Synthesis of supremal successful normal actuator attackers on normal supervisors

Liyong Lin, Sander Thuijsman, Yuting Zhu, Simon Ware, Rong Su, Michel Reniers

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

18 Citations (Scopus)

Abstract

In this paper, we propose and develop an actuator attack model for discrete-event systems. We assume the actuator attacker partially observes the execution of the closed-loop system and eavesdrops the control commands issued by the supervisor. The attacker can modify each control command on a specified subset of attackable events. The goal of the actuator attacker is to remain covert until it can establish a successful attack and lead the attacked closed-loop system into generating certain damaging strings. We then present a characterization for the existence of a successful attacker and prove the existence of the supremal successful attacker, when both the supervisor and the attacker are normal. Finally, we present an algorithm to synthesize the supremal successful normal attackers.

Original languageEnglish
Title of host publication2019 American Control Conference, ACC 2019
Place of PublicationPiscataway
PublisherInstitute of Electrical and Electronics Engineers
Pages5614-5619
Number of pages6
ISBN (Electronic)978-1-5386-7926-5
DOIs
Publication statusPublished - 1 Jul 2019
Event2019 American Control Conference (ACC 2019) - Philadelphia, United States
Duration: 10 Jul 201912 Jul 2019
http://acc2019.a2c2.org

Conference

Conference2019 American Control Conference (ACC 2019)
Abbreviated titleACC2019
Country/TerritoryUnited States
CityPhiladelphia
Period10/07/1912/07/19
Internet address

Keywords

  • Actuator attack
  • Cyber-physical systems
  • Discrete-event systems
  • Partial observation
  • Supervisory control

Fingerprint

Dive into the research topics of 'Synthesis of supremal successful normal actuator attackers on normal supervisors'. Together they form a unique fingerprint.

Cite this