A cyber attack model with bounded sensor reading alterations
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of a...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/138014 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-138014 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1380142020-04-28T09:34:32Z A cyber attack model with bounded sensor reading alterations Su, Rong School of Electrical and Electronic Engineering 2017 American Control Conference (ACC) Engineering::Electrical and electronic engineering Discrete-event Systems Supervisory Control One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands improperly, driving the system to an undesirable state. We first consider the cyber attack problem from an attacker point of view, and formulate an attack with bounded sensor reading alterations (ABSRA) problem. We then show that the supremal (or least restrictive) ABSRA exists and can be synthesized, as long as the plant model and the supervisor model are regular, i.e., representable by finite-state automata. MOE (Min. of Education, S’pore) Accepted version 2020-04-22T01:54:00Z 2020-04-22T01:54:00Z 2017 Conference Paper Su, R. (2017). A cyber attack model with bounded sensor reading alterations. Proceedings of 2017 American Control Conference (ACC), 3200-3205. doi:10.23919/ACC.2017.7963440 9781509045839 https://hdl.handle.net/10356/138014 3200 3205 en © 2017 AACC. All rights reserved. This paper was published by IEEE in Proceedings of 2017 American Control Conference and is made available with permission of AACC. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering Discrete-event Systems Supervisory Control |
spellingShingle |
Engineering::Electrical and electronic engineering Discrete-event Systems Supervisory Control Su, Rong A cyber attack model with bounded sensor reading alterations |
description |
One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands improperly, driving the system to an undesirable state. We first consider the cyber attack problem from an attacker point of view, and formulate an attack with bounded sensor reading alterations (ABSRA) problem. We then show that the supremal (or least restrictive) ABSRA exists and can be synthesized, as long as the plant model and the supervisor model are regular, i.e., representable by finite-state automata. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Su, Rong |
format |
Conference or Workshop Item |
author |
Su, Rong |
author_sort |
Su, Rong |
title |
A cyber attack model with bounded sensor reading alterations |
title_short |
A cyber attack model with bounded sensor reading alterations |
title_full |
A cyber attack model with bounded sensor reading alterations |
title_fullStr |
A cyber attack model with bounded sensor reading alterations |
title_full_unstemmed |
A cyber attack model with bounded sensor reading alterations |
title_sort |
cyber attack model with bounded sensor reading alterations |
publishDate |
2020 |
url |
https://hdl.handle.net/10356/138014 |
_version_ |
1681058684239609856 |