Selection of a stealthy and harmful attack function in discrete event systems

Abstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dumm...

Full description

Bibliographic Details
Main Authors: Qi Zhang, Carla Seatzu, Zhiwu Li, Alessandro Giua
Format: Article
Language:English
Published: Nature Portfolio 2022-09-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-022-19737-w
_version_ 1811236425535848448
author Qi Zhang
Carla Seatzu
Zhiwu Li
Alessandro Giua
author_facet Qi Zhang
Carla Seatzu
Zhiwu Li
Alessandro Giua
author_sort Qi Zhang
collection DOAJ
description Abstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator.
first_indexed 2024-04-12T12:08:32Z
format Article
id doaj.art-f30d2e34f5c5456d819401b96b1ca096
institution Directory Open Access Journal
issn 2045-2322
language English
last_indexed 2024-04-12T12:08:32Z
publishDate 2022-09-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj.art-f30d2e34f5c5456d819401b96b1ca0962022-12-22T03:33:39ZengNature PortfolioScientific Reports2045-23222022-09-0112111410.1038/s41598-022-19737-wSelection of a stealthy and harmful attack function in discrete event systemsQi Zhang0Carla Seatzu1Zhiwu Li2Alessandro Giua3School of Electro-Mechanical Engineering, Xidian UniversityDepartment of Electrical and Electronic Engineering, University of CagliariInstitute of Systems Engineering, Macau University of Science and TechnologyDepartment of Electrical and Electronic Engineering, University of CagliariAbstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator.https://doi.org/10.1038/s41598-022-19737-w
spellingShingle Qi Zhang
Carla Seatzu
Zhiwu Li
Alessandro Giua
Selection of a stealthy and harmful attack function in discrete event systems
Scientific Reports
title Selection of a stealthy and harmful attack function in discrete event systems
title_full Selection of a stealthy and harmful attack function in discrete event systems
title_fullStr Selection of a stealthy and harmful attack function in discrete event systems
title_full_unstemmed Selection of a stealthy and harmful attack function in discrete event systems
title_short Selection of a stealthy and harmful attack function in discrete event systems
title_sort selection of a stealthy and harmful attack function in discrete event systems
url https://doi.org/10.1038/s41598-022-19737-w
work_keys_str_mv AT qizhang selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT carlaseatzu selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT zhiwuli selectionofastealthyandharmfulattackfunctionindiscreteeventsystems
AT alessandrogiua selectionofastealthyandharmfulattackfunctionindiscreteeventsystems