• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks

    2024-01-27 06:49:04DanYouandShouguangWangSenior
    IEEE/CAA Journal of Automatica Sinica 2024年1期

    Dan You ,,, and Shouguang Wang , Senior,

    Abstract—In this paper, we study the supervisory control problem of discrete event systems assuming that cyber-attacks might occur.In particular, we focus on the problem of liveness enforcement and consider a sensor-reading modification attack(SM-attack) that may disguise the occurrence of an event as that of another event by intruding sensor communication channels.To solve the problem, we introduce non-deterministic supervisors in the paper, which associate to every observed sequence a set of possible control actions offline and choose a control action from the set randomly online to control the system.Specifically, given a bounded Petri net (PN) as the reference formalism and an SMattack, an algorithm that synthesizes a liveness-enforcing nondeterministic supervisor tolerant to the SM-attack is proposed for the first time.

    I.INTRODUCTION

    Acyber-physical system (CPS) integrates computing and communication to monitor and control physical processes [1].The use of communication networks not only endows the physical components of CPS with information processing and communication capabilities, but also increases the vulnerability of CPS to cyber-attacks [2].The supervisory control of CPS under cyber-attacks has been receiving more and more attentions, especially in the area of discrete event systems (DESs).By modeling a CPS as a DES, the existing studies dealing with attack issues can be classified into three categories, namely, attack strategy design [3]-[5], attack detection and defense [6]-[10], and robust/tolerant supervisor design [3], [11]-[19].In this work, we investigate the design of robust/tolerant supervisors in the sense that a given control specification can be satisfied by such a supervisor despite the existence of attacks.

    Much attention has been paid to the robust/tolerant supervisor design in the literature.Wakaikiet al.[11] design a supervisor robust against the so-called replacement-removal attacks in the sensor channels.In more detail, the attacker may erase an event produced by the plant or replace it with another one by tampering with sensor-readings in related sensor channels.Essentially, their work is similar to the work dealing with the supervisory control of DES with nondeterministic observations [13]-[15].The conditions under which a supervisor exists exactly enforcing a given control specification are provided in [13], [14], while a supervisor synthesis method is given in [15] using a model transformation technique.Su [3]considers sensor deception attacks as well but requires attacks to be stealthy, which means that the supervisor cannot be aware of the existence of attacks.Specifically, the attacker may replace an observable event generated by the plant with a bounded sequence of observable events.From the viewpoint of an attacker, the supremal stealthy attack strategy is computed first and then a supervisor robust against the attack is synthesized from the viewpoint of a system defender.Meira-Góeset al.[12] investigate the synthesis of supervisors robust to parameterized sensor deception attacks.In addition to sensor deception attacks, actuator deception attacks are taken into account in [16]-[18].

    The above studies basically consider language or state specifications.In contrast, the liveness-enforcing control specification has received little attention in the presence of attacks.Liveness is a property characterizing a specific dynamic behavior of a system.How to enforce liveness has been widely studied in different problem settings [20]-[23].Nevertheless, to our best knowledge, [19] is the only work dealing with the liveness-enforcing problem under attacks.In [19], the problem is investigated based on bounded Petri net (PN) systems [24], [25] and sensor-reading modification attacks (SMattacks) are considered, which are a particular class of the replacement-removal attacks in [11].In the scenario of SMattacks, an intruder has the ability to disguise the occurrence of some transitions as that of other transitions by modifying sensor-readings in vulnerable sensor channels.An algorithm that synthesizes a liveness-enforcing supervisor tolerant to SM-attacks is provided in [19].Unfortunately, the supervisor is not guaranteed to be maximally permissive.How to get a maximally permissive liveness-enforcing supervisor tolerant to an SM-attack remains an open issue.

    We note that the supervisor in [19] refers to a deterministic supervisor, which means that the supervisor associates every observed sequence with a unique control action.In contrast to deterministic supervisors, there are non-deterministic supervisors.In simple words, a non-deterministic supervisor associates every observed sequence with a set of possible control actions.Which one is chosen to control the system is determined randomly online.Non-deterministic supervisors are first proposed to tackle the standard supervisory control problem under partial observation [26], [27].Compared with using deterministic supervisors, the main advantages of using them include that 1) The complexity of synthesizing a supervisor is reduced from being exponential to polynomial; and 2) More control specifications can be realized such as temporal logic CTL* [28] andμ-calculus [29].Moreover, in the setting of the non-deterministic plant and non-deterministic control specification, non-deterministic supervisors are capable of solving a(bi)similarity control problem [29]-[33].Recently, they are also used to solve an opacity enforcing problem [34].

    In this paper, we design non-deterministic supervisors to enforce the property of liveness on DES under SM-attacks.As far as we know, the liveness-enforcing problem under attacks has never been solved by using non-deterministic supervisors.Indeed, in the scenario of SM-attacks, it could happen that an observation does not explicitly reflect real information.For example, in the case that an SM-attack may disguise the firing of transitiont1as the firing of transitiont2, when we observet2, we are not sure which transition fires producing the observationt2ift1andt2are both enabled.It is the vague information that makes the liveness-enforcing problem under SM-attacks very complex.The use of a non-deterministic supervisor can exactly eliminate the vague situation and keep more possible behavior of the controlled system.In the above example, a non-deterministic supervisor may give two possible control actions, namely, disablingt1ort2.No matter which one is chosen online to control the system, we know with certainty which transition fires producing the observationt2.Following this basic idea, we develop an algorithm in the paper,which synthesizes a liveness-enforcing non-deterministic supervisor tolerant to an SM-attack.We may see that, compared with the current methods that synthesize a deterministic supervisor, the proposed method enjoys lower computational complexity in synthesizing a non-deterministic one.Note that as in [19] PNs are used as a modeling tool to solve the problem in this paper and only bounded PN systems are considered.

    The remainder of the paper is organized as follows.Section II reviews the basic notions involved in the paper.Section III formulates the problem to be addressed in the paper.How to synthesize a non-deterministic liveness-enforcing supervisor tolerant to SM-attacks is answered in Section IV.Discussion on the proposed method is provided in Section V.Section VI concludes this paper and indicates future work.

