IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v11y2023i4p943-d1066513.html
   My bibliography  Save this article

Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems

Author

Listed:
  • Zhenhua Yu

    (College of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, China)

  • Xudong Duan

    (College of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, China)

  • Xuya Cong

    (College of Computer Science and Technology, Xi’an University of Science and Technology, Xi’an 710054, China)

  • Xiangning Li

    (School of Mechano-Electronic Engineering, Xidian University, Xi’an 710071, China)

  • Li Zheng

    (School of Foreign Languages, Changji College, Changji 831100, China)

Abstract

The feedback control system with network-connected components is vulnerable to cyberattacks. We study a problem of attack detection in supervisory control of discrete-event systems. The scenario of a system subjected to actuator enablement attacks is considered in this article. We also consider that some unsafe places that should be protected from an attacker exist in the system, and some controllable events that are disabled by a supervisor might be re-enabled by an attacker. This article proposes a defense strategy to detect actuator enablement attacks and disable all controllable events after detecting an attack. We design algorithmic procedures to determine whether the system can be protected against damage caused by actuator enablement attacks, where the damage is predefined as a set of “unsafe” places. In this way, the system property is called “AE-safe controllability”. The safe controllability can be verified by using a basis diagnoser or a basis verifier. Finally, we explain the approach with a cargo system example.

Suggested Citation

  • Zhenhua Yu & Xudong Duan & Xuya Cong & Xiangning Li & Li Zheng, 2023. "Detection of Actuator Enablement Attacks by Petri Nets in Supervisory Control Systems," Mathematics, MDPI, vol. 11(4), pages 1-23, February.
  • Handle: RePEc:gam:jmathe:v:11:y:2023:i:4:p:943-:d:1066513
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/11/4/943/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/11/4/943/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Masashi Wakaiki & Paulo Tabuada & João P. Hespanha, 2019. "Supervisory Control of Discrete-Event Systems Under Attacks," Dynamic Games and Applications, Springer, vol. 9(4), pages 965-983, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Dan Wang & Yukang Liu & Zhenhua Yu, 2023. "Synergistic Mechanism of Designing Information Granules with the Use of the Principle of Justifiable Granularity," Mathematics, MDPI, vol. 11(7), pages 1-19, April.
    2. Haoming Zhu & Gaiyun Liu & Zhenhua Yu & Zhiwu Li, 2023. "Detectability in Discrete Event Systems Using Unbounded Petri Nets," Mathematics, MDPI, vol. 11(18), pages 1-28, September.
    3. Yongyao Li & Yufeng Chen & Rui Zhou, 2024. "A Set Covering Approach to Design Maximally Permissive Supervisors for Flexible Manufacturing Systems," Mathematics, MDPI, vol. 12(11), pages 1-20, May.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Abdeldjalil Labed & Ikram Saadaoui & Hanyu E & Mohammed A. El-Meligy & Zhiwu Li & Mohamed Sharaf, 2023. "Language Recovery in Discrete-Event Systems against Sensor Deception Attacks," Mathematics, MDPI, vol. 11(10), pages 1-15, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:4:p:943-:d:1066513. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.