2020
DOI: 10.1109/access.2020.2977992
|View full text |Cite
|
Sign up to set email alerts
|

Overview of Opacity in Discrete Event Systems

Abstract: In recent years, opacity has received increasing attention in terms of analyzing security and privacy problems. Opacity is a confidentiality property that characterizes a system's ability to hide its secret information from any external intruders. A systematic overview of opacity in the context of discrete event systems (DESs) was conducted; this paper firstly reviews the verification methods and computational complexity of the opacity in DESs using the formalisms of automata and Petri nets. When the system is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 96 publications
(139 reference statements)
0
10
0
Order By: Relevance
“…At M 0 = p 1 + p 2 , the transition t 1 could be firable. The set of explanations of t 1 is Σ(M 0 , t 1 ) = {ε, t 2 , t 2 t 3 } and Y(M 0 , t 1 ) = { 0, [10] T , [11] T }. Since Y(M 0 , t 1 ) ≠ { 0}, there exists at least a transition sequence t 2 t 1 such that λ(t 2 t 1 ) = db ∈ L NS and Pr(db) = Pr(b) = b.…”
Section: Verification Of Language-based Opacitymentioning
confidence: 99%
See 1 more Smart Citation
“…At M 0 = p 1 + p 2 , the transition t 1 could be firable. The set of explanations of t 1 is Σ(M 0 , t 1 ) = {ε, t 2 , t 2 t 3 } and Y(M 0 , t 1 ) = { 0, [10] T , [11] T }. Since Y(M 0 , t 1 ) ≠ { 0}, there exists at least a transition sequence t 2 t 1 such that λ(t 2 t 1 ) = db ∈ L NS and Pr(db) = Pr(b) = b.…”
Section: Verification Of Language-based Opacitymentioning
confidence: 99%
“…The initial marking of the MBRG is then initialized based on the initial marking M 0 and added to the set MB . After that, M := M \ {M 0 } is done and for all basis markings M ∈ M, if M ∈ M \ M, then a composed pair (M, − 1) is added to the set M. Once M ∉ M \ M, the binary scalar of M is computed according to Equation (10), i.e., α(M), and the pair (M, α(M)) is added to the set . At the end, the set of markings of β is (Steps 15 to 32).…”
Section: Modified Basis Reachability Graph (Mbrg)mentioning
confidence: 99%
“…Given a supervisor S A that satisfies Eq. (1) and a homomorphic encryption scheme {KGen, Enc, Dec, Eval}, if there exists a map f ε such that: f ε (Enc(q(k)), Enc(e(k))) = Enc(f (q(k), e(k))), (15) we say that the given S A can be homomorphically encrypted through a specified encryption scheme. We call f ε as an encrypted control policy.…”
Section: A Feasibility Of Applying Homomorphic Encryption Schemementioning
confidence: 99%
“…Passive attacks are those in which an attacker intercepts information flows between two parties to steal information stored in a system by eavesdropping or similar means. Opacity is an information flow property that characterizes the inability for an external intruder to know whether the given "secret" behavior happens in a system [14], [15]. However, almost all studies on opacity are based on data transmitted in plaintext data.…”
Section: Introductionmentioning
confidence: 99%
“…Several notions of opacity have been proposed and studied in the literature [4], [5], [6]. Overviews, surveys on commonly used techniques and existing tools, and historical remarks on the opacity of DES are presented in [7], [8], [9].…”
Section: Introductionmentioning
confidence: 99%