    II.PRELIMINARIES

    A. Petri Nets

    A reachability graph (RG) of a PN system (N,m0) is a directed graph describing the system evolution.Specifically,each node of the RG corresponds to a reachable markingm∈R(N,m0) and each arc is labelled by a transitiont∈T.Specifically, there exists an arc labelled by transitiontfrom a node representing markingm1to a node representing markingm2in the RG if and only if it holds thatm1[t〉m2.

    B. Deterministic and Non-Deterministic Supervisors

    Given a PN system (N,m0), we useLo(N,m0) to denote the set of all possible observed sequences of the system and use Δ =2Tto denote the set of all control actions, each of which refers to a set of transitions to be disabled, or equivalently, whose firing should be forbidden.

    A deterministic supervisor of a PN system (N,m0) isμ:Lo(N,m0)→Δ, associating to every observed sequence a control action.A non-deterministic supervisor of a PN system (N,m0) isμ:Lo(N,m0)→2Δ, associating to every observed sequence a set of control actions.It is worth noting that only one control action is chosen among the set to control the PN system during its evolution and it is chosen online non-deterministically.

    Given a PN system (N,m0) and a supervisorμ, we denote the system under the control ofμas (N,m0)|μand the set of reachable markings of (N,m0)|μasR(N,m0)|μ.

    A supervisorμis said to beliveness-enforcingfor a PN system (N,m0) if the controlled system (N,m0)|μis live, i.e.,?t∈T, ?m∈R(N,m0)|μ, ?m'∈R(N,m)|μ, s.t.m'[μt〉, wherem'[μt〉 denotes thattcan fire at markingm'under the control ofμ.

    C. SM-Attacks

    We define an SM-attack as a mappingO:T→2T.

    The setO(t) enumerates all the possible observations whentoccurs due to the existence of the SM-attack.

    Example 1: Consider a bounded PN (N,m0) with the set of transitionsT= {t1,t2,t3} and an SM-attackOsuch thatO=[O(t1),O(t2),O(t3)]T= [{t1}, {t2,t3}, {t3}]T.We can see that,due to the existence of the SM-attack, the occurrence oft2might produce the observationt2ort3.In other words, the occurrence oft2is possibly disguised as the occurrence oft3.As fort1andt3, their observations can never be changed.

    We may generalize the notationO(·) to a sequence of transitionsσ=t1t2…tk∈T*such thatO(σ) =O(t1)O(t2)…O(tk).Note that given two setsAandB, it is defined thatAB= {ab|a∈A,b∈B}.Then, given a PN system (N,m0) and an SM-attackO, we have

    III.PROBLEM STATEMENT

    The problem that we plan to address in the paper is formulated as follows.

    Problem 1: Given a bounded PN system (N,m0) and an SMattackO, design a liveness-enforcing supervisor tolerant toO.

    “Tolerant” means that the supervisor is liveness-enforcing even in the presence of an SM-attack.The problem has been investigated in [19], where the solution is a deterministic supervisor that is not guaranteed to be maximally permissive.In this work, we intend to solve the problem by designing a supervisor that is allowed to be non-deterministic.

    IV.NON-DETERMINISTIC CONTROL

    In this section, we first introduce a so-called supervisor graph that represents a supervisor in this paper and then provide an algorithm that synthesizes a non-deterministic supervisor for solving Problem 1.

    A. Supervisor Graph

    A structure called a supervisor graph is formally defined in[19] to describe a deterministic supervisor intuitively.We still use it in this paper but with some modification such that it can describe a non-deterministic supervisor as well.In simple words, a supervisor graph is now a directed graph where a node is assigned to be an initial node, each arc is labelled by a transition and each node is associated with a set of control actions.Note that we simply writeμ(x) to represent the set of control actions associated with a nodex.Indeed, for all observed sequences leading from the initial node to nodexin a supervisor graph, they are associated with the same set of control actions, i.e.,μ(x).

    Example 2: Fig.1 shows a supervisor graph with an initial nodex0.It tells that 1) for any observed sequence leading from initial nodex0to nodex1, the set of control actions is{{t2}, {t3}}, which means that it is chosen non-deterministically online to disablet2ort3; 2) for any observed sequence leading fromx0tox3,t1should be disabled; and 3) for any observed sequence leading fromx0to nodex0orx2, no transition should be disabled.To be intuitive, nodes with a nonempty set of control actions are colored in grey.

    In the remainder of the paper, we omit writingμ(x) = ? for every nodexin a supervisor graph to save space.Besides, a node in a supervisor graph basically corresponds to a set of markings.Thus, for the sake of simplicity, we may name a node by its corresponding marking set if there is no ambiguity.

    Fig.1.Supervisor graph.

    Example 3: Consider a PN system (N,m0) in Fig.2(a).Its RGGrshown in Fig.2(b) can be viewed as a supervisor graph of (N,m0).It tells that whatever we observe, we do not disable any transition.Also, graphGlin Fig.3 is a supervisor graph of (N,m0).It indicates that 1) When we observe a sequence (e.g.,t2) leading to node {m1}, we should disablet2;2) When we observe a sequence (e.g.,t2t3) leading to node{m3}, we should disablet4; and 3) When we observe a sequence (e.g.,t3) leading to other nodes, we do not disable any transition.Trivially,Glrepresents a deterministic supervisor since no node is associated with a set containing two or more control actions.

    Fig.2.Case study.(a) PN system (N, m0) modelled for chemical reactions;(b) Its RG Gr.

    Fig.3.Maximally permissive liveness-enforcing deterministic supervisor Gl of the PN system (N, m0) in Fig.2(a) under no attack.

    G'inG, we say thatG'is accessible fromx(or equivalently,xcan accessG') if there exists a nodex'inG'accessible fromx.Note thatxandx'can be the same node and we can see that if a node can access an SCC, the node can access every node in this SCC.Moreover, given a nodexin a supervisor graph, we may use?xto denote the set of input nodes ofxandx?to denote the set of output nodes ofx.A nodexis said to be a sink node if it has no output node, i.e.,x?= ?.An SCCG'is said to be a sink SCC if no node outsideG'is accessible from a node inG'.

