Papers
Topics
Authors
Recent
Search
2000 character limit reached

Distributed Secret Securing in Discrete-Event Systems

Published 14 Feb 2024 in eess.SY and cs.SY | (2402.08878v1)

Abstract: In this paper, we study a security problem of protecting secrets in distributed systems. Specifically, we employ discrete-event systems to describe the structure and behaviour of distributed systems, in which global secret information is separated into pieces and stored in local component agents. The goal is to prevent such secrets from being exposed to intruders by imposing appropriate protection measures. This problem is formulated as to ensure that at least one piece of every distributed global secret is secured by a required number of protections, while the overall cost to apply protections is minimum. We first characterize the solvability of this security problem by providing a necessary and sufficient condition, and then develop an algorithm to compute a solution based on the supervisory control theory of discrete-event systems. Finally, we illustrate the effectiveness of our solution with an example system comprising distributed databases.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (20)
  1. K. Scarfone, W. Jansen, M. Tracy, et al., “Guide to general server security,” NIST Special Publication, vol. 800, no. 123, 2008.
  2. T. Kulik, B. Dongol, P. G. Larsen, H. D. Macedo, S. Schneider, P. W. V. Tran-Jørgensen, and J. Woodcock, “A survey of practical formal methods for security,” Formal Aspects of Computing, vol. 34, no. 1, pp. 1–39, 2022.
  3. J. W. Bryans, M. Koutny, and P. Y. Ryan, “Modelling opacity using Petri nets,” Electronic Notes in Theoretical Computer Science, vol. 121, pp. 101–115, 2005.
  4. A. Saboori and C. N. Hadjicostis, “Notions of security and opacity in discrete event systems,” in IEEE Conference on Decision and Control, 2007, pp. 5056–5061.
  5. F. Lin, “Opacity of discrete event systems and its applications,” Automatica, vol. 47, no. 3, pp. 496–503, 2011.
  6. J. Balun and T. Masopust, “On verification of weak and strong k-step opacity for discrete-event systems,” IFAC-PapersOnLine, vol. 55, no. 28, pp. 108–113, 2022.
  7. A. Labed, I. Saadaoui, N. Wu, J. Yu, and Z. Li, “Current-state opacity verification in discrete event systems using an observer net,” Scientific Reports, vol. 12, 2022.
  8. X. Han, K. Zhang, J. Zhang, Z. Li, and Z. Chen, “Strong current-state and initial-state opacity of discrete-event systems,” Automatica, vol. 148, 2023.
  9. J. Dubreil, P. Darondeau, and H. Marchand, “Opacity enforcing control synthesis,” in International Workshop on Discrete Event Systems, 2008, pp. 28–35.
  10. A. Saboori and C. N. Hadjicostis, “Opacity-enforcing supervisory strategies via state estimator constructions,” IEEE Transactions on Automatic Control, vol. 57, no. 5, pp. 1155–1165, 2012.
  11. M. Wakaiki, P. Tabuada, and J. P. Hespanha, “Supervisory control of discrete-event systems under attacks,” Dynamic Games and Applications, vol. 9, no. 4, pp. 965–983, 2018.
  12. L. K. Carvalho, Y.-C. Wu, R. Kwong, and S. Lafortune, “Detection and prevention of actuator enablement attacks in supervisory control systems,” in International Workshop on Discrete Event Systems, 2016, pp. 298–305.
  13. A. Paoli and F. Lin, “Decentralized opacity of discrete event systems,” in American Control Conference, 2012, pp. 6083–6088.
  14. B. Wu, J. Dai, and H. Lin, “Synthesis of insertion functions to enforce decentralized and joint opacity properties of discrete-event systems,” in American Control Conference, 2018, pp. 3026–3031.
  15. Y. Tong, K. Cai, and A. Giua, “Decentralized opacity enforcement in discrete event systems using supervisory control,” in Annual Conference of the Society of Instrument and Control Engineers of Japan, 2018, pp. 1053–1058.
  16. Y. Tong and H. Lan, “Current-state opacity verification in modular discrete event systems,” in IEEE Conference on Decision and Control, 2019, pp. 7665–7670.
  17. S. Matsui and K. Cai, “Secret securing with multiple protections and minimum costs,” in IEEE Conference on Decision and Control, 2019, pp. 7635–7640.
  18. S. Matsui and K. Cai, “Usability aware secret protection with minimum cost,” Nonlinear Analysis: Hybrid Systems, vol. 43, 2021.
  19. Z. Ma and K. Cai, “Optimal secret protections in discrete-event systems,” IEEE Transactions on Automatic Control, vol. 67, no. 6, pp. 2816–2828, 2021.
  20. Z. Ma, J. Jiang, and K. Cai, “Secret protections with costs and disruptiveness in discrete-event systems using centralities,” IEEE Transactions on Automatic Control (Early Access), pp. 1–16, 2023.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (3)

Collections

Sign up for free to add this paper to one or more collections.