Next Article in Journal
Application of an Optimal Control Therapeutic Approach for the Memory-Regulated Infection Mechanism of Leprosy through Caputo–Fabrizio Fractional Derivative
Next Article in Special Issue
A Novel Simulation-Based Optimization Method for Autonomous Vehicle Path Tracking with Urban Driving Application
Previous Article in Journal
An Intrinsic Version of the k-Harmonic Equation
Previous Article in Special Issue
Realization of Intelligent Observer for Sensorless PMSM Drive Control
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Quantification for Discrete Event Systems Based on the Worth of States

1
School of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau SAR 999078, China
2
Hitachi Building Technology (Guangzhou) Co., Ltd., No. 2 Nanxiang 3rd Road, Guangzhou 510613, China
3
Institute of Systems Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macau SAR 999078, China
*
Author to whom correspondence should be addressed.
Submission received: 30 June 2023 / Revised: 11 August 2023 / Accepted: 21 August 2023 / Published: 22 August 2023

Abstract

:
This work addresses the problem of quantifying opacity for discrete event systems. We consider a passive intruder who knows the overall structure of a system but has limited observational capabilities and tries to infer the secret of this system based on the captured information flow. Researchers have developed various approaches to quantify opacity to compensate for the lack of precision of qualitative opacity in describing the degree of security of a system. Most existing works on quantifying opacity study specified probabilistic problems in the framework of probabilistic systems, where the behaviors or states of a system are classified as secret or non-secret. In this work, we quantify opacity by a state-worth function, which associates each state of a system with the worth it carries. To this end, we present a novel category of opacity, called worthy opacity, characterizing whether the worth of information exposed to the outside world during the system’s evolution is below a threshold. We first provide an online approach for verifying worthy opacity using the notion of a run matrix proposed in this research. Then, we investigate a class of systems satisfying the so-called 1-cycle returned property and present a worthy opacity verification algorithm for this class. Finally, an example in the context of smart buildings is provided.