    B. Proposed Algorithm

    In this subsection, we propose an algorithm to solve Problem 1.To this end, we introduce the following concepts.

    Definition 1: Given a setT'?Tof transitions and an SMattackO, we say that Π ? 2T'is a feasible partition onT'w.r.t.Oif

    1) ∪π∈Ππ =T';

    2) ?π ∈ Π, |π| ≥ 1; and

    3) ?π ∈ Π, (|π| = 1)∨(?t1,t2∈ π,O(t1)∩O(t2) = ?).

    In Definition 1, condition 1) means that the union of all sets in Π is equal to the setT'; condition 2) requires that every set in Π contains at least one transition; and condition 3) indicates that for every set in Π, either it contains only one transition or no two transitions in it have the same observation.

    Definition 2: Given a setT'?Tof transitions and an SMattackO, a feasible partition Π ? 2T'is said to be optimal if for any other feasible partition Π' ? 2T', it holds that ?π ∈ Π,?π' ∈ Π', π ? π'.

    In simple words, when we compute a feasible partition on a set of transitions, we actually divide the set of transitions into several groups such that any two transitions in a group do not have the same observation.The optimality of a feasible partition indicates that no more transition can be added to any group such that the partition remains to be feasible.

    We next present a function namedOptimalFeasiblePartition(i.e., Function 1), by which the optimal feasible partition is derived.Note that, given a transitiont∈Tand an SM-attackO, we denoteTe(t) = {t'∈T{t}|O(t)∩O(t') ≠ ?}, namely,T(t)consists of all transitions who possibly produce the same observation astdue to the SM-attackO.

    Function 1 Π := OptimalFeasiblePartition (T', O)Input: A set T' ? T of transitions and an SM-attack O;Output: Π ? 2T'.1) Π := {T'};2) for t ∈ T' do 3) for π ∈ Π do images/BZ_246_510_2766_532_2799.pngT(t)4) if t ∈ π ∧ ∩π ≠ ? then images/BZ_246_503_2817_525_2850.pngT(t)5) π1 := π and π2: = π{t};6) Π := Π{π}∪{π1, π2};7) end if 8) end for 9) end for 10) output: Π.

    Result 1: Given a set of transitionsT'?Tand an SM-attackO, Π :=OptimalFeasiblePartition(T',O) is the optimal feasible partition onT'w.r.t.O.

    Proof: By contradiction, suppose that Π is not the optimal feasible partition.It means that there exists a feasible partition Π' such that ?π ∈ Π, ?π' ∈ Π', π ? π'.Lett∈ π'π.By functionOptimalFeasiblePartition, ?t'∈ π, s.t.t∈Te(t′) since otherwisetis a transition in π.Hence, we can see that ?t,t'∈π', s.t.,t∈Te(t′), which contradicts that Π' is a feasible partition.As a result, Π is the optimal feasible partition onT'w.r.t.O.■

    Algorithm 1 Supervisor Synthesizer Input: A bounded PN system (N, m0) and an SM-attack O.Output: A supervisor graph G#.1) Gl := MaxLiveEnforceSupervisor (N, m0); /*See Function 2.MaxLiveEnforceSupervisor returns a maximally permissive liveness-enforcing deterministic supervisor of (N, m0) under no attack [19] */2) for each node x in Gl do 3) if x is a confusing node w.r.t.O then TGl out(x)4) Π := OptimalFeasiblePartition ( , O);μ(x):=∪π∈Π{(TGlout(x)π)∪μ(x)}5) ;6) end if TGl 7) for each t ∈ do 8) for t' ∈ O(t){t} do 9) add an arc labelled by t'|t from x to x', where x' is a node reached from node x via an arc labelled by t;10) end for 11) end for 12) end for 13) denote the final graph as G#;14) output: G#.out(x)

    Function 2 Gl = MaxLiveEnforceSupervisor (N, m0)Input: A bounded PN system (N, m0) with N = (P, T, F);Output: A maximally permissive liveness-enforcing deterministic supervisor Gl.

    1) compute the RG Gr of (N, m0);2) Φ := Tarjan(Gr); /*Tarjan [35] here returns the set of SCCs excluding those that are exactly a single node in Gr */?3) Φ# := {α ∈ Φ| T La(α)};4) Gl := Gr;5) while there exists a sink node x or a sink SCC α ∈ Φ# in Gl do 6) if there exists a sink node x in Gl then 7) for each x' ∈ ?x do 8) μ(x') := μ(x')∪T', where T' denotes the set of transitions labeling the arcs from x' to x;9) end for 10) update Gl by deleting x and its related arcs;11) end if 12) if there exists a sink SCC α ∈ Φ# in Gl then 13) for each x' ∈ ?xα, where xα is a node in α and x' is a node outside α do 14) μ(x'): = μ(x')∪T', where T' denotes the set of transitions labeling the arcs from x' to xα;15) end for 16) update Gl by deleting α and its related arcs;17) end if 18) end while 19) output: Gl.

    t

    Example 5: Continue to consider Example 4.Suppose that the maximally permissive liveness-enforcing deterministic supervisorGlof the PN system (N,m0) under no attack is computed and there is a nodexinGlsuch that(x) =T'={t1-t5} andμ(x) = {{t6}}.To be intuitive, we consider a case as depicted in Fig.4(a) where only the subgraph ofGlthat consists of nodextogether with its output arcs and nodes is shown.Clearly,xis a confusing node.Let us see how Algorithm 1 works regardingx.First, we compute the optimal feasible partition Π on(x) w.r.t.O, which has been derived in Example 4.Next, it is computed thatμ(x) ={{t2,t3,t6}, {t1,t4,t6}, {t1,t3,t6}}.Finally, we add output arcs to nodex, which results in the subgraph in Fig.4(b).This subgraph tells that a control action at nodexis chosen non-deterministically among{t2,t3,t6}, {t1,t4,t6} and {t1,t3,t6}.Consider as an example that {t2,t3,t6} is chosen as the control action and thent6is observed.By Procedure 1, we should select the arc with labelt6|t1, which means that it is the firing oft1that produces the observationt6, and thus we reach nodex1to determine the next control action.

    Given a bounded PN system (N,m0), an SM-attackO, and a supervisorG#computed by Algorithm 1, we have the following result.

