A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 11 Issue 1
Jan.  2024

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
D. You and S. Wang, “Non-deterministic liveness-enforcing supervisor tolerant to sensor-reading modification attacks,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 1, pp. 240–248, Jan. 2024. doi: 10.1109/JAS.2023.123702
Citation: D. You and S. Wang, “Non-deterministic liveness-enforcing supervisor tolerant to sensor-reading modification attacks,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 1, pp. 240–248, Jan. 2024. doi: 10.1109/JAS.2023.123702

Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks

doi: 10.1109/JAS.2023.123702
Funds:  This work was supported in part by the Public Technology Research Plan of Zhejiang Province (LGJ21F030001), the National Natural Science Foundation of China (62302448), and the Zhejiang Provincial Key Laboratory of New Network Standards and Technologies (2013E10012)
More Information
  • In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur. In particular, we focus on the problem of liveness enforcement and consider a sensor-reading modification attack (SM-attack) that may disguise the occurrence of an event as that of another event by intruding sensor communication channels. To solve the problem, we introduce non-deterministic supervisors in the paper, which associate to every observed sequence a set of possible control actions offline and choose a control action from the set randomly online to control the system. Specifically, given a bounded Petri net (PN) as the reference formalism and an SM-attack, an algorithm that synthesizes a liveness-enforcing non-deterministic supervisor tolerant to the SM-attack is proposed for the first time.

     

