Skip to main content
Log in

Synthesis of covert actuator attackers for free

  • Published:
Discrete Event Dynamic Systems Aims and scope Submit manuscript

Abstract

In this paper, we shall formulate and address a problem of covert actuator attacker synthesis for cyber-physical systems that are modeled by discrete-event systems. We assume the actuator attacker partially observes the execution of the closed-loop system and is able to modify each control command issued by the supervisor on a specified attackable subset of controllable events. We provide straightforward but in general exponential-time reductions, due to the use of subset construction procedure, from the covert actuator attacker synthesis problems to the Ramadge-Wonham supervisor synthesis problems. It then follows that it is possible to use the many techniques and tools already developed for solving the supervisor synthesis problem to solve the covert actuator attacker synthesis problem for free. In particular, we show that, if the attacker cannot attack unobservable events to the supervisor, then the reductions can be carried out in polynomial time. We also provide a brief discussion on some other conditions under which the exponential blowup in state size can be avoided. Finally, we show how the reduction based synthesis procedure can be extended for the synthesis of successful covert actuator attackers that also eavesdrop the control commands issued by the supervisor.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. There is in fact an exception. In sensor insertion scenario, Carvalho et al. (2018) assumes the attacker knows the model of the supervisor.

  2. The supervisor could be designed in such a way that either every disabled event is non-attackable, which makes (enablement) attack impossible, or every disabled attackable event cannot bring the system to damage, which makes attack futile.

  3. We write δ(q, σ)! to mean δ(q, σ) is defined and write ¬δ(q, σ)! to mean δ(q, σ) is undefined. As usual, δ is naturally extended to the partial transition function \(\delta : Q \times {\varSigma }^{*} \rightarrow Q\) such that, for any qQ, any sΣ and any σΣ, δ(q, 𝜖) = q and δ(q, sσ) = δ(δ(q, s), σ). We define \(\delta (Q^{\prime } ,\sigma )=\{\delta (q, \sigma ) \mid q \in Q^{\prime }\}\) for any \(Q^{\prime }\subseteq Q\).

  4. This assumption may be removed, by imposing the constraint that the attacker does not change its attack decision whenever σΣuo is executed in the plant, even when the execution of σ may be observed by the attacker, if σΣuoΣo, A, and thus may lead to state change in the attacker. The analysis of this general case is left to the future work.

  5. The supervisor is not sure whether σ has been disabled by an attacker, even if disabling σ may result in deadlock, as the supervisor is never sure whether: 1) deadlock has occurred due to actuator attack, or 2) σ will possibly fire soon (according to the internal mechanism of the plant).

  6. The requirement \({\varSigma }_{c, A} \subseteq {\varSigma }_{c}\) is not essential, as it is only used in Remark 2, i.e., used in the discussion of when the reduction can be carried out in polynomial time.

  7. The relaxation of this requirement makes our synthesis approach incomplete in general.

  8. In Lima et al. (2017), when the supervisor detects the presence of an attacker, all controllable events will be disabled, while uncontrollable events can still occur (i.e., immediate halt by reset is impossible). This is not difficult to accommodate, by working on the damage automaton H that defines the set of damage-inflicting strings Lm(H). In particular, if uncontrollable events can still occur after the detection, then we only need to use the new damage automaton \(H^{\prime }\) with \(L_{m}(H^{\prime })=L_{m}(H) \cup L_{m}(H)/{\varSigma }_{uc}^{*}\), where \(L_{m}(H)/{\varSigma }_{uc}^{*}:=\{s \in {\varSigma }^{*} \mid \exists s^{\prime } \in {\varSigma }_{uc}^{*}, ss^{\prime } \in L_{m}(H)\}\), as the renewed set of damage-inflicting strings. An alternative approach is to add self-loops of each uncontrollable event at the state xhalt of SA and at the state \(\varnothing \) of \(P_{{\varSigma }_{o}}(S\lVert G)\) to allow execution of uncontrollable events after the detection; the definition of these two components will be explained soon.

  9. The same monitoring mechanism indeed works for both covert attackers and risky attackers (Lin et al. 2019b).

  10. Alternatively, we can use the equivalent set \(\{(q, x, D, y, w) \in Q \times (X \cup \{x_{halt}\}) \times 2^{X \times Q} \times Y \times W \mid D=\varnothing \wedge w \notin W_{m}\}\) for specifying the violation of covertness.

  11. Theorem 1 requires the synthesis of a safe and nonblocking supervisor, while Theorem 2 only requires the synthesis of a safe and nonempty supervisor. The maximally permissive supervisor synthesis algorithm in Yin and Lafortune (2016) is of exponential time complexity and can be adapted for both scenarios.

  12. In another setup (Lin et al. 2019b), the supervisor sends a control command each time when it fires an observable transition \(\zeta (x, \sigma )=x^{\prime }\) satisfying \(\varGamma (x) \neq \varGamma (x^{\prime })\). To solve the (covert) actuator attacker synthesis problem for this setup requires the concept of dynamic observation (Arnold et al. 2003) that is beyond the scope of this work.