1. Introduction

With global urbanization, cities are growing in size and population, and the proportion of people living in urban areas is expected to grow to 68% by 2050 [1], creating inevitable challenges to urban residents due to limited resources and services. The concept of smart cities has been proposed to efficiently deploy public resources, improve social governance, and promote sustainable urban development. Currently, smart cities are being intensively established around the world; for example, there are already more than 500 in China [2].
Buildings provide the physical space required for people to carry out various social, economic, and cultural activities, and are one of the areas where the Internet of Things (IoT) would make significant impacts [3]. Smart buildings improve the energy efficiency, operational efficiency, security, and comfort of the living or working environment by integrating advanced technologies and systems [4,5]. For example, people use the model predictive control approach for temperature control in smart buildings, reducing operating costs and improving thermal comfort [6,7]. However, IoT devices in smart buildings generate a large amount of data, which can pose many potential threats. Deciding how to analyze the security of smart buildings is becoming an increasingly important issue and has attracted a lot of attention over the past few years [8,9,10].
In this article, we study an information flow security property of great interest: opacity, within the discrete event system (DES) framework, where DES can describe the state transition relationships between events in an IoT, thereby assisting us in understanding and analyzing IoT behavior. Opacity was originally introduced in 2004 for the analysis of cryptographic protocols [11]. Later, it is taken as a general information flow security framework for a DES interacting with a passive intruder. Many kinds of information flow security properties can be formulated as opacity, such as non-interference [12], anonymity [13], etc. Roughly speaking, opacity is a type of confidentiality property that characterizes whether certain secret information from a system can be deduced by outside observers that may be malicious.
In the context of DESs, opacity is classified into language-based and state-based opacity, depending on the defined secret [14]. Language-based opacity has been studied with models such as automata [13] and Petri nets [15], where the secret is defined as a language. In general, this type of opacity can be further classified as strong and weak opacity, as opposed to state-based opacity, which has a wide range of classifications depending on the state of interest. For example, current-state opacity [16,17] has been proposed to take the system’s current state as a secret and determine whether the system reveals this secret during its evolution. Similarly, initial-state opacity [18] and initial-and-final-state opacity [19] are suggested when the secret is defined as a set of initial states or a set of secret state pairs. The notions of K-step opacity [20] and infinite-step opacity [21] are developed when the delayed information of a system is concerned, and pre-opacity [22] is formulated when the intention of a system needs to be kept secret.
All of the aforementioned notions of opacity describe a system in a binary way, where the system is either opaque or non-opaque. It has been noted that qualitative opacity is not accurate enough in assessing the information obtained by passive attackers [23]. For instance, a system that violates qualitative opacity with a very low probability and one that violates qualitative opacity with a very high probability are considered insecure. However, their degree of security is different [24]. The authors of [25] introduce game theory’s ideas into probabilistic automata and propose a model of probabilistic resource automata based on which the current-state opacity is quantified.
The above-mentioned studies on quantification of opacity are basically based on probabilistic systems. However, a probabilistic model is much more difficult to be abstracted than a non-probabilistic version. The study in [26] is the first work that introduces the quantification of opacity into non-probabilistic DES. Considering that the essence of opacity is to explore the observational equivalent strings, the authors developed a method to calculate the opacity degree of a system by computing the dispersion among non-secret runs and secret equivalents.
In this work, we investigate the quantification of opacity from a new perspective by describing the worth of information that each system state carries in terms of a state-worth function. Then, we introduce a new type of opacity, called worthy opacity, to describe whether the worth of information exposed to the outside world in the system’s evolution meets the security requirements. We consider an intruder who knows the whole structure of a system but has limited observation capabilities. Unlike the general notions of state-based opacity, we do not explicitly treat a secret as a specific sub-set of states since the state-worth function describes the importance of each system state. We show that current-state opacity is strictly weaker than worthy opacity. The proposed notion of worthy opacity is closely related to the notion of opacity degree in [26]. The contributions of this article can be summarized as follows:   
  • A novel notion of worthy opacity is proposed to quantitatively characterize the worth of a system available to an intruder;
  • An online algorithm is provided to verify worthy opacity;
  • A system property called 1-cycle returned is defined, and an offline verification algorithm for the system’s worthy opacity satisfying this property is presented;
  • It is shown that worthy opacity provides a more granular partitioning of the system than current-state opacity.
The rest of this article is organized as follows. Section 2 recalls the necessary preliminaries. The notion of worthy opacity is proposed in Section 3. In Section 4, two effective algorithms for the verification of worthy opacity are reported. Finally, Section 5 concludes this research.

2. Preliminaries

Symbols R , R 0 , N , and Z + are specified to denote the sets of real numbers, non-negative real numbers, non-negative integers, and positive integers, respectively. The ceiling function of a real number x R , denoted as x , is defined as the smallest integer that is not smaller than x. For a vector v , v i is used to denote the i-th entry of v . Given a matrix M , its ( i , j ) -th entry is denoted as M i , j . The transpose of a vector v is denoted by v T . Given a k-dimensional vector v , its 1-norm is defined as the sum of the absolute values of each entry, i.e., v = i = 1 k | v i | . The L1-normalization of a vector v , denoted by norm ( v ) in this article, is defined as norm ( v ) = v / v . Given an ordered pair c = ( a , b ) , we use c ( 1 ) and c ( 2 ) to denote its first and second components, namely, c ( 1 ) = a and c ( 2 ) = b .

