Citation: | Z. He, N. Wu, R. Su, and Z. Li, “Cyber-attacks with resource constraints on discrete event systems under supervisory control,” IEEE/CAA J. Autom. Sinica, vol. 11, no. 0, pp. 1–11, Jun. 2024. |
[1] |
R. Baheti and H. Gill, “Cyber-physical systems,” Impact Control Technol., vol. 12, no. 1, pp. 161–166, Mar. 2011.
|
[2] |
Y. Liu, Y. Peng, B. Wang, S. Yao, and Z. Liu, “Review on cyber-physical systems,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 1, pp. 27–40, Jan. 2017. doi: 10.1109/JAS.2017.7510349
|
[3] |
S. Sridhar, A. Hahn, and M. Govindarasu, “Cyber-physical system security for the electric power grid,” Proc. IEEE, vol. 100, no. 1, pp. 210–224, Jan. 2012. doi: 10.1109/JPROC.2011.2165269
|
[4] |
K. Zhang, C. Keliris, T. Parisini, B. Jiang, and M. M. Polycarpou, “Passive attack detection for a class of stealthy intermittent integrity attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 898–915, Apr. 2023. doi: 10.1109/JAS.2023.123177
|
[5] |
A. Cardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, “Challenges for securing cyber physical systems,” in Proc. Workshop Future Directions Cyber——Physical Syst. Secur., Jul. 2009, vol. 5, no. 1, pp. 1–7.
|
[6] |
M. Wakaiki, P. Tabuada, and J. P. Hespanha, “Supervisory control of discrete-event systems under attacks,” Dyn. Games Appl., vol. 9, no. 4, pp. 965–983, Dec. 2019. doi: 10.1007/s13235-018-0285-3
|
[7] |
R. Meira-Góes, S. Lafortune, and H. Marchand, “Synthesis of supervisors robust against sensor deception attacks,” IEEE Trans. Autom. Control, vol. 66, no. 10, pp. 4990–4997, Oct. 2021. doi: 10.1109/TAC.2021.3051459
|
[8] |
Q. Zhang, C. Seatzu, Z. Li, and A. Giua, “Selection of a stealthy and harmful attack function in discrete event systems,” Sci. Rep., vol. 12, no. 1, pp. 1–14, Sep. 2022. doi: 10.1038/s41598-021-99269-x
|
[9] |
R. Meira-Góes, E. Kang, R. Kwong, and S. Lafortune, “Stealthy deception attacks for cyber-physical systems,” in Proc. IEEE 56th Annu. Conf. Decis. Control, Dec. 2017, pp. 4224–4230.
|
[10] |
W. Duo, M. Zhou, and A. Abusorrah, “A survey of cyber attacks on cyber physical systems: Recent advances and challenges,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 5, pp. 784–800, May 2022. doi: 10.1109/JAS.2022.105548
|
[11] |
L. Lin and R. Su, “Synthesis of covert actuator and sensor attackers,” Automatica, vol. 130, p. 109714, Aug. 2021. doi: 10.1016/j.automatica.2021.109714
|
[12] |
L. K. Carvalho, Y.-C. Wu, R. Kwong, and S. Lafortune, “Detection and prevention of actuator enablement attacks in supervisory control systems,” in Proc. 13th Int. Workshop Discrete Event Syst., May 2016, pp. 298–305.
|
[13] |
——, “Detection and mitigation of classes of attacks in supervisory control systems,” Automatica, vol. 97, pp. 121–133, Nov. 2018. doi: 10.1016/j.automatica.2018.07.017
|
[14] |
R. Sengupta and S. Lafortune, “An optimal control theory for discrete event systems,” SIAM J. Control Optimiz., vol. 36, no. 2, pp. 488–541, Mar. 1998. doi: 10.1137/S0363012994260957
|
[15] |
Y. Ji, X. Yin, and S. Lafortune, “Optimal supervisory control with mean payoff objectives and under partial observation,” Automatica, vol. 123, p. 109359, Jan. 2021. doi: 10.1016/j.automatica.2020.109359
|
[16] |
H. Guo, J. Sun, and Z.-H. Pang, “Residual-based false data injection attacks against multi-sensor estimation systems,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 5, pp. 1181–1191, May 2023. doi: 10.1109/JAS.2023.123441
|
[17] |
D. Thorsley and D. Teneketzis, “Intrusion detection in controlled discrete event systems,” in Proc. IEEE 45th Conf. Decis. Control, Dec. 2006, pp. 6047–6054.