References

  • Amin S, Litrico X, Sastry SS, Bayen AM (2010) Stealthy deception attacks on water SCADA systems. HSCC: 161–170

  • Arnold A, Vincent A, Walukiewicz I (2003) Games for synthesis of controllers with partial observation. Theor Comp Sci 303(1):7–34

    Article  MathSciNet  Google Scholar 

  • Bergeron A (1993) A unified approach to control problems in discrete event processes. RAIRO-Theoretical Informatics and Applications 27(6):555–573

    Article  MathSciNet  Google Scholar 

  • Carvalho LK, Wu YC, Kwong R, Lafortune S (2016) Detection and prevention of actuator enablement attacks in supervisory control systems. WODES: 298–305

  • Carvalho LK, Wu YC, Kwong R, Lafortune S (2018) Detection and mitigation of classes of attacks in supervisory control systems. Automatica 97:121–133

    Article  MathSciNet  Google Scholar 

  • Cassandras C, Lafortune S (1999) Introduction to discrete event systems. Kluwer, Boston

    Book  Google Scholar 

  • Forejt V, Kwiatkowska M, Norman G, Parker D (2011) Automated verification techniques for probabilistic systems. SFM: 53–113

  • Goes RM, Kang E, Kwong R, Lafortune S (2017) Stealthy deception attacks for cyber-physical systems. Conference on Decision and Control: 4224–4230

  • Hélouët L, Marchand H, Ricker L (2018) Opacity with powerful attackers. IFAC 51(7):464–471

    Google Scholar 

  • Hopcroft JE, Ullman JD (1979) Introduction to automata theory, languages, and computation. Addison-Wesley, Reading

    MATH  Google Scholar 

  • Jones A, Kong Z, Belta C (2014) Anomaly detection in cyber-physical systems: a formal methods approach. Conference on Decision and Control: 848–853

  • Kang E, Adepu S, Mathur A, Jackson D (2016) Model based security analysis of a water treatment system. SEsCPS: 22–28

  • Lanotte R, Merro M, Muradore R, Vigano L (2017) A formal approach to cyber-physical attacks. IEEE Computer Security Foundations Symposium: 436–450

  • Lei F, Wonham WM (2010) On the computation of natural observers in discrete-event systems. Discrete Event Dynamic Systems 20(1):63–102

    Article  MathSciNet  Google Scholar 

  • Lima PM, Alves MVS, Carvalho LK, Moreira MV (2017) Security against network attacks in supervisory control systems. IFAC 50(1):12333–12338

    Google Scholar 

  • Lima PM, Carvalho LK, Moreira MV (2018) Detectable and undetectable network attack security of cyber-physical systems. IFAC 51(7):179–185

    Google Scholar 

  • Lin L, Thuijsman S, Zhu Y, Ware S, Su R, Reniers M (2019a) Synthesis of successful normal actuator attackers on normal supervisors. American Control Conference: 5614–5619

  • Lin L, Zhu Y, Su R (2019b) Towards bounded synthesis of resilient supervisors. Conference on Decision and Control, accepted

  • Mo Y, Kim HJ, Brancik K, Dickinson D, Lee H, Perrig A, Sinopoli B (2012) Cyber-physical security of a smart grid infrastructure. Proc. IEEE: 195–209

  • Pasqualetti F, Dorfler F, Bullo F (2013) Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11):2715–2729

    Article  MathSciNet  Google Scholar 

  • Rashidinejad A, Lin L, Wetzels BHJ, Zhu Y, Reniers M, Su R (2019) Supervisory control of discrete-event systems under attacks: an overview and outlook. European Control Conference, accepted

  • Rocchetto M, Tippenhauer NO (2017) Towards formal security analysis of industrial control systems. ACM Asia Conference on Computer and Communications Security: 114–126

  • Smith RS (2011) A decoupled feedback structure for covertly appropriating networked control systems. IFAC: 90–95

  • Su R (2018) Supervisor synthesis to thwart cyber-attack with bounded sensor reading alterations. Automatica 94:35–44

    Article  MathSciNet  Google Scholar 

  • Teixeira A, Shames I, Sandberg H, Johansson KH (2012) Revealing stealthy attacks in control systems. 50th Annual Allerton conference on communication, control and computing

  • Wakaiki M, Tabuada P, Hespanha JP (2017) Supervisory control of discrete-event systems under attacks. arXiv:1701.00881v1

  • Wang Y, Bozkurt AK, Pajic M (2019) Attack-resilient supervisory control of discrete-event systems. arXiv:1904.03264

  • Wonham WM, Cai K (2018) Supervisory control of discrete-event systems. Monograph Series Communications and Control Engineering, Springer

  • Yin X, Lafortune S (2016) Synthesis of maximally permissive supervisors for partially observed discrete event systems. IEEE Trans Autom Control 61(5):1239–1254

    Article  MathSciNet  Google Scholar 

  • Yin X, Li S (2018) Verification of opacity in networked supervisory control systems with insecure control channels. Conference on Decision and Control: 4851–4856

  • Zhu Y, Lin L, Su R (2018) Supervisor obfuscation against actuator enablement attack. European Control Conference: 1732–1739

  • Zhu Y, Lin L, Ware S, Su R (2019) Supervisor synthesis for networked discrete event systems with communication delays and lossy channels. Conference on decision and control, accepted

Download references

Acknowledgements

This work is financially supported by Singapore Ministry of Education Academic Research Grant RG91/18-(S)-SU RONG (VP), which is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liyong Lin.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article belongs to the Topical Collection: Smart Manufacturing - A New DES Frontier

Guest Editors: Rong Su and Bengt Lennartson

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, L., Zhu, Y. & Su, R. Synthesis of covert actuator attackers for free. Discrete Event Dyn Syst 30, 561–577 (2020). https://doi.org/10.1007/s10626-020-00312-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10626-020-00312-2

Keywords

Navigation