Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks

Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent t...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE transactions on automatic control Ročník 66; číslo 3; s. 995 - 1008
Hlavní autoři: Niu, Luyao, Fu, Jie, Clark, Andrew
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Témata:
ISSN:0018-9286, 1558-2523
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent the system from satisfying the desired specification. In this article, we introduce a control synthesis method to minimize deviations from the desired specification due to adversaries. We consider the scenario where the adversary has limited capability of observing the controller's strategy. We synthesize a minimum violation control strategy for a finite-state stochastic game under cosafe linear temporal logic constraints. We formulate a mixed-integer nonlinear program for computing the optimal controller strategy and present two algorithms. First, we propose an exact algorithm that computes the optimal control strategy with probability one but without guarantees on the convergence rate. Second, we present an approximate algorithm that computes a suboptimal control strategy. The approximate algorithm converges faster compared to the exact algorithm; however, it only returns an optimal solution when the adversary has full observation over the controller's strategy. A numerical case study is presented to evaluate the proposed framework.
AbstractList Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly important roles in various domains, are also subject to malicious attacks initiated by intelligent adversaries. Malicious attacks may prevent the system from satisfying the desired specification. In this article, we introduce a control synthesis method to minimize deviations from the desired specification due to adversaries. We consider the scenario where the adversary has limited capability of observing the controller's strategy. We synthesize a minimum violation control strategy for a finite-state stochastic game under cosafe linear temporal logic constraints. We formulate a mixed-integer nonlinear program for computing the optimal controller strategy and present two algorithms. First, we propose an exact algorithm that computes the optimal control strategy with probability one but without guarantees on the convergence rate. Second, we present an approximate algorithm that computes a suboptimal control strategy. The approximate algorithm converges faster compared to the exact algorithm; however, it only returns an optimal solution when the adversary has full observation over the controller's strategy. A numerical case study is presented to evaluate the proposed framework.
Author Clark, Andrew
Fu, Jie
Niu, Luyao
Author_xml – sequence: 1
  givenname: Luyao
  orcidid: 0000-0001-8591-5522
  surname: Niu
  fullname: Niu, Luyao
  email: lniu@wpi.edu
  organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA
– sequence: 2
  givenname: Jie
  orcidid: 0000-0002-4470-2827
  surname: Fu
  fullname: Fu, Jie
  email: jfu2@wpi.edu
  organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA
– sequence: 3
  givenname: Andrew
  orcidid: 0000-0002-5868-6186
  surname: Clark
  fullname: Clark, Andrew
  email: aclark@wpi.edu
  organization: Department of Electrical and Computer Engineering, Worcester Polytechnic Institute, Worcester, MA, USA
