Enforcing opacity by publicly known edit functions

Yiding Ji, Stephane Lafortune

Research output: Chapter in Book/Conference Proceeding/ReportConference Paper published in a bookpeer-review

18 Citations (Scopus)

Abstract

This paper extends prior work about the enforcement of opacity by insertion functions and applies a more general method called edit functions. Based on its observations, the edit function can insert or erase events to modify the outputs of the system and obfuscate the outside intruder. In this paper, a key assumption is that the intruder knows the implementation of the edit function, which requires the edit function to be 'public-private enforcing'. In order to capture the limitations of edit functions, state based edit constraints are introduced and may preclude some originally feasible edit choices, complicating the enforcement problem. The edit function in this work is deterministic and the enforcement problem is formulated as a two-player game between the edit function and the system. Our goal is to synthesize public-private enforcing edit functions without violating edit constraints. A new synthesis algorithm is proposed based on the game structure.

Original languageEnglish
Title of host publication2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages4866-4871
Number of pages6
ISBN (Electronic)9781509028733
Publication statusPublished - 28 Jun 2017
Externally publishedYes
Event56th IEEE Annual Conference on Decision and Control, CDC 2017 - Melbourne, Australia
Duration: 12 Dec 201715 Dec 2017

Publication series

Name2017 IEEE 56th Annual Conference on Decision and Control, CDC 2017
Volume2018-January

Conference

Conference56th IEEE Annual Conference on Decision and Control, CDC 2017
Country/TerritoryAustralia
CityMelbourne
Period12/12/1715/12/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Fingerprint

Dive into the research topics of 'Enforcing opacity by publicly known edit functions'. Together they form a unique fingerprint.

Cite this