2.1. System Model

We define an alphabet as any non-empty finite set of events, denoted by E. A string over the alphabet E is a sequence of events taken out of E [27]. The length of a string s, written as | s | (if X is a set, the notation | X | denotes the cardinality of X. The distinction is usually clear from context), is the number of events contained in it, counting multiple occurrences of the same event. The string without any events is called the empty string and is denoted by ε with | ε | = 0 . Given two strings s 1 and s 2 , the concatenation of s 1 and s 2 is the sequence of events in s 1 followed by the sequence of events in s 2 , denoted as s 1 · s 2 or s 1 s 2 . We use the superscript notation s k to indicate that the string s is concatenated with itself k times.
Given an alphabet E, we denote by E k the set of all strings of length k, particularly, E 0 = { ε } . The set consisting of all finite-length strings defined over E is denoted by E * , i.e., E * = E 0 E E 2 . Given an alphabet E, a language is a sub-set of E * . Given two languages L 1 and L 2 , the concatenation of L 1 and L 2 is L 1 L 2 = { s 1 s 2 s 1 L 1 , s 2 L 2 } . In this article, we model a DES as a non-deterministic finite automaton, formally defined as follows.
Definition 1
(Non-deterministic Finite Automaton). A non-deterministic finite automaton (NFA) is a four-tuple G = ( Q , E , f , Q 0 ) , where   
  • Q = { q 1 , q 2 , , q N } is the finite set of states;
  • E = { e 1 , e 2 , , e M } is the finite set of events associated with G;
  • f : Q × E 2 Q (where 2 Q is the power set of Q) is the transition function, and q f ( q , e ) means that there is a transition labeled by e from state q to state q ;
  • Q 0 Q is the set of initial states.
If Q 0 in G is a singleton and the transition function of G is a partially defined function Q × E Q , then G is called a deterministic finite automaton (DFA). The transition function f can be extended recursively from the domain Q × E to the domain Q × E * : f ( q , ε ) = { q } and f ( q , s e ) = q f ( q , s ) f ( q , e ) for all states q Q , where s E * and e E . The language generated by G from state q Q is L ( G , q ) = { s E * f ( q , s ) ! } , where f ( q , s ) ! indicates that f ( q , s ) is defined, i.e., f ( q , s ) . The language generated by G from a set of states Q Q is L ( G , Q ) = q Q L ( G , q ) . Naturally, the language generated by G is L ( G ) = L ( G , Q 0 ) .
Formally an NFA G can be equivalently represented by a directed graph, with a set of nodes Q denoting states and a set of edges { q e q q f ( q , e ) } denoting transitions. A run in G starting from q ( 0 ) Q is a finite sequence of transitions r : q ( 0 ) e ( 1 ) q ( 1 ) e ( 2 ) q ( k 1 ) e ( k ) q ( k ) (here, we use the numbers in parentheses to indicate the order in which states or events appear in the run, that is to say, q ( i ) is not necessarily equal to q i and e ( i ) is not necessarily equal to e i ), and the events extracted from it in order form the string associated with it, denoted by ϕ ( r ) = e ( 1 ) e ( 2 ) e ( k ) (we also say that r is a run on ϕ ( r ) and use l a s t ( r ) = q ( k ) to denote the ending state). We define the length of a run r as the length of the string ϕ ( r ) associated with it, i.e., | r | = | ϕ ( r ) | . Given a run from state q to q on a string s, we denote it as q s q ; if a specific string associated with the run is not of interest, we denote it as q q . The set of all runs starting from state q Q in G is denoted by Γ ( G , q ) ; the set of all runs generated by G is Γ ( G ) = q Q 0 Γ ( G , q ) . A run of length greater than zero that begins and ends at the same state is called a cycle.

