Efficient Synthesis of Sensor Deception Attacks Using Observation Equivalence-Based Abstraction

Sahar Mohajerani, Rômulo Meira-Góes, Stéphane Lafortune

Research output: Contribution to journalConference articlepeer-review

10 Scopus citations

Abstract

This paper investigates the synthesis of successful sensor deception attack functions in supervisory control using abstraction methods to reduce computational complexity. In sensor deception attacks, an attacker hijacks a subset of the sensors of the plant and feeds incorrect information to the supervisor with the intent on causing damage to the supervised system. The attacker is successful if its attack causes damage to the system and it is not identified by an intrusion detection module. The existence test and the synthesis method of successful sensor deception attack functions are computationally expensive, specifically in partially observed systems. For this reason, we leverage results on abstraction methods to reduce the computational effort in solving these problems. Namely, we introduce an equivalence relation called restricted observation equivalence, that is used to abstract the original system before calculating attack functions. Based on this equivalence relation we prove that the existence of successful attack functions in the abstracted supervised system guarantees the existence of successful attack functions in the unabstracted supervised system and vice versa. Moreover, successful attack functions synthesized from the abstracted system can be exactly mapped to successful attack functions on the unabstracted system, thereby providing a complete solution to the attack synthesis problem.

Original languageEnglish (US)
Pages (from-to)28-34
Number of pages7
JournalIFAC-PapersOnLine
Volume53
Issue number4
DOIs
StatePublished - 2020
Event15th IFAC Workshop on Discrete Event Systems, WODES 2020 - Rio de Janeiro, Brazil
Duration: Nov 11 2020Nov 13 2020

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Efficient Synthesis of Sensor Deception Attacks Using Observation Equivalence-Based Abstraction'. Together they form a unique fingerprint.

Cite this