    Fig.4.Illustrative example: (a) A subgraph of Gl-; (b) A subgraph of G#computed by Algorithm 1.

    Lemma 1: Letxandx'be two nodes inG#corresponding to markingsmandm', respectively.It holds thatm'∈R(N,m)|G#if there exists a path from nodexto nodex'inG#.

    Proof: Without loss of generality, we assume that the path from nodexto nodex'inG#is

    Theorem 1: Given a bounded PN system (N,m0) and an SM-attackO,G#computed by Algorithm 1 is a livenessenforcing supervisor tolerant toOifG#≠ ?.

    Proof: The proof consists of two parts, namely, 1)G#is a feasible supervisor under attackOin the sense thatG#associates every observed sequence a set of control actions; and 2)G#is liveness-enforcing.

    1) Algorithm 1 first computes a liveness-enforcing deterministic supervisorGlunder no attack.It means thatGlassociates to every observed sequence, which is also the really occurred sequence, a control action.Structurally,G#is a resultant graph by adding more arcs toGl.Since arcs are added in detail as Steps 7-11 of Algorithm 1 for every node inGl, all the possible observations and their corresponding really fired transitions in the presence of attackOare provided inG#.Moreover, at every confusing nodexinGl(i.e., ?t1,t2∈(x), s.t.O(t1)∩O(t2) ≠ ?), we updateμ(x), the set of control actions.Sinceμ(x) is computed based on the optimal feasible partition on(x) w.r.t.O, whatever control action is chosen fromμ(x), we know with certainty which transition actually fires when getting an observation.In other words,when we observe a transition atx, we can find one and only one arc that leads from the node to the next node by Procedure 1.Thus, for every observed sequence, it corresponds to one and only one set of control actions inG#.As a result,G#is a feasible supervisor under attackO.

    2) For the sake of simplicity, we say that an SCCG'in a supervisor graph is complete if its arc labels cover all transitions of the considered PN, i.e.,T?La(G').Now, we start the proof as follows.

    SinceGlis a liveness-enforcing deterministic supervisor under no attack, we have ?t∈T, ?m∈R(N,m0)|Gl, ?m'∈R(N,m)|Gl, s.t.m'[Glt〉.Moreover, every node inGlcan access a complete SCC since (N,m0) is a bounded system.Structurally, every node inG#can also access a complete SCC sinceG#is a resultant graph by adding more arcs toGl.

    Letxbe a node inG#corresponding to a markingm.Clearly, there exists a path inG#from the initial nodex0tox.Thus, we havem∈R(N,m0)|G#due to Lemma 1.Also,xcan access a complete SCC.Hence, for eacht∈T, there exists a nodex'with a markingm'in the complete SCC such thatm'∈R(N,m)|G#and ?Tdis∈μ(x'), s.t.t?Tdis, i.e.,tcan fire atm'.Trivially, all the markings inG#constitute the setR(N,m0)|G#.As a result, we can see that

    Therefore,G#is liveness-enforcing.■

    C. Case Study

    In this subsection, we provide a case study where the proposed method is applied.This case study is originally presented in [19].

    An automatic control system is designed for playing a game on chemical reactions, where chemical (1)-(5) are involved.

    Suppose that NaOH, HCl, HNO3and H2O are sufficiently provided and the chemical transformation among Na2CO3,CO2, and NaHCO3is the focus of the game.Consequently, the chemical reactions can be modelled by the PN system in Fig.2(a), wherep1-p3represent NaHCO3, Na2CO3and CO2,respectively, andt1-t5represent the chemical reactions(1)-(5), respectively.To be intuitive, the meanings of places and the needed substances triggering chemical transformation are annotated.Placep1contains two tokens in the initial marking, which models the initial condition that two copies of NaHCO3are provided.The control specification on the system requires that any of the five chemical (1)-(5) can always be performed after finite times of other chemical reactions.This corresponds to the liveness specification on the PN system in Fig.2(a).

    The supervisor in the closed-loop control system observes the occurrence of chemical reactions by receiving signals from sensors and gives control actions based on observations.The supervisor communicates with sensors/actuators via communication networks, which makes the system possibly suffer from the intrusion of malicious agents.Suppose that we have the prior knowledge that the sensor signals produced by the chemical (2) are prone to be disguised as the sensor signals produced by the chemical (3) in related sensor communication channels by an intruder.Then, we can see that the system is vulnerable to the SM-attackO= [O(t1),O(t2),O(t3),O(t4),O(t5)]T= [{t1},{t2,t3},{t3}, {t4}, {t5}]T.In other words, the SM-attack may disguise the occurrence oft2as the occurrence oft3.

    Now, we compute a liveness-enforcing supervisor tolerant to the SM-attack for the PN system in Fig.2(a) by Algorithm 1.First, we compute a maximally permissive liveness-enforcing deterministic supervisorGlof (N,m0) under no attack, which is shown in Fig.3.Next, we update the set of control actions at every confusing node inGland add more arcs toGl.There are two confusing nodes, i.e., {m0} and {m2}.Consider node{m0}.The optimal feasible partition on({m0}) w.r.t.Ois Π= {{t2,t5},{t3,t5}} and thus we haveμ({m0}) = {{t3}, {t2}}.Then, we add an arc labelled byt3|t2from node {m0} to node{m1}.Similarly, for node {m2}, we haveμ({m2}) = {{t3},{t2}} and add an arc labelled byt3|t2from node {m2} to node{m3}.Since no more arcs should be added, we obtain the final supervisorG#as shown in Fig.5.It is a liveness-enforcing non-deterministic supervisor for the PN system in Fig.2(a) tolerant toO.

    Fig.5.Supervisor G# computed by Algorithm 1 in the case study.

    V.DISCUSSION

    We can see that a non-deterministic supervisor, if associating to every observed sequence a set with only one control action, is essentially a deterministic supervisor; while in other cases, a non-deterministic supervisor can be viewed as the combination of multiple or even countless deterministic supervisors.The online execution of a non-deterministic supervisor is indeed also a procedure of determining a deterministic supervisor that is used to control the system since a control action is fixed online every time a sequence is observed.

