Identification of system vulnerability under a smart sensor attack via attack model reduction

In this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exp...

Full description

Saved in:
Bibliographic Details
Main Authors: Tai, Ruochen, Lin, Liyong, Su, Rong
Other Authors: School of Electrical and Electronic Engineering
Format: Article
Language:English
Published: 2023
Subjects:
Online Access:https://hdl.handle.net/10356/164232
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-164232
record_format dspace
spelling sg-ntu-dr.10356-1642322023-01-10T07:36:48Z Identification of system vulnerability under a smart sensor attack via attack model reduction Tai, Ruochen Lin, Liyong Su, Rong School of Electrical and Electronic Engineering Engineering::Electrical and electronic engineering Attack Model Reduction Sensor Attack In this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exploited by a specific smart sensor attack to cause damage infliction. We consider a nondeterministic smart attack, i.e., there might exist more than one attack choice over each received observation, and adopt our previously proposed modeling framework, where such an attack is captured by a standard finite-state automaton. For a given supervisor S and a smart sensor attack model A, another smart attack model {\mathrm{ A}}' is called attack equivalent to A with respect to S, if the resulting compromised supervisor, defined as the composition of the supervisor S and attack model {\mathrm{ A}}' , is control equivalent to the original compromised supervisor, defined as the composition of S and A. Following the spirit of supervisor reduction that relies on the concept of control congruence, we will show that, this problem of synthesizing a reduced smart attack model {\mathrm{ A}}' that is attack equivalent to A with respect to S, can be transformed to a classical supervisor reduction problem, making all existing synthesis tools available for supervisor reduction directly applicable to our problem. A simplified and ideally minimum-state attack model can reveal all necessary observation sequences for the attacker to be successful, thus, reminds system designers to take necessary precautions in advance, which may improve system resilience significantly. An example is presented to show the effectiveness of our proposed attack model reduction technique. Agency for Science, Technology and Research (A*STAR) Nanyang Technological University This work was supported in part by the Agency for Science, Technology and Research (A*STAR) through its IAF-ICP Programme under Grant ICP1900093, and in part by the Schaeffler Hub for Advanced Research at NTU. 2023-01-10T07:36:48Z 2023-01-10T07:36:48Z 2022 Journal Article Tai, R., Lin, L. & Su, R. (2022). Identification of system vulnerability under a smart sensor attack via attack model reduction. IEEE Control Systems Letters, 6, 2948-2953. https://dx.doi.org/10.1109/LCSYS.2022.3168735 2475-1456 https://hdl.handle.net/10356/164232 10.1109/LCSYS.2022.3168735 2-s2.0-85129138156 6 2948 2953 en ICP1900093 IEEE Control Systems Letters © 2022 IEEE. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
Attack Model Reduction
Sensor Attack
spellingShingle Engineering::Electrical and electronic engineering
Attack Model Reduction
Sensor Attack
Tai, Ruochen
Lin, Liyong
Su, Rong
Identification of system vulnerability under a smart sensor attack via attack model reduction
description In this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exploited by a specific smart sensor attack to cause damage infliction. We consider a nondeterministic smart attack, i.e., there might exist more than one attack choice over each received observation, and adopt our previously proposed modeling framework, where such an attack is captured by a standard finite-state automaton. For a given supervisor S and a smart sensor attack model A, another smart attack model {\mathrm{ A}}' is called attack equivalent to A with respect to S, if the resulting compromised supervisor, defined as the composition of the supervisor S and attack model {\mathrm{ A}}' , is control equivalent to the original compromised supervisor, defined as the composition of S and A. Following the spirit of supervisor reduction that relies on the concept of control congruence, we will show that, this problem of synthesizing a reduced smart attack model {\mathrm{ A}}' that is attack equivalent to A with respect to S, can be transformed to a classical supervisor reduction problem, making all existing synthesis tools available for supervisor reduction directly applicable to our problem. A simplified and ideally minimum-state attack model can reveal all necessary observation sequences for the attacker to be successful, thus, reminds system designers to take necessary precautions in advance, which may improve system resilience significantly. An example is presented to show the effectiveness of our proposed attack model reduction technique.
author2 School of Electrical and Electronic Engineering
author_facet School of Electrical and Electronic Engineering
Tai, Ruochen
Lin, Liyong
Su, Rong
format Article
author Tai, Ruochen
Lin, Liyong
Su, Rong
author_sort Tai, Ruochen
title Identification of system vulnerability under a smart sensor attack via attack model reduction
title_short Identification of system vulnerability under a smart sensor attack via attack model reduction
title_full Identification of system vulnerability under a smart sensor attack via attack model reduction
title_fullStr Identification of system vulnerability under a smart sensor attack via attack model reduction
title_full_unstemmed Identification of system vulnerability under a smart sensor attack via attack model reduction
title_sort identification of system vulnerability under a smart sensor attack via attack model reduction
publishDate 2023
url https://hdl.handle.net/10356/164232
_version_ 1756370577756520448