Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks
Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent t...
Uloženo v:
| Vydáno v: | IEEE transactions on automatic control Ročník 66; číslo 3; s. 995 - 1008 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
IEEE
01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 0018-9286, 1558-2523 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent the system from satisfying the desired specification. In this article, we introduce a control synthesis method to minimize deviations from the desired specification due to adversaries. We consider the scenario where the adversary has limited capability of observing the controller's strategy. We synthesize a minimum violation control strategy for a finite-state stochastic game under cosafe linear temporal logic constraints. We formulate a mixed-integer nonlinear program for computing the optimal controller strategy and present two algorithms. First, we propose an exact algorithm that computes the optimal control strategy with probability one but without guarantees on the convergence rate. Second, we present an approximate algorithm that computes a suboptimal control strategy. The approximate algorithm converges faster compared to the exact algorithm; however, it only returns an optimal solution when the adversary has full observation over the controller's strategy. A numerical case study is presented to evaluate the proposed framework. |
|---|---|
| AbstractList | Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent the system from satisfying the desired specification. In this article, we introduce a control synthesis method to minimize deviations from the desired specification due to adversaries. We consider the scenario where the adversary has limited capability of observing the controller's strategy. We synthesize a minimum violation control strategy for a finite-state stochastic game under cosafe linear temporal logic constraints. We formulate a mixed-integer nonlinear program for computing the optimal controller strategy and present two algorithms. First, we propose an exact algorithm that computes the optimal control strategy with probability one but without guarantees on the convergence rate. Second, we present an approximate algorithm that computes a suboptimal control strategy. The approximate algorithm converges faster compared to the exact algorithm; however, it only returns an optimal solution when the adversary has full observation over the controller's strategy. A numerical case study is presented to evaluate the proposed framework. |
| Author | Clark, Andrew Fu, Jie Niu, Luyao |
| Author_xml | – sequence: 1 givenname: Luyao orcidid: 0000-0001-8591-5522 surname: Niu fullname: Niu, Luyao email: lniu@wpi.edu organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA – sequence: 2 givenname: Jie orcidid: 0000-0002-4470-2827 surname: Fu fullname: Fu, Jie email: jfu2@wpi.edu organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA – sequence: 3 givenname: Andrew orcidid: 0000-0002-5868-6186 surname: Clark fullname: Clark, Andrew email: aclark@wpi.edu organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA |
| BookMark | eNp9kLtrwzAQh0VJoUnavdDF0NmpHrYeYzB9QUoKSboKWZaJUttKJWXwf1-nCR06dDqO-3133DcBo851BoBbBGcIQfGwnhczDDGcYcEFpvwCjFGe8xTnmIzAGELEU4E5vQKTEHZDS7MMjcFquY-2VU3yZjvbHtrkw7pGReu6pHBd9K5JVn0XtybYkLg6KfrS-PR92wer1XEWomlDsukq45N5jEp_hmtwWasmmJtznYLN0-O6eEkXy-fXYr5INRYopoqUOTEVhTlhSDGdacZ4RjVhmSacGyMwQyWhFS6JqGpdkwrXTKMc84pnpiZTcH_au_fu62BClDt38N1wUuJMZIRRlvMhRU8p7V0I3tRS2_jzYfTKNhJBeRQoB4HyKFCeBQ4g_APu_aDK9_8hdyfEGmN-4wIyTBEk399QfVY |
