4.7 Article

Secret inference and attacktability analysis of discrete event systems

期刊

INFORMATION SCIENCES
卷 609, 期 -, 页码 1221-1238

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2022.07.028

关键词

Discrete event system; Opacity; Active intruder; Attacktabiity; Discrete event system; Opacity; Active intruder; Attacktabiity

向作者/读者索取更多资源

This paper addresses the opacity problem in discrete event systems modeled with labeled Petri nets, assuming the existence of an active intruder who can manipulate the system behavior through sensor attacks. The paper proposes a framework for opacity verification and derives algorithms for identifying opaque secret words and analyzing attacks. The validity and efficiency of the proposed approaches are demonstrated through experiments.
In the discrete event systems literature, the studies addressing opacity usually assume a passive intruder, who has full knowledge of the structure of a system but with only a partial observation ability. This work touches upon the opacity problem in discrete event systems modeled with labeled Petri nets, by assuming the existence of an active intruder. Herein, an active intruder, whose abilities exceed passive observations, is assumed to be able to manipulate the behavior of a system through sensor attacks in a practical manner, i.e., in an embedded way, in order to compromise the opacity of a system. In this setting, a framework for opacity verification is first proposed from the intruder's viewpoint, where opacity is referred to as language-based opacity. A verification algorithm is then derived to identify opaque secret words. Two stealthy attack models named sensor-failure-making strategy and sensor-injection-making strategy are introduced, allowing the intruder to implant/damage some sensors, i.e., add/delete some events, in line with the original behavior of a system, in order to infer the secret information. An algorithmic procedure for attractability analysis is provided for each attack strategy. Once a system is proved to be attackable, a stealthy attack structure that synthesizes different sensor-failure-making (resp. sensor-injection-making) attacks is constructed. Furthermore, we demonstrate the validity and efficiency of the proposed approaches by implementing the presented algorithms and running experiments on a manufacturing system example. (c) 2022 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据