A cyber attack model with bounded sensor reading alterations

One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of a...

Full description

Saved in:
Bibliographic Details
Main Author: Su, Rong
Other Authors: School of Electrical and Electronic Engineering
Format: Conference or Workshop Item
Language:English
Published: 2020
Subjects:
Online Access:https://hdl.handle.net/10356/138014
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-138014
record_format dspace
spelling sg-ntu-dr.10356-1380142020-04-28T09:34:32Z A cyber attack model with bounded sensor reading alterations Su, Rong School of Electrical and Electronic Engineering 2017 American Control Conference (ACC) Engineering::Electrical and electronic engineering Discrete-event Systems Supervisory Control One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands improperly, driving the system to an undesirable state. We first consider the cyber attack problem from an attacker point of view, and formulate an attack with bounded sensor reading alterations (ABSRA) problem. We then show that the supremal (or least restrictive) ABSRA exists and can be synthesized, as long as the plant model and the supervisor model are regular, i.e., representable by finite-state automata. MOE (Min. of Education, S’pore) Accepted version 2020-04-22T01:54:00Z 2020-04-22T01:54:00Z 2017 Conference Paper Su, R. (2017). A cyber attack model with bounded sensor reading alterations. Proceedings of 2017 American Control Conference (ACC), 3200-3205. doi:10.23919/ACC.2017.7963440 9781509045839 https://hdl.handle.net/10356/138014 3200 3205 en © 2017 AACC. All rights reserved. This paper was published by IEEE in Proceedings of 2017 American Control Conference and is made available with permission of AACC. application/pdf
institution Nanyang Technological University
building NTU Library
country Singapore
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Discrete-event Systems
Supervisory Control
spellingShingle Engineering::Electrical and electronic engineering
Discrete-event Systems
Supervisory Control
Su, Rong
A cyber attack model with bounded sensor reading alterations
description One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands improperly, driving the system to an undesirable state. We first consider the cyber attack problem from an attacker point of view, and formulate an attack with bounded sensor reading alterations (ABSRA) problem. We then show that the supremal (or least restrictive) ABSRA exists and can be synthesized, as long as the plant model and the supervisor model are regular, i.e., representable by finite-state automata.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Su, Rong
format Conference or Workshop Item
author Su, Rong
author_sort Su, Rong
title A cyber attack model with bounded sensor reading alterations
title_short A cyber attack model with bounded sensor reading alterations
title_full A cyber attack model with bounded sensor reading alterations
title_fullStr A cyber attack model with bounded sensor reading alterations
title_full_unstemmed A cyber attack model with bounded sensor reading alterations
title_sort cyber attack model with bounded sensor reading alterations
publishDate 2020
url https://hdl.handle.net/10356/138014
_version_ 1681058684239609856