    Consider the non-deterministic supervisor in Fig.5.It can be viewed as the combination of countless deterministic supervisors.In particular, there are two choices at node {m0}and {m2}, namely, disablingt2ort3.In the case that we always disablet2at node {m0} and disablet3at node {m2}, we may extract a deterministic supervisor, as shown in Fig.6,from the non-deterministic supervisor.The supervisor in Fig.6 is indeed a maximally permissive liveness-enforcing deterministic supervisor tolerant to the SM-attackOin the case study.Note that a liveness-enforcing deterministic supervisor is also computed by the method in [19] for the case study,which is shown in Fig.7.We can see that the supervisor in Fig.7 is more restrictive than the one in Fig.6, i.e., it is not maximally permissive.For example, sequencet3t5is allowed to fire by the supervisor in Fig.6, while it is not allowed to fire by the supervisor in Fig.7.On the contrary, sequences that are allowed to fire by the supervisor in Fig.7 are all allowed to fire by the supervisor in Fig.6.

    Fig.6.Maximally permissive liveness-enforcing deterministic supervisor tolerant to the SM-attack O in the case study.

    Fig.7.Liveness-enforcing deterministic supervisor tolerant to the SMattack O in the case study computed by the method in [19].

    We finally compare the computational complexity of the proposed method and the one in [19] in finding a solution to Problem 1.We observe that both methods start from constructing a maximally permissive liveness-enforcing deterministic supervisorGlunder no attack.This step determines the exponential complexity of both methods with respect to the size of the considered PN system since the RG has to be computed.We then focus on their remaining steps for comparison in what follows.Consider the proposed method.In the worst case, it updates once the set of control actions at every node ofGland handles every arc ofGlonce.Suppose thatGlcontainsanodes and arcs in total.Then, the complexity of the proposed method isO(a) in getting a solution.In other words, the proposed method is of polynomial complexity with respect to the net size ofGl.Consider the method in [19].It has to repeatedly compute a so-called basic supervisor, which is of exponential complexity with respect to the net size ofGl[19].Consequently, we may conclude that the proposed method has lower computational complexity than the method in [19] in synthesizing a supervisor.In particular, when a maximally permissive liveness-enforcing deterministic supervisorGlunder no attack is given, the complexity of getting a solution is reduced from the exponential one to the polynomial one by using the proposed method.We note that the only additional cost of using non-deterministic supervisors lies in choosing a control action randomly online.Fortunately, such computation is actually negligible.

    VI.CONCLUSIONS AND FUTURE WORK

    In this paper, we consider the use of non-deterministic control mechanisms to solve the liveness-enforcing problem in the presence of cyber-attacks.Specifically, for a bounded Petri net system vulnerable to a sensor-reading modification attack(SM-attack), an algorithm is proposed that synthesizes an SMattack-tolerant liveness-enforcing supervisor that is allowed to be non-deterministic.Compared with the method in [19] synthesizing a liveness-enforcing deterministic supervisor tolerant to an SM-attack, the proposed method is simpler in computational complexity.In our future work, we may consider the improvement of the proposed method so that the resulting supervisor is more permissive.Its extension to unbounded Petri nets [36]-[38] remains open.

