Model Reconstruction via Hieralchical Supervisory Control with Cyber Attacks

Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model....

Full description

Saved in:
Bibliographic Details
Published inProceedings of IEEE International Symposium on Consumer Electronics pp. 1 - 6
Main Authors Ogawa, Kanta, Sawada, Kenji
Format Conference Proceeding
LanguageEnglish
Published IEEE 06.01.2024
Subjects
Online AccessGet full text
ISSN2158-4001
DOI10.1109/ICCE59016.2024.10444174

Cover

Abstract Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model. The challenge in the attacked situation is that the controllable parts of the controlled object (plant) differ between the normal control and the attacker's control. To address this issue, this study uses hierarchical supervisory control. We reconstruct the plant model considering the controllability of the attacker and design a degenerate operation model. We show that the degenerate operation model can be designed as a defensive measure based on the controllability of the attacker in the event of a cyber-attack. Furthermore, the designed degenerate operation model was found to be controllable by simulation..
AbstractList Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model. The challenge in the attacked situation is that the controllable parts of the controlled object (plant) differ between the normal control and the attacker's control. To address this issue, this study uses hierarchical supervisory control. We reconstruct the plant model considering the controllability of the attacker and design a degenerate operation model. We show that the degenerate operation model can be designed as a defensive measure based on the controllability of the attacker in the event of a cyber-attack. Furthermore, the designed degenerate operation model was found to be controllable by simulation..
Author Ogawa, Kanta
Sawada, Kenji
Author_xml – sequence: 1
  givenname: Kanta
  surname: Ogawa
  fullname: Ogawa, Kanta
  email: knt.ogw@uec.ac.jp
  organization: University of Electro-Communications,Tokyo,Japan
– sequence: 2
  givenname: Kenji
  surname: Sawada
  fullname: Sawada, Kenji
  email: knj.sawada@uec.ac.jp
  organization: University of Electro-Communications,Tokyo,Japan
BookMark eNo1j9tKAzEURaMo2Nb-gWB-YGpOLpOexzLUtlARvDyXTOaURsdJyaSV_r0F9WktWLBhD9lVFzti7B7EBEDgw6qq5gYFlBMppJ6A0FqD1RdsjBanygglNajykg0kmGmhhYAbNuz7j7MgGhyw9VNsqOUv5GPX53TwOcSOH4Pjy0DJtX4XvGv562FP6Rj6mE68il1OseXfIe94daop8VnOzn_2t-x669qexn8csffH-Vu1LNbPi1U1WxcBAHNh3LSxjQVSUngrtCuxBiSPW9U4RWc9B6wbp0kasAacLsnWEtBstW-EGrG7391ARJt9Cl8unTb_79UP64lRYQ
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/ICCE59016.2024.10444174
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9798350324136
EISSN 2158-4001
EndPage 6
ExternalDocumentID 10444174
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IL
6IN
AAWTH
ABLEC
ACGFS
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IJVOP
M43
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i119t-5a8d7d71e320c704a69b19ec9f3da3e19e3209bda4e251751a46e7b2195f4cd03
IEDL.DBID RIE
IngestDate Wed Aug 27 02:08:21 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-5a8d7d71e320c704a69b19ec9f3da3e19e3209bda4e251751a46e7b2195f4cd03
PageCount 6
ParticipantIDs ieee_primary_10444174
PublicationCentury 2000
PublicationDate 2024-Jan.-6
PublicationDateYYYYMMDD 2024-01-06
PublicationDate_xml – month: 01
  year: 2024
  text: 2024-Jan.-6
  day: 06
PublicationDecade 2020
PublicationTitle Proceedings of IEEE International Symposium on Consumer Electronics
PublicationTitleAbbrev ICCE
PublicationYear 2024
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0019959
Score 2.2428484
Snippet Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Automation
Consumer electronics
Control system security
Control theory
Controllability
Cyberattack
Fallback control
Supervisory control
Supervisory control theory
System analysis and design
Title Model Reconstruction via Hieralchical Supervisory Control with Cyber Attacks
URI https://ieeexplore.ieee.org/document/10444174
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5uT_ribeKdPPja2kvSLI9SNqboEHSwt5E0JzAc25itMH-9OekuKgi-hZa05aTJab9833cIuRGGAbepCiKuVMBEKgLJrA1kZNsuYWSKWwT0n_pZb8Aehny4Eqt7LQwAePIZhNj0e_lmVlQIlbkZzrBiFmuQhnvParHWZssAjbNWBK44krf3ed5BXSXSEBIWrrv-KKLic0h3n_TXd6-pI29hVeqw-PxlzPjvxzsgra1cjz5vEtEh2YHpEdn75jR4TB6x5tmE4s_m1jKWfowV7Y0RlfIVUSb0pZrj2vE-WyxpXpPYKSK1NF9qWNC7skRJfosMup3XvBesCikE4ziWZcBV2wgjYkiTqBARU5nUsYRC2tSoFFzTnZDaKAboYMZjxTIQ2i1m3LLCROkJaU5nUzglFIpEckiYtu5br3DZXgnrJq5J3MW4NtEZaWFgRvPaK2O0jsn5H8cvyC6Ojwc1skvSdBGAK5fmS33th_cL3EunnA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSgMxFA1aF-rGV8W3WbidcR7JpFnK0FK1LYItdFeSyQ0US1vqVKhfb-5MHyoI7kKGeXBDcjIn95xLyJ0wDLiNlRdwpTwmYuFJZq0nA1tzgJEobpHQb3eSZo899Xl_KVYvtDAAUCSfgY_N4izfTLI5UmVuhjOsmMW2yY4DfsZLudb60ACts5YpXGEg7x_TtI7KSkxEiJi_uvlHGZUCRRoHpLN6f5k88ubPc-1nn7-sGf_9gYekuhHs0Zc1FB2RLRgfk_1vXoMnpIVVz0YUfzc3prH0Y6hoc4i8VFETZURf51NcPd4nswVNyzR2ilwtTRcaZvQhz1GUXyW9Rr2bNr1lKQVvGIYy97iqGWFECHEUZCJgKpE6lJBJGxsVg2u6C1IbxQA9zHioWAJCu-WMW5aZID4llfFkDGeEQhZJDhHT1u32Mof3Slg3dU3kHsa1Cc5JFQMzmJZuGYNVTC7-6L8lu81uuzVoPXaeL8kejlVBcSRXpOKiAdcO9HN9Uwz1F9L-quk
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+IEEE+International+Symposium+on+Consumer+Electronics&rft.atitle=Model+Reconstruction+via+Hieralchical+Supervisory+Control+with+Cyber+Attacks&rft.au=Ogawa%2C+Kanta&rft.au=Sawada%2C+Kenji&rft.date=2024-01-06&rft.pub=IEEE&rft.eissn=2158-4001&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICCE59016.2024.10444174&rft.externalDocID=10444174