2018
DOI: 10.1016/j.automatica.2018.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Supervisor synthesis to thwart cyber attack with bounded sensor reading alterations

Abstract: One of the major challenges about cyber physical systems is how to prevent cyber attacks to ensure system integrity. There has been a large number of different types of attacks discussed in the modern control and computer science communities. In this paper we aim to investigate one special type of attacks in the discrete-event system framework, where an attacker can arbitrarily alter sensor readings after intercepting them from a target system in order to trick a given supervisor to issue control commands impr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
134
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 123 publications
(134 citation statements)
references
References 30 publications
0
134
0
Order By: Relevance
“…The obstacle-avoidance algorithm of R v is APF. (a) The preset trap locates in (5,12). Attack iteration time is 169 steps, and the path length after being attacked is 6.56m.…”
Section: Attack Statementioning
confidence: 99%
See 3 more Smart Citations
“…The obstacle-avoidance algorithm of R v is APF. (a) The preset trap locates in (5,12). Attack iteration time is 169 steps, and the path length after being attacked is 6.56m.…”
Section: Attack Statementioning
confidence: 99%
“…8 shows that the shortest-path attack strategy against non-holonomic robot is applied. Two cases are designed where the trap is preseted as (5,12) and (−10, 15), respectively. The traps locates in area S 1 (defined in Fig.…”
Section: Attack Statementioning
confidence: 99%
See 2 more Smart Citations
“…Mainly inspired by some recent works [12], [13], [14], [15], we address the problem of cyber attacks with bounded sensor reading edits for partially-observed discrete event systems. In [12], the authors present a new finite structure called parallel observer, which allows to simultaneously describe the observations of the supervisor and of the attacker.…”
Section: Introductionmentioning
confidence: 99%