    另类精品久久| 亚洲一卡2卡3卡4卡5卡精品中文| 91精品伊人久久大香线蕉| 国产av精品麻豆| 亚洲精品一二三| 91国产中文字幕| 久久人人爽人人片av| 男女午夜视频在线观看| 9热在线视频观看99| 国产av码专区亚洲av| 国产精品女同一区二区软件| 成人三级做爰电影| 午夜福利网站1000一区二区三区| 夫妻午夜视频| 国产麻豆69| 亚洲av福利一区| 成人影院久久| 中文字幕人妻熟女乱码| 色吧在线观看| 男女边吃奶边做爰视频| 日本av手机在线免费观看| netflix在线观看网站| 中文乱码字字幕精品一区二区三区| 看免费av毛片| 久久ye,这里只有精品| 在线观看免费高清a一片| 亚洲精品日本国产第一区| 天美传媒精品一区二区| 中国国产av一级| 中文字幕人妻丝袜制服| 少妇精品久久久久久久| 巨乳人妻的诱惑在线观看| 日韩 欧美 亚洲 中文字幕| 国产欧美日韩一区二区三区在线| 麻豆精品久久久久久蜜桃| 欧美成人午夜精品| 久久国产亚洲av麻豆专区| 欧美黑人精品巨大| 女人被躁到高潮嗷嗷叫费观| 一级黄片播放器| www.自偷自拍.com| 日韩电影二区| 久久精品国产亚洲av涩爱| 免费女性裸体啪啪无遮挡网站| 又大又爽又粗| 人人妻人人澡人人看| 大码成人一级视频| 黄片播放在线免费| 亚洲精品国产av成人精品| 亚洲欧美激情在线| 国产日韩欧美亚洲二区| 久久亚洲国产成人精品v| 欧美日韩一区二区视频在线观看视频在线| 亚洲一码二码三码区别大吗| 精品久久蜜臀av无| 水蜜桃什么品种好| 久久精品久久久久久久性| 国产伦理片在线播放av一区| 哪个播放器可以免费观看大片| 两个人看的免费小视频| 蜜桃国产av成人99| 精品酒店卫生间| 欧美人与性动交α欧美精品济南到| av天堂久久9| 精品少妇一区二区三区视频日本电影 | 久久97久久精品| 如何舔出高潮| 欧美日韩综合久久久久久| 午夜老司机福利片| av国产久精品久网站免费入址| av线在线观看网站| 亚洲欧美一区二区三区黑人| 多毛熟女@视频| 亚洲欧美日韩另类电影网站| 91精品三级在线观看| 波多野结衣一区麻豆| 亚洲精品久久午夜乱码| 日日啪夜夜爽| 国产福利在线免费观看视频| 成人影院久久| 伊人久久大香线蕉亚洲五| 亚洲中文av在线| 亚洲国产av新网站| 国产精品久久久久成人av| 午夜精品国产一区二区电影| 日韩视频在线欧美| 午夜福利影视在线免费观看| 中文字幕人妻熟女乱码| 男人操女人黄网站| 女人精品久久久久毛片| 丰满迷人的少妇在线观看| 伦理电影免费视频| 久久久久精品国产欧美久久久 | 国产一级毛片在线| 精品视频人人做人人爽| 国产免费现黄频在线看| 亚洲一区二区三区欧美精品| 日本vs欧美在线观看视频| 欧美精品av麻豆av| 中文字幕精品免费在线观看视频| 国产成人欧美| 久久狼人影院| 老司机影院毛片| 日本av免费视频播放| 午夜久久久在线观看| 综合色丁香网| e午夜精品久久久久久久| 国产av一区二区精品久久| 午夜福利,免费看| 看免费成人av毛片| 国产成人精品久久二区二区91 | 一边亲一边摸免费视频| 最近中文字幕高清免费大全6| 老司机在亚洲福利影院| 丝瓜视频免费看黄片| 亚洲男人天堂网一区| 亚洲国产欧美一区二区综合| 日韩制服骚丝袜av| 天堂8中文在线网| 五月天丁香电影| 香蕉丝袜av| 操出白浆在线播放| 久久ye,这里只有精品| 欧美乱码精品一区二区三区| 婷婷色av中文字幕| 日韩熟女老妇一区二区性免费视频| 1024视频免费在线观看| 国产精品国产av在线观看| 日韩成人av中文字幕在线观看| 啦啦啦视频在线资源免费观看| 亚洲欧美精品综合一区二区三区| 亚洲精品一区蜜桃| 国产毛片在线视频| 国产免费福利视频在线观看| 街头女战士在线观看网站| 可以免费在线观看a视频的电影网站 | 国产日韩一区二区三区精品不卡| 美女国产高潮福利片在线看| 人人妻,人人澡人人爽秒播 | 国产色婷婷99| 黄频高清免费视频| 亚洲美女视频黄频| 亚洲一区中文字幕在线| 亚洲,欧美,日韩| 最黄视频免费看| 美国免费a级毛片| 巨乳人妻的诱惑在线观看| 亚洲精品日韩在线中文字幕| 午夜日韩欧美国产| 天天影视国产精品| 国产精品一国产av| av电影中文网址| 日本欧美视频一区| 香蕉国产在线看| 丝袜美足系列| 久久亚洲国产成人精品v| 日韩精品有码人妻一区| 午夜激情av网站| 91精品三级在线观看| 极品人妻少妇av视频| 亚洲精品av麻豆狂野| 美女视频免费永久观看网站| 少妇人妻精品综合一区二区| 免费日韩欧美在线观看| 在线免费观看不下载黄p国产| 欧美精品高潮呻吟av久久| 亚洲人成77777在线视频| 欧美精品一区二区免费开放| 多毛熟女@视频| 99久国产av精品国产电影| 999久久久国产精品视频| 啦啦啦 在线观看视频| 中文字幕人妻熟女乱码| 欧美中文综合在线视频| 一本大道久久a久久精品| 韩国精品一区二区三区| 国产一区二区三区综合在线观看| 国产精品偷伦视频观看了| 国产高清国产精品国产三级| 777久久人妻少妇嫩草av网站| 美女午夜性视频免费| 男女之事视频高清在线观看 | 欧美最新免费一区二区三区| 久久精品久久久久久噜噜老黄| 亚洲情色 制服丝袜| 日韩一区二区三区影片| 亚洲精华国产精华液的使用体验| 纵有疾风起免费观看全集完整版| 少妇的丰满在线观看| 美国免费a级毛片| 亚洲国产毛片av蜜桃av| 亚洲七黄色美女视频| 777米奇影视久久| 久热爱精品视频在线9| 亚洲精华国产精华液的使用体验| 欧美在线一区亚洲| 日韩中文字幕视频在线看片| 在线观看免费高清a一片| 久久久久久久国产电影| 深夜精品福利| 国产黄频视频在线观看| 中文字幕最新亚洲高清| 一边摸一边做爽爽视频免费| 国产成人午夜福利电影在线观看| 亚洲一区二区三区欧美精品| 久久ye,这里只有精品| 韩国av在线不卡| 1024香蕉在线观看| 亚洲精品自拍成人| 欧美国产精品一级二级三级| 