2.2. Intruder Model and Opacity

In the general setting of studying opacity in DESs, it is assumed that the intruder is fully aware of the system’s structure but only partially observes the system’s behavior [14]. We follow this setting in our work and formalize it as the partial observability of events, where the set of events E is divided into an observable event set E o and an unobservable event set E u o , i.e., E = E o ˙ E u o . Given a string s E * generated by G, the intruder’s observation is the output of the natural projection function P : E * E o * , which is defined recursively as:
P ( ε ) = ε ; P ( e ) = e , if e E o , ε , otherwise ;
P ( s e ) = P ( s ) · P ( e ) for s E * , e E .
The unobservable reach of a state q Q in G, denoted by U R ( q ) , is U R ( q ) = { q Q t E u o * : f ( q , t ) ! , q f ( q , t ) } . This definition can be extended to a set of states Q Q by U R ( Q ) = q Q U R ( q ) .
This work is an extension of state-based opacity, where the secret of a system is a sub-set of states S Q . When a system generates a string s E * , the intruder observes P ( s ) and infers whether the system is in a secret state based on this observation and the system’s structure.
Definition 2
(Current-State Opacity [14]). Given a system G = ( Q , E , f , Q 0 ) , a secret S Q , and a set of observable events E o E , G is current-state opaque with respect to S and E o , written as ( S , E o ) -CSO, if
q Q 0 , s L ( G , q ) [ f ( q , s ) S ] q Q 0 , s L ( G , q ) [ P ( s ) = P ( s ) , f ( q , s ) S ] .
In plain words, a system being current-state opaque means that an intruder cannot infer whether the current state belongs to the secret, regardless of the sequence of events occurring in the system. Given an observation ω P ( L ( G ) ) , the current-state estimate associated with ω is C ( ω ) = { q Q q 0 Q 0 : s L ( G , q 0 ) , q f ( q 0 , s ) , P ( s ) = ω } , and the set of consistent strings is S ( ω ) = { s L ( G ) P ( s ) = ω } .
Lemma 1
([28]). Given a system G = ( Q , E , f , Q 0 ) , a secret S Q , and a set of observable events E o E , G is ( S , E o ) -CSO if and only if for any observation ω P ( L ( G ) ) , C ( ω ) S .
By Lemma 1, to verify current-state opacity, we can construct the observer  G o b s of system G and check whether there exists a state in observer G o b s that is a sub-set of S [16].
Definition 3.
Given a system G = ( Q , E , f , Q 0 ) and a set of observable events E o E , its observer is a DFA G o b s = ( X , E o b s , f o b s , x 0 ) , where   
  • X 2 Q , with each state x Q being a state estimate generated by an intruder based on the evolution of G;
  • E o b s = E o is the set of events that can be observed by an intruder;
  • f o b s ( x , e ) = q x U R ( f ( q , e ) ) ;
  • x 0 = U R ( Q 0 ) is the initial state estimate.
Example 1.
Consider the system G 1 in Figure 1a, where S = { q 2 , q 3 } and E o = { e 1 } . Clearly, by constructing the observer of G 1 as shown in Figure 1b, we can find that G is current-state opaque, since no state of G 1 , o b s is a sub-set of S.

2.3. Some Counting Principles

As an essential part of combinatorics, counting objects with specific properties is indispensable for the study of DESs. Many different types of problems require us to count items. For instance, some notions of diagnosability are defined in terms of fault counting problems [29]. Counting is also required to determine the complexity of algorithms [30]. In addition, counting techniques are widely used in calculating the finite probability [31]. Our work is also inseparable from counting. This subsection recalls some critical counting principles [32].
Lemma 2
(Addition Principle). Suppose that a set S can be partitioned into pairwise disjoint parts S 1 , S 2 , , S m . The number of elements in S is the sum of the number of elements in each of its part, i.e., | S | = i = 1 m | S i | .
We divide the problem into mutually exclusive cases for applying the addition principle. An alternative formulation of Lemma 2 is as follows: if there are m ways to complete a task, where the i-th way has k i ( i { 1 , 2 , , m } ) choices, then there are i = 1 m k i choices for completing that task.
Example 2.
Consider the system G 1 in Example 1. Suppose we want to find the number of cycles of length two in G 1 . We divide these cycles by listing their start and end states. The number of 2-length cycles starting and ending in states q 1 , q 2 , q 3 , and q 4 are 2, 2, 1, and 1, respectively. Therefore, the number of cycles of length two in G 1 is 2 + 2 + 1 + 1 = 6 .
Lemma 3
(Multiplication Principle). Let S be a set of m-tuples ( S 1 , S 2 , , S m ) , where the i-th component S i comes from a set of size a i . The size of S is i = 1 m a i .
The multiplication principle is a corollary of Lemma 2. A useful formulation of Lemma 3 is as follows: suppose that a task can be decomposed into m consecutive steps. If step i can be performed in a i ways, and for each of these, step i + 1 can be performed in a i + 1 ( i { 1 , 2 , , m 1 } ) ways, then the task itself can be accomplished in i = 1 m a i ways.
Example 3.
Consider the system G 1 in Example 1. The number of 2-length runs starting from state q 1 , passing through state q 2 , and ending at state q 3 is 1, as the number of 1-length runs from state q 1 to q 2 and state q 2 to q 3 is 1, respectively.
Lemma 4
(Generalized Pigeonhole Principle [33]). If p objects are placed into q boxes, then at least one box contains a minimum of p / q objects.

