Cargando…

Selection of a stealthy and harmful attack function in discrete event systems

In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Qi, Seatzu, Carla, Li, Zhiwu, Giua, Alessandro
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9523072/
https://www.ncbi.nlm.nih.gov/pubmed/36175585
http://dx.doi.org/10.1038/s41598-022-19737-w
_version_ 1784800190304092160
author Zhang, Qi
Seatzu, Carla
Li, Zhiwu
Giua, Alessandro
author_facet Zhang, Qi
Seatzu, Carla
Li, Zhiwu
Giua, Alessandro
author_sort Zhang, Qi
collection PubMed
description In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator.
format Online
Article
Text
id pubmed-9523072
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-95230722022-10-01 Selection of a stealthy and harmful attack function in discrete event systems Zhang, Qi Seatzu, Carla Li, Zhiwu Giua, Alessandro Sci Rep Article In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator. Nature Publishing Group UK 2022-09-29 /pmc/articles/PMC9523072/ /pubmed/36175585 http://dx.doi.org/10.1038/s41598-022-19737-w Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Zhang, Qi
Seatzu, Carla
Li, Zhiwu
Giua, Alessandro
Selection of a stealthy and harmful attack function in discrete event systems
title Selection of a stealthy and harmful attack function in discrete event systems
title_full Selection of a stealthy and harmful attack function in discrete event systems
title_fullStr Selection of a stealthy and harmful attack function in discrete event systems
title_full_unstemmed Selection of a stealthy and harmful attack function in discrete event systems
title_short Selection of a stealthy and harmful attack function in discrete event systems
title_sort selection of a stealthy and harmful attack function in discrete event systems
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9523072/
https://www.ncbi.nlm.nih.gov/pubmed/36175585
http://dx.doi.org/10.1038/s41598-022-19737-w
work_keys_str_mv AT zhangqi selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT seatzucarla selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT lizhiwu selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT giuaalessandro selectionofastealthyandharmfulattackfunctionindiscreteeventsystems