2018 Annual American Control Conference (ACC) 2018
DOI: 10.23919/acc.2018.8431583
|View full text |Cite
|
Sign up to set email alerts
|

Synthesis of Insertion Functions to Enforce Decentralized and Joint Opacity Properties of Discrete-event Systems

Abstract: Opacity is a confidentiality property that characterizes the non-disclosure of specified secret information of a system to an outside observer. In this paper, we consider the enforcement of opacity within the discrete-event system formalism in the presence of multiple intruders. We study two cases, one without coordination among the intruders and the other with coordination. We propose appropriate notions of opacity corresponding to the two cases, respectively, and propose enforcement mechanisms for these opac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…In the case of multiple intruders, Wu et al [34] investigate the problem of enforcing system opacity. There may or may not be coordination between intruders.…”
Section: ) Insertion Functionsmentioning
confidence: 99%
“…In the case of multiple intruders, Wu et al [34] investigate the problem of enforcing system opacity. There may or may not be coordination between intruders.…”
Section: ) Insertion Functionsmentioning
confidence: 99%
“…There are many other important topics that we are not able to cover here, including (probabilistic) attack on probabilistic systems, game based solving approach, model checking based solving approach, ideas using attack trees and graphs [55]- [58] and so on. In addition, it is possible to investigate cooperative attack scenarios or decentralized attack architectures in similar spirit to [59], [60]. Last but not the least, it is important to consider the potential applications for securing practical industrial control systems.…”
Section: G Other Topicsmentioning
confidence: 99%
“…When a system is verified to be non-opaque, one important problem is to enforce opacity via some mechanisms. In general, there are two approaches for enforcing opacity: one is to control the actual behavior of the system so that those secret-revealing behaviors can be avoided [1], [4], [14], [16], [34], [41], [43], [50], [56] the other one is to change the information-flow of the system so that the intruder can be "cheated" or be "confused" [3], [10], [19], [20], [28], [44], [45], [52], [54]. In particular, the first approach is essentially the supervisory control of opacity that aims to find a supervisor that restricts the behavior of the system dynamically such that the closed-loop system is opaque.…”
Section: Introductionmentioning
confidence: 99%