精品少妇一区二区三区视频日本电影 | 巨乳人妻的诱惑在线观看| 精品免费久久久久久久清纯 | 国产精品一区二区在线观看99| 精品福利永久在线观看| 99热国产这里只有精品6| 啦啦啦视频在线资源免费观看| 自线自在国产av| 精品国产一区二区三区久久久樱花| 亚洲成国产人片在线观看| 日本欧美国产在线视频| 免费少妇av软件| 男女之事视频高清在线观看 | 黄片无遮挡物在线观看| 亚洲av电影在线观看一区二区三区| 老司机在亚洲福利影院| 欧美变态另类bdsm刘玥| 午夜日本视频在线| 国产人伦9x9x在线观看| 激情视频va一区二区三区| 精品人妻熟女毛片av久久网站| 国产精品无大码| 91精品国产国语对白视频| 在线亚洲精品国产二区图片欧美| 老司机亚洲免费影院| 在线观看国产h片| 国产日韩一区二区三区精品不卡| 亚洲欧美日韩另类电影网站| 久久97久久精品| 欧美日韩国产mv在线观看视频| 国产欧美日韩一区二区三区在线| 亚洲中文av在线| 99久久精品国产亚洲精品| 一本大道久久a久久精品| 青春草视频在线免费观看| a级毛片在线看网站| 久久综合国产亚洲精品| 韩国高清视频一区二区三区| 高清视频免费观看一区二区| 99热国产这里只有精品6| netflix在线观看网站| 午夜影院在线不卡| 99国产综合亚洲精品| 午夜老司机福利片| 好男人视频免费观看在线| 最黄视频免费看| 成人三级做爰电影| 又黄又粗又硬又大视频| 欧美黑人精品巨大| 日韩av在线免费看完整版不卡| 桃花免费在线播放| 王馨瑶露胸无遮挡在线观看| 亚洲图色成人| 国产高清不卡午夜福利| 日本vs欧美在线观看视频| 久久精品亚洲熟妇少妇任你| 国产淫语在线视频| 又大又爽又粗| 综合色丁香网| 亚洲av在线观看美女高潮| 黄频高清免费视频| 精品一区在线观看国产| 秋霞在线观看毛片| 久久久久精品人妻al黑| 少妇人妻 视频| 亚洲自偷自拍图片 自拍| 日韩精品免费视频一区二区三区| 精品国产乱码久久久久久男人| 日韩av免费高清视频| 下体分泌物呈黄色| 亚洲在久久综合| 又大又黄又爽视频免费| 欧美人与性动交α欧美软件| 欧美变态另类bdsm刘玥| 日韩伦理黄色片| 老司机深夜福利视频在线观看 | 亚洲成人手机| 在线精品无人区一区二区三| av一本久久久久| 久久久久久免费高清国产稀缺| tube8黄色片| 超碰97精品在线观看| 欧美变态另类bdsm刘玥| 国产一区二区三区av在线| 丝袜美足系列| 国产又爽黄色视频| 这个男人来自地球电影免费观看 | 80岁老熟妇乱子伦牲交| 国产精品秋霞免费鲁丝片| 最近2019中文字幕mv第一页| 欧美日本中文国产一区发布| 亚洲一级一片aⅴ在线观看| 少妇人妻精品综合一区二区| 美女高潮到喷水免费观看| 欧美人与性动交α欧美精品济南到| 2021少妇久久久久久久久久久| 熟女av电影| 国产97色在线日韩免费| 蜜桃国产av成人99| 在线看a的网站| 天堂8中文在线网| 免费黄频网站在线观看国产| 大香蕉久久成人网| 国产成人a∨麻豆精品| 日韩 欧美 亚洲 中文字幕| 香蕉国产在线看| 亚洲精品国产av成人精品| 午夜免费男女啪啪视频观看| 久久99精品国语久久久| 亚洲婷婷狠狠爱综合网| avwww免费| 只有这里有精品99| 精品国产乱码久久久久久小说| 久久免费观看电影| 国产片内射在线| 欧美日韩亚洲高清精品| 亚洲国产精品一区二区三区在线| 黑人欧美特级aaaaaa片| 男女午夜视频在线观看| 国产极品天堂在线| 亚洲精品国产色婷婷电影| 国产精品久久久久久久久免| 天天添夜夜摸| 美女扒开内裤让男人捅视频| 啦啦啦啦在线视频资源| 叶爱在线成人免费视频播放| 免费av中文字幕在线| 狠狠精品人妻久久久久久综合| 成年美女黄网站色视频大全免费| 欧美精品av麻豆av| 久久精品国产a三级三级三级| 国产精品 国内视频| 大片免费播放器 马上看| 人妻 亚洲 视频| 久久这里只有精品19| 欧美精品亚洲一区二区| 免费高清在线观看日韩| 成人漫画全彩无遮挡| 国产亚洲精品第一综合不卡| 欧美亚洲 丝袜 人妻 在线| 亚洲欧美精品综合一区二区三区| 久久天躁狠狠躁夜夜2o2o | 免费看av在线观看网站| 午夜av观看不卡| 免费看av在线观看网站| 婷婷色综合大香蕉| 嫩草影视91久久| 亚洲一码二码三码区别大吗| 最新在线观看一区二区三区 | 国产成人欧美| 男女之事视频高清在线观看 | 最近2019中文字幕mv第一页| 午夜日本视频在线| 丰满饥渴人妻一区二区三| 免费人妻精品一区二区三区视频| 亚洲精品中文字幕在线视频| 看非洲黑人一级黄片| 18禁动态无遮挡网站| 99精品久久久久人妻精品| 婷婷色av中文字幕| 街头女战士在线观看网站| 久久精品久久久久久久性| 国产黄频视频在线观看| 亚洲国产欧美日韩在线播放| 欧美日韩福利视频一区二区| 九九爱精品视频在线观看| 人人妻人人澡人人看| 男人舔女人的私密视频| 操美女的视频在线观看| 亚洲成人免费av在线播放| 国产成人91sexporn| 日韩av不卡免费在线播放| 啦啦啦视频在线资源免费观看| 亚洲精品久久成人aⅴ小说| 一级片'在线观看视频| 精品视频人人做人人爽| 亚洲欧洲精品一区二区精品久久久 | 国产在线免费精品| 中文字幕色久视频| 别揉我奶头~嗯~啊~动态视频 | 极品少妇高潮喷水抽搐| 1024视频免费在线观看| 咕卡用的链子| 人人妻人人爽人人添夜夜欢视频| 精品午夜福利在线看| 久久久久久人妻| 日韩大码丰满熟妇| 欧美 亚洲 国产 日韩一| 国产精品二区激情视频| 午夜激情久久久久久久| 自线自在国产av| 国产精品偷伦视频观看了| 欧美 亚洲 国产 日韩一| www.av在线官网国产| 午夜激情久久久久久久| 久久精品国产a三级三级三级| 一区二区三区精品91| 老司机深夜福利视频在线观看 | 一边摸一边做爽爽视频免费| 亚洲国产精品一区二区三区在线| 国产免费一区二区三区四区乱码| 宅男免费午夜| 一级片'在线观看视频| 一二三四中文在线观看免费高清| 国产片特级美女逼逼视频| videosex国产| 久久影院123| tube8黄色片| 精品国产乱码久久久久久小说| 国产无遮挡羞羞视频在线观看| 亚洲第一区二区三区不卡| 精品国产国语对白av| 欧美黑人欧美精品刺激| 成人影院久久| 青春草视频在线免费观看| 女人精品久久久久毛片| 男人舔女人的私密视频| 亚洲人成电影观看| 亚洲精品日本国产第一区| 久久久国产精品麻豆| 在线观看国产h片| 国产亚洲精品第一综合不卡| 美女主播在线视频| 建设人人有责人人尽责人人享有的| 中文字幕另类日韩欧美亚洲嫩草| 青青草视频在线视频观看| 男女无遮挡免费网站观看| 日韩制服骚丝袜av| 亚洲国产成人一精品久久久| 国产精品国产三级专区第一集| 曰老女人黄片| 巨乳人妻的诱惑在线观看| 国产精品欧美亚洲77777| 尾随美女入室| 黄色毛片三级朝国网站| 久久人妻熟女aⅴ| 欧美日韩精品网址| 制服诱惑二区| 黑人巨大精品欧美一区二区蜜桃| 可以免费在线观看a视频的电影网站 | 大话2 男鬼变身卡| 午夜激情av网站| 黄片无遮挡物在线观看| 99久久人妻综合| 各种免费的搞黄视频| 国产淫语在线视频| 2018国产大陆天天弄谢| 天天躁狠狠躁夜夜躁狠狠躁| 美女主播在线视频| 美女视频免费永久观看网站| 伊人久久大香线蕉亚洲五| 国产av码专区亚洲av| 色视频在线一区二区三区| 赤兔流量卡办理| 熟女少妇亚洲综合色aaa.| 建设人人有责人人尽责人人享有的| 男女午夜视频在线观看| 你懂的网址亚洲精品在线观看| av国产久精品久网站免费入址| 国产精品一区二区在线观看99| 色视频在线一区二区三区| 国产av一区二区精品久久| 久久久久视频综合| 日韩制服丝袜自拍偷拍| 香蕉国产在线看| 欧美精品亚洲一区二区| 叶爱在线成人免费视频播放| 国产免费一区二区三区四区乱码| 女人久久www免费人成看片| 一区二区三区四区激情视频| 欧美黑人精品巨大| 亚洲av电影在线进入| 中文字幕av电影在线播放| 美女中出高潮动态图| 一级毛片 在线播放| 伊人久久大香线蕉亚洲五| 亚洲熟女精品中文字幕| 亚洲国产欧美日韩在线播放| 视频在线观看一区二区三区| 五月天丁香电影| 精品国产露脸久久av麻豆| 久久99热这里只频精品6学生| 国产伦理片在线播放av一区| 国产精品免费大片| 国产一区有黄有色的免费视频| 又大又黄又爽视频免费| 婷婷色av中文字幕| 亚洲精品,欧美精品| 建设人人有责人人尽责人人享有的| 久久天躁狠狠躁夜夜2o2o | 国语对白做爰xxxⅹ性视频网站| 国产成人精品在线电影| 热re99久久国产66热| 免费在线观看完整版高清| 精品一区在线观看国产| 日韩 欧美 亚洲 中文字幕| 在线观看三级黄色| 午夜影院在线不卡| 在线观看三级黄色| 欧美av亚洲av综合av国产av | 久久精品国产a三级三级三级| 极品人妻少妇av视频| 日日啪夜夜爽| 日日撸夜夜添| 国产日韩欧美亚洲二区| 亚洲精品,欧美精品| 爱豆传媒免费全集在线观看| 嫩草影视91久久| 亚洲精品久久久久久婷婷小说| 中文乱码字字幕精品一区二区三区| 亚洲国产精品一区二区三区在线| 天堂俺去俺来也www色官网| 日本vs欧美在线观看视频| 少妇被粗大的猛进出69影院| 大片免费播放器 马上看| 日韩av不卡免费在线播放| 久久久久久人妻| 国产精品三级大全| 久久久国产精品麻豆| 成人毛片60女人毛片免费| 久久久精品区二区三区| 亚洲成国产人片在线观看| 宅男免费午夜| 午夜福利影视在线免费观看| 街头女战士在线观看网站| 一个人免费看片子| 欧美国产精品一级二级三级| 免费看不卡的av| 亚洲情色 制服丝袜| 中文字幕人妻丝袜一区二区 | 国产人伦9x9x在线观看| 韩国精品一区二区三区| 亚洲天堂av无毛| 黄色视频在线播放观看不卡| 欧美在线一区亚洲| 欧美精品亚洲一区二区| 天天躁夜夜躁狠狠久久av| 亚洲欧美一区二区三区国产| 1024视频免费在线观看| 黄网站色视频无遮挡免费观看| 成人手机av| 晚上一个人看的免费电影| 美女主播在线视频| 亚洲av成人不卡在线观看播放网 | 亚洲精品,欧美精品| 国产亚洲av片在线观看秒播厂| 9色porny在线观看| 男女之事视频高清在线观看 | 国产亚洲av片在线观看秒播厂| 国产一区二区 视频在线| av.在线天堂| 老司机靠b影院| 中文精品一卡2卡3卡4更新| 19禁男女啪啪无遮挡网站| 97人妻天天添夜夜摸| 日韩精品有码人妻一区| 免费看不卡的av| 一本久久精品| 哪个播放器可以免费观看大片| 久久狼人影院| 久久国产亚洲av麻豆专区| 亚洲激情五月婷婷啪啪| 丁香六月天网| 欧美日韩视频高清一区二区三区二| 国产成人精品久久久久久| 飞空精品影院首页| 国产精品免费大片| 亚洲人成77777在线视频| 国产精品一二三区在线看| 久久久久国产一级毛片高清牌| 国产欧美亚洲国产| 一二三四在线观看免费中文在| 99热网站在线观看| 99re6热这里在线精品视频| 国产精品熟女久久久久浪| 99热国产这里只有精品6| 久久久欧美国产精品| 高清欧美精品videossex| 别揉我奶头~嗯~啊~动态视频 | 久久久国产欧美日韩av| 亚洲情色 制服丝袜| 男女下面插进去视频免费观看| 国产深夜福利视频在线观看| 成人漫画全彩无遮挡| 亚洲一码二码三码区别大吗| 老熟女久久久| 丰满迷人的少妇在线观看| 制服丝袜香蕉在线| 老汉色∧v一级毛片| 国产精品 欧美亚洲| 色网站视频免费| 热re99久久精品国产66热6| 一边亲一边摸免费视频| 成人亚洲欧美一区二区av| 亚洲成人一二三区av| 国产亚洲午夜精品一区二区久久| 夫妻性生交免费视频一级片| 天堂俺去俺来也www色官网| 高清av免费在线| 亚洲第一青青草原| 久久精品亚洲熟妇少妇任你| 亚洲美女视频黄频| 中文字幕人妻丝袜一区二区 | 99热国产这里只有精品6| 久久亚洲国产成人精品v|