Homomorphic Encryption of Supervisory Control Systems Using Automata

被引:39
作者
Zhou, Sian [1 ]
Yu, Zhenhua [2 ]
Nasr, Emad S. Abouel [3 ,4 ]
Mahmoud, Haitham A. [3 ,4 ]
Awwad, Emad Mahrous [5 ]
Wu, Naiqi [6 ,7 ]
机构
[1] Macau Univ Sci & Technol, Fac Informat Technol, Taipa 999078, Macao, Peoples R China
[2] Xian Univ Sci & Technol, Inst Syst Secur & Control, Coll Comp Sci & Technol, Xian 710054, Shaanxi, Peoples R China
[3] King Saud Univ, Ind Engn Dept, Coll Engn, Riyadh 11421, Saudi Arabia
[4] Helwan Univ, Mech Engn Dept, Fac Engn, Cairo 11732, Egypt
[5] King Saud Univ, Elect Engn Dept, Coll Engn, Riyadh 11421, Saudi Arabia
[6] Macau Univ Sci & Technol, Inst Syst Engn, Taipa 999078, Macao, Peoples R China
[7] Macau Univ Sci & Technol, Collaborat Lab Intelligent Sci & Syst, Taipa 999078, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Automata; Supervisory control; Entropy; Discrete-event systems; Cyber-physical system; discrete event system; supervisory control; security; encryption; automaton; TIME PETRI-NET; SECURITY; OPACITY; SPREAD; ISSUES;
D O I
10.1109/ACCESS.2020.3014217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-physical systems have been highly integrated into many contemporary infrastructures. As this integration deepens, the importance of protecting these systems from unauthorized access and data corruption increases. Nowadays, cyber-physical systems are not well protected against network attacks. One solution is to improve the security of a system by encrypting the transmitted data. In this paper, we consider the encryption of supervisors of discrete event systems modeled with deterministic finite-state automata. We propose an encryption framework of supervisory control systems based on the matrix notation of automata. The purpose of using matrix notation is to make it suitable for homomorphic encryption schemes over integers, which are emerging in the cryptography area. We calculate the entropy of the matrix notation and find that as the size of a system increases, it gets smaller and approaches zero. Owing to the low entropy of the matrix notation, we propose an algorithm to enhance its entropy. By applying the entropy-enhancing process, the distribution characteristics of entries in matrices or vectors can be hidden to avoid a brute force attack. Correspondingly, we propose an entropy restoration algorithm to ensure that the control action can be transmitted correctly.
引用
收藏
页码:147185 / 147198
页数:14
相关论文
共 64 条
[1]  
[Anonymous], 2019, The Economist
[2]   Distributed Model Predictive Control for Networked Plant-wide Systems With Neighborhood Cooperation [J].
Bai, Ting ;
Li, Shaoyuan ;
Zheng, Yi .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2019, 6 (01) :108-117
[3]   A Survey of Network Attacks on Cyber-Physical Systems [J].
Cao, Liwei ;
Jiang, Xiaoning ;
Zhao, Yumei ;
Wang, Shouguang ;
You, Dan ;
Xu, Xianli .
IEEE ACCESS, 2020, 8 :44219-44227
[4]  
Cassandras C. G., 2009, INTRO DISCRETE EVENT
[5]   On a maximally permissive deadlock prevention policy for automated manufacturing systems by using resource-oriented Petri nets [J].
Chen, HeFeng ;
Wu, NaiQi ;
Li, ZhiWu ;
Qu, Ting .
ISA TRANSACTIONS, 2019, 89 :67-76
[6]   Towards Encrypted MPC for Linear Constrained Systems [J].
Darup, Moritz Schulze ;
Redder, Adrian ;
Shames, Iman ;
Farokhi, Farhad ;
Quevedo, Daniel .
IEEE CONTROL SYSTEMS LETTERS, 2018, 2 (02) :195-200
[7]   Design, Analysis and Verification of Real-Time Systems Based on Time Petri Net Refinement [J].
Ding, Zhijun ;
Jiang, Changjun ;
Zhou, Mengchu .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12 (01)
[8]   Practical homomorphic encryption over the integers for secure computation in the cloud [J].
Dyer, James ;
Dyer, Martin ;
Xu, Jie .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) :549-579
[9]   Secure and private control using semi-homomorphic encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
CONTROL ENGINEERING PRACTICE, 2017, 67 :13-20
[10]  
Frey G., 2002, Design and formal analysis of Petri net based logic controllers