Please use this identifier to cite or link to this item:
|Synthesis of the supremal covert attacker against unknown supervisors by using observations
|Engineering::Electrical and electronic engineering
|Tai, R., Lin, L., Zhu, Y. & Su, R. (2022). Synthesis of the supremal covert attacker against unknown supervisors by using observations. IEEE Transactions On Automatic Control. https://dx.doi.org/10.1109/TAC.2022.3191393
|IEEE Transactions on Automatic Control
|In this paper, we consider the problem of synthesizing the supremal covert damage-reachable attacker, in the setup where the model of the supervisor is unknown to the adversary but the adversary has recorded a (prefix-closed) finite set of observations of the runs of the closed-loop system. The synthesized attacker needs to ensure both the damage-reachability and the covertness against all the supervisors which are consistent with the given set of observations. There is a gap between the de facto supremality, assuming the model of the supervisor is known, and the supremality that can be attained with a limited knowledge of the model of the supervisor, from the adversary's point of view. We consider the setup where the attacker can exercise sensor replacement/deletion attacks and actuator enablement/disablement attacks. The solution methodology proposed in this work is to reduce the synthesis of the supremal covert damage-reachable attacker, given the model of the plant and the finite set of observations, to the synthesis of the supremal safe supervisor for certain transformed plant, which shows the decidability of the observation-assisted covert attacker synthesis problem. The effectiveness of our approach is illustrated on a water tank example adapted from the literature.
|School of Electrical and Electronic Engineering
|© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: https://doi.org/10.1109/TAC.2022.3191393.
|Appears in Collections:
|EEE Journal Articles
Files in This Item:
Updated on Feb 16, 2024
Updated on Feb 28, 2024
Updated on Feb 28, 2024
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.