  • loading
  • [1]
    R. Baheti and H. Gill, “Cyber-physical systems,” The Impact of Control Technology, vol. 12, no. 1, pp. 161–166, 2011.
    [2]
    J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2021.
    [3]
    R. Su, “Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations,” Automatica, vol. 94, pp. 35–44, 2018. doi: 10.1016/j.automatica.2018.04.006
    [4]
    R. Meira-Góes, E. Kang, R. H. Kwong, and S. Lafortune, “Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems,” Automatica, vol. 121, p. 109172, 2020. doi: 10.1016/j.automatica.2020.109172
    [5]
    L. Lin and R. Su, “Synthesis of covert actuator and sensor attackers,” Automatica, vol. 130, p. 109714, 2021. doi: 10.1016/j.automatica.2021.109714
    [6]
    D. Thorsley and D. Teneketzis, “Intrusion detection in controlled discrete event systems,” in Proc. 45th IEEE Conf. Decision and Control, 2006, pp. 6047–6054.
    [7]
    L. K. Carvalho, Y.-C. Wu, R. Kwong, and S. Lafortune, “Detection and mitigation of classes of attacks in supervisory control systems,” Automatica, vol. 97, pp. 121–133, 2018. doi: 10.1016/j.automatica.2018.07.017
    [8]
    P. M. Lima, M. V. S. Alves, L. K. Carvalho, and M. V. Moreira, “Security against communication network attacks of cyber-physical systems,” J. Control,Automation and Electrical Systems, vol. 30, no. 1, pp. 125–135, 2019. doi: 10.1007/s40313-018-0420-9
    [9]
    M. Agarwal, S. Purwar, S. Biswas, and S. Nandi, “Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 4, pp. 792–808, 2017. doi: 10.1109/JAS.2016.7510178
    [10]
    M. Agarwal, S. Biswas, and S. Nandi, “Discrete event system framework for fault diagnosis with measurement inconsistency: Case study of rogue DHCP attack,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 3, pp. 789–806, 2019. doi: 10.1109/JAS.2017.7510379
    [11]
    M. Wakaiki, P. Tabuada, and J. P. Hespanha, “Supervisory control of discrete-event systems under attacks,” Dynamic Games and Applications, vol. 9, pp. 965–983, 2019.
    [12]
    R. Meira-Góes, S. Lafortune, and H. Marchand, “Synthesis of supervisors robust against sensor deception attacks,” IEEE Trans. Automatic Control, vol. 66, no. 10, pp. 4990–4997, Oct. 2021. doi: 10.1109/TAC.2021.3051459
    [13]
    T. Ushio and S. Takai, “Nonblocking supervisory control of discrete event systems modeled by mealy automata with nondeterministic output functions,” IEEE Trans. Autom. Control, vol. 61, no. 3, pp. 799–804, 2016. doi: 10.1109/TAC.2015.2449051
    [14]
    S. Xu and R. Kumar, “Discrete event control under nondeterministic partial observation,” in Proc. IEEE Int. Conf. Automation Science and Engineering, 2009, pp. 127–132.
    [15]
    X. Yin, “Supervisor synthesis for mealy automata with output functions: A model transformation approach,” IEEE Trans. Autom. Control, vol. 62, no. 5, pp. 2576–2581, 2017. doi: 10.1109/TAC.2016.2601118
    [16]
    L. Lin, Y. Zhu, and R. Su, “Towards bounded synthesis of resilient supervisors,” in Proc. IEEE 58th Conf. Decision and Control, 2019, pp. 7659–7664.
    [17]
    Y. Wang and M. Pajic, “Attack-resilient supervisory control with intermittently secure communication,” in Proc. IEEE 58th Conf. Decision and Control, 2019, pp. 2015–2020.
    [18]
    R. Meira-Góes, H. Marchand, and S. Lafortune, “Dealing with sensor and actuator deception attacks in supervisory control,” Automatica, vol. 147, p. 110736, 2023. doi: 10.1016/j.automatica.2022.110736
    [19]
    D. You, S. Wang, and C. Seatzu, “A liveness-enforcing supervisor tolerant to sensor-reading modification attacks,” IEEE Trans. Systems,Man,and Cyber.: Syst., vol. 52, no. 4, pp. 2398–2411, 2022. doi: 10.1109/TSMC.2021.3051096
    [20]
    C. Chen and H. Hu, “Liveness-enforcing supervision in AMS-oriented hamgs: An approach based on new characterization of siphons using Petri nets,” IEEE Trans. Autom. Control, vol. 63, no. 7, pp. 1987–2002, 2017.
    [21]
    Y. Chen and Z. Li, “Design of a maximally permissive liveness-enforcing supervisor with a compressed supervisory structure for flexible manufacturing systems,” Automatica, vol. 47, no. 5, pp. 1028–1034, 2011. doi: 10.1016/j.automatica.2011.01.070
    [22]
    B. Huang, M. Zhou, Y. Huang, and Y. Yang, “Supervisor synthesis for fms based on critical activity places,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 49, no. 5, pp. 881–890, 2019. doi: 10.1109/TSMC.2017.2732442
    [23]
    D. You, S. Wang, and M. Zhou, “Synthesis of monitor-based liveness-enforcing supervisors for S3PR with ${\boldsymbol {\xi}} $-resources,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 45, no. 6, pp. 967–975, 2015. doi: 10.1109/TSMC.2014.2376476
    [24]
    G. Liu, Petri Nets: Theoretical Models and Analysis Methods for Concurrent Systems. Singapore: Springer 2022.
    [25]
    L. He and G. Liu, “Prioritized time-point-interval Petri nets modelling multi-processor real-time systems and TCTLx,” IEEE Trans. Industrial Informatics, vol. 19, no. 8, pp. 8784 –8794, 2023. doi: 10.1109/TII.2022.3222342
    [26]
    K. Inan, “Nondeterministic supervision under partial observations,” in Proc. 11th Int. Conf. Analysis and Optimization of Syst. Discrete Event Syst., 1994, pp. 39–48.
    [27]
    R. Kumar, S. Jiang, C. Zhou, and W. Qiu, “Polynomial synthesis of supervisor for partially observed discrete-event systems by allowing nondeterminism in control,” IEEE Trans. Autom. Control, vol. 50, no. 4, pp. 463–475, 2005. doi: 10.1109/TAC.2005.844725
    [28]
    S. Jiang and R. Kumar, “Supervisory control of discrete event systems with CTL* temporal logic specifications,” SIAM J. Control and Optimization, vol. 44, no. 6, pp. 2079–2103, 2006. doi: 10.1137/S0363012902409982
    [29]
    S. Basu and R. Kumar, “Control of non-deterministic systems with calculus specifications using quotienting,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 5, pp. 953–970, 2021. doi: 10.1109/JAS.2021.1003964
    [30]
    M. Fabian and B. Lennartson, “On non-deterministic supervisory control,” in Proc. 35th IEEE Conf. Decision and Control, 1996, vol. 2, pp. 2213–2218.
    [31]
    H. Farhat, “Control of nondeterministic systems for bisimulation equivalence under partial information,” IEEE Trans. Autom. Control, vol. 65, no. 12, pp. 5437–5443, 2020. doi: 10.1109/TAC.2020.2970148
    [32]
    C. Zhou, R. Kumar, and S. Jiang, “Control of nondeterministic discrete-event systems for bisimulation equivalence,” IEEE Trans. Autom. Control, vol. 51, no. 5, pp. 754–765, 2006. doi: 10.1109/TAC.2006.875036
    [33]
    S. Takai, “Synthesis of maximally permissive supervisors for nondeterministic discrete event systems with nondeterministic specifications,” IEEE Trans. Autom. Control, vol. 66, no. 7, pp. 3197–3204, 2021. doi: 10.1109/TAC.2020.3015453
    [34]
    Y. Xie, X. Yin, and S. Li, “Opacity enforcing supervisory control using non-deterministic supervisors,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 1763–1769, 2020. doi: 10.1016/j.ifacol.2020.12.2315
    [35]
    R. Tarjan, “Depth-first search and linear graph algorithms,” SIAM J. Computing, vol. 1, no. 2, pp. 146–160, 1972. doi: 10.1137/0201010
    [36]
    J. Li, X. Yu, and M. Zhou, “Analysis of unbounded Petri net with lean reachability trees,” IEEE Trans. Syst.,Man,and Cybern.: Syste., vol. 50, no. 6, pp. 2007–2016, 2020. doi: 10.1109/TSMC.2018.2791527
    [37]
    F. Lu, Q. Zeng, M. Zhou, Y. Bao, and H. Duan, “Complex reachability trees and their application to deadlock detection for unbounded Petri nets,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 49, no. 6, pp. 1164–1174, 2019. doi: 10.1109/TSMC.2017.2692262
    [38]
    S. Wang, M. Gan, M. Zhou, and D. You, “A reduced reachability tree for a class of unbounded Petri nets,” IEEE/CAA J. Autom. Sinica, vol. 2, no. 4, pp. 345–352, 2015. doi: 10.1109/JAS.2015.7296528

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)

    Article Metrics

    Article views (183) PDF downloads(35) Cited by()

    Highlights

    • Liveness enforcement on cyber-physical systems in the presence of sensor-reading modification attacks
    • By using bounded Petri nets as the reference formalism, an algorithm that synthesizes a liveness-enforcing nondeterministic supervisor tolerant to sensor-reading modification attacks is proposed
    • Compared with a previous method synthesizing a liveness-enforcing deterministic supervisor tolerant to sensor-reading modification attacks, the proposed method has lower computational complexity

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return