Synthesis of covert actuator attackers for free

  • PDF / 652,349 Bytes
  • 17 Pages / 439.642 x 666.49 pts Page_size
  • 55 Downloads / 229 Views

DOWNLOAD

REPORT


Synthesis of covert actuator attackers for free Liyong Lin1

· Yuting Zhu1 · Rong Su1

Received: 28 April 2019 / Accepted: 20 January 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In this paper, we shall formulate and address a problem of covert actuator attacker synthesis for cyber-physical systems that are modeled by discrete-event systems. We assume the actuator attacker partially observes the execution of the closed-loop system and is able to modify each control command issued by the supervisor on a specified attackable subset of controllable events. We provide straightforward but in general exponential-time reductions, due to the use of subset construction procedure, from the covert actuator attacker synthesis problems to the Ramadge-Wonham supervisor synthesis problems. It then follows that it is possible to use the many techniques and tools already developed for solving the supervisor synthesis problem to solve the covert actuator attacker synthesis problem for free. In particular, we show that, if the attacker cannot attack unobservable events to the supervisor, then the reductions can be carried out in polynomial time. We also provide a brief discussion on some other conditions under which the exponential blowup in state size can be avoided. Finally, we show how the reduction based synthesis procedure can be extended for the synthesis of successful covert actuator attackers that also eavesdrop the control commands issued by the supervisor. Keywords Cyber-physical systems · Discrete-event systems · Supervisory control · Actuator attack · Partial observation

1 Introduction Recently, security of cyber-physical systems has drawn much research interest within the discrete-event systems and formal methods community (Carvalho et al. 2016, 2018; Su This article belongs to the Topical Collection: Smart Manufacturing - A New DES Frontier Guest Editors: Rong Su and Bengt Lennartson  Liyong Lin

[email protected] Yuting Zhu [email protected] Rong Su [email protected] 1

Electrical and Electronic Engineering, Nanyang Technological University, Singapore, Singapore

Discrete Event Dynamic Systems

2018; Goes et al. 2017; Lanotte et al. 2017; Jones et al. 2014; Wakaiki et al. 2017; Lima et al. 2017, 2018; Kang et al. 2016; Rocchetto and Tippenhauer 2017; Lin et al. 2019a, b; Zhu et al. 2018; Wang et al. 2019; Yin and Li 2018; H´elou¨et et al. 2018). For a recent survey on the discrete-event systems based approach for the security of cyber-physical systems, the reader is referred to Rashidinejad et al. (2019). In this paper, we shall focus on discreteevent systems as our model of cyber-physical systems and consider the problem of attacker synthesis, as a major step towards solving the resilient supervisor synthesis problem (Lin et al. 2019b). In particular, we consider the synthesis of a successful actuator attacker (Lin et al. 2019a, b). We assume the goal of the actuator attacker is to remain covert in the process of attacking the closed-loop systems until it causes damage