Multistep Sensor Attackability in Cyber-Physical Systems

IF 7 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automatic Control Pub Date : 2025-02-14 DOI:10.1109/TAC.2025.3542214
Wenli Duo;Shouguang Wang;MengChu Zhou
{"title":"Multistep Sensor Attackability in Cyber-Physical Systems","authors":"Wenli Duo;Shouguang Wang;MengChu Zhou","doi":"10.1109/TAC.2025.3542214","DOIUrl":null,"url":null,"abstract":"This work investigates cyber-attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders’ perspective, we propose a concept called <italic>k</i>-step attackability to explore attack scenarios where intruders are constrained by a limited number of attack operations. In particular, we focus on a class of sensor attacks where sensor readings can be replaced, deleted, and inserted during transmission. We examine <italic>k</i>-step attackability under such attacks and address its verification problem by proposing a structure termed an attack recognizer. It evaluates whether an arbitrary strategy generated by an attack structure can compromise a system within a certain number of attacks. Furthermore, we extend this work to general attack scenarios and provide a method to identify desired attack strategies.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 7","pages":"4794-4800"},"PeriodicalIF":7.0000,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10887304/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This work investigates cyber-attacks targeting cyber-physical systems in the framework of discrete event systems. From intruders’ perspective, we propose a concept called k-step attackability to explore attack scenarios where intruders are constrained by a limited number of attack operations. In particular, we focus on a class of sensor attacks where sensor readings can be replaced, deleted, and inserted during transmission. We examine k-step attackability under such attacks and address its verification problem by proposing a structure termed an attack recognizer. It evaluates whether an arbitrary strategy generated by an attack structure can compromise a system within a certain number of attacks. Furthermore, we extend this work to general attack scenarios and provide a method to identify desired attack strategies.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络物理系统中的多步传感器可攻击性
这项工作调查了离散事件系统框架中针对网络物理系统的网络攻击。从入侵者的角度来看,我们提出了一个称为k步可攻击性的概念,以探索入侵者受到有限数量攻击操作约束的攻击场景。我们特别关注一类传感器攻击,其中传感器读数可以在传输过程中被替换、删除和插入。我们研究了这种攻击下的k步可攻击性,并通过提出一种称为攻击识别器的结构来解决其验证问题。它评估由攻击结构生成的任意策略是否可以在一定数量的攻击内危及系统。此外,我们将这项工作扩展到一般的攻击场景,并提供了一种识别所需攻击策略的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automatic Control
IEEE Transactions on Automatic Control 工程技术-工程:电子与电气
CiteScore
11.30
自引率
5.90%
发文量
824
审稿时长
9 months
期刊介绍: In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered: 1) Papers: Presentation of significant research, development, or application of control concepts. 2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions. In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.
期刊最新文献
Set-Based State Estimation for Discrete-Time Semi-Markov Jump Linear Systems Using Zonotopes Safe Event-triggered Gaussian Process Learning for Barrier-Constrained Control Energy-Gain Control of Time-Varying Systems: Receding Horizon Approximation Linear quantum systems: poles, zeros, invertibility and sensitivity Constrained Common Invariant Subspace to Descriptor Multiaffine Representation of Rational Parameter Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1