On decidability of existence of nonblocking supervisors resilient to smart sensor attacks
From MaRDI portal
Publication:6175603
DOI10.1016/J.AUTOMATICA.2023.111076zbMATH Open1520.93321arXiv2009.02626MaRDI QIDQ6175603FDOQ6175603
Publication date: 24 July 2023
Published in: Automatica (Search for Journal in Brave)
Abstract: Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due to its high relevance to the so-called 4th industrial revolution that heavily relies on data communication among networked systems. One key challenge is how to ensure system resilience to sensor and/or actuator attacks, which may tamper data integrity and service availability. In this paper we focus on some key decidability issues related to smart sensor attacks. We first present a sufficient and necessary condition that ensures the existence of a smart sensor attack, which reveals a novel demand-supply relationship between an attacker and a controlled plant, represented as a set of risky pairs. Each risky pair consists of a damage string desired by the attacker and an observable sequence feasible in the supervisor such that the latter induces a sequence of control patterns, which allows the damage string to happen. It turns out that each risky pair can induce a smart weak sensor attack. Next, we show that, when the plant, supervisor and damage language are regular, it is computationally feasible to remove all such risky pairs from the plant behaviour, via a genuine encoding scheme, upon which we are able to establish our key result that the existence of a nonblocking supervisor resilient to smart sensor attacks is decidable. To the best of our knowledge, this is the first result of its kind in the DES literature on cyber attacks. The proposed decision process renders a specific synthesis procedure that guarantees to compute a resilient supervisor whenever it exists, which so far has not been achieved in the literature.
Full work available at URL: https://arxiv.org/abs/2009.02626
discrete-event systemsdecidability of existence of resilient supervisory controlsmart sensor attacks
Hierarchical systems (93A13) Discrete event control/observation systems (93C65) Networked control (93B70)
Cites Work
- Supervisory Control of a Class of Discrete Event Processes
- Diagnosability of discrete-event systems
- On observability of discrete-event systems
- Maximally permissive coordinated distributed supervisory control of nondeterministic discrete-event systems
- Aggregative Synthesis of Distributed Supervisors Based on Automaton Abstraction
- Active fault tolerant control of discrete event systems using online diagnostics
- Supervisory control of discrete-event systems
- Synthesis of Maximally Permissive Supervisors for Partially-Observed Discrete-Event Systems
- Robust supervisory control of discrete event systems against intermittent loss of observations
- Detection and mitigation of classes of attacks in supervisory control systems
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations
- A Supervisory Control Approach to Dynamic Cyber-Security
- Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems
- Supervisory control of discrete-event systems under attacks
- Synthesis of covert actuator attackers for free
- Synthesis of covert actuator and sensor attackers
- Synthesis of Supervisors Robust Against Sensor Deception Attacks
Cited In (1)
Recommendations
- Supervisory control of discrete-event systems under attacks π π
- Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations π π
- A Framework for the Analysis of Supervised Discrete Event Systems Under Attack π π
- Dealing with sensor and actuator deception attacks in supervisory control π π
- Discrete-event systems subject to unknown sensor attacks π π
This page was built for publication: On decidability of existence of nonblocking supervisors resilient to smart sensor attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6175603)