Cyber Security of Complex Systems

  • Workshop of 60th IEEE Conference on Decision and Control
    Enter Here

info pic 
  • Previous Workshop IFAC World Congress 2020 Slides Download Here

Cyber Attacks Based on DES

A detailed account of most recent research outcomes is provided on fault diagnosis, opacity analysis and enhancement, and cyber security analysis and enforcement, within suitable discrete event system modelling frameworks. In each case, we describe basic problem statements and key concepts, and then point out the key challenges in each research area. After that, we present a thorough review of state-of-the-art techniques, and discuss their advantages and disadvantages. Finally, key research directions for further exploration is highlighted.

info pic 

With the continuous advancement of information and communications technology (ICT), in particular, the recent 5G-based IoT technologies, we are enjoying unprecedented connectivity around the world, including the ability to remotely monitor and control various systems and processes. At the same time, the threat of cyber attacks that may potentially cause significant system damage and even cost human lives, is increasingly attracting attention from different research communities. Within the DES community, different attack models have been proposed and analysed, upon which relevant defense techniques have been developed.

Research Topic

1.Attack of Observation Channels

info pic 

A given closed loop system (G,S) is attackable if there exists a non-empty attack model A such that the following hold:

1. Covertness: Event insertions by A must be convert to S, i.e.,

Theta(L(A)) cup L(G) subseteq L(S), namely the supervisor will not see any unexpected observable sequences from A that are allowed by the plant G.

2. Strong attack: A may always cause “damage” to G, i.e.,

info pic 

Weak attack: A may possibly cause “damage” to G, i.e.,  L(V_{Scirc A}/G)cap L_{dam} neq emptyset, namely some string in the closed-loop system (G,Scirc A) is a damaging string. 3. Control Feasibility: The closed-loop language is normal with respect to G and P_o, i.e.,

P_o^{-1}(P_o(V_{Scirc A/G}))cap L(G) = L(V_{Scirc A/G}). The attack model A defined above is called an Attack with Bounded Sensor Reading Alterations(ABSRA) of (G,S).

2.Attack of Command Channels

info pic 

An actuator attack model is described as a map

A:P_{o,A}^S(P_o(L(G))) rightarrow Gamma, which maps each attacker's observation $(P_{o,A}(P_o(s)), V(P_o(s)))in (Sigma_{o,A}cup

{epsilon})times Gamma$ to an altered control pattern.

(Attackability) Given a plant G and a normal supervisor S, whose supervisory control map is V, the closed-loop system (G,S) is attackable with respect to an attack model A associated with (Sigma_{c,A},Sigma_{o,A}) and a damaging language L_{dam} if (exists s in L(V/G))(exists sigma in Sigma_{c,A})P_o^{-1}(hat{P_{o,A}^V}^{-1}(P_{o,A}^VP_o(s))){sigma}cap L(G) subseteq L_{dam}, where (s,sigma) is called an attack pair under A.

3.Attack of Observation Channels and Command Channels

info pic 

and an actuator attack A_{ACT}, where A_{SEN}:((Sigma_{o,A}cup{epsilon})times Gamma)^* rightarrow Sigma_o^*, and A_{ACT}:((Sigma_{o,A}cup{epsilon})times Gamma)^* rightarrow Gamma, where the attacker can apply observations of both intercepted events and control patterns to sensor and actuator attacks.

Team members

Lin Liyong, Tai Ruochen, Zhu Yuting

Publications:

  1. Tai, R., Lin, L., Zhu, Y. and Su, R., 2021. Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. arXiv preprint arXiv:2104.14919, Automatica, under review, 2021.

  2. Tai, R., Lin, L., Zhu, Y. and Su, R., 2021. Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations. arXiv preprint arXiv:2106.12268, Automatica, under review, 2021.

  3. Tai, R., Lin, L., Zhu, Y. and Su, R., 2021. Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction. arXiv preprint arXiv:2104.04299, IEEE Transactions on Automatic Control, under review, 2021.

  4. Tai, R., Lin, L., Zhu, Y. and Su, R., 2021. Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels. arXiv preprint arXiv:2103.07132, IEEE Transactions on Automatic Control, under review, 2021.

  5. Joao Carlos Basilio, Christoforos N. Hadjicostis, Rong Su. Analysis and Control for Resilience of Discrete Event Systems. Foundations and Trends in Systems and Control Series. Now Publishers Inc. 2021.

  6. L. Lin, R. Tai, Y. Zhu, R. Su, Observation-assisted heuristic synthesis of covert attackers against unknown supervisors, Discrete Event Dynamic Systems, under review, 2021.

  7. L. Lin, R. Su (2019). Bounded synthesis of resilient supervisors. IEEE Transactions on Automatic Control, under review, 2020.

  8. L. Lin, R. Su (2020). Synthesis of covert actuator and sensor attackers. Automatica, under review, 2020.

  9. L. Lin, Y. Zhu, R. Su (2020). Synthesis of covert actuator attackers for free. Discrete Event Dynamic Systems, DOI: 10.1007/s10626-020-00312-2. Accepted.

  10. L. Lin, Y. Zhu, R. Su (2019). Towards bounded synthesis of resilient supervisors. Conference on Decision and Control, pp. 7659-7664. Accepted

  11. L. Lin, R. Su (2020). Synthesis of covert actuator and sensor attackers as supervisor synthesis. Workshop on Discrete Event Systems, Accepted

  12. Zhu, Y., Lin, L., & Su, R. (2018). Supervisor Obfuscation Against Actuator Enablement Attack. European Control Conference(2019), Accepted

  13. Aida Rashidinejad, Liyong Lin, Bart Wetzels, Yuting Zhu, Michel Reniers, Rong Su. Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook. European Control Conference(2019), Accepted

  14. Lin, L., Thuijsman, S., Zhu, Y., Ware, S., Su, R., & Reniers, M. (2018), Synthesis of successful actuator attackers on supervisors. American Control Conference (2019), Accepted

  15. Liyong Lin, Rong Su, Bertil Brandin, Simon Ware, Yuting Zhu, Synchronous Composition of Finite Interval Automata. 15th IEEE International Conference on Control and Automation (ICCA, 2019), Accepted

  16. Su, R., (2017). Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations. Automatica, Accepted, April 2017

Projects:

  • Discrete Event Based Cyber Security Analysis and Attack Resilient Controller Synthesis for Cyber Physical Systems, 2018 - 2021, completed.

  • Secure and Privacy Preserving Multi-agent Cooperation, 2017 - 2019, completed.