Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [1] Supervisory Control of Discrete-Event Systems Under Attacks
    Masashi Wakaiki
    Paulo Tabuada
    João P. Hespanha
    Dynamic Games and Applications, 2019, 9 : 965 - 983
  • [2] Supervisory Control of Discrete-Event Systems Under Attacks
    Wakaiki, Masashi
    Tabuada, Paulo
    Hespanha, Joao P.
    DYNAMIC GAMES AND APPLICATIONS, 2019, 9 (04) : 965 - 983
  • [3] Estimation and Prevention of Actuator Enablement Attacks in Discrete-Event Systems Under Supervisory Control
    He, Zhaoyang
    Wu, Naiqi
    Li, Zhiwu
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (09) : 5963 - 5978
  • [4] Supervisory control of discrete-event systems under external attacks
    Wang, Yi
    Li, Yuting
    Yu, Zhenhua
    Wu, Naiqi
    Li, Zhiwu
    INFORMATION SCIENCES, 2021, 562 : 398 - 413
  • [5] Synthesis of resilient fallback control system under cyber-attacks via supervisory control
    Sakata, Kousei
    Sawada, Kenji
    Ogura, Takashi
    Fujita, Junya
    Matsumoto, Noritaka
    ADVANCED ROBOTICS, 2024, 38 (9-10) : 659 - 671
  • [6] Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook
    Rashidinejad, Aida
    Lin, Liyong
    Wetzels, Bart
    Zhu, Yuting
    Reniers, Michel
    Su, Rong
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1732 - 1739
  • [7] Security and Diagnosability of Finite State Machines Under Cyber-Attacks
    Shamloo, Naeimeh Fakhr
    De Santis, Elena
    Di Benedetto, Maria Domenica
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [8] Detection and Prevention of Cyber-Attacks in Networked Control Systems
    Li, Yike
    Tong, Yin
    Giua, Alessandro
    IFAC PAPERSONLINE, 2020, 53 (04): : 7 - 13
  • [9] Modeling and Control of Discrete-Event Systems Under Joint Sensor-Actuator Cyberattacks
    Zheng, Shengbao
    Shu, Shaolong
    Lin, Feng
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 782 - 794
  • [10] Modeling and detection of cyber attacks on discrete event systems
    Fritz, Raphael
    Zhang, Ping
    IFAC PAPERSONLINE, 2018, 51 (07): : 285 - 290