Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [21] On Resilient Supervisory Control Against Indefinite Actuator Attacks in Discrete-Event Systems
    Ma, Ziyue
    Cai, Kai
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 2942 - 2947
  • [22] Event-based model predictive damping control for power systems with cyber-attacks
    Liu, Yuezhi
    Chen, Yong
    Li, Meng
    ISA TRANSACTIONS, 2023, 136 : 687 - 700
  • [23] Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
    Zhao, Di
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3926 - 3938
  • [24] Supervisory control of discrete event systems under asynchronous spiking neuron P systems
    Chen, Xiaoliang
    Peng, Hong
    Wang, Jun
    Hao, Fei
    INFORMATION SCIENCES, 2022, 597 : 253 - 273
  • [25] Supervisory control of discrete event systems
    Thistle, JG
    MATHEMATICAL AND COMPUTER MODELLING, 1996, 23 (11-12) : 25 - 53
  • [26] A Cyber-HIL for Investigating Control Systems in Ship Cyber Physical Systems Under Communication Issues and Cyber Attacks
    Vu, Linh
    Nguyen, Tung-Lam
    Abdelrahman, Mahmoud S.
    Vu, Tuyen
    Mohammed, Osama A.
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2024, 60 (02) : 2142 - 2152
  • [27] A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense, and Design
    Lian, Zhi
    Shi, Peng
    Chen, Mou
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1471 - 1483
  • [28] Quantitative Supervisory Control Game for Discrete Event Systems
    Pruekprasert, Sasinee
    Ushio, Toshimitsu
    Kanazawa, Takafumi
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (10) : 2987 - 3000
  • [29] Multitasking Supervisory Control of Discrete-Event Systems
    Max H. de Queiroz
    José E. R. Cury
    W. M. Wonham
    Discrete Event Dynamic Systems, 2005, 15 : 375 - 395
  • [30] Multitasking supervisory control of discrete-event systems
    De Queiroz, MH
    Cury, JER
    Wonham, WM
    DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2005, 15 (04): : 375 - 395