| CODEN | IETAA9 |
| CitedBy_id | crossref_primary_10_1016_j_arcontrol_2024_100940 crossref_primary_10_1109_TICPS_2025_3569217 crossref_primary_10_1109_TAC_2021_3138704 crossref_primary_10_1016_j_segan_2021_100535 crossref_primary_10_1109_TAC_2024_3390848 |
| Cites_doi | 10.1109/ACC.2013.6579837 10.23919/ACC.2018.8431867 10.1109/TAC.2014.2303233 10.1109/MCS.2014.2364710 10.1109/TAC.2014.2298143 10.1007/3-540-46002-0_30 10.1016/j.automatica.2013.05.025 10.1016/j.jcss.2011.08.007 10.1007/978-3-642-22110-1_54 10.1007/978-3-540-78163-9_9 10.1109/TAC.2015.2492159 10.1016/j.artint.2010.07.002 10.1109/ICRA.2016.7487554 10.1109/ICCPS.2016.7479106 10.1109/CDC.2009.5399536 10.1007/978-3-642-19835-9_30 10.1109/CDC40024.2019.9029851 10.1109/ICRA.2017.7989177 10.23919/ACC.2018.8431595 10.1017/CBO9780511973031.004 10.1016/j.sorms.2012.08.001 10.1177/0278364915587034 10.1109/CDC.2012.6426174 10.1109/CDC.2018.8619174 10.1016/j.artint.2012.03.003 10.1111/1467-9280.02431 10.1109/ICRA.2012.6224807 10.1287/ijoc.1060.0176 10.1109/ACC.2014.6859284 10.1109/ICRA.2014.6907485 10.1145/2883817.2883842 10.1109/TAC.2017.2676679 10.1016/S0004-3702(99)00039-9 10.1109/TAC.2019.2930039 10.23919/ACC.2018.8431459 10.1023/A:1011254632723 10.1109/TRO.2009.2030225 10.1109/ROBOT.2010.5509503 10.1007/978-3-030-01090-4_27 10.1007/978-3-319-68711-7_24 10.1007/978-3-642-36742-7_13 10.1017/CBO9780511973031 10.1109/TRO.2011.2172150 10.1109/LICS.2000.855763 10.1287/opre.1060.0367 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
| DOI | 10.1109/TAC.2020.2989268 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1558-2523 |
| EndPage | 1008 |
| ExternalDocumentID | 10_1109_TAC_2020_2989268 9072610 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: ONR grantid: N00014-17-S-B001 – fundername: NSF grantid: CNS-1656981; CNS-1941670 – fundername: Defense Advanced Research Projects Agency grantid: HR00111990015 funderid: 10.13039/100000185 |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 VJK ~02 AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c291t-a3b53ed605371a7c4c77846c374c388ee9271b36d2b39dfcf3d2f7c1528d84ef3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 9 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000623420100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9286 |
| IngestDate | Mon Jun 30 10:21:34 EDT 2025 Tue Nov 18 22:06:00 EST 2025 Sat Nov 29 05:40:59 EST 2025 Wed Aug 27 02:43:55 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c291t-a3b53ed605371a7c4c77846c374c388ee9271b36d2b39dfcf3d2f7c1528d84ef3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-8591-5522 0000-0002-4470-2827 0000-0002-5868-6186 |
| PQID | 2494376758 |
| PQPubID | 85475 |
| PageCount | 14 |
| ParticipantIDs | crossref_citationtrail_10_1109_TAC_2020_2989268 proquest_journals_2494376758 ieee_primary_9072610 crossref_primary_10_1109_TAC_2020_2989268 |
| PublicationCentury | 2000 |
| PublicationDate | 2021-03-01 |
| PublicationDateYYYYMMDD | 2021-03-01 |
| PublicationDate_xml | – month: 03 year: 2021 text: 2021-03-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on automatic control |
| PublicationTitleAbbrev | TAC |
