×

Dealing with sensor and actuator deception attacks in supervisory control. (English) Zbl 1505.93003

Summary: We consider feedback control systems where sensor readings and actuator commands may be compromised by an attacker intending to damage the system. We study this problem at the supervisory layer of the control system, using discrete event systems techniques. The attacker can edit the outputs from the sensors of the system before they reach the supervisory controller as well as it can edit actuator commands before they reach the system. In this context, we formulate the problem of synthesizing a supervisor that is robust against a large class of edit attacks on the sensor readings and actuator commands. Intuitively, we search for a supervisor that guarantees the safety of the system even when sensor readings and actuator commands are compromised. Given the similarities of the investigated problem to the standard supervisory control problem, our solution methodology reduces the problem of synthesizing a robust supervisor against deception attacks to a supervisory control problem. This new and intuitive solution methodology improves upon prior work on this topic.

MSC:

93A13 Hierarchical systems
93C65 Discrete event control/observation systems
93B52 Feedback control

Software:

UMDES
Full Text: DOI

References:

[1] Cardenas, A. A.; Amin, S.; Sastry, S., Secure control: Towards survivable cyber-physical systems, (2008 the 28th international conference on distributed computing systems workshops (2008)), 495-500
[2] Carvalho, L. K.; Wu, Y. C.; Kwong, R.; Lafortune, S., Detection and mitigation of classes of attacks in supervisory control systems, Automatica, 97, 121-133 (2018) · Zbl 1406.93006
[3] Cassandras, C. G.; Lafortune, S., Introduction to discrete event systems (2008), Springer-Verlag New York, Inc.: Springer-Verlag New York, Inc. Secaucus, NJ, USA · Zbl 1165.93001
[4] Cho, H.; Marcus, S. I., On supremal languages of classes of sublanguages that arise in supervisor synthesis problems with partial observation, Mathematics of Control, Signals, and Systems, 2, 1, 47-69 (1989) · Zbl 0654.93046
[5] Golaszewski, C. H.; Ramadge, P. J., Control of discrete event processes with forced events, (26th IEEE conference on decision and control, Vol. 26 (1987)), 247-251
[6] Hadj-Alouane, N. B.; Lafortune, S.; Lin, F., Centralized and distributed algorithms for on-line synthesis of maximal control policies under partial observation, Discrete Event Dynamic Systems, 6, 4, 379-427 (1996) · Zbl 0880.93016
[7] Li, Y.; Lin, F.; Lin, Z. H., A generalized framework for supervisory control of discrete event systems, International Journal of Intelligent Control and Systems, 2, 139-160 (1998)
[8] Lima, P. M.; Alves, M. V.S.; Carvalho, L. K.; Moreira, M. V., Security against communication network attacks of cyber-physical systems, Journal of Control, Automation and Electrical Systems, 30, 1, 125-135 (2019)
[9] Lima, P. M.; Carvalho, L. K.; Moreira, M. V., Detectable and undetectable network attack security of cyber-physical systems, (14th IFAC workshop on discrete event systems WODES 2018, Vol. 51 (2018)), 179-185
[10] Lin, L.; Thuijsman, S.; Zhu, Y.; Ware, S.; Su, R.; Reniers, M., Synthesis of supremal successful normal actuator attackers on normal supervisors, (2019 American control conference (ACC) (2019)), 5614-5619
[11] Lin, L.; Zhu, Y.; Su, R., Towards bounded synthesis of resilient supervisors, (2019 IEEE 58th conference on decision and control (CDC) (2019)), 7659-7664
[12] Meira-Góes, R.; Kang, E.; Kwong, R. H.; Lafortune, S., Synthesis of sensor deception attacks at the supervisory layer of cyber-physical systems, Automatica, 121, Article 109172 pp. (2020) · Zbl 1448.93207
[13] Meira-Góes, R.; Kwong, R. H.; Lafortune, S., Synthesis of optimal multi-objective attack strategies for controlled systems modeled by probabilistic automata, IEEE Transactions on Automatic Control (2021)
[14] Meira-Góes, R.; Lafortune, S.; Marchand, H., Synthesis of supervisors robust against sensor deception attacks, IEEE Transactions on Automatic Control, 66, 10, 4990-4997 (2021) · Zbl 1536.93011
[15] Meira-Góes, R.; Marchand, H.; Lafortune, S., Towards resilient supervisors against sensor deception attacks, (2019 IEEE 58th annual conference on decision and control. 2019 IEEE 58th annual conference on decision and control, CDC (2019))
[16] Meira-Góes, R.; Weitze, J.; Lafortune, S., A compact and uniform approach for synthesizing state-based property-enforcing supervisors for discrete-event systems, IEEE Transactions on Automatic Control (2021) · Zbl 1537.93014
[17] Ramadge, P. J.; Wonham, W. M., Supervisory control of a class of discrete event processes, SIAM Journal on Control and Optimization, 25, 1, 206-230 (1987) · Zbl 0618.93033
[18] Su, R., Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations, Automatica, 94, 35-44 (2018) · Zbl 1400.93189
[19] Takai, S., Supervisory control of partially observed discrete event systems with arbitrary control patterns, International Journal of Systems Science, 31, 5, 649-656 (2000) · Zbl 1080.93623
[20] Teixeira, A.; Pérez, D.; Sandberg, H.; Johansson, K. H., Attack models and scenarios for networked control systems, (Proceedings of the 1st international conference on high confidence networked systems. Proceedings of the 1st international conference on high confidence networked systems, HiCoNS ’12 (2012), ACM: ACM New York, NY, USA), 55-64
[21] Thorsley, D.; Teneketzis, D., Intrusion detection in controlled discrete event systems, (Proceedings of the 45th IEEE conference on decision and control (2006)), 6047-6054
[22] Wakaiki, M.; Tabuada, P.; Hespanha, J. P., Supervisory control of discrete-event systems under attacks, Dynamic Games and Applications, 9, 965-983 (2018) · Zbl 1431.91080
[23] Wang, Y.; Pajic, M., Attack-resilient supervisory control with intermittently secure communication, (2019 IEEE 58th conference on decision and control. 2019 IEEE 58th conference on decision and control, CDC (2019)), 2015-2020
[24] Wonham, W. M.; Cai, K., Supervisory control of discrete-event systems (2018), Springer International Publishing
[25] Yin, X.; Lafortune, S., A uniform approach for synthesizing property-enforcing supervisors for partially-observed discrete-event systems, IEEE Transactions on Automatic Control, 61, 8, 2140-2154 (2016) · Zbl 1359.93295
[26] Zhang, Q.; Li, Z.; Seatzu, C.; Giua, A., Stealthy attacks for partially-observed discrete event systems, (2018 IEEE 23rd international conference on emerging technologies and factory automation, Vol. 1. 2018 IEEE 23rd international conference on emerging technologies and factory automation, Vol. 1, ETFA (2018)), 1161-1164
[27] Zhu, Y.; Lin, L.; Su, R., Supervisor obfuscation against actuator enablement attack, (2019 18th European control conference. 2019 18th European control conference, ECC (2019)), 1760-1765
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.