2020
DOI: 10.1016/j.automatica.2020.109172
|View full text |Cite
|
Sign up to set email alerts
|

Synthesis of sensor deception attacks at the supervisory layer of Cyber–Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
69
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(71 citation statements)
references
References 23 publications
1
69
0
1
Order By: Relevance
“…Meira-Góes et al [26] propose a novel bipartite transition structure in the framework of discrete event systems, namely, Insertion-Deletion Attack structure, and present a game-like relationship between the supervisor and the environment (the plant and the attacker) to determine if the attacker can lead the plant to a forbidden state without being detected by the supervisor.…”
Section: A Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Meira-Góes et al [26] propose a novel bipartite transition structure in the framework of discrete event systems, namely, Insertion-Deletion Attack structure, and present a game-like relationship between the supervisor and the environment (the plant and the attacker) to determine if the attacker can lead the plant to a forbidden state without being detected by the supervisor.…”
Section: A Literature Reviewmentioning
confidence: 99%
“…What we propose is a methodology for studying how the possible choices of the attacker can affect the estimate of the operator. On the contrary, previous works on cyber attacks in the DES literature, including [15], [26]- [28], consider the case of an operator/supervisor: in such a case the goal of the attacker is to beguile the supervisor so that a specification is violated, i.e., the plant reaches a forbidden state or generates a forbidden evolution.…”
Section: A Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Of particular relevance to this paper is the work in [16], where the synthesis of stealthy sensor deception attacks assuming a fixed and known supervisor is considered; in this sense, [16] pertains to attack strategies. Herein, we consider the "dual" problem of synthesizing a supervisor that is robust against sensor deception attacks; thus, this paper is focused on defense strategies.…”
mentioning
confidence: 99%
“…II.1 corrects a mistake in the corresponding clause (1) of Def. 2 in[16], where ∅ was inadvertently used instead of {ǫ} for initializing f A (s, ǫ).…”
mentioning
confidence: 99%