Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTai, Ruochenen_US
dc.contributor.authorLin, Liyongen_US
dc.contributor.authorSu, Rongen_US
dc.identifier.citationTai, R., Lin, L. & Su, R. (2022). Identification of system vulnerability under a smart sensor attack via attack model reduction. IEEE Control Systems Letters, 6, 2948-2953.
dc.description.abstractIn this letter, we investigate how to make use of model reduction techniques to identify the vulnerability of a closed-loop system, consisting of a plant and a supervisor, that might invite attacks. Here, the system vulnerability refers to the existence of key observation sequences that could be exploited by a specific smart sensor attack to cause damage infliction. We consider a nondeterministic smart attack, i.e., there might exist more than one attack choice over each received observation, and adopt our previously proposed modeling framework, where such an attack is captured by a standard finite-state automaton. For a given supervisor S and a smart sensor attack model A, another smart attack model {\mathrm{ A}}' is called attack equivalent to A with respect to S, if the resulting compromised supervisor, defined as the composition of the supervisor S and attack model {\mathrm{ A}}' , is control equivalent to the original compromised supervisor, defined as the composition of S and A. Following the spirit of supervisor reduction that relies on the concept of control congruence, we will show that, this problem of synthesizing a reduced smart attack model {\mathrm{ A}}' that is attack equivalent to A with respect to S, can be transformed to a classical supervisor reduction problem, making all existing synthesis tools available for supervisor reduction directly applicable to our problem. A simplified and ideally minimum-state attack model can reveal all necessary observation sequences for the attacker to be successful, thus, reminds system designers to take necessary precautions in advance, which may improve system resilience significantly. An example is presented to show the effectiveness of our proposed attack model reduction technique.en_US
dc.description.sponsorshipAgency for Science, Technology and Research (A*STAR)en_US
dc.description.sponsorshipNanyang Technological Universityen_US
dc.relation.ispartofIEEE Control Systems Lettersen_US
dc.rights© 2022 IEEE. All rights reserved.en_US
dc.subjectEngineering::Electrical and electronic engineeringen_US
dc.titleIdentification of system vulnerability under a smart sensor attack via attack model reductionen_US
dc.typeJournal Articleen
dc.contributor.schoolSchool of Electrical and Electronic Engineeringen_US
dc.subject.keywordsAttack Model Reductionen_US
dc.subject.keywordsSensor Attacken_US
dc.description.acknowledgementThis work was supported in part by the Agency for Science, Technology and Research (A*STAR) through its IAF-ICP Programme under Grant ICP1900093, and in part by the Schaeffler Hub for Advanced Research at NTU.en_US
item.fulltextNo Fulltext-
Appears in Collections:EEE Journal Articles

Page view(s)

Updated on Mar 23, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.