BookMark eNp9kLtrwzAQh0VJoUnavdDF0NmpHrYeYzB9QUoKSboKWZaJUttKJWXwf1-nCR06dDqO-3133DcBo851BoBbBGcIQfGwnhczDDGcYcEFpvwCjFGe8xTnmIzAGELEU4E5vQKTEHZDS7MMjcFquY-2VU3yZjvbHtrkw7pGReu6pHBd9K5JVn0XtybYkLg6KfrS-PR92wer1XEWomlDsukq45N5jEp_hmtwWasmmJtznYLN0-O6eEkXy-fXYr5INRYopoqUOTEVhTlhSDGdacZ4RjVhmSacGyMwQyWhFS6JqGpdkwrXTKMc84pnpiZTcH_au_fu62BClDt38N1wUuJMZIRRlvMhRU8p7V0I3tRS2_jzYfTKNhJBeRQoB4HyKFCeBQ4g_APu_aDK9_8hdyfEGmN-4wIyTBEk399QfVY
CODEN IETAA9
CitedBy_id crossref_primary_10_1016_j_arcontrol_2024_100940
crossref_primary_10_1109_TICPS_2025_3569217
crossref_primary_10_1109_TAC_2021_3138704
crossref_primary_10_1016_j_segan_2021_100535
crossref_primary_10_1109_TAC_2024_3390848
Cites_doi 10.1109/ACC.2013.6579837
10.23919/ACC.2018.8431867
10.1109/TAC.2014.2303233
10.1109/MCS.2014.2364710
10.1109/TAC.2014.2298143
10.1007/3-540-46002-0_30
10.1016/j.automatica.2013.05.025
10.1016/j.jcss.2011.08.007
10.1007/978-3-642-22110-1_54
10.1007/978-3-540-78163-9_9
10.1109/TAC.2015.2492159
10.1016/j.artint.2010.07.002
10.1109/ICRA.2016.7487554
10.1109/ICCPS.2016.7479106
10.1109/CDC.2009.5399536
10.1007/978-3-642-19835-9_30
10.1109/CDC40024.2019.9029851
10.1109/ICRA.2017.7989177
10.23919/ACC.2018.8431595
10.1017/CBO9780511973031.004
10.1016/j.sorms.2012.08.001
10.1177/0278364915587034
10.1109/CDC.2012.6426174
10.1109/CDC.2018.8619174
10.1016/j.artint.2012.03.003
10.1111/1467-9280.02431
10.1109/ICRA.2012.6224807
10.1287/ijoc.1060.0176
10.1109/ACC.2014.6859284
10.1109/ICRA.2014.6907485
10.1145/2883817.2883842
10.1109/TAC.2017.2676679
10.1016/S0004-3702(99)00039-9
10.1109/TAC.2019.2930039
10.23919/ACC.2018.8431459
10.1023/A:1011254632723
10.1109/TRO.2009.2030225
10.1109/ROBOT.2010.5509503
10.1007/978-3-030-01090-4_27
10.1007/978-3-319-68711-7_24
10.1007/978-3-642-36742-7_13
10.1017/CBO9780511973031
10.1109/TRO.2011.2172150
10.1109/LICS.2000.855763
10.1287/opre.1060.0367
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1109/TAC.2020.2989268
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2523
EndPage 1008
ExternalDocumentID 10_1109_TAC_2020_2989268
9072610
Genre orig-research
GrantInformation_xml – fundername: ONR
  grantid: N00014-17-S-B001
– fundername: NSF
  grantid: CNS-1656981; CNS-1941670
– fundername: Defense Advanced Research Projects Agency
  grantid: HR00111990015
  funderid: 10.13039/100000185
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
VJK
~02
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-a3b53ed605371a7c4c77846c374c388ee9271b36d2b39dfcf3d2f7c1528d84ef3
IEDL.DBID RIE
ISICitedReferencesCount 9
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000623420100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9286
IngestDate Mon Jun 30 10:21:34 EDT 2025
Tue Nov 18 22:06:00 EST 2025
Sat Nov 29 05:40:59 EST 2025
Wed Aug 27 02:43:55 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-a3b53ed605371a7c4c77846c374c388ee9271b36d2b39dfcf3d2f7c1528d84ef3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8591-5522
0000-0002-4470-2827
0000-0002-5868-6186
PQID 2494376758
PQPubID 85475
PageCount 14
ParticipantIDs crossref_citationtrail_10_1109_TAC_2020_2989268
proquest_journals_2494376758
ieee_primary_9072610
crossref_primary_10_1109_TAC_2020_2989268
PublicationCentury 2000
PublicationDate 2021-03-01
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 03
  year: 2021
  text: 2021-03-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on automatic control
PublicationTitleAbbrev TAC
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref13
michael (ref2) 2013
ref56
ref12
ref15
ref14
ref53
ref55
ref11
ref54
ref10
bertsekas (ref51) 1995; 1
ref17
ref16
ref19
ref18
