Cyber-Attacks with Resource Constraints on Discrete Event Systems Under Supervisory Control

被引:0
|
作者
He, Zhaoyang [1 ]
Wu, Naiqi [1 ]
Su, Rong [2 ]
Li, Zhiwu [1 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macau, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
基金
新加坡国家研究基金会;
关键词
Actuators; Supervisory control; Cyber-physical systems; Polynomials; Discrete-event systems; Closed loop systems; Security; Cyberattack; Faces; Cyber-attack; cyber-physical system; discrete event system; supervisory control; NETWORK ATTACKS; SECURITY; SENSOR;
D O I
10.1109/JAS.2024.124596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and actuator attacks with resource constraints (the total resource consumption of the attacks is not greater than a given initial resource of the attacker) to mislead a discrete event system under supervisory control to reach unsafe states. We consider that the attacker can implement two types of attacks: One by modifying the sensor readings observed by a supervisor and the other by enabling the actuator commands disabled by the supervisor. Each attack has its corresponding resource consumption and remains covert. To solve this problem, we first introduce a notion of combined-attackability to determine whether a closed-loop system may reach an unsafe state after receiving attacks with resource constraints. We develop an algorithm to construct a corrupted supervisor under attacks, provide a verification method for combined-attackability in polynomial time based on a plant, a corrupted supervisor, and an attacker's initial resource, and propose a corresponding attack synthesis algorithm. The effectiveness of the proposed method is illustrated by an example.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [41] Supervisory Control of Concurrent Discrete-Event Systems
    Su, Rong
    2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 1811 - 1816
  • [42] Research on secure control and communication for cyber-physical systems under cyber-attacks
    Li, Wei
    Shi, Yahong
    Li, Yajie
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 41 (12) : 3421 - 3437
  • [43] Attack-Resilient Supervisory Control of Discrete-Event Systems: A Finite-State Transducer Approach
    Wang, Yu
    Bozkurt, Alper Kamil
    Smith, Nathan
    Pajic, Miroslav
    IEEE OPEN JOURNAL OF CONTROL SYSTEMS, 2023, 2 : 208 - 220
  • [44] Supervisory Control of Fuzzy Discrete Event Systems Under Partial Observation
    Lin, Feng
    Ying, Hao
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (09) : 3161 - 3172
  • [45] Detection of Cyber-Attacks in a Discrete Event System Based on Deep Learning
    Ding, Sichen
    Liu, Gaiyun
    Yin, Li
    Wang, Jianzhou
    Li, Zhiwu
    MATHEMATICS, 2024, 12 (17)
  • [46] Effects of Permanent Bounded Cyber-Attacks on Networked Control Systems
    Gerard, Benjamin
    Voos, Holger
    Li, Yumei
    Darouach, Mohamed
    2015 23RD MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2015, : 877 - 882
  • [47] Network-Based Modeling and Sampling Guaranteed Cost Control for Unmanned Surface Vehicle Systems Under Stochastic Cyber-Attacks
    Ding, Kui
    Zhu, Quanxin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (06) : 6173 - 6185
  • [48] Online Supervisory Control of Networked Discrete Event Systems With Control Delays
    Liu, Zhaocong
    Yin, Xiang
    Shu, Shaolong
    Lin, Feng
    Li, Shaoyuan
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (05) : 2314 - 2329
  • [49] Supervisory Control of Networked Discrete Event Systems With Timing Structure
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Basilio, Joao Carlos
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2206 - 2218
  • [50] Event-Triggered Security Output Feedback Control for Networked Interconnected Systems Subject to Cyber-Attacks
    Gu, Zhou
    Park, Ju H.
    Yue, Dong
    Wu, Zheng-Guang
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 6197 - 6206