Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [31] Supervisory Control of Networked Fuzzy Discrete Event Systems
    Lin, Feng
    Ying, Hao
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2024, 32 (11) : 6277 - 6287
  • [32] Supervisory control of a class of concurrent discrete event systems
    Takai, S
    Ushio, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (04): : 850 - 855
  • [33] Decentralized supervisory control of fuzzy discrete event systems
    Liu, Fuchun
    Qiu, Daowen
    EUROPEAN JOURNAL OF CONTROL, 2008, 14 (03) : 234 - 243
  • [34] Supervisory control of discrete event systems with flexible marking
    Cury, JER
    Torrico, CRC
    da Cunha, AEC
    EUROPEAN JOURNAL OF CONTROL, 2004, 10 (01) : 47 - 60
  • [35] Approximate current state observability of discrete-time nonlinear systems under cyber-attacks
    Pola, Giordano
    De Santis, Elena
    Di Benedetto, Maria Domenica
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2023, 50
  • [36] Optimal Supervisory Control of Probabilistic Discrete Event Systems
    Pantelic, Vera
    Lawford, Mark
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2012, 57 (05) : 1110 - 1124
  • [37] Design of a Cosimulation Platform With Hardware-in-the-Loop for Cyber-Attacks on Cyber-Physical Power Systems
    Liu, Zengji
    Wang, Qi
    Tang, Yi
    IEEE ACCESS, 2020, 8 (08): : 95997 - 96005
  • [38] Embedded supervisory control of discrete-event systems
    Yang, Y
    Gohari, R
    2005 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2005, : 410 - 415
  • [39] Asynchronous Diagnosability Enforcement in Discrete Event Systems Based on Supervisory Control
    Hu, Yihui
    Cao, Shengli
    IEEE SENSORS JOURNAL, 2023, 23 (09) : 10071 - 10079
  • [40] Distributed event-triggered control for networked control systems with stochastic cyber-attacks
    Liu, Jinliang
    Tian, Engang
    Xie, Xiangpeng
    Lin, Hong
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2019, 356 (17): : 10260 - 10276