Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [1] Cyber-Attacks With Resource Constraints on Discrete Event Systems Under Supervisory Control
    Zhaoyang He
    Naiqi Wu
    Rong Su
    Zhiwu Li
    IEEE/CAA Journal of Automatica Sinica, 2025, 12 (03) : 585 - 595
  • [2] Supervisory Control of Discrete-Event Systems Under Attacks
    Masashi Wakaiki
    Paulo Tabuada
    João P. Hespanha
    Dynamic Games and Applications, 2019, 9 : 965 - 983
  • [3] Supervisory Control of Discrete-Event Systems Under Attacks
    Wakaiki, Masashi
    Tabuada, Paulo
    Hespanha, Joao P.
    DYNAMIC GAMES AND APPLICATIONS, 2019, 9 (04) : 965 - 983
  • [4] Supervisory control of discrete-event systems under external attacks
    Wang, Yi
    Li, Yuting
    Yu, Zhenhua
    Wu, Naiqi
    Li, Zhiwu
    Information Sciences, 2021, 562 : 398 - 413
  • [5] Supervisory control of discrete-event systems under external attacks
    Wang, Yi
    Li, Yuting
    Yu, Zhenhua
    Wu, Naiqi
    Li, Zhiwu
    INFORMATION SCIENCES, 2021, 562 : 398 - 413
  • [6] Event-Triggered Control for Networked Control Systems under Intermittent Cyber-Attacks
    Li, Tao
    Wang, Ting
    Chen, Linbo
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 4709 - 4713
  • [7] Improved event-triggered control for networked control systems under stochastic cyber-attacks
    Li, Tao
    Tang, Xiaoling
    Zhang, Haitao
    Fei, Shumin
    NEUROCOMPUTING, 2019, 350 : 33 - 43
  • [8] Synthesis of resilient fallback control system under cyber-attacks via supervisory control
    Sakata, Kousei
    Sawada, Kenji
    Ogura, Takashi
    Fujita, Junya
    Matsumoto, Noritaka
    ADVANCED ROBOTICS, 2024, 38 (9-10) : 659 - 671
  • [9] Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook
    Rashidinejad, Aida
    Lin, Liyong
    Wetzels, Bart
    Zhu, Yuting
    Reniers, Michel
    Su, Rong
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1732 - 1739
  • [10] Event-triggered adaptive control for networked control systems under two stochastic cyber-attacks
    Tang, Xiaoling
    Li, Tao
    Cong, Shen
    Qian, Wei
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 170 - 175