Model Reconstruction via Hieralchical Supervisory Control with Cyber Attacks
Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model....
Saved in:
Published in | Proceedings of IEEE International Symposium on Consumer Electronics pp. 1 - 6 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
06.01.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2158-4001 |
DOI | 10.1109/ICCE59016.2024.10444174 |
Cover
Abstract | Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model. The challenge in the attacked situation is that the controllable parts of the controlled object (plant) differ between the normal control and the attacker's control. To address this issue, this study uses hierarchical supervisory control. We reconstruct the plant model considering the controllability of the attacker and design a degenerate operation model. We show that the degenerate operation model can be designed as a defensive measure based on the controllability of the attacker in the event of a cyber-attack. Furthermore, the designed degenerate operation model was found to be controllable by simulation.. |
---|---|
AbstractList | Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but safe operation is required even under cyber-attacks. The purpose of this study is to design an attack model and a degenerate operation model. The challenge in the attacked situation is that the controllable parts of the controlled object (plant) differ between the normal control and the attacker's control. To address this issue, this study uses hierarchical supervisory control. We reconstruct the plant model considering the controllability of the attacker and design a degenerate operation model. We show that the degenerate operation model can be designed as a defensive measure based on the controllability of the attacker in the event of a cyber-attack. Furthermore, the designed degenerate operation model was found to be controllable by simulation.. |
Author | Ogawa, Kanta Sawada, Kenji |
Author_xml | – sequence: 1 givenname: Kanta surname: Ogawa fullname: Ogawa, Kanta email: knt.ogw@uec.ac.jp organization: University of Electro-Communications,Tokyo,Japan – sequence: 2 givenname: Kenji surname: Sawada fullname: Sawada, Kenji email: knj.sawada@uec.ac.jp organization: University of Electro-Communications,Tokyo,Japan |
BookMark | eNo1j9tKAzEURaMo2Nb-gWB-YGpOLpOexzLUtlARvDyXTOaURsdJyaSV_r0F9WktWLBhD9lVFzti7B7EBEDgw6qq5gYFlBMppJ6A0FqD1RdsjBanygglNajykg0kmGmhhYAbNuz7j7MgGhyw9VNsqOUv5GPX53TwOcSOH4Pjy0DJtX4XvGv562FP6Rj6mE68il1OseXfIe94daop8VnOzn_2t-x669qexn8csffH-Vu1LNbPi1U1WxcBAHNh3LSxjQVSUngrtCuxBiSPW9U4RWc9B6wbp0kasAacLsnWEtBstW-EGrG7391ARJt9Cl8unTb_79UP64lRYQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/ICCE59016.2024.10444174 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9798350324136 |
EISSN | 2158-4001 |
EndPage | 6 |
ExternalDocumentID | 10444174 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IL 6IN AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP M43 OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i119t-5a8d7d71e320c704a69b19ec9f3da3e19e3209bda4e251751a46e7b2195f4cd03 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:08:21 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i119t-5a8d7d71e320c704a69b19ec9f3da3e19e3209bda4e251751a46e7b2195f4cd03 |
PageCount | 6 |
ParticipantIDs | ieee_primary_10444174 |
PublicationCentury | 2000 |
PublicationDate | 2024-Jan.-6 |
PublicationDateYYYYMMDD | 2024-01-06 |
PublicationDate_xml | – month: 01 year: 2024 text: 2024-Jan.-6 day: 06 |
PublicationDecade | 2020 |
PublicationTitle | Proceedings of IEEE International Symposium on Consumer Electronics |
PublicationTitleAbbrev | ICCE |
PublicationYear | 2024 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0019959 |
Score | 2.2428484 |
Snippet | Control systems, which are becoming more and more IoT-oriented, require system design and operation subject to cyber-attacks. In other words, a degenerate but... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Automation Consumer electronics Control system security Control theory Controllability Cyberattack Fallback control Supervisory control Supervisory control theory System analysis and design |
Title | Model Reconstruction via Hieralchical Supervisory Control with Cyber Attacks |
URI | https://ieeexplore.ieee.org/document/10444174 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwFA5uT_ribeKdPPja2kvSLI9SNqboEHSwt5E0JzAc25itMH-9OekuKgi-hZa05aTJab9833cIuRGGAbepCiKuVMBEKgLJrA1kZNsuYWSKWwT0n_pZb8Aehny4Eqt7LQwAePIZhNj0e_lmVlQIlbkZzrBiFmuQhnvParHWZssAjbNWBK44krf3ed5BXSXSEBIWrrv-KKLic0h3n_TXd6-pI29hVeqw-PxlzPjvxzsgra1cjz5vEtEh2YHpEdn75jR4TB6x5tmE4s_m1jKWfowV7Y0RlfIVUSb0pZrj2vE-WyxpXpPYKSK1NF9qWNC7skRJfosMup3XvBesCikE4ziWZcBV2wgjYkiTqBARU5nUsYRC2tSoFFzTnZDaKAboYMZjxTIQ2i1m3LLCROkJaU5nUzglFIpEckiYtu5br3DZXgnrJq5J3MW4NtEZaWFgRvPaK2O0jsn5H8cvyC6Ojwc1skvSdBGAK5fmS33th_cL3EunnA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSgMxFA1aF-rGV8W3WbidcR7JpFnK0FK1LYItdFeSyQ0US1vqVKhfb-5MHyoI7kKGeXBDcjIn95xLyJ0wDLiNlRdwpTwmYuFJZq0nA1tzgJEobpHQb3eSZo899Xl_KVYvtDAAUCSfgY_N4izfTLI5UmVuhjOsmMW2yY4DfsZLudb60ACts5YpXGEg7x_TtI7KSkxEiJi_uvlHGZUCRRoHpLN6f5k88ubPc-1nn7-sGf_9gYekuhHs0Zc1FB2RLRgfk_1vXoMnpIVVz0YUfzc3prH0Y6hoc4i8VFETZURf51NcPd4nswVNyzR2ilwtTRcaZvQhz1GUXyW9Rr2bNr1lKQVvGIYy97iqGWFECHEUZCJgKpE6lJBJGxsVg2u6C1IbxQA9zHioWAJCu-WMW5aZID4llfFkDGeEQhZJDhHT1u32Mof3Slg3dU3kHsa1Cc5JFQMzmJZuGYNVTC7-6L8lu81uuzVoPXaeL8kejlVBcSRXpOKiAdcO9HN9Uwz1F9L-quk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Proceedings+of+IEEE+International+Symposium+on+Consumer+Electronics&rft.atitle=Model+Reconstruction+via+Hieralchical+Supervisory+Control+with+Cyber+Attacks&rft.au=Ogawa%2C+Kanta&rft.au=Sawada%2C+Kenji&rft.date=2024-01-06&rft.pub=IEEE&rft.eissn=2158-4001&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FICCE59016.2024.10444174&rft.externalDocID=10444174 |