baier (ref42) 2008
jiang (ref50) 0
henning (ref35) 0
lahijanian (ref33) 0
ref46
ref45
ref48
ref47
ref41
ref44
ref43
vorobeychik (ref52) 0
ref49
ref8
ref7
pavel (ref1) 2017
ref9
ref4
ref6
ref40
ref34
ref36
ref31
ref30
ref32
guo (ref38) 0
ref39
ref24
ref23
ref26
ref25
ricketts (ref3) 0
ref20
ref22
ref21
guo (ref37) 0
ref28
ref27
ref29
zhu (ref5) 0
References_xml – start-page: 3664
  year: 0
  ident: ref33
  article-title: This time the robot settles for a cost: A quantitative approach to temporal logic planning with partial satisfaction
  publication-title: Proc 29th AAAI Conf Artif Intell
– ident: ref29
  doi: 10.1109/ACC.2013.6579837
– ident: ref26
  doi: 10.23919/ACC.2018.8431867
– ident: ref8
  doi: 10.1109/TAC.2014.2303233
– start-page: 4153
  year: 0
  ident: ref35
  article-title: On the design of penalty structures for minimum-violation LTL motion planning
  publication-title: Proc Conf Decis Control
– ident: ref6
  doi: 10.1109/MCS.2014.2364710
– ident: ref11
  doi: 10.1109/TAC.2014.2298143
– ident: ref44
  doi: 10.1007/3-540-46002-0_30
– ident: ref10
  doi: 10.1016/j.automatica.2013.05.025
– ident: ref24
  doi: 10.1016/j.jcss.2011.08.007
– start-page: 1478
  year: 0
  ident: ref52
  article-title: Computing Stackelberg equilibria in discounted stochastic games
  publication-title: Proc 26th AAAI Conf Artif Intell
– ident: ref17
  doi: 10.1007/978-3-642-22110-1_54
– ident: ref28
  doi: 10.1007/978-3-540-78163-9_9
– ident: ref9
  doi: 10.1109/TAC.2015.2492159
– ident: ref22
  doi: 10.1016/j.artint.2010.07.002
– start-page: 207
  year: 0
  ident: ref50
  article-title: Game-theoretic randomization for security patrolling with dynamic execution uncertainty
  publication-title: Proc Int Conf Auton Agents Multi-Agent Syst
– ident: ref14
  doi: 10.1109/ICRA.2016.7487554
– ident: ref30
  doi: 10.1109/ICCPS.2016.7479106
– ident: ref12
  doi: 10.1109/CDC.2009.5399536
– ident: ref41
  doi: 10.1007/978-3-642-19835-9_30
– ident: ref27
  doi: 10.1109/CDC40024.2019.9029851
– start-page: 4063
  year: 0
  ident: ref5
  article-title: Stackelberg-game analysis of correlated attacks in cyber-physical systems
  publication-title: Proc Amer Control Conf
– ident: ref31
  doi: 10.1109/ICRA.2017.7989177
– ident: ref15
  doi: 10.23919/ACC.2018.8431595
– ident: ref48
  doi: 10.1017/CBO9780511973031.004
– ident: ref57
  doi: 10.1016/j.sorms.2012.08.001
– start-page: 2758
  year: 0
  ident: ref37
  article-title: Reconfiguration in motion planning of single-and multi-agent systems under infeasible local LTL specifications
  publication-title: Proc Conf Decis Control
– ident: ref36
  doi: 10.1177/0278364915587034
– year: 2013
  ident: ref2
  article-title: The Stuxnet attack on Iran's nuclear plant was 'far more dangerous' than previously thought
– ident: ref56
  doi: 10.1109/CDC.2012.6426174
– ident: ref19
  doi: 10.1109/CDC.2018.8619174
– ident: ref49
  doi: 10.1016/j.artint.2012.03.003
– start-page: 5025
  year: 0
  ident: ref38
  article-title: Revising motion planning under linear temporal logic specifications in partially known workspaces
  publication-title: Proc Int Conf Robot Autom
– ident: ref21
  doi: 10.1111/1467-9280.02431
– volume: 1
  year: 1995
  ident: ref51
  publication-title: Dynamic Programming and Optimal Control
– ident: ref18
  doi: 10.1109/ICRA.2012.6224807
– ident: ref54
  doi: 10.1287/ijoc.1060.0176
– ident: ref32
  doi: 10.1109/ACC.2014.6859284
– ident: ref39
  doi: 10.1109/ICRA.2014.6907485
– year: 2008
  ident: ref42
  publication-title: Principles of Model Checking
– ident: ref25
  doi: 10.1145/2883817.2883842
– ident: ref4
  doi: 10.1109/TAC.2017.2676679
– ident: ref40
  doi: 10.1016/S0004-3702(99)00039-9
– ident: ref16
  doi: 10.1109/TAC.2019.2930039
– ident: ref7
  doi: 10.23919/ACC.2018.8431459
– ident: ref43
  doi: 10.1023/A:1011254632723
– ident: ref23
  doi: 10.1109/TRO.2009.2030225
– ident: ref13
  doi: 10.1109/ROBOT.2010.5509503
– ident: ref34
  doi: 10.1007/978-3-030-01090-4_27
– ident: ref47
  doi: 10.1007/978-3-319-68711-7_24
– ident: ref46
  doi: 10.1007/978-3-642-36742-7_13
– ident: ref45
  doi: 10.1017/CBO9780511973031
– ident: ref55
  doi: 10.1109/TRO.2011.2172150
– year: 2017
  ident: ref1
  article-title: Ukraine's power outage was a cyber attack: Ukrenergo
– ident: ref20
  doi: 10.1109/LICS.2000.855763
– year: 0
  ident: ref3
  article-title: Sheep dip your removable storage devices to reduce the threat of cyber attacks
– ident: ref53
  doi: 10.1287/opre.1060.0367
SSID ssj0016441
Score 2.4375362
Snippet Temporal logic provides a rigorous and expressive way to model specifications for cyber-physical systems (CPS). Such systems, which are playing increasingly...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 995
SubjectTerms Algorithms
Approximation algorithms
Automata
Computational modeling
Controllers
Convergence
Cyber-physical systems
Games
Mixed integer
Optimal control
probabilistic logic
safety
Security
Specifications
Stochastic processes
Strategy
Synthesis
Temporal logic
Title Optimal Minimum Violation Control Synthesis of Cyber-Physical Systems Under Attacks
URI https://ieeexplore.ieee.org/document/9072610
https://www.proquest.com/docview/2494376758
Volume 66
WOSCitedRecordID wos000623420100004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-2523
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0016441
  issn: 0018-9286
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA5zeNCDv6Y4nZKDF8G6Lcny4ziGw4tzsCm7lTZ5hYLrZOuE_fcmaVcGiuCthxco-Zq89_W99z2E7kzEIp4oCKRkEDDF4kBFHAKTWHLAjeaka_ywCTEaydlMjWvooeqFAQBffAaP7tHn8s1Cr92vsrYlcjbgtwR9TwhR9GpVGQPn14tb1x5gIquUZEe1p_2BJYKk8-jUxokTVd1xQX6myo-L2HuX4fH_3usEHZVRJO4XsJ-iGmRn6HBHW7CBJq_2Mphbo5c0S-frOX5PF0XdGx4U5el4ssls-LdKV3iR4MEmhmUwLmHDpZI59nORcD_PXS_-OXobPk0Hz0E5QSHQRHXzIKJxj4LhTrSlGwnNtBA24NBUME2lBFBEdGPKDYmpMolOqCGJ0NanS2OxS-gFqmeLDC4RZiLmAExLkBEDGUc80jEVlj1p4Lynmqi93dRQl_LibsrFR-hpRkeFFobQwRCWMDTRfbXis5DW-MO24ba9sit3vIlaW9zC8uytQksomdeokVe_r7pGB8RVpvhKshaq58s13KB9_ZWnq-Wt_6y-AYlDyvg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS-RAEC5EhdWDuj5wfG0f9iJsnEl3Tz-Ow6Ao6qzgrHgLSXcFAk5GZjKC_97uTgyCsuAth2oI_aW76ktVfQXw26Y8FbnGSCmOEdc8i3QqMLK5IwfCGkFjG4ZNyNFIPT7quyX40_bCIGIoPsMz_xhy-XZqFv5XWdcRORfwO4K-0uecxnW3Vpsz8J69vnfdEaaqTUr2dHc8GDoqSHtnXm-celnVD04oTFX5dBUH_3Kx-b0324KNJo4kgxr4n7CE5Tasf1AX3IH7v-46mDij26IsJosJeSimdeUbGdYF6uT-tXQB4LyYk2lOhq8ZzqK7BjjSaJmTMBmJDKrKd-Pvwr-L8_HwMmpmKESG6riKUpb1GVrhZVviVBpupHQhh2GSG6YUoqYyzpiwNGPa5iZnlubSOK-urEMvZ3uwXE5L3AfCZSYQuVGoUo4qS0VqMiYdfzIoRF93oPu-qYlpBMb9nIunJBCNnk4cDImHIWlg6MBpu-K5Ftf4j-2O3_bWrtnxDhy945Y0p2-eOErJg0qNOvh61S_4cTm-vUlurkbXh7BGfZ1KqCs7guVqtsBjWDUvVTGfnYRP7A1Ca84_
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Optimal+Minimum+Violation+Control+Synthesis+of+Cyber-Physical+Systems+Under+Attacks&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Niu%2C+Luyao&rft.au=Fu%2C+Jie&rft.au=Clark%2C+Andrew&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=66&rft.issue=3&rft.spage=995&rft_id=info:doi/10.1109%2FTAC.2020.2989268&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon