Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [41] Approximate current state observability of discrete-time nonlinear systems under cyber-attacks
    Pola, Giordano
    De Santis, Elena
    Di Benedetto, Maria Domenica
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2023, 50
  • [42] Confusion avoidance for discrete event systems by P/E constraints and supervisory control
    Chen, Xiaoliang
    Li, Zhiwu
    Wu, Naiqi
    Al-Ahmari, Abdulrahman M.
    El-Tamimi, Abdulaziz Mohammed
    Nasr, Emad S. Abouel
    IMA JOURNAL OF MATHEMATICAL CONTROL AND INFORMATION, 2016, 33 (02) : 309 - 332
  • [43] Event-based security tracking control for networked control systems against stochastic cyber-attacks
    Liu, Jinliang
    Dong, Yanhui
    Zha, Lijuan
    Tian, Engang
    Xie, Xiangpeng
    INFORMATION SCIENCES, 2022, 612 : 306 - 321
  • [44] Dynamic event-triggered consensus of multi-agent systems under cyber-attacks
    Wang L.
    Hu A.-H.
    Jiang Z.-X.
    Kongzhi yu Juece/Control and Decision, 2023, 38 (05): : 1295 - 1302
  • [45] Critical observability of partially observed discrete event systems under cyber attacks
    Tong, Liyun
    Liang, Jinling
    Liu, Yang
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (02)
  • [46] Critical observability of partially observed discrete event systems under cyber attacks
    Liyun TONG
    Jinling LIANG
    Yang LIU
    ScienceChina(InformationSciences), 2024, 67 (02) : 333 - 334
  • [47] Modeling and detection of cyber attacks on discrete event systems
    Fritz, Raphael
    Zhang, Ping
    IFAC PAPERSONLINE, 2018, 51 (07): : 285 - 290
  • [48] Supervisory Control of Fuzzy Discrete Event Systems Under Partial Observation
    Lin, Feng
    Ying, Hao
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (09) : 3161 - 3172
  • [49] Supervisory Control of Probabilistic Discrete Event Systems Under Partial Observation
    Deng, Weilin
    Yang, Jingkai
    Qiu, Daowen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (12) : 5051 - 5065
  • [50] On Resilient Supervisory Control Against Indefinite Actuator Attacks in Discrete-Event Systems
    Ma, Ziyue
    Cai, Kai
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 2942 - 2947