Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets

This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are...

Full description

Saved in:
Bibliographic Details
Published inIEEE/CAA journal of automatica sinica Vol. 12; no. 8; pp. 1661 - 1672
Main Authors Liu, Ruotian, Mangini, Agostino Marcello, Fanti, Maria Pia
Format Journal Article
LanguageEnglish
Published Chinese Association of Automation (CAA) 01.08.2025
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are replaced by others or empty string, and its attack stealthiness requires that the corrupted observations should be contained in the behavior of system. The aim of this work is, from an attacker viewpoint, to design a stealthy replacement attack for violating the diagnosability of system. To this end, we first build a new structure, called complete unfolded verifier, with the notion of a predefined elementary unsound path that leads to the violation of diagnosability, which is used to enumerate all the potential attacked paths to be transformed into elementary unsound ones. Then an optimal attack synthesis problem in terms of minimum energy cost is formulated by determining whether an elementary unsound path is generated via solving a set of integer nonlinear programming problems. Finally, we show that the nonlinear programming problems can be transformed into integer linear programming problems by introducing additional linear constraints. Examples are used to illustrate the proposed attack strategy.
AbstractList This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In particular, we focus on a stealthy replacement attack to alter or corrupt the observation of the system, in which the transition labels are replaced by others or empty string, and its attack stealthiness requires that the corrupted observations should be contained in the behavior of system. The aim of this work is, from an attacker viewpoint, to design a stealthy replacement attack for violating the diagnosability of system. To this end, we first build a new structure, called complete unfolded verifier, with the notion of a predefined elementary unsound path that leads to the violation of diagnosability, which is used to enumerate all the potential attacked paths to be transformed into elementary unsound ones. Then an optimal attack synthesis problem in terms of minimum energy cost is formulated by determining whether an elementary unsound path is generated via solving a set of integer nonlinear programming problems. Finally, we show that the nonlinear programming problems can be transformed into integer linear programming problems by introducing additional linear constraints. Examples are used to illustrate the proposed attack strategy.
Author Liu, Ruotian
Fanti, Maria Pia
Mangini, Agostino Marcello
Author_xml – sequence: 1
  givenname: Ruotian
  orcidid: 0009-0000-1823-1542
  surname: Liu
  fullname: Liu, Ruotian
  email: ruotian.liu@poliba.it
  organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125
– sequence: 2
  givenname: Agostino Marcello
  orcidid: 0000-0001-6850-6153
  surname: Mangini
  fullname: Mangini, Agostino Marcello
  email: agostinomarcello.mangini@poliba.it
  organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125
– sequence: 3