| PublicationYear | 2021 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref57 ref13 michael (ref2) 2013 ref56 ref12 ref15 ref14 ref53 ref55 ref11 ref54 ref10 bertsekas (ref51) 1995; 1 ref17 ref16 ref19 ref18 baier (ref42) 2008 jiang (ref50) 0 henning (ref35) 0 lahijanian (ref33) 0 ref46 ref45 ref48 ref47 ref41 ref44 ref43 vorobeychik (ref52) 0 ref49 ref8 ref7 pavel (ref1) 2017 ref9 ref4 ref6 ref40 ref34 ref36 ref31 ref30 ref32 guo (ref38) 0 ref39 ref24 ref23 ref26 ref25 ricketts (ref3) 0 ref20 ref22 ref21 guo (ref37) 0 ref28 ref27 ref29 zhu (ref5) 0 |
| References_xml | – start-page: 3664 year: 0 ident: ref33 article-title: This time the robot settles for a cost: A quantitative approach to temporal logic planning with partial satisfaction publication-title: Proc 29th AAAI Conf Artif Intell – ident: ref29 doi: 10.1109/ACC.2013.6579837 – ident: ref26 doi: 10.23919/ACC.2018.8431867 – ident: ref8 doi: 10.1109/TAC.2014.2303233 – start-page: 4153 year: 0 ident: ref35 article-title: On the design of penalty structures for minimum-violation LTL motion planning publication-title: Proc Conf Decis Control – ident: ref6 doi: 10.1109/MCS.2014.2364710 – ident: ref11 doi: 10.1109/TAC.2014.2298143 – ident: ref44 doi: 10.1007/3-540-46002-0_30 – ident: ref10 doi: 10.1016/j.automatica.2013.05.025 – ident: ref24 doi: 10.1016/j.jcss.2011.08.007 – start-page: 1478 year: 0 ident: ref52 article-title: Computing Stackelberg equilibria in discounted stochastic games publication-title: Proc 26th AAAI Conf Artif Intell – ident: ref17 doi: 10.1007/978-3-642-22110-1_54 – ident: ref28 doi: 10.1007/978-3-540-78163-9_9 – ident: ref9 doi: 10.1109/TAC.2015.2492159 – ident: ref22 doi: 10.1016/j.artint.2010.07.002 – start-page: 207 year: 0 ident: ref50 article-title: Game-theoretic randomization for security patrolling with dynamic execution uncertainty publication-title: Proc Int Conf Auton Agents Multi-Agent Syst – ident: ref14 doi: 10.1109/ICRA.2016.7487554 – ident: ref30 doi: 10.1109/ICCPS.2016.7479106 – ident: ref12 doi: 10.1109/CDC.2009.5399536 – ident: ref41 doi: 10.1007/978-3-642-19835-9_30 – ident: ref27 doi: 10.1109/CDC40024.2019.9029851 – start-page: 4063 year: 0 ident: ref5 article-title: Stackelberg-game analysis of correlated attacks in cyber-physical systems publication-title: Proc Amer Control Conf – ident: ref31 doi: 10.1109/ICRA.2017.7989177 – ident: ref15 doi: 10.23919/ACC.2018.8431595 – ident: ref48 doi: 10.1017/CBO9780511973031.004 – ident: ref57 doi: 10.1016/j.sorms.2012.08.001 – start-page: 2758 year: 0 ident: ref37 article-title: Reconfiguration in motion planning of single-and multi-agent systems under infeasible local LTL specifications publication-title: Proc Conf Decis Control – ident: ref36 doi: 10.1177/0278364915587034 – year: 2013 ident: ref2 article-title: The Stuxnet attack on Iran's nuclear plant was 'far more dangerous' than previously thought – ident: ref56 doi: 10.1109/CDC.2012.6426174 – ident: ref19 doi: 10.1109/CDC.2018.8619174 – ident: ref49 doi: 10.1016/j.artint.2012.03.003 – start-page: 5025 year: 0 ident: ref38 article-title: Revising motion planning under linear temporal logic specifications in partially known workspaces publication-title: Proc Int Conf Robot Autom – ident: ref21 doi: 10.1111/1467-9280.02431 – volume: 1 year: 1995 ident: ref51 publication-title: Dynamic Programming and Optimal Control – ident: ref18 doi: 10.1109/ICRA.2012.6224807 – ident: ref54 doi: 10.1287/ijoc.1060.0176 – ident: ref32 doi: 10.1109/ACC.2014.6859284 – ident: ref39 doi: 10.1109/ICRA.2014.6907485 – year: 2008 ident: ref42 publication-title: Principles of Model Checking – ident: ref25 doi: 10.1145/2883817.2883842 – ident: ref4 doi: 10.1109/TAC.2017.2676679 – ident: ref40 doi: 10.1016/S0004-3702(99)00039-9 – ident: ref16 doi: 10.1109/TAC.2019.2930039 – ident: ref7 doi: 10.23919/ACC.2018.8431459 – ident: ref43 doi: 10.1023/A:1011254632723 – ident: ref23 doi: 10.1109/TRO.2009.2030225 – ident: ref13 doi: 10.1109/ROBOT.2010.5509503 – ident: ref34 doi: 10.1007/978-3-030-01090-4_27 – ident: ref47 doi: 10.1007/978-3-319-68711-7_24 – ident: ref46 doi: 10.1007/978-3-642-36742-7_13 – ident: ref45 doi: 10.1017/CBO9780511973031 – ident: ref55 doi: 10.1109/TRO.2011.2172150 – year: 2017 ident: ref1 article-title: Ukraine's power outage was a cyber attack: Ukrenergo – ident: ref20 doi: 10.1109/LICS.2000.855763 – year: 0 ident: ref3 article-title: Sheep dip your removable storage devices to reduce the threat of cyber attacks – ident: ref53 doi: 10.1287/opre.1060.0367 |
| SSID | ssj0016441 |
| Score | 2.4375362 |
| Snippet | Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 995 |
| SubjectTerms | Algorithms Approximation algorithms Automata Computational modeling Controllers Convergence Cyber-physical systems Games Mixed integer Optimal control probabilistic logic safety Security Specifications Stochastic processes Strategy Synthesis Temporal logic |
| Title | Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks |
| URI | https://ieeexplore.ieee.org/document/9072610 https://www.proquest.com/docview/2494376758 |
| Volume | 66 |
| WOSCitedRecordID | wos000623420100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2523 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0016441 issn: 0018-9286 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5zeNCDv6Y4nZKDF8G6Lcny4ziGw4tzsCm7lTZ5hYLrZOuE_fcmaVcGiuCthxco-Zq89_W99z2E7kzEIp4oCKRkEDDF4kBFHAKTWHLAjeaka_ywCTEaydlMjWvooeqFAQBffAaP7tHn8s1Cr92vsrYlcjbgtwR9TwhR9GpVGQPn14tb1x5gIquUZEe1p_2BJYKk8-jUxokTVd1xQX6myo-L2HuX4fH_3usEHZVRJO4XsJ-iGmRn6HBHW7CBJq_2Mphbo5c0S-frOX5PF0XdGx4U5el4ssls-LdKV3iR4MEmhmUwLmHDpZI59nORcD_PXS_-OXobPk0Hz0E5QSHQRHXzIKJxj4LhTrSlGwnNtBA24NBUME2lBFBEdGPKDYmpMolOqCGJ0NanS2OxS-gFqmeLDC4RZiLmAExLkBEDGUc80jEVlj1p4Lynmqi93dRQl_LibsrFR-hpRkeFFobQwRCWMDTRfbXis5DW-MO24ba9sit3vIlaW9zC8uytQksomdeokVe_r7pGB8RVpvhKshaq58s13KB9_ZWnq-Wt_6y-AYlDyvg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS-RAEC5EhdWDuj5wfG0f9iJsnEl3Tz-Ow6Ao6qzgrHgLSXcFAk5GZjKC_97uTgyCsuAth2oI_aW76ktVfQXw26Y8FbnGSCmOEdc8i3QqMLK5IwfCGkFjG4ZNyNFIPT7quyX40_bCIGIoPsMz_xhy-XZqFv5XWdcRORfwO4K-0uecxnW3Vpsz8J69vnfdEaaqTUr2dHc8GDoqSHtnXm-celnVD04oTFX5dBUH_3Kx-b0324KNJo4kgxr4n7CE5Tasf1AX3IH7v-46mDij26IsJosJeSimdeUbGdYF6uT-tXQB4LyYk2lOhq8ZzqK7BjjSaJmTMBmJDKrKd-Pvwr-L8_HwMmpmKESG6riKUpb1GVrhZVviVBpupHQhh2GSG6YUoqYyzpiwNGPa5iZnlubSOK-urEMvZ3uwXE5L3AfCZSYQuVGoUo4qS0VqMiYdfzIoRF93oPu-qYlpBMb9nIunJBCNnk4cDImHIWlg6MBpu-K5Ftf4j-2O3_bWrtnxDhy945Y0p2-eOErJg0qNOvh61S_4cTm-vUlurkbXh7BGfZ1KqCs7guVqtsBjWDUvVTGfnYRP7A1Ca84_ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimal+Minimum+Violation+Control+Synthesis+of+Cyber-Physical+Systems+Under+Attacks&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Niu%2C+Luyao&rft.au=Fu%2C+Jie&rft.au=Clark%2C+Andrew&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=66&rft.issue=3&rft.spage=995&rft_id=info:doi/10.1109%2FTAC.2020.2989268&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon |