Opacity and its Trade-offs with Security in Linear Systems

被引:2
作者
John, Varkey M. [1 ]
Katewa, Vaibhav [2 ,3 ]
机构
[1] Indian Inst Sci IISc, Dept ECE, Bangalore, Karnataka, India
[2] IISc, Robert Bosch Ctr CPS, Bangalore, Karnataka, India
[3] IISc, Dept ECE, Bangalore, Karnataka, India
来源
2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC) | 2022年
关键词
D O I
10.1109/CDC51059.2022.9992537
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opacity and attack detectability are important properties for any system as they allow the states to remain private and malicious attacks to be detected, respectively. In this paper, we show that a fundamental trade-off exists between these properties for a linear dynamical system, in the sense that one cannot have an opaque system without making it vulnerable to undetectable attacks. We first characterize the opacity conditions for the system in terms of its weakly unobservable subspace (WUS) and show that the number of opaque states is proportional to the size of the WUS. Further, we establish conditions under which increasing the opaque sets also increases the set of undetectable attacks. This highlights a fundamental trade-off between security and privacy. We demonstrate our results on a team of delivery UAVs.
引用
收藏
页码:5443 / 5449
页数:7
相关论文
共 23 条
[1]   Opacity Enforcement for Confidential Robust Control in Linear Cyber-Physical Systems [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (03) :1234-1241
[2]   A Functionally Stable RuMn Electrocatalyst for Oxygen Evolution Reaction in Acid [J].
An, Lu ;
Yang, Fan ;
Fu, Cehuang ;
Cai, Xiyang ;
Shen, Shuiyun ;
Xia, Guofeng ;
Li, Jing ;
Du, Yunzhu ;
Luo, Liuxuan ;
Zhang, Junliang .
ADVANCED FUNCTIONAL MATERIALS, 2022, 32 (27)
[3]   Opacity Preserving Abstraction for Web Services and their Composition Using SOGs [J].
Bourouis, Amina ;
Klai, Kais ;
El Touati, Yamen ;
Ben Hadj-Alouane, Nejib .
2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), 2015, :313-320
[4]   Modelling Opacity Using Petri Nets [J].
Bryans, Jeremy W. ;
Koutny, Maciej ;
Ryan, Peter Y. A. .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 121 :101-115
[5]   Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (09) :4618-4624
[6]  
Delos V., 2015, J APPL MATH PHYS, V3, P62, DOI DOI 10.4236/JAMP.2015.31008
[7]  
Delos V., 2015, INT C COMP MATH COMP
[8]  
Fridman Leonid, 2007, Proceedings of the European Control Conference 2007 (ECC), P5139
[9]  
Giraldo J, 2017, P AMER CONTR CONF, P1679, DOI 10.23919/ACC.2017.7963194
[10]   On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective [J].
Jin, Richeng ;
He, Xiaofan ;
Dai, Huaiyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (12) :3273-3286