IEEE/CAA Journal of Automatica Sinica
Citation: | D. You and S. Wang, “Non-deterministic liveness-enforcing supervisor tolerant to sensor-reading modification attacks,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 1, pp. 240–248, Jan. 2024. doi: 10.1109/JAS.2023.123702 |
[1] |
R. Baheti and H. Gill, “Cyber-physical systems,” The Impact of Control Technology, vol. 12, no. 1, pp. 161–166, 2011.
|
[2] |
J. Zhang, L. Pan, Q.-L. Han, C. Chen, S. Wen, and Y. Xiang, “Deep learning based attack detection for cyber-physical system cybersecurity: A survey,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 3, pp. 377–391, 2021.
|
[3] |
R. Su, “Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations,” Automatica, vol. 94, pp. 35–44, 2018. doi: 10.1016/j.automatica.2018.04.006
|
[4] |
R. Meira-Góes, E. Kang, R. H. Kwong, and S. Lafortune, “Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems,” Automatica, vol. 121, p. 109172, 2020. doi: 10.1016/j.automatica.2020.109172
|
[5] |
L. Lin and R. Su, “Synthesis of covert actuator and sensor attackers,” Automatica, vol. 130, p. 109714, 2021. doi: 10.1016/j.automatica.2021.109714
|
[6] |
D. Thorsley and D. Teneketzis, “Intrusion detection in controlled discrete event systems,” in Proc. 45th IEEE Conf. Decision and Control, 2006, pp. 6047–6054.
|
[7] |
L. K. Carvalho, Y.-C. Wu, R. Kwong, and S. Lafortune, “Detection and mitigation of classes of attacks in supervisory control systems,” Automatica, vol. 97, pp. 121–133, 2018. doi: 10.1016/j.automatica.2018.07.017
|
[8] |
P. M. Lima, M. V. S. Alves, L. K. Carvalho, and M. V. Moreira, “Security against communication network attacks of cyber-physical systems,” J. Control,Automation and Electrical Systems, vol. 30, no. 1, pp. 125–135, 2019. doi: 10.1007/s40313-018-0420-9
|
[9] |
M. Agarwal, S. Purwar, S. Biswas, and S. Nandi, “Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 4, pp. 792–808, 2017. doi: 10.1109/JAS.2016.7510178
|
[10] |
M. Agarwal, S. Biswas, and S. Nandi, “Discrete event system framework for fault diagnosis with measurement inconsistency: Case study of rogue DHCP attack,” IEEE/CAA J. Autom. Sinica, vol. 6, no. 3, pp. 789–806, 2019. doi: 10.1109/JAS.2017.7510379
|
[11] |
M. Wakaiki, P. Tabuada, and J. P. Hespanha, “Supervisory control of discrete-event systems under attacks,” Dynamic Games and Applications, vol. 9, pp. 965–983, 2019.
|
[12] |
R. Meira-Góes, S. Lafortune, and H. Marchand, “Synthesis of supervisors robust against sensor deception attacks,” IEEE Trans. Automatic Control, vol. 66, no. 10, pp. 4990–4997, Oct. 2021. doi: 10.1109/TAC.2021.3051459
|
[13] |
T. Ushio and S. Takai, “Nonblocking supervisory control of discrete event systems modeled by mealy automata with nondeterministic output functions,” IEEE Trans. Autom. Control, vol. 61, no. 3, pp. 799–804, 2016. doi: 10.1109/TAC.2015.2449051
|
[14] |
S. Xu and R. Kumar, “Discrete event control under nondeterministic partial observation,” in Proc. IEEE Int. Conf. Automation Science and Engineering, 2009, pp. 127–132.
|
[15] |
X. Yin, “Supervisor synthesis for mealy automata with output functions: A model transformation approach,” IEEE Trans. Autom. Control, vol. 62, no. 5, pp. 2576–2581, 2017. doi: 10.1109/TAC.2016.2601118
|
[16] |
L. Lin, Y. Zhu, and R. Su, “Towards bounded synthesis of resilient supervisors,” in Proc. IEEE 58th Conf. Decision and Control, 2019, pp. 7659–7664.
|
[17] |
Y. Wang and M. Pajic, “Attack-resilient supervisory control with intermittently secure communication,” in Proc. IEEE 58th Conf. Decision and Control, 2019, pp. 2015–2020.
|
[18] |
R. Meira-Góes, H. Marchand, and S. Lafortune, “Dealing with sensor and actuator deception attacks in supervisory control,” Automatica, vol. 147, p. 110736, 2023. doi: 10.1016/j.automatica.2022.110736
|
[19] |
D. You, S. Wang, and C. Seatzu, “A liveness-enforcing supervisor tolerant to sensor-reading modification attacks,” IEEE Trans. Systems,Man,and Cyber.: Syst., vol. 52, no. 4, pp. 2398–2411, 2022. doi: 10.1109/TSMC.2021.3051096
|
[20] |
C. Chen and H. Hu, “Liveness-enforcing supervision in AMS-oriented hamgs: An approach based on new characterization of siphons using Petri nets,” IEEE Trans. Autom. Control, vol. 63, no. 7, pp. 1987–2002, 2017.
