Abstract

The problem of state estimation in the setting of partially-observed discrete event systems subject to cyber attacks is considered. An operator observes a plant through a natural projection that hides the occurrence of certain events. The objective of the operator is that of estimating the current state of the system. The observation is corrupted by an attacker which can tamper with the readings of a set of sensors thus inserting some fake events or erasing some observations. The aim of the attacker is that of altering the state estimation of the operator. An automaton, called joint estimator, is defined to describe the set of all possible attacks. In more details, an unbounded joint estimator is obtained by concurrent composition of two state observers, the attacker observer and the operator observer. The joint estimator shows, for each possible corrupted observation, the joint state estimation, i.e., the set of states consistent with the uncorrupted observation and the set of states consistent with the corrupted observation. Such a structure can be used to establish if an attack function is harmful w.r.t. a misleading relation. Our approach is also extended to the case in which the attacker may insert at most n events between two consecutive observations.

Highlights

  • Cyber-physical systems are intelligent interconnected systems which are exposed to network-based malicious attacks

  • Zhang et al.: Joint State Estimation Under Attack of Discrete Event Systems we consider a plant modeled as a discrete event system with state set X, whose evolution is observed by an operator

  • STRUCTURES we define a particular deterministic finite-state automaton (DFA), called attack structure, which is defined on alphabet Ea and contains all attack words that can be generated by the plant

Read more

Summary

INTRODUCTION

Cyber-physical systems are intelligent interconnected systems which are exposed to network-based malicious attacks. The problem of supervisory control of discrete event systems under attack has been considered in [15]–[24]. Inspired by some recent works [25]–[28], we address the problem of state estimation in the setting of partially-observed discrete event systems subject to cyber attacks. Q. Zhang et al.: Joint State Estimation Under Attack of Discrete Event Systems we consider a plant modeled as a discrete event system with state set X, whose evolution is observed by an operator. An observation s ∈ Eo∗ produced by a plant can be changed into a corrupted observation s ∈ Eo∗ and as a result the operator computes a state estimate C(s ) ⊆ X, which is in general incorrect. By inspection of such a structure one can determine if the attack function is harmful w.r.t. a misleading relation

LITERATURE REVIEW
PRELIMINARIES
ATTACKER OBSERVER AND OPERATOR OBSERVER
OPERATOR OBSERVER
UNBOUNDED AND N -BOUNDED ATTACK
BOUNDED ATTACK STRUCTURE
CONCLUSIONS AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call