Opacity notion is a security and privacy property that verifies whether an external observer (intruder) can deduce a secret of a system by observing its behaviour. This paper addresses the current state opacity verification and enforcement in the framework of Petri Net (PN): an observation of the system is said to be current-state opaque if an intruder is unable to determine whether the current-state of the system belongs to a set of secret states, otherwise it is said to be not current-state opaque. The run time verifier waits for an observable event and performs an algorithm based on the solution of Integer Linear Programming problem to verify the current state opacity and preserve the secret. Indeed, if the secret may be discovered, then the last event is hidden. An example shows the efficiency of the proposed approach.
On-line Algorithm for Current State Opacity Enforcement in a Petri Net Framework / Cong, X. Y.; Fanti, M. P.; Mangini, A. M.; Li, Z. W.. - ELETTRONICO. - 51:7(2018), pp. 349-354. (Intervento presentato al convegno 14th IFAC International Workshop on Discrete Event Systems, WODES 2018 tenutosi a Salerno, Italy nel May 30 - June 1, 2018) [10.1016/j.ifacol.2018.06.324].
On-line Algorithm for Current State Opacity Enforcement in a Petri Net Framework
Fanti M. P.;Mangini A. M.;
2018-01-01
Abstract
Opacity notion is a security and privacy property that verifies whether an external observer (intruder) can deduce a secret of a system by observing its behaviour. This paper addresses the current state opacity verification and enforcement in the framework of Petri Net (PN): an observation of the system is said to be current-state opaque if an intruder is unable to determine whether the current-state of the system belongs to a set of secret states, otherwise it is said to be not current-state opaque. The run time verifier waits for an observable event and performs an algorithm based on the solution of Integer Linear Programming problem to verify the current state opacity and preserve the secret. Indeed, if the secret may be discovered, then the last event is hidden. An example shows the efficiency of the proposed approach.File | Dimensione | Formato | |
---|---|---|---|
1-s2.0-S2405896318306542-main.pdf
accesso aperto
Tipologia:
Versione editoriale
Licenza:
Tutti i diritti riservati
Dimensione
469.44 kB
Formato
Adobe PDF
|
469.44 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.