Malicious Origin of Deadlocks in Flexible Manufacturing Systems

被引:1
作者
Beaudet, Amaury [1 ]
Zamai, Eric [1 ]
Escudero, Cedric [1 ]
Dumitrescu, Emil [1 ]
机构
[1] Univ Claude Bernard Lyon 1, Univ Lyon, INSA Lyon, Ecole Cent Lyon,CNRS,Ampere,UMR5005, F-69621 Villeurbanne, France
来源
IFAC PAPERSONLINE | 2022年 / 55卷 / 28期
关键词
Flexible Manufacturing Systems; Cyber-attacks; Deadlock; Petri-Net; PREVENTION POLICY; ATTACKS;
D O I
10.1016/j.ifacol.2022.10.330
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flexible Manufacturing Systems (FMSs) are designed to execute parallel processes simultaneously by using flexible resources (e.g. robots, re-configurable machines) alongside a supervisor allocating the resources to the different processes. In these systems, deadlocks are defined as blocking states where no resource allocation decision can be taken. They originate from resources characteristics (i.e. mutual exclusion condition, non-preemptive), processes interactions (i.e. shared resources, circular wait of resources) and an inappropriate sequence of allocation decisions. In modern FMSs, the use of open and interconnected control components for resource allocation control and productivity enhancement makes FMSs vulnerable to cyberattacks. Hence, although FMSs are designed to deal with known natural deadlocks, new malicious ones can originate from sophisticated cyber-attacks. In this paper, malicious deadlocks are defined and contextualized regarding the existing literature on deadlocks management and on cyber-attacks targeting Discrete-Event Systems (DES). Then, a model representative of deadlock attacks is proposed based on the S3PR theory and DES attacks modeling. Finally, the deadlock attack model is simulated and new malicious deadlocks are exhibited and discussed. Copyright (C) 2022 The Authors.
引用
收藏
页码:100 / 107
页数:8
相关论文
共 18 条
[1]   Malicious Anomaly Detection Approaches Robustness in Manufacturing ICSs [J].
Beaudet, Amaury ;
Escudero, Cedric ;
Zamai, Eric .
IFAC PAPERSONLINE, 2021, 54 (01) :146-151
[2]  
Cardenas A.A., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS'11, P355
[3]   Detection and mitigation of classes of attacks in supervisory control systems [J].
Carvalho, Lilian Kawakami ;
Wu, Yi-Chin ;
Kwong, Raymond ;
Lafortune, Stephane .
AUTOMATICA, 2018, 97 :121-133
[4]   Robust Deadlock Avoidance and Control of Automated Manufacturing Systems With Assembly Operations Using Petri Nets [J].
Du, Nan ;
Hu, Hesuan ;
Zhou, MengChu .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2020, 17 (04) :1961-1975
[5]   Random sampling strategies for multivariate statistical process control to detect cyber-physical manufacturing attacks [J].
Elhabashy, Ahmad E. ;
Dastoorian, Romina ;
Wells, Lee J. ;
Camelio, Jaime A. .
QUALITY ENGINEERING, 2021, 33 (02) :300-317
[6]   Analysis, prevention, and feasibility assessment of stealthy ageing attacks on dynamical systems [J].
Escudero, Cedric ;
Massioni, Paolo ;
Zamai, Eric ;
Raison, Bertrand .
IET CONTROL THEORY AND APPLICATIONS, 2022, 16 (04) :381-397
[7]  
Escudero C, 2018, IEEE INT C EMERG, P605, DOI 10.1109/ETFA.2018.8502585
[8]   A PETRI-NET BASED DEADLOCK PREVENTION POLICY FOR FLEXIBLE MANUFACTURING SYSTEMS [J].
EZPELETA, J ;
COLOM, JM ;
MARTINEZ, J .
IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, 1995, 11 (02) :173-184
[9]  
Franck Sicard, 2018, 2018 2nd Cyber Security in Networking Conference (CSNet), DOI 10.1109/CSNET.2018.8602960
[10]   Deadlock-free Supervisor Design for Robotic Manufacturing Cells With Uncontrollable and Unobservable Events [J].
Huang, Bo ;
Zhou, MengChu ;
Wang, Cong ;
Abusorrah, Abdullah ;
Al-Turki, Yusuf .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2021, 8 (03) :597-605