2020 59th IEEE Conference on Decision and Control (CDC) 2020
DOI: 10.1109/cdc42340.2020.9304130
|View full text |Cite
|
Sign up to set email alerts
|

On Attack Mitigation in Supervisory Control Systems: A Tolerant Control Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…, S u−1 for G (if they exist) as well as the minimum cost index i min . Each supervisor is computed by the UCC function (lines [14][15][16][17][18][19][20][21][22][23][24], and provides a different control policy such that every string reaching secret states has at least one controllable event of (security) level at v. So in total, S 0 , . .…”
Section: Policy Computation For Uscpmentioning
confidence: 99%
See 2 more Smart Citations
“…, S u−1 for G (if they exist) as well as the minimum cost index i min . Each supervisor is computed by the UCC function (lines [14][15][16][17][18][19][20][21][22][23][24], and provides a different control policy such that every string reaching secret states has at least one controllable event of (security) level at v. So in total, S 0 , . .…”
Section: Policy Computation For Uscpmentioning
confidence: 99%
“…This status change is done by event relabeling. Specifically, let G j = (Q, Σ j = Σ uc,j ∪Σ c,j , δ j , q 0 , Q m ) be the jth system model and D j be the control policy in (18) corresponding to supervisor S j . Then the set of controllable transitions specified (or disabled) by D j is…”
Section: Policy Computation For Uscpmentioning
confidence: 99%
See 1 more Smart Citation
“…(Email: ruochen001@e.ntu.edu.sg; llin5@e.ntu.edu.sg; rsu@ntu.edu.sg). (Corresponding author: Liyong Lin) attackers from eavesdropping and intercepting secret information, 4) embedding the mitigation module to disable events that can be defended [11], 5) designing transition protecting policies against an external intruder, which could delay the event firings, to guarantee that the makespan of the requirement does not drop below a given deadline [12], 6) synthesizing secret protection strategies such that any event sequence from the initial state that reaches a secret state contains a number of protected events no less than a given threshold [13], [14], and 7) synthesizing liveness-enforcing supervisors against attacks [15]. This paper would continue our previous work [9] on the study of supervisor obfuscation problem.…”
Section: Introductionmentioning
confidence: 99%
“…Regarding fault modeling, it is important to mention that is a more complete modeling of the system, even if the faults are not detectable. The above direction is becoming more and more necessary in industry 4.0 manufacturing systems, not only because faults affect the productivity and safety of the system but also due to the strong correlation and common control strategies required for fault detection, fault tolerance control, and handling of cyber-attacks, indicatively see [ 19 , 20 ].…”
Section: Introductionmentioning
confidence: 99%