论文标题
在监督控制系统中,传感器欺骗攻击针对初始状态隐私
Sensor Deception Attacks Against Initial-State Privacy in Supervisory Control Systems
论文作者
论文摘要
本文研究了在离散事件系统(DES)的监督控制下,将传感器欺骗攻击者反对隐私的问题进行了研究。我们认为由主管控制的DES植物,该植物受传感器欺骗攻击的约束。具体来说,我们考虑了一个主动攻击者,可以篡改主管在传感器和主管之间的通信渠道上的观察结果。监督控制系统的隐私要求是维护初始状态不透明度,即,它不想揭示其在操作过程中从秘密状态启动的事实。另一方面,攻击者旨在通过篡改其观察结果来欺骗主管,因此由于不正确的控制措施而违反了初始状态的不透明度。在这项工作中,我们从攻击者的角度研究了一种有效的方法来综合传感器攻击策略威胁系统隐私。为此,我们提出了所有攻击结构(AAS),该结构记录了主管和攻击者的状态估计。该结构是综合传感器攻击策略的基础。我们还讨论了如何通过利用初始状态隐私要求的结构特性来简化综合复杂性。提供了一个运行的学术示例来说明综合程序。
This paper investigates the problem of synthesizing sensor deception attackers against privacy in the context of supervisory control of discrete-event systems (DES). We consider a DES plant controlled by a supervisor, which is subject to sensor deception attacks. Specifically, we consider an active attacker that can tamper with the observations received by the supervisor by, e.g., hacking on the communication channel between the sensors and the supervisor. The privacy requirement of the supervisory control system is to maintain initial-state opacity, i.e., it does not want to reveal the fact that it was initiated from a secret state during its operation. On the other hand, the attacker aims to deceive the supervisor, by tampering with its observations, such that initial-state opacity is violated due to incorrect control actions. In this work, we investigate from the attacker's point of view by presenting an effective approach for synthesizing sensor attack strategies threatening the privacy of the system. To this end, we propose the All Attack Structure (AAS) that records state estimates for both the supervisor and the attacker. This structure serves as a basis for synthesizing a sensor attack strategy. We also discuss how to simplify the synthesis complexity by leveraging the structural property of the initial-state privacy requirement. A running academic example is provided to illustrate the synthesis procedure.