Secret inference and attacktability analysis of discrete event systems

被引:3
作者
Habbachi, Salwa [1 ]
Zaghdoud, Amal [1 ]
Li, Zhiwu [1 ]
Wu, Naiqi [1 ]
Khalgui, Mohamed [2 ]
机构
[1] Macau Univ Sci & Technol, Inst Syst Engn, Taipa, Macau, Peoples R China
[2] Jinan Univ, Sch Elect & Informat Engn, Zhuhai Campus, Zhuhai, Peoples R China
关键词
Discrete event system; Opacity; Active intruder; Attacktabiity; SUPERVISORY CONTROL; OPACITY; ATTACK;
D O I
10.1016/j.ins.2022.07.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the discrete event systems literature, the studies addressing opacity usually assume a passive intruder, who has full knowledge of the structure of a system but with only a partial observation ability. This work touches upon the opacity problem in discrete event systems modeled with labeled Petri nets, by assuming the existence of an active intruder. Herein, an active intruder, whose abilities exceed passive observations, is assumed to be able to manipulate the behavior of a system through sensor attacks in a practical manner, i.e., in an embedded way, in order to compromise the opacity of a system. In this setting, a framework for opacity verification is first proposed from the intruder's viewpoint, where opacity is referred to as "language-based opacity". A verification algorithm is then derived to identify opaque secret words. Two stealthy attack models named sensor-failure-making strategy and sensor-injection-making strategy are introduced, allowing the intruder to implant/damage some sensors, i.e., add/delete some events, in line with the original behavior of a system, in order to infer the secret information. An algorithmic procedure for attractability analysis is provided for each attack strategy. Once a system is proved to be attackable, a stealthy attack structure that synthesizes different sensor-failure-making (resp. sensor-injection-making) attacks is constructed. Furthermore, we demonstrate the validity and efficiency of the proposed approaches by implementing the presented algorithms and running experiments on a manufacturing system example. (c) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:1221 / 1238
页数:18
相关论文
共 31 条
  • [1] Concurrent secrets
    Badouel, E.
    Bednarczyk, M.
    Borzyszkowski, A.
    Caillaud, B.
    Darondeau, P.
    [J]. DISCRETE EVENT DYNAMIC SYSTEMS-THEORY AND APPLICATIONS, 2007, 17 (04): : 425 - 446
  • [2] An algebraic characterization of language-based opacity in labeled Petri nets
    Basile, F.
    De Tommasi, G.
    [J]. IFAC PAPERSONLINE, 2018, 51 (07): : 329 - 336
  • [3] Discrete event diagnosis using labeled Petri nets. An application to manufacturing systems
    Cabasino, M. P.
    Giua, A.
    Pocci, M.
    Seatzu, C.
    [J]. CONTROL ENGINEERING PRACTICE, 2011, 19 (09) : 989 - 1001
  • [4] A Survey of Network Attacks on Cyber-Physical Systems
    Cao, Liwei
    Jiang, Xiaoning
    Zhao, Yumei
    Wang, Shouguang
    You, Dan
    Xu, Xianli
    [J]. IEEE ACCESS, 2020, 8 : 44219 - 44227
  • [5] Modeling and detection of cyber attacks on discrete event systems
    Fritz, Raphael
    Zhang, Ping
    [J]. IFAC PAPERSONLINE, 2018, 51 (07): : 285 - 290
  • [6] Giua A, 2005, IEEE DECIS CONTR P, P6323
  • [7] Overview of Opacity in Discrete Event Systems
    Guo, Ye
    Jiang, Xiaoning
    Guo, Chen
    Wang, Shouguang
    Karoui, Oussama
    [J]. IEEE ACCESS, 2020, 8 : 48731 - 48741
  • [8] Opacity with powerful attackers
    Helouet, Loic
    Marchand, Herve
    Ricker, Laurie
    [J]. IFAC PAPERSONLINE, 2018, 51 (07): : 464 - 471
  • [9] Overview of discrete event systems opacity: Models, validation, and quantification
    Jacob, Romain
    Lesage, Jean-Jacques
    Faure, Jean-Marc
    [J]. ANNUAL REVIEWS IN CONTROL, 2016, 41 : 135 - 146
  • [10] Opacity Enforcement Using Nondeterministic Publicly Known Edit Functions
    Ji, Yiding
    Yin, Xiang
    Lafortune, Stephane
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (10) : 4369 - 4376