{"title":"Multistep Sensor Attackability in Cyber-Physical Systems","authors":"Wenli Duo;Shouguang Wang;MengChu Zhou","doi":"10.1109/TAC.2025.3542214","DOIUrl":null,"url":null,"abstract":"This work investigates cyber-attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders’ perspective, we propose a concept called <italic>k</i>-step attackability to explore attack scenarios where intruders are constrained by a limited number of attack operations. In particular, we focus on a class of sensor attacks where sensor readings can be replaced, deleted, and inserted during transmission. We examine <italic>k</i>-step attackability under such attacks and address its verification problem by proposing a structure termed an attack recognizer. It evaluates whether an arbitrary strategy generated by an attack structure can compromise a system within a certain number of attacks. Furthermore, we extend this work to general attack scenarios and provide a method to identify desired attack strategies.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 7","pages":"4794-4800"},"PeriodicalIF":7.0000,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10887304/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This work investigates cyber-attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders’ perspective, we propose a concept called k-step attackability to explore attack scenarios where intruders are constrained by a limited number of attack operations. In particular, we focus on a class of sensor attacks where sensor readings can be replaced, deleted, and inserted during transmission. We examine k-step attackability under such attacks and address its verification problem by proposing a structure termed an attack recognizer. It evaluates whether an arbitrary strategy generated by an attack structure can compromise a system within a certain number of attacks. Furthermore, we extend this work to general attack scenarios and provide a method to identify desired attack strategies.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.