{"title":"Diagnosability and attack detection for discrete event systems under sensor attacks","authors":"Feng Lin, Stéphane Lafortune, Caisheng Wang","doi":"10.1007/s10626-024-00401-6","DOIUrl":null,"url":null,"abstract":"<p>This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state automata as models. It assumes that an attacker has compromised the communication channel between the system’s sensors and the diagnostic engine. While the general attack model utilized by the attacker has been previously studied in the context of supervisory control, its application to fault diagnosis remains unexplored. The attacker possesses the capability to substitute each compromised observable event with a string from an attack language. The attack model incorporates event insertion and deletion, as well as static and dynamic attacks. To formally capture the diagnostic engine’s ability to identify faults in the presence of the attacker, a novel concept called CA-diagnosability is introduced. This extends the existing notions of CA-controllability and CA-observability. A testing procedure for CA-diagnosability is developed, and its correctness is proven. Some sufficient conditions for CA-diagnosability that can be easily checked are also proposed and proved. The paper then investigates conditions under which the role of an attacker can be reverted from malicious to benevolent, that is, to help the diagnoser to diagnose faults. The paper further applies diagnosability theory to investigate conditions under which the presence of the attacker can be detected.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"41 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Discrete event dynamic systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s10626-024-00401-6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state automata as models. It assumes that an attacker has compromised the communication channel between the system’s sensors and the diagnostic engine. While the general attack model utilized by the attacker has been previously studied in the context of supervisory control, its application to fault diagnosis remains unexplored. The attacker possesses the capability to substitute each compromised observable event with a string from an attack language. The attack model incorporates event insertion and deletion, as well as static and dynamic attacks. To formally capture the diagnostic engine’s ability to identify faults in the presence of the attacker, a novel concept called CA-diagnosability is introduced. This extends the existing notions of CA-controllability and CA-observability. A testing procedure for CA-diagnosability is developed, and its correctness is proven. Some sufficient conditions for CA-diagnosability that can be easily checked are also proposed and proved. The paper then investigates conditions under which the role of an attacker can be reverted from malicious to benevolent, that is, to help the diagnoser to diagnose faults. The paper further applies diagnosability theory to investigate conditions under which the presence of the attacker can be detected.
本文以有限状态自动机为模型,通过研究传感器攻击下离散事件系统的故障诊断,扩展了可诊断性理论。本文假设攻击者破坏了系统传感器与诊断引擎之间的通信通道。虽然攻击者使用的一般攻击模型以前在监督控制方面进行过研究,但其在故障诊断方面的应用仍有待探索。攻击者有能力用攻击语言中的字符串替代每个被破坏的可观测事件。攻击模型包括事件插入和删除,以及静态和动态攻击。为了正式捕捉诊断引擎在攻击者存在的情况下识别故障的能力,引入了一个名为 CA 可诊断性的新概念。这扩展了现有的 CA 可控性和 CA 可观察性概念。我们开发了 CA 可诊断性的测试程序,并证明了其正确性。本文还提出并证明了一些易于检查的 CA 可诊断性充分条件。然后,本文研究了攻击者的角色可以从恶意转为善意(即帮助诊断者诊断故障)的条件。论文进一步应用可诊断性理论,研究在哪些条件下可以检测到攻击者的存在。