Security Quantification for Discrete Event Systems Based on the Worth of States
Abstract
:1. Introduction
- A novel notion of worthy opacity is proposed to quantitatively characterize the worth of a system available to an intruder;
- An online algorithm is provided to verify worthy opacity;
- A system property called 1-cycle returned is defined, and an offline verification algorithm for the system’s worthy opacity satisfying this property is presented;
- It is shown that worthy opacity provides a more granular partitioning of the system than current-state opacity.
2. Preliminaries
2.1. System Model
- is the finite set of states;
- is the finite set of events associated with G;
- (where is the power set of Q) is the transition function, and means that there is a transition labeled by e from state q to state ;
- is the set of initial states.
2.2. Intruder Model and Opacity
- , with each state being a state estimate generated by an intruder based on the evolution of G;
- is the set of events that can be observed by an intruder;
- ;
- is the initial state estimate.
2.3. Some Counting Principles
3. Notions of Worthy Opacity
4. Verifying Worthy Opacity
4.1. Online Verification of an Observation
- (1)
- In the case that and are not identical, the number of runs on string or can be described by matrix , i.e., the number of runs from state to on string or is ;
- (2)
- The number of runs on string can be described by matrix , i.e., the number of runs from state to on string is .
- (1)
- In the case that and are disjoint, .
- (2)
- .
Algorithm 1 Online verification of worthy opacity |
|
4.2. Run Status Recorder and 1-Cycle Returned
Algorithm 2 Construction of the run status recorder and and verification of the 1-CR of system G |
|
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
DES | Discrete Event System |
DFA | Deterministic Finite Automaton |
IoT | Internet of Things |
NFA | Non-deterministic Finite Automaton |
1-CR | 1-Cycle Returned |
References
- Khor, N.; Arimah, B.; Otieno, R.; Oostrum, M.; Mutinda, M.; Martins, J. World Cities Report 2022: Envisaging the Future of Cities. 2022. Available online: https://unhabitat.org/sites/default/files/2022/06/wcr_2022.pdf (accessed on 29 June 2022).
- Yang, J.; Lee, T.Y.; Zhang, W. Smart cities in China: A brief overview. IT Prof. 2021, 23, 89–94. [Google Scholar] [CrossRef]
- Jia, M.; Komeily, A.; Wang, Y.; Srinivasan, R.S. Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Autom. Constr. 2019, 101, 111–126. [Google Scholar] [CrossRef]
- Verma, A.; Prakash, S.; Srivastava, V.; Kumar, A.; Mukhopadhyay, S.C. Sensing, controlling, and IoT infrastructure in smart building: A Review. IEEE Sens. J. 2019, 19, 9036–9046. [Google Scholar] [CrossRef]
- Shaikh, P.H.; Nor, N.B.M.; Nallagownden, P.; Elamvazuthi, I.; Ibrahim, T. A review on optimized control systems for building energy and comfort management of smart sustainable buildings. Renew. Sustain. Energy Rev. 2014, 34, 409–429. [Google Scholar] [CrossRef]
- Carli, R.; Cavone, G.; Dotoli, M.; Epicoco, N.; Scarabaggio, P. Model predictive control for thermal comfort optimization in building energy management systems. In Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 6–9 October 2019; pp. 2608–2613. [Google Scholar]
- Ascione, F.; Bianco, N.; De Stasio, C.; Mauro, G.M.; Vanoli, G.P. Simulation-based model predictive control by the multi-objective optimization of building energy performance and thermal comfort. Energy Build. 2016, 111, 131–144. [Google Scholar] [CrossRef]
- Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 2014, 16, 1933–1954. [Google Scholar] [CrossRef]
- Wendzel, S. How to increase the security of smart buildings? Commun. ACM 2016, 59, 47–49. [Google Scholar] [CrossRef]
- Hu, J.; Zhang, Z.; Lu, J.; Yu, J.; Cao, J. Demand response control of smart buildings integrated with security interconnection. IEEE Trans. Cloud Comput. 2022, 10, 43–55. [Google Scholar] [CrossRef]
- Mazaré, L. Using unification for opacity properties. In Proceedings of the 4th IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security, Barcelona, Spain, 3–4 April 2004. [Google Scholar]
- Bryans, J.; Koutny, M.; Mazaré, L.; Ryan, P. Opacity generalised to transition systems. Int. J. Inf. Secur. 2008, 7, 421–435. [Google Scholar] [CrossRef]
- Lin, F. Opacity of discrete event systems and its applications. Automatica 2011, 47, 496–503. [Google Scholar] [CrossRef]
