Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/161646
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLin, Liyongen_US
dc.contributor.authorZhu, Yutingen_US
dc.contributor.authorSu, Rongen_US
dc.date.accessioned2022-09-13T05:24:03Z-
dc.date.available2022-09-13T05:24:03Z-
dc.date.issued2020-
dc.identifier.citationLin, L., Zhu, Y. & Su, R. (2020). Synthesis of covert actuator attackers for free. Discrete Event Dynamic Systems, 30(4), 561-577. https://dx.doi.org/10.1007/s10626-020-00312-2en_US
dc.identifier.issn0924-6703en_US
dc.identifier.urihttps://hdl.handle.net/10356/161646-
dc.description.abstractIn this paper, we shall formulate and address a problem of covert actuator attacker synthesis for cyber-physical systems that are modeled by discrete-event systems. We assume the actuator attacker partially observes the execution of the closed-loop system and is able to modify each control command issued by the supervisor on a specified attackable subset of controllable events. We provide straightforward but in general exponential-time reductions, due to the use of subset construction procedure, from the covert actuator attacker synthesis problems to the Ramadge-Wonham supervisor synthesis problems. It then follows that it is possible to use the many techniques and tools already developed for solving the supervisor synthesis problem to solve the covert actuator attacker synthesis problem for free. In particular, we show that, if the attacker cannot attack unobservable events to the supervisor, then the reductions can be carried out in polynomial time. We also provide a brief discussion on some other conditions under which the exponential blowup in state size can be avoided. Finally, we show how the reduction based synthesis procedure can be extended for the synthesis of successful covert actuator attackers that also eavesdrop the control commands issued by the supervisor.en_US
dc.description.sponsorshipMinistry of Education (MOE)en_US
dc.language.isoenen_US
dc.relationRG91/18-(S)-SU RONG (VP)en_US
dc.relation.ispartofDiscrete Event Dynamic Systemsen_US
dc.rights© 2020 Springer Science Business Media, LLC, part of Springer Nature. All rights reserved.en_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleSynthesis of covert actuator attackers for freeen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.identifier.doi10.1007/s10626-020-00312-2-
dc.identifier.scopus2-s2.0-85084261275-
dc.identifier.issue4en_US
dc.identifier.volume30en_US
dc.identifier.spage561en_US
dc.identifier.epage577en_US
dc.subject.keywordsCyber-Physical Systemsen_US
dc.subject.keywordsDiscrete-Event Systemsen_US
dc.description.acknowledgementThis work is financially supported by Singapore Ministry of Education Academic Research Grant RG91/18-(S)-SU RONG (VP), which is gratefully acknowledged.en_US
item.grantfulltextnone-
item.fulltextNo Fulltext-
Appears in Collections:EEE Journal Articles

SCOPUSTM   
Citations 10

34
Updated on Feb 29, 2024

Web of ScienceTM
Citations 20

22
Updated on Oct 26, 2023

Page view(s)

78
Updated on Mar 4, 2024

Google ScholarTM

Check

Altmetric


Plumx

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.