论文标题
关于存在非阻止主管的确定性,可抵御智能传感器攻击
On Decidability of Existence of Nonblocking Supervisors Resilient to Smart Sensor Attacks
论文作者
论文摘要
离散事件系统(DES)的网络安全最近引起了越来越多的关注,因为它与所谓的第四次工业革命相关,该革命在很大程度上依赖于网络系统之间的数据通信。一个关键的挑战是如何确保系统对传感器和/或执行器攻击的弹性,这可能会损害数据完整性和服务可用性。在本文中,我们专注于与智能传感器攻击有关的一些关键可决定性问题。我们首先提出了足够和必要的条件,以确保存在智能传感器攻击,该智能传感器攻击揭示了攻击者与受控植物之间的新型需求供应关系,该关系是一组风险对。每对风险对由攻击者想要的损坏串和主管中可观察的序列组成,使后者诱导一系列控制模式,从而使损坏字符串发生。事实证明,每对危险对都会引起智能弱传感器攻击。接下来,我们表明,当植物,主管和损害语言是常规的时,可以通过真正的编码方案从植物行为中删除所有这些风险对的计算可行性,我们可以在其上确定我们的关键结果,即存在非阻止主管对智能传感器攻击的弹性弹性是可决定的。据我们所知,这是关于网络攻击的文献中同类的第一个结果。拟议的决策过程提供了一个特定的综合程序,该程序可以保证在存在时计算弹性主管,到目前为止,文献尚未实现。
Cybersecurity of discrete event systems (DES) has been gaining more and more attention recently, due to its high relevance to the so-called 4th industrial revolution that heavily relies on data communication among networked systems. One key challenge is how to ensure system resilience to sensor and/or actuator attacks, which may tamper data integrity and service availability. In this paper we focus on some key decidability issues related to smart sensor attacks. We first present a sufficient and necessary condition that ensures the existence of a smart sensor attack, which reveals a novel demand-supply relationship between an attacker and a controlled plant, represented as a set of risky pairs. Each risky pair consists of a damage string desired by the attacker and an observable sequence feasible in the supervisor such that the latter induces a sequence of control patterns, which allows the damage string to happen. It turns out that each risky pair can induce a smart weak sensor attack. Next, we show that, when the plant, supervisor and damage language are regular, it is computationally feasible to remove all such risky pairs from the plant behaviour, via a genuine encoding scheme, upon which we are able to establish our key result that the existence of a nonblocking supervisor resilient to smart sensor attacks is decidable. To the best of our knowledge, this is the first result of its kind in the DES literature on cyber attacks. The proposed decision process renders a specific synthesis procedure that guarantees to compute a resilient supervisor whenever it exists, which so far has not been achieved in the literature.