DeepAI AI Chat
Log In Sign Up

On Decidability of Existence of Nonblocking Supervisors Resilient to Smart Sensor Attacks

by   Rong Su, et al.

Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due to its high relevance to the so-called 4th industrial revolution that heavily relies on data communication among networked systems. One key challenge is how to ensure system resilience to sensor and/or actuator attacks, which may tamper data integrity and service availability. In this paper we focus on some key decidability issues related to smart sensor attacks. We first present a sufficient and necessary condition that ensures the existence of a smart sensor attack, which reveals a novel demand-supply relationship between an attacker and a controlled plant, represented as a set of risky pairs. Each risky pair consists of a damage string desired by the attacker and an observable sequence feasible in the supervisor such that the latter induces a sequence of control patterns, which allows the damage string to happen. It turns out that each risky pair can induce a smart weak sensor attack. Next, we show that, when the plant, supervisor and damage language are regular, it is computationally feasible to remove all such risky pairs from the plant behaviour, via a genuine encoding scheme, upon which we are able to establish our key result that the existence of a nonblocking supervisor resilient to smart sensor attacks is decidable. To the best of our knowledge, this is the first result of its kind in the DES literature on cyber attacks. The proposed decision process renders a specific synthesis procedure that guarantees to compute a resilient supervisor whenever it exists, which so far has not been achieved in the literature.


page 1

page 2

page 3

page 4


Resilience to Denial-of-Service and Integrity Attacks: A Structured Systems Approach

The resilience of cyberphysical systems to denial-of-service (DoS) and i...

A framework for the analysis of supervised discrete event systems under attack

This paper focuses on the problem of cyber attacks for discrete event sy...

Cyber attacks with bounded sensor reading edits for partially-observed discrete event systems

The problem of cyber attacks with bounded sensor reading edits for parti...

Authentication of cyber-physical systems under learning-based attacks

The problem of attacking and authenticating cyber-physical systems is co...

Efficient attack sequences in m-eternal domination

We study the m-eternal domination problem from the perspective of the at...

Detection of Smart Grid Integrity Attacks Using Signal Temporal Logic

Cyber-attacks can have severe impacts on critical infrastructures, from ...

Electromagnetic Sensor and Actuator Attacks on Power Converters for Electric Vehicles

Alleviating range anxiety for electric vehicles (i.e., whether such vehi...