A framework for the analysis of supervised discrete event systems under attack

05/01/2020
by   Qi Zhang, et al.
0

This paper focuses on the problem of cyber attacks for discrete event systems under supervisory control. In more detail, the goal of the supervisor, who has a partial observation of the system evolution, is that of preventing the system from reaching a set of unsafe states. An attacker may act in two different ways: he can corrupt the observation of the supervisor editing the sensor readings, and can enable events that are disabled by the supervisor. This is done with the aim of leading the plant to an unsafe state, and keeping the supervisor unaware of that before the unsafe state is reached. A special automaton, called attack structure is constructed as the parallel composition of two special structures. Such an automaton can be used by the attacker to select appropriate actions (if any) to reach the above goal, or equivalently by the supervisor, to validate its robustness with respect to such attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/12/2019

Cyber attacks with bounded sensor reading edits for partially-observed discrete event systems

The problem of cyber attacks with bounded sensor reading edits for parti...
research
03/28/2022

Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

We consider the probabilistic planning problem for a defender (P1) who c...
research
09/06/2020

On Decidability of Existence of Nonblocking Supervisors Resilient to Smart Sensor Attacks

Cybersecurity of discrete event systems (DES) has been gaining more and ...
research
09/17/2018

Authentication of cyber-physical systems under learning-based attacks

The problem of attacking and authenticating cyber-physical systems is co...
research
11/02/2020

Error- and Tamper-Tolerant State Estimation for Discrete Event Systems under Cost Constraints

This paper deals with the state estimation problem in discrete-event sys...
research
04/01/2021

Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

We consider the probabilistic planning problem where the agent (called P...
research
02/26/2021

Yoneda Hacking: The Algebra of Attacker Actions

Our work focuses on modeling security of systems from their component-le...

Please sign up or login with your details

Forgot password? Click here to reset