|
[18] |
R. Su, “Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations,” Automatica, vol. 94, pp. 35–44, Aug. 2018. doi: 10.1016/j.automatica.2018.04.006
|
[19] |
R. Meira-Góes, E. Kang, R. Kwong, and S. Lafortune, “Synthesis of sensor deception attacks at the supervisory layer of cyber–physical systems,” Automatica, vol. 121, p. 109172, Nov. 2020. doi: 10.1016/j.automatica.2020.109172
|
[20] |
A. Khoumsi, “Sensor and actuator attacks of cyber-physical systems: A study based on supervisory control of discrete event systems,” in Proc. 8th Int. Conf. Syst. Control, Oct. 2019, pp. 176–182.
|
[21] |
R. Meira-Góes, H. Marchand, and S. Lafortune, “Dealing with sensor and actuator deception attacks in supervisory control,” Automatica, vol. 147, p. 110736, Jan. 2023. doi: 10.1016/j.automatica.2022.110736
|
[22] |
Q. Zhang, C. Seatzu, Z. L, and A. Giua, “Sensor and actuator attacks in discrete event systems,” IFAC-PapersOnLine, vol. 55, no. 28, pp. 38–45, Sep. 2022. doi: 10.1016/j.ifacol.2022.10.321
|
[23] |
P. M. Lima, M. V. S. Alves, L. K. Carvalho, and M. V. Moreira, “Security against network attacks in supervisory control systems,” IFAC-PapersOnLine, vol. 50, no. 1, pp. 12 333–12 338, Jul. 2017. doi: 10.1016/j.ifacol.2017.08.2161
|
[24] |
——, “Security against communication network attacks of cyber-physical systems,” J. Control Autom. Electr. Syst., vol. 30, no. 1, pp. 125–135, Feb. 2019. doi: 10.1007/s40313-018-0420-9
|
[25] |
Y. Li, C. N. Hadjicostis, and N. Wu, “Tamper-tolerant diagnosability under bounded or unbounded attacks,” IFAC-PapersOnLine, vol. 55, no. 28, pp. 52–57, Sep. 2022. doi: 10.1016/j.ifacol.2022.10.323
|
[26] |
R. Meira-Góes, R. Kwong, and S. Lafortune, “Synthesis of optimal multi-objective attack strategies for controlled systems modeled by probabilistic automata,” IEEE Trans. Autom. Control, vol. 67, no. 6, pp. 2873–2888, Jun. 2022. doi: 10.1109/TAC.2021.3094737
|
[27] |
R. Tai, L. Lin, and R. Su, “Synthesis of optimal covert sensor-actuator attackers for discrete-event systems,” Automatica, vol. 151, p. 110910, May 2023. doi: 10.1016/j.automatica.2023.110910
|
[28] |
C. G. Cassandras and S. Lafortune, Introduction to Discrete Event Systems. Cham, Switzerland: Springer, 2021.
|
[29] |
A. Bergeron, “A unified approach to control problems in discrete event processes,” RAIRO-Theor. Inf. Appl., vol. 27, no. 6, pp. 555–573, 1993. doi: 10.1051/ita/1993270605551
|
[30] |
Q. Zhang, Z. Li, C. Seatzu, and A. Giua, “Stealthy attacks for partially-observed discrete event systems,” in Proc. IEEE 23rd Int. Conf. Emerg. Technol. Factory Autom., Sep. 2018, vol. 1, pp. 1161–1164.
|