  givenname: Maria Pia
  orcidid: 0000-0002-8612-1852
  surname: Fanti
  fullname: Fanti, Maria Pia
  email: mariapia.fanti@poliba.it
  organization: Polytechnic University of Bari,Department of Electrical and Information Engineering,Bari,Italy,70125
BookMark eNpFkMtOwzAQRS1UJErpmg0L_0BSj53nMipvVRRRWEdTZ9waQlLF3uTvcVUEq5nFvVdH55JNur4jxq5BxACiXDxXm1gKmcYgU0izMzaVSpZRKfNk8vdn2QWbO_cphAixPCuTKXvbjJ3fk7OO94avD95-Y8s3nrD1-5FX3qP-chx3aDvn-a3FXdc73NrW-pHbjq9wSy01_JX8YPkLeXfFzg22jua_d8Y-7u_el4_Rav3wtKxWkQalfISQIeht4DUyJVOUGgrdBEiDSaIBUSogKFLQOWCSCU1FY6Qmkgk0ZEDN2OK0q4feuYFMfRgC_TDWIOqjlTpYqY9W6pOV0Lg5NSwR_adBKJVDoX4AUG1gfA
CODEN IJASJC
Cites_doi 10.1109/LCSYS.2023.3284340
10.1109/LCSYS.2020.2998610
10.1016/j.ifacol.2023.10.1900
10.1109/TAC.2022.3191393
10.1016/j.automatica.2012.06.039
10.1007/s10626-024-00401-6
10.1109/TAC.2023.3239590
10.1016/j.automatica.2021.109714
10.1016/j.isatra.2021.01.036
10.1007/s13235-018-0285-3
10.1016/j.automatica.2023.111330
10.1109/TCNS.2019.2915024
10.1016/j.automatica.2013.04.041
10.1016/j.automatica.2020.108907
10.1109/5.24143
10.1109/TASE.2013.2289360
10.1016/j.automatica.2012.09.017
10.1109/TASE.2024.3416821
10.1109/JAS.2021.1004261
10.1016/j.automatica.2014.02.038
10.1016/j.automatica.2023.110910
10.1109/TAC.2003.814099
10.1109/CDC49753.2023.10383814
10.1109/TAC.2023.3239433
10.1109/TAC.2023.3266021
10.1109/87.486338
10.1109/TAC.2018.2874020
10.1109/TAC.2016.2574120
10.1016/j.automatica.2018.04.006
10.1109/TAC.2021.3051459
10.1109/TAC.2023.3292747
10.1109/SMC.2019.8914035
10.1109/TAC.2024.3367656
10.1016/j.automatica.2010.06.013
10.1007/978-0-387-68612-7
10.1016/j.automatica.2020.109172
10.1038/s41598-022-19737-w
10.1109/TSMC.2024.3351740
10.1109/9.412626
10.1109/TAC.2019.2897553
10.1016/j.automatica.2022.110222
10.1109/TCNS.2023.3312249
10.1016/j.automatica.2022.110736
10.1016/j.automatica.2018.07.017
10.1109/TAC.2023.3253462
10.1109/JAS.2022.105548
10.1109/TSMC.2017.2762823
10.1109/TAC.2020.2983088
10.1016/j.automatica.2024.111971
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/JAS.2025.125156
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Xplore Digital Libary (IEL)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2329-9274
EndPage 1672
ExternalDocumentID 10_1109_JAS_2025_125156
11033718
Genre orig-research
GrantInformation_xml – fundername: European Union's Horizon Europe research and Innovation Programme
  grantid: 101076791
  funderid: 10.13039/501100000780
GroupedDBID -0I
-0Y
-SI
-S~
0R~
4.4
5VR
6IK
92M
97E
9D9
9DI
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AFUIB
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CAJEI
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PQQKQ
Q--
RIA
RIE
RT9
T8Y
TCJ
TGT
U1F
U1G
U5I
U5S
AAYXX
CITATION
ID FETCH-LOGICAL-c133t-a16a1cb251f25ef89c18cd266fa44c1aa231e1851c71a460ce8df2cee241def13
IEDL.DBID RIE
ISSN 2329-9266
IngestDate Wed Aug 27 16:27:56 EDT 2025
Wed Aug 27 07:36:57 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c133t-a16a1cb251f25ef89c18cd266fa44c1aa231e1851c71a460ce8df2cee241def13
ORCID 0009-0000-1823-1542
0000-0001-6850-6153
0000-0002-8612-1852
PageCount 12
ParticipantIDs ieee_primary_11033718
crossref_primary_10_1109_JAS_2025_125156
PublicationCentury 2000
PublicationDate 2025-August
