Discrete-event systems subject to unknown sensor attacks
| dc.creator | Michel Rodrigo das Chagas Alves | |
| dc.creator | Patrícia N. Pena | |
| dc.creator | Karen Rudie | |
| dc.date.accessioned | 2025-06-04T14:11:13Z | |
| dc.date.accessioned | 2025-09-08T23:40:46Z | |
| dc.date.available | 2025-06-04T14:11:13Z | |
| dc.date.issued | 2022 | |
| dc.identifier.doi | https://doi.org/10.1007/s10626-021-00351-3 | |
| dc.identifier.issn | 15737594 | |
| dc.identifier.uri | https://hdl.handle.net/1843/82775 | |
| dc.language | eng | |
| dc.publisher | Universidade Federal de Minas Gerais | |
| dc.relation.ispartof | Discrete Event Dynamic Systems | |
| dc.rights | Acesso Aberto | |
| dc.subject | Sistemas de tempo discreto | |
| dc.subject.other | Discrete-event system | |
| dc.subject.other | Supervisory control | |
| dc.subject.other | Attacks on output symbols | |
| dc.subject.other | P-observability | |
| dc.title | Discrete-event systems subject to unknown sensor attacks | |
| dc.type | Artigo de periódico | |
| local.citation.epage | 158 | |
| local.citation.issue | 1 | |
| local.citation.spage | 143 | |
| local.citation.volume | 32 | |
| local.description.resumo | This work is set in the context of supervisory control of discrete-event systems under partial observation. Attackers that are able to insert or erase occurrences of particular output symbols can tamper with the supervisor’s observation and by doing so, can lead the controlled system to undesirable states. We consider a scenario with multiple attackers, each one being an element of a set, called the attack set. We also assume that only one of the attackers within an attack set is acting, although we don’t know which one. According to previous results in the literature, a supervisor that enforces a given legal language, regardless of which attacker is acting, can be designed if the legal language is controllable and satisfies a property called P-observability for an attack set. The latter is an extended notion of observability and is related with the supervisor’s ability to always distinguish between outputs that require different control actions, even if the outputs were attacked. We present a new approach for checking if a given language is P-observable for an attack set, by first introducing a visual representation as well as some definitions that capture the attack’s effect. Additionally, we present two algorithms that together allow us to verify if a given language is P-observable for an attack set, when it is represented as an automaton. | |
| local.publisher.country | Brasil | |
| local.publisher.department | ENG - DEPARTAMENTO DE ENGENHARIA ELETRÔNICA | |
| local.publisher.initials | UFMG | |
| local.url.externa | https://link.springer.com/article/10.1007/s10626-021-00351-3 |
Arquivos
Licença do pacote
1 - 1 de 1