3. Notions of Worthy Opacity

In this section, we first provide the definition of worthy opacity for DESs, and then compare it with the widely studied current-state opacity. Existing notions of state-based opacity, both qualitative and quantitative, divide the set of states into secret or non-secret. However, various degrees of confidentiality exist for different states that are part of the same secret. For example, a spy trying to hide his/her tracks would wish neither his/her hiding place be exposed nor the convenience store he/she regularly visits be discovered. Nevertheless, it is clear that the secrecy of the hiding place is more valuable. To describe the degree of confidentiality of individual states, we introduce the notion of state-worth function.
Definition 4
(State-worth Function). Given a system G = ( Q , E , f , Q 0 ) , a state-worth function is a mapping that assigns a non-negative number to a state, defined as Δ : Q R 0 .
Note that instead of describing the degree of confidentiality of each state in the secret (a sub-set of the state set), we define the state-worth function as assigning a worth to each state of the system. This is a more general approach than splitting the states into two categories. When linked to the conventional notion of secret, we can use this function to divide secrets: each state possesses a worth, and states carrying worth above a certain threshold are considered constituent elements of a secret.
Example 4.
Suppose that we have a bank account with a deposit limit of $300 and a balance of $100. The amount we deposit into our account or spend at a point of sale (POS) is $100 each time. In addition, a private detective is lying in wait at the bank door and wants to know our financial situation, and he can only find out that we deposit but not that we use POS spending.
Then, the above scenario can be modeled with the system of Example 1; event e 1 represents the deposit of $100 while event e 2 represents the POS spending of $100. Each state represents the balance of the bank account, and naturally, we can take the balance represented by each state as the value of the state-worth function, i.e., Δ ( q 1 ) = 100 , Δ ( q 2 ) = 200 , Δ ( q 3 ) = 300 , and Δ ( q 4 ) = 0 . If we treat a bank balance over $100 as a secret, then it is S = { q Δ ( q ) > 100 } = { q 2 , q 3 } , as shown in Example 1.
In addition, the existing notions of opacity are not sufficiently refined for depicting the evolution of a system. In fact, the most fundamental element of a system corresponding to an observation is the set of runs rather than the set of strings, as shown in Figure 2. Specifically, given a run r Γ ( G ) of a system G, we can obtain the string ϕ ( r ) L ( G ) by extracting the sequence of events occurring in it, also commonly considered as the logical behavior of a system, and then an intruder obtains the corresponding observation ω P ( L ( G ) ) based on the observability of the events.
Definition 5.
Given a system G = ( Q , E , f , Q 0 ) with a set of observable events E o E and an observation ω P ( L ( G ) ) , the set of consistent runs and the set of consistent runs ending in state q Q are defined as Φ ( ω ) = { r Γ ( G ) s S ( ω ) : ϕ ( r ) = s } and Φ q ( ω ) = { r Φ ( ω ) l a s t ( r ) = q } , respectively.
Intuitively, given an observation ω , the set of consistent runs Φ ( ω ) is the set of all runs for which the system can generate that observation, and accordingly, the set Φ q ( ω ) is the set of all runs that cause the system to produce that observation and reach state q.
Definition 6
(Worthy Opacity). Given a system G = ( Q , E , f , Q 0 ) with state-worth function Δ, a set of observable events E o E , and a non-negative value K R 0 , an observation ω P ( L ( G ) ) is worthy opaque with respect to E o , Δ, and K (denoted by ( E o , Δ , K ) -WO) if
q Q α ω ( q ) · Δ ( q ) K ,
where α ω ( q ) = | Φ q ( ω ) | / | Φ ( ω ) | . System G is said to be worthy opaque with respect to E o , Δ, and K ( ( E o , Δ , K ) -WO) if all observations ω P ( L ( G ) ) are ( E o , Δ , K ) -WO.