PublicationDateYYYYMMDD 2025-08-01
PublicationDate_xml – month: 08
  year: 2025
  text: 2025-August
PublicationDecade 2020
PublicationTitle IEEE/CAA journal of automatica sinica
PublicationTitleAbbrev JAS
PublicationYear 2025
Publisher Chinese Association of Automation (CAA)
Publisher_xml – name: Chinese Association of Automation (CAA)
References ref13
ref12
ref15
ref14
ref11
ref10
ref17
ref16
ref19
ref18
ref46
ref45
ref48
ref47
ref42
ref41
ref44
ref43
ref49
ref8
ref7
ref9
ref4
ref3
ref6
ref5
ref40
ref35
ref34
ref37
ref36
ref31
ref30
ref33
ref32
ref2
ref1
ref39
ref38
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
References_xml – ident: ref35
  doi: 10.1109/LCSYS.2023.3284340
– ident: ref15
  doi: 10.1109/LCSYS.2020.2998610
– ident: ref42
  doi: 10.1016/j.ifacol.2023.10.1900
– ident: ref10
  doi: 10.1109/TAC.2022.3191393
– ident: ref26
  doi: 10.1016/j.automatica.2012.06.039
– ident: ref7
  doi: 10.1007/s10626-024-00401-6
– ident: ref14
  doi: 10.1109/TAC.2023.3239590
– ident: ref8
  doi: 10.1016/j.automatica.2021.109714
– ident: ref2
  doi: 10.1016/j.isatra.2021.01.036
– ident: ref21
  doi: 10.1007/s13235-018-0285-3
– ident: ref12
  doi: 10.1016/j.automatica.2023.111330
– ident: ref16
  doi: 10.1109/TCNS.2019.2915024
– ident: ref31
  doi: 10.1016/j.automatica.2013.04.041
– ident: ref46
  doi: 10.1016/j.automatica.2020.108907
– ident: ref48
  doi: 10.1109/5.24143
– ident: ref27
  doi: 10.1109/TASE.2013.2289360
– ident: ref36
  doi: 10.1016/j.automatica.2012.09.017
– ident: ref39
  doi: 10.1109/TASE.2024.3416821
– ident: ref3
  doi: 10.1109/JAS.2021.1004261
– ident: ref32
  doi: 10.1016/j.automatica.2014.02.038
– ident: ref9
  doi: 10.1016/j.automatica.2023.110910
– ident: ref25
  doi: 10.1109/TAC.2003.814099
– ident: ref40
  doi: 10.1109/CDC49753.2023.10383814
– ident: ref34
  doi: 10.1109/TAC.2023.3239433
– ident: ref37
  doi: 10.1109/TAC.2023.3266021
– ident: ref24
  doi: 10.1109/87.486338
– ident: ref29
  doi: 10.1109/TAC.2018.2874020
– ident: ref44
  doi: 10.1109/TAC.2016.2574120
– ident: ref20
  doi: 10.1016/j.automatica.2018.04.006
– ident: ref22
  doi: 10.1109/TAC.2021.3051459
– ident: ref47
  doi: 10.1109/TAC.2023.3292747
– ident: ref6
  doi: 10.1109/SMC.2019.8914035
– ident: ref18
  doi: 10.1109/TAC.2024.3367656
– ident: ref43
  doi: 10.1016/j.automatica.2010.06.013
– ident: ref49
  doi: 10.1007/978-0-387-68612-7
– ident: ref11
  doi: 10.1016/j.automatica.2020.109172
– ident: ref13
  doi: 10.1038/s41598-022-19737-w
– ident: ref30
  doi: 10.1109/TSMC.2024.3351740
– ident: ref23
  doi: 10.1109/9.412626
– ident: ref33
  doi: 10.1109/TAC.2019.2897553
– ident: ref41
  doi: 10.1016/j.automatica.2022.110222
– ident: ref17
  doi: 10.1109/TCNS.2023.3312249
– ident: ref19
  doi: 10.1016/j.automatica.2022.110736
– ident: ref4
  doi: 10.1016/j.automatica.2018.07.017
– ident: ref5
  doi: 10.1109/TAC.2023.3253462
– ident: ref1
  doi: 10.1109/JAS.2022.105548
– ident: ref28
  doi: 10.1109/TSMC.2017.2762823
– ident: ref45
  doi: 10.1109/TAC.2020.2983088
– ident: ref38
  doi: 10.1016/j.automatica.2024.111971
SSID ssj0001257694
Score 2.3236501
Snippet This paper addresses the diagnosability analysis problem under external malicious attacks of a networked discrete event system modeled by labeled Petri net. In...
