Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [21] Modeling cyber-attacks on Industrial Control Systems
    Paliath, Vivin
    Shakarian, Paulo
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 316 - 318
  • [22] Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning
    Ding, Sichen
    Liu, Gaiyun
    Yin, Li
    Wang, Jianzhou
    Li, Zhiwu
    MATHEMATICS, 2024, 12 (17)
  • [23] Nonfragile Integral-Based Event-Triggered Control of Uncertain Cyber-Physical Systems under Cyber-Attacks
    Yan, Shen
    Nguang, Sing Kiong
    Zhang, Liruo
    COMPLEXITY, 2019, 2019
  • [24] Supervisory control of real-time discrete event systems under bounded time constraints
    Park, SJ
    Cho, KH
    Lim, JT
    IEE PROCEEDINGS-CONTROL THEORY AND APPLICATIONS, 2004, 151 (03): : 347 - 352
  • [25] Distributed event-triggered control for bipartite consensus under complex cyber-attacks
    Wu, Tong
    Cai, Guangbin
    Wang, Jie
    Mu, Chaoxu
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (11) : 5997 - 6010
  • [26] Event-based model predictive damping control for power systems with cyber-attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    ISA TRANSACTIONS, 2023, 136 : 687 - 700
  • [27] Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
    Zhao, Di
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3926 - 3938
  • [28] Probabilistic event-triggered distributed filtering for fuzzy systems under cyber-attacks
    Zhou, Zhidong
    Cai, Ying
    Cheng, Jun
    Wang, Yunliang
    Cao, Jinde
    INFORMATION SCIENCES, 2025, 700
  • [29] Modeling Network Systems Under Simultaneous Cyber-Attacks
    Da, Gaofeng
    Xu, Maochao
    Zhao, Peng
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 971 - 984
  • [30] Supervisory Control Of Discrete Event Systems Under Nondeterministic Observations
    Zhou, Lei
    Shu, Shaolong
    Lin, Feng
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 4192 - 4197