. The proposed remedy also prevents a kind of denial of Service Attack found in the original scheme. High performance and other good functionalities are preserved.