|
[21] |
Y. Chen and Z. Li, “Design of a maximally permissive liveness-enforcing supervisor with a compressed supervisory structure for flexible manufacturing systems,” Automatica, vol. 47, no. 5, pp. 1028–1034, 2011. doi: 10.1016/j.automatica.2011.01.070
|
[22] |
B. Huang, M. Zhou, Y. Huang, and Y. Yang, “Supervisor synthesis for fms based on critical activity places,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 49, no. 5, pp. 881–890, 2019. doi: 10.1109/TSMC.2017.2732442
|
[23] |
D. You, S. Wang, and M. Zhou, “Synthesis of monitor-based liveness-enforcing supervisors for S3PR with ${\boldsymbol {\xi}} $-resources,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 45, no. 6, pp. 967–975, 2015. doi: 10.1109/TSMC.2014.2376476
|
[24] |
G. Liu, Petri Nets: Theoretical Models and Analysis Methods for Concurrent Systems. Singapore: Springer 2022.
|
[25] |
L. He and G. Liu, “Prioritized time-point-interval Petri nets modelling multi-processor real-time systems and TCTLx,” IEEE Trans. Industrial Informatics, vol. 19, no. 8, pp. 8784 –8794, 2023. doi: 10.1109/TII.2022.3222342
|
[26] |
K. Inan, “Nondeterministic supervision under partial observations,” in Proc. 11th Int. Conf. Analysis and Optimization of Syst. Discrete Event Syst., 1994, pp. 39–48.
|
[27] |
R. Kumar, S. Jiang, C. Zhou, and W. Qiu, “Polynomial synthesis of supervisor for partially observed discrete-event systems by allowing nondeterminism in control,” IEEE Trans. Autom. Control, vol. 50, no. 4, pp. 463–475, 2005. doi: 10.1109/TAC.2005.844725
|
[28] |
S. Jiang and R. Kumar, “Supervisory control of discrete event systems with CTL* temporal logic specifications,” SIAM J. Control and Optimization, vol. 44, no. 6, pp. 2079–2103, 2006. doi: 10.1137/S0363012902409982
|
[29] |
S. Basu and R. Kumar, “Control of non-deterministic systems with calculus specifications using quotienting,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 5, pp. 953–970, 2021. doi: 10.1109/JAS.2021.1003964
|
[30] |
M. Fabian and B. Lennartson, “On non-deterministic supervisory control,” in Proc. 35th IEEE Conf. Decision and Control, 1996, vol. 2, pp. 2213–2218.
|
[31] |
H. Farhat, “Control of nondeterministic systems for bisimulation equivalence under partial information,” IEEE Trans. Autom. Control, vol. 65, no. 12, pp. 5437–5443, 2020. doi: 10.1109/TAC.2020.2970148
|
[32] |
C. Zhou, R. Kumar, and S. Jiang, “Control of nondeterministic discrete-event systems for bisimulation equivalence,” IEEE Trans. Autom. Control, vol. 51, no. 5, pp. 754–765, 2006. doi: 10.1109/TAC.2006.875036
|
[33] |
S. Takai, “Synthesis of maximally permissive supervisors for nondeterministic discrete event systems with nondeterministic specifications,” IEEE Trans. Autom. Control, vol. 66, no. 7, pp. 3197–3204, 2021. doi: 10.1109/TAC.2020.3015453
|
[34] |
Y. Xie, X. Yin, and S. Li, “Opacity enforcing supervisory control using non-deterministic supervisors,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 1763–1769, 2020. doi: 10.1016/j.ifacol.2020.12.2315
|
[35] |
R. Tarjan, “Depth-first search and linear graph algorithms,” SIAM J. Computing, vol. 1, no. 2, pp. 146–160, 1972. doi: 10.1137/0201010
|
[36] |
J. Li, X. Yu, and M. Zhou, “Analysis of unbounded Petri net with lean reachability trees,” IEEE Trans. Syst.,Man,and Cybern.: Syste., vol. 50, no. 6, pp. 2007–2016, 2020. doi: 10.1109/TSMC.2018.2791527
|
[37] |
F. Lu, Q. Zeng, M. Zhou, Y. Bao, and H. Duan, “Complex reachability trees and their application to deadlock detection for unbounded Petri nets,” IEEE Trans. Syst.,Man,and Cyber.: Syst., vol. 49, no. 6, pp. 1164–1174, 2019. doi: 10.1109/TSMC.2017.2692262
|
[38] |
S. Wang, M. Gan, M. Zhou, and D. You, “A reduced reachability tree for a class of unbounded Petri nets,” IEEE/CAA J. Autom. Sinica, vol. 2, no. 4, pp. 345–352, 2015. doi: 10.1109/JAS.2015.7296528
|