Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [31] Sliding Mode Fuzzy Control of Stochastic Nonlinear Systems Under Cyber-Attacks
    Yang, Yue
    Wen, Baoyu
    Su, Xiaojie
    Huang, Jiangshuai
    Liu, Biao
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (05) : 3174 - 3182
  • [32] An Algebraic Detection Approach for Control Systems under Multiple Stochastic Cyber-attacks
    Yumei Li
    Holger Voos
    Mohamed Darouach
    Changchun Hua
    IEEE/CAA Journal of Automatica Sinica, 2015, 2 (03) : 258 - 266
  • [33] An algebraic detection approach for control systems under multiple stochastic cyber-attacks
    Li, Yumei
    Voos, Holger
    Darouach, Mohamed
    Hua, Changchun
    IEEE/CAA Journal of Automatica Sinica, 2015, 2 (03) : 258 - 266
  • [34] Supervisory control of discrete event systems
    Thistle, JG
    MATHEMATICAL AND COMPUTER MODELLING, 1996, 23 (11-12) : 25 - 53
  • [35] Hybrid-triggered predictive control of cyber-physical-systems under cyber-attacks
    Li, Hengqian
    Zhan, Xisheng
    Wu, Bo
    Wu, Jie
    Yan, Huaicheng
    ASIAN JOURNAL OF CONTROL, 2024, 26 (05) : 2495 - 2506
  • [36] Detection and Prevention of Cyber-Attacks in Networked Control Systems
    Li, Yike
    Tong, Yin
    Giua, Alessandro
    IFAC PAPERSONLINE, 2020, 53 (04): : 7 - 13
  • [37] Robust H∞ cyber-attacks estimation for control systems
    Li Yumei
    Holger, Voos
    Mohamed, Daroijach
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 3124 - 3129
  • [38] Interval forecasting of cyber-attacks on industrial control systems
    Ivanyo, Y. M.
    Krakovsky, Y. M.
    Luzgin, A. N.
    INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, AUTOMATION AND CONTROL SYSTEMS 2017, 2018, 327
  • [39] Memory-based event-triggered control for networked control system under cyber-attacks
    Nafir, Noureddine
    Khemissat, Abdel Mouneim
    Farrag, Mohamed Emad
    Rouamel, Mohamed
    IET CONTROL THEORY AND APPLICATIONS, 2024, 18 (13): : 1739 - 1750
  • [40] Mixed H∞ and passive event-triggered control for Markovian jump systems with sensor saturation under cyber-attacks
    Li, Tianrui
    Wang, Weiqun
    Chen, Weimin
    ASIAN JOURNAL OF CONTROL, 2022, 24 (06) : 3588 - 3600