Note that α ω ( q ) in Definition 6 can be viewed as the intruder’s probability estimate of the current state of the system as q after observing ω , i.e., the probability of system G in state q C ( ω ) when observation ω is generated is implicitly defined as the number of runs in which the system generates observation ω and ends up in state q divided by the number of all runs that can generate observation ω . Then, the left-hand side of (1) shows the worth the system is expected to expose for generating the observation ω . That is to say, a system is worthy opaque if the worth it exposes to the outside world during its evolution does not exceed a certain threshold.
Example 5.
Consider the situation in Example 4, which is modeled as the system G 1 of Example 1. Suppose that the private detective sees that we deposit $100 in the bank, i.e., the system G 1 produces the observation e 1 . We have Φ ( e 1 ) = { q 1 e 1 q 2 e 2 q 1 , q 1 e 2 q 4 e 1 q 1 , q 1 e 1 q 2 , q 1 e 2 q 4 e 1 q 1 e 2 q 4 , q 1 e 1 q 2 e 2 q 1 e 2 q 4 } . Thus, we have | Φ q 1 ( e 1 ) | = 2 , | Φ q 2 ( e 1 ) | = 1 , | Φ q 4 ( e 1 ) | = 2 , and | Φ ( e 1 ) | = 5 , leading to α e 1 ( q 1 ) = 2 / 5 , α e 1 ( q 2 ) = 1 / 5 , and α e 1 ( q 4 ) = 2 / 5 . By (1), we have q Q α ω ( q ) · Δ ( q ) = 2 / 5 · 100 + 1 / 5 · 200 + 2 / 5 · 0 = 80 , implying that observation e 1 is ( E o , Δ , 80 ) -WO. In plain words, the worth of information revealed to the outside world by observation e 1 is 80, which is a reasonable inference that the private detective can make.
Notice that the probabilities implied in Definition 6 are based on a uniform distribution over the set of consistent runs, which implies that the set Φ ( ω ) must be finite, since there is no uniform distribution over infinite countable sets; otherwise the additivity of the probability axioms [31] is violated. Therefore, we have the following assumption on system G.
Assumption 1.
There are no unobservable cycles in the system G, where an unobservable cycle c u is a cycle such that P ( ϕ ( c u ) ) = ε .
The above assumption ensures that, for each observation, the set of consistent runs is finite (as shown in Proposition 1), and this assumption is also a general one when the system is modeled as a Petri net and the problem is analyzed using the notion of a basis reachability graph [28].
Proposition 1.
  Given a system G = ( Q , E , f , Q 0 ) with a set of observable events E o E , the set Φ ( ω ) is finite for any observation ω P ( L ( G ) ) if there are no unobservable cycles in G.
Proof. 
We first show that system G can generate no more than N k + 1 M k runs of length k, where N is the number of states and M is the number of events in G. Note that we can consider a k-length run as a cross-arrangement of k + 1 states and k events, provided that the transition function f is satisfied and q ( 0 ) Q 0 . The number of k-length runs is maximized by setting Q 0 = Q and f ( q , e ) = Q (for any q Q and e E ). In this way, each state and each event in a run can be arbitrarily selected from N states and M events, respectively. In other words, the number of k-length runs cannot exceed N k + 1 M k .
Then, we prove the proposition by contrapositive. Suppose that there exists an observation ω = o ( 1 ) o ( 2 ) o ( l ) such that the set Φ ( ω ) is infinite. The length of runs in set Φ ( ω ) can be greater than any given positive integer L. Otherwise, the number of runs in Φ ( ω ) cannot exceed i = 1 L N i + 1 M i , which implies that Φ ( ω ) is finite.
Now, let L = N · ( l + 2 ) 1 , we can find a run
r L = q ( 0 ) e ( 1 ) q ( 1 ) e ( 2 ) q ( N · ( l + 2 ) 1 ) e ( N · ( l + 2 ) ) q ( N · ( l + 2 ) ) ,
whose length is greater than L. By Lemma 4, we can obtain that there is a state q d of G that is duplicated at least l + 2 times in r L . This implies that there are at least l + 1 cycles in r L that begin and end with state q d . Since the length of ω is l < l + 1 , we conclude that at least one of these l + 1 cycles is unobservable, which completes the proof. □
Recall that in the research of state-based opacity, the secret is defined as a sub-set of system states. In general, secret states are more valuable than non-secret states. With this consideration, we can relate current-state opacity to the proposed worthy opacity.
Proposition 2.
Given a system G = ( Q , E , f , Q 0 ) with state-worