2019 18th European Control Conference (ECC) 2019
DOI: 10.23919/ecc.2019.8795844
|View full text |Cite
|
Sign up to set email alerts
|

Supervisor Obfuscation Against Actuator Enablement Attack

Abstract: In this paper, we propose and address the problem of supervisor obfuscation against actuator enablement attack, in a common setting where the actuator attacker can eavesdrop the control commands issued by the supervisor. We propose a method to obfuscate an (insecure) supervisor to make it resilient against actuator enablement attack in such a way that the behavior of the original closed-loop system is preserved. An additional feature of the obfuscated supervisor, if it exists, is that it has exactly the minimu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
37
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 39 publications
(39 citation statements)
references
References 26 publications
2
37
0
Order By: Relevance
“…In this subsection, we recall two problems, i.e., the supervisor obfuscation problem [12] and a formulation of the resilient supervisor synthesis problem [11]. C , if it exists, such that 1) L(G 1 ) ⊆ L(S G) ⊆ L(G 2 ) and 2) there is no successful attacker on (G, S) w.r.t.…”
Section: B Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations
“…In this subsection, we recall two problems, i.e., the supervisor obfuscation problem [12] and a formulation of the resilient supervisor synthesis problem [11]. C , if it exists, such that 1) L(G 1 ) ⊆ L(S G) ⊆ L(G 2 ) and 2) there is no successful attacker on (G, S) w.r.t.…”
Section: B Problem Formulationmentioning
confidence: 99%
“…Based on Constraints (12), (13) and (14), Constraints (15) are used to ensure L(G 1 ) ⊆ L(S G). Let φ S T le f t denote the resultant formula after combining Constraints (11), (12), (13), (14) and (15).…”
Section: Bounded Resilient Supervisor Synthesismentioning
confidence: 99%
See 2 more Smart Citations
“…Exceptions to that are the works in [16], [13]. It is also relevant to mention the work in actuation deception attacks in [8], [18], even though a different deception attack class is investigated in these works.…”
Section: Introductionmentioning
confidence: 99%