- Jacob, R.; Lesage, J.J.; Faure, J.M. Overview of discrete event systems opacity: Models, validation, and quantification. Annu. Rev. Control 2016, 41, 135–146. [Google Scholar] [CrossRef]
- Tong, Y.; Ma, Z.; Li, Z.; Seatzu, C.; Giua, A. Verification of language-based opacity in Petri nets using verifier. In Proceedings of the 2016 American Control Conference, Boston, MA, USA, 6–8 July 2016. [Google Scholar]
- Saboori, A.; Hadjicostis, C.N. Notions of security and opacity in discrete event systems. In Proceedings of the 46th IEEE Conference on Decision and Control, New Orleans, LA, USA, 12–14 December 2007. [Google Scholar]
- Dong, Y.; Li, Z.; Wu, N. Symbolic verification of current-state opacity of discrete event systems using Petri nets. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 7628–7641. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Verification of initial-state opacity in security applications of discrete event systems. Inf. Sci. 2013, 246, 115–132. [Google Scholar] [CrossRef]
- Wu, Y.C.; Lafortune, S. Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst. 2013, 23, 307–339. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Verification of K-step opacity and analysis of its complexity. IEEE Trans. Autom. Sci. Eng. 2011, 8, 549–559. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Verification of infinite-step opacity and complexity considerations. IEEE Trans. Autom. Control 2011, 57, 1265–1269. [Google Scholar] [CrossRef]
- Yang, S.; Yin, X. Secure Your Intention: On Notions of Pre-Opacity in Discrete-Event Systems. IEEE Trans. Autom. Control 2023, 68, 4754–4766. [Google Scholar] [CrossRef]
- Bérard, B.; Mullins, J.; Sassolas, M. Quantifying opacity. Math. Struct. Comput. Sci. 2015, 25, 361–403. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Current-state opacity formulations in probabilistic finite automata. IEEE Trans. Autom. Control 2014, 59, 120–133. [Google Scholar] [CrossRef]
- Li, D.; Yin, L.; Wang, J.; Wu, N. Game current-state opacity formulation in probabilistic resource automata. Inf. Sci. 2022, 613, 96–113. [Google Scholar] [CrossRef]
- Bourouis, A.; Klai, K.; Hadj-Alouane, N.B. Measuring opacity for non-probabilistic DES: A SOG-based approach. In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, Guangzhou, China, 10–13 November 2019. [Google Scholar]
- Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems; Springer Nature: Cham, Switzerland, 2021. [Google Scholar]
- Tong, Y.; Li, Z.; Seatzu, C.; Giua, A. Verification of state-based opacity using Petri nets. IEEE Trans. Autom. Control 2017, 62, 2823–2837. [Google Scholar] [CrossRef]
- Jiang, S.; Kumar, R.; Garcia, H.E. Diagnosis of repeated/intermittent failures in discrete event systems. IEEE Trans. Robot. Autom. 2003, 19, 310–323. [Google Scholar] [CrossRef]
- Reinhardt, K. Counting as Method, Model and Task in Theoretical Computer Science. Habilitation Thesis, University of Tübingen, Tübingen, Germany, 2005. [Google Scholar]
- Bertsekas, D.P.; Tsitsiklis, J.N. Introduction to Probability; Athena Scientific: Nashua, New Hampshire, 2008. [Google Scholar]
- Brualdi, R. Introductory Combinatorics; Pearson Education: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
- Rosen, K. Discrete Mathematics and Its Applications; McGraw-Hill: New York, NY, USA, 2019. [Google Scholar]
- Hadjicostis, C.N. Estimation and Inference in Discrete Event Systems: A Model-Based Approach with Finite Automata; Springer: New York, NY, USA, 2020. [Google Scholar]
- Blizard, W. Multiset theory. Notre Dame J. Form. Log. 1989, 30, 36–66. [Google Scholar] [CrossRef]
Observation () | ||
---|---|---|
1 | 0 | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, S.; Yu, J.; Yin, L.; Li, Z. Security Quantification for Discrete Event Systems Based on the Worth of States. Mathematics 2023, 11, 3629. https://doi.org/10.3390/math11173629
Zhou S, Yu J, Yin L, Li Z. Security Quantification for Discrete Event Systems Based on the Worth of States. Mathematics. 2023; 11(17):3629. https://doi.org/10.3390/math11173629
Chicago/Turabian StyleZhou, Sian, Jiaxin Yu, Li Yin, and Zhiwu Li. 2023. "Security Quantification for Discrete Event Systems Based on the Worth of States" Mathematics 11, no. 17: 3629. https://doi.org/10.3390/math11173629
APA StyleZhou, S., Yu, J., Yin, L., & Li, Z. (2023). Security Quantification for Discrete Event Systems Based on the Worth of States. Mathematics, 11(17), 3629. https://doi.org/10.3390/math11173629