Cargando…
Selection of a stealthy and harmful attack function in discrete event systems
In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9523072/ https://www.ncbi.nlm.nih.gov/pubmed/36175585 http://dx.doi.org/10.1038/s41598-022-19737-w |
_version_ | 1784800190304092160 |
---|---|
author | Zhang, Qi Seatzu, Carla Li, Zhiwu Giua, Alessandro |
author_facet | Zhang, Qi Seatzu, Carla Li, Zhiwu Giua, Alessandro |
author_sort | Zhang, Qi |
collection | PubMed |
description | In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator. |
format | Online Article Text |
id | pubmed-9523072 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-95230722022-10-01 Selection of a stealthy and harmful attack function in discrete event systems Zhang, Qi Seatzu, Carla Li, Zhiwu Giua, Alessandro Sci Rep Article In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator. Nature Publishing Group UK 2022-09-29 /pmc/articles/PMC9523072/ /pubmed/36175585 http://dx.doi.org/10.1038/s41598-022-19737-w Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Zhang, Qi Seatzu, Carla Li, Zhiwu Giua, Alessandro Selection of a stealthy and harmful attack function in discrete event systems |
title | Selection of a stealthy and harmful attack function in discrete event systems |
title_full | Selection of a stealthy and harmful attack function in discrete event systems |
title_fullStr | Selection of a stealthy and harmful attack function in discrete event systems |
title_full_unstemmed | Selection of a stealthy and harmful attack function in discrete event systems |
title_short | Selection of a stealthy and harmful attack function in discrete event systems |
title_sort | selection of a stealthy and harmful attack function in discrete event systems |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9523072/ https://www.ncbi.nlm.nih.gov/pubmed/36175585 http://dx.doi.org/10.1038/s41598-022-19737-w |
work_keys_str_mv | AT zhangqi selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT seatzucarla selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT lizhiwu selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT giuaalessandro selectionofastealthyandharmfulattackfunctionindiscreteeventsystems |