Visible to the public Supervisor Obfuscation Against Actuator Enablement Attack

TitleSupervisor Obfuscation Against Actuator Enablement Attack
Publication TypeConference Paper
Year of Publication2019
AuthorsZhu, Yuting, Lin, Liyong, Su, Rong
Conference Name2019 18th European Control Conference (ECC)
Date Publishedjun
Keywordsactuator attack, actuator attacker, actuator attackers, actuator enablement attack, actuator security, attackability, behavior-preserving supervisors, closed loop systems, closed-loop system, composability, computability, Cyber-physical systems, discrete-event systems, finite state automata, finite state machines, Human Behavior, Metrics, normality assumption, obfuscated supervisor, pubcrawl, Resiliency, SAT solvers, security of data, supervisor obfuscation, supervisory control
AbstractIn this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimum number of states among the set of all the resilient and behavior-preserving supervisors. Our approach involves a simple combination of two basic ideas: 1) a formulation of the problem of computing behavior-preserving supervisors as the problem of computing separating finite state automata under controllability and observability constraints, which can be tackled by using SAT solvers, and 2) the use of a recently proposed technique for the verification of attackability in our setting, with a normality assumption imposed on both the actuator attackers and supervisors.
DOI10.23919/ECC.2019.8795844
Citation Keyzhu_supervisor_2019