Incremental Observer Reduction Applied to Opacity Verification and Synthesis

12/16/2018
by   Mona Noori-Hosseini, et al.
0

With the proliferation of communication networks and mobile devices, the privacy and security concerns on their information flow are raised. Given a critical system that may leak confidential information, the problem consists of verifying and also enforcing opacity by designing supervisors, to conceal confidential information from unauthorized persons. To find out what the intruder sees, it is required to construct an observer of the system. In this paper, we consider incremental observer generation of modular systems, for verification and enforcement of current state opacity. The synchronization of the subsystems generate a large state space. Moreover, the observer generation with exponential complexity adds even larger state space. To tackle the complexity problem, we prove that observer generation can be done locally before synchronizing the subsystems. The incremental local observer generation along with an abstraction method lead to a significant state space reduction compared to traditional monolithic methods. The existence of shared unobservable events is also considered in the incremental approach. Moreover, we present an illustrative example, where the results of verification and enforcement of current state opacity are shown on a modular multiple floor/elevator building with an intruder. Furthermore, we extend the current state opacity, current state anonymity, and language based opacity formulations for verification of modular systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/12/2019

Transforming opacity verification to nonblocking verification in modular systems

We consider the verification of current-state and K-step opacity for sys...
research
07/19/2023

Practical Model Reductions for Verification of Multi-Agent Systems

Formal verification of intelligent agents is often computationally infea...
research
10/25/2017

State Space Reduction for Reachability Graph of CSM Automata

Classical CTL temporal logics are built over systems with interleaving m...
research
09/14/2023

HIVE: Scalable Hardware-Firmware Co-Verification using Scenario-based Decomposition and Automated Hint Extraction

Hardware-firmware co-verification is critical to design trustworthy syst...
research
03/31/2022

Attack Impact Evaluation by Exact Convexification through State Space Augmentation

We address the attack impact evaluation problem for control system secur...
research
03/25/2019

Symmetry Reduction for the Local Mu-Calculus

Model checking large networks of processes is challenging due to state e...
research
08/19/2017

Modular Safety Verification for Stateful Networks

Modern networks achieve robustness and scalability by maintaining states...

Please sign up or login with your details

Forgot password? Click here to reset