Selection of a stealthy and harmful attack function in discrete event systems
Abstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dumm...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2022-09-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-022-19737-w |
_version_ | 1811236425535848448 |
---|---|
author | Qi Zhang Carla Seatzu Zhiwu Li Alessandro Giua |
author_facet | Qi Zhang Carla Seatzu Zhiwu Li Alessandro Giua |
author_sort | Qi Zhang |
collection | DOAJ |
description | Abstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator. |
first_indexed | 2024-04-12T12:08:32Z |
format | Article |
id | doaj.art-f30d2e34f5c5456d819401b96b1ca096 |
institution | Directory Open Access Journal |
issn | 2045-2322 |
language | English |
last_indexed | 2024-04-12T12:08:32Z |
publishDate | 2022-09-01 |
publisher | Nature Portfolio |
record_format | Article |
series | Scientific Reports |
spelling | doaj.art-f30d2e34f5c5456d819401b96b1ca0962022-12-22T03:33:39ZengNature PortfolioScientific Reports2045-23222022-09-0112111410.1038/s41598-022-19737-wSelection of a stealthy and harmful attack function in discrete event systemsQi Zhang0Carla Seatzu1Zhiwu Li2Alessandro Giua3School of Electro-Mechanical Engineering, Xidian UniversityDepartment of Electrical and Electronic Engineering, University of CagliariInstitute of Systems Engineering, Macau University of Science and TechnologyDepartment of Electrical and Electronic Engineering, University of CagliariAbstract In this paper we consider the problem of joint state estimation under attack in partially-observed discrete event systems. An operator observes the evolution of the plant to evaluate its current states. The attacker may tamper with the sensor readings received by the operator inserting dummy events or erasing real events that have occurred in the plant with the goal of preventing the operator from computing the correct state estimation. An attack function is said to be harmful if the state estimation consistent with the correct observation and the state estimation consistent with the corrupted observation satisfy a given misleading relation. On the basis of an automaton called joint estimator, we show how to compute a supremal stealthy joint subestimator that allows the attacker to remain stealthy, no matter what the future evolution of the plant is. Finally, we show how to select a stealthy and harmful attack function based on such a subestimator.https://doi.org/10.1038/s41598-022-19737-w |
spellingShingle | Qi Zhang Carla Seatzu Zhiwu Li Alessandro Giua Selection of a stealthy and harmful attack function in discrete event systems Scientific Reports |
title | Selection of a stealthy and harmful attack function in discrete event systems |
title_full | Selection of a stealthy and harmful attack function in discrete event systems |
title_fullStr | Selection of a stealthy and harmful attack function in discrete event systems |
title_full_unstemmed | Selection of a stealthy and harmful attack function in discrete event systems |
title_short | Selection of a stealthy and harmful attack function in discrete event systems |
title_sort | selection of a stealthy and harmful attack function in discrete event systems |
url | https://doi.org/10.1038/s41598-022-19737-w |
work_keys_str_mv | AT qizhang selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT carlaseatzu selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT zhiwuli selectionofastealthyandharmfulattackfunctionindiscreteeventsystems AT alessandrogiua selectionofastealthyandharmfulattackfunctionindiscreteeventsystems |