2017
DOI: 10.1016/j.ifacol.2017.08.2161
|View full text |Cite
|
Sign up to set email alerts
|

Security Against Network Attacks in Supervisory Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
47
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 53 publications
(47 citation statements)
references
References 7 publications
0
47
0
Order By: Relevance
“…In particular, Constraints (5) and (6) are used to propogate the constraints on r x ,y , based on the synchronous product construction and the inductive definition of reachability. Based on Constraints (5) and (6), Constraints (7) are used to ensure L m (G)∩L m (S) ⊆ L m (S ); Constraints (8) are used to ensure L m (S ) ∩ (L m (G)\L m (S)) = ∅.…”
Section: B Algorithm For Supervisor Obfuscationmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, Constraints (5) and (6) are used to propogate the constraints on r x ,y , based on the synchronous product construction and the inductive definition of reachability. Based on Constraints (5) and (6), Constraints (7) are used to ensure L m (G)∩L m (S) ⊆ L m (S ); Constraints (8) are used to ensure L m (S ) ∩ (L m (G)\L m (S)) = ∅.…”
Section: B Algorithm For Supervisor Obfuscationmentioning
confidence: 99%
“…Let the conjunction of Constraints (5), (6), (7) and (8) be denoted by formula φ sep n , which enforces the separating finite state automaton constraint. We have…”
Section: B Algorithm For Supervisor Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…With the purpose of preventing failure of a supervisory control system under attack, two main approaches have been presented in the literature: 1) detection and prevention, 2) synthesis of a resilient supervisor. The first approach places an intrusion detection module (IDM) in the system to detect an attack and prevent it before it causes damage to the system by leading it to an unsafe state [18], [20]. The set of unsafe or critical states is assumed to be given, and they are mainly related to physical damage such as overflow or collision.…”
Section: Security Mechanismmentioning
confidence: 99%
“…In[8], when the supervisor detects the presence of an attack, all controllable events are disabled and uncontrollable events can still occur (immediate halt by reset is impossible). This is not difficult to accommodate; we can add self-loops at the halt state x halt for each uncontrollable event σ ∈ Σ uc .…”
mentioning
confidence: 99%