SourceID crossref
ieee
SourceType Index Database
Publisher
StartPage 1661
SubjectTerms Automata
Costs
Cyber attack
diagnosability
discrete event system (DES)
Discrete-event systems
Europe
Finite element analysis
Firing
Focusing
labeled Petri net (LPN)
Labeling
Optimization
Petri nets
Title Synthesis of Optimal Stealthy Attacks against Diagnosability in Labeled Petri Nets
URI https://ieeexplore.ieee.org/document/11033718
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA62Jz34rFhf5ODBS9pNN_vIsailFK1gLfS2ZLMTKepW7PZQf72T7BYXQfAWlgTCTMj3TXbmG0KuTJb62vghA6EkE2EsmAw8xSJl9cSR0ZvYFjg_jMPhVIxmwawqVne1MADgks-gY4fuX3620Cv7VNZFqPJ9vEwbpIGRW1msVXtQQersGh8iSZBMIvJUUj7ck91Rf4LBYC_oWEC33aprKFRrq-JQZbBHxpv9lMkkr51VkXb01y-pxn9veJ_sVvyS9ssDcUC2ID8kOzXVwSPyNFnnSPuW8yVdGPqId8Y7rrCJvW_oNdovClt3T9WLmiN3pLdlMl6p572m85zeqxTBKqOuGxcdQ7Fskeng7vlmyKrWCkxjUFowxUPFdYq2ML0ATCw1j3WGJjNKCM2VQtoHCOVcR1yJ0NMQZ6aHgIqAn4Hh_jFp5oscTgiFSMUg08ALIRCcg4pAySDObHCm0dptcr0xdfJRKmgkLvLwZIJeSaxXktIrbdKyNvyZVpnv9I_vZ2Tbri7z8c5Js_hcwQVyhCK9dGfjG91luFU
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwELWgHIADaxFl9YEDl7Rx4yw-ViwqpQ0SbaXeIscZowpIEU0P5esZJ6mIkJC4RVYSWW8svzf2LIRc6SR2lHY8C7gUFvcCbgnXlpYvTT1xVPQ6MAnOg9Drjnlv4k7KZPU8FwYA8uAzaJrH_C4_mamFOSprIVU5Dm6m62QDid9lRbpW5UgFxXPe-hBlgrAEck9ZzIfZotXrDNEdbLtNQ-mmX3WFhyqNVXJeud8l4WpGRTjJa3ORxU319atY47-nvEd2SoVJO8WS2CdrkB6Q7UrdwUPyPFymKPzm0zmdafqEu8Y7fmFCe9_QbrSTZSbznsoXOUX1SG-LcLyioveSTlPalzHSVULzflw0hGxeJ-P7u9FN1yqbK1gK3dLMksyTTMWIhW67oAOhWKAShExLzhWTEoUfIJkz5TPJPVtBkOg2UipSfgKaOUekls5SOCYUfBmAiF3bA5czBtIHKdwgMe6ZQrQb5HoFdfRR1NCIct_DFhFaJTJWiQqrNEjdYPjzWgnfyR_jl2SzOxr0o_5D-HhKtsyfiui8M1LLPhdwjoohiy_ydfINq3O7ng
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Synthesis+of+Optimal+Stealthy+Attacks+against+Diagnosability+in+Labeled+Petri+Nets&rft.jtitle=IEEE%2FCAA+journal+of+automatica+sinica&rft.au=Liu%2C+Ruotian&rft.au=Mangini%2C+Agostino+Marcello&rft.au=Fanti%2C+Maria+Pia&rft.date=2025-08-01&rft.issn=2329-9266&rft.eissn=2329-9274&rft.volume=12&rft.issue=8&rft.spage=1661&rft.epage=1672&rft_id=info:doi/10.1109%2FJAS.2025.125156&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JAS_2025_125156
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2329-9266&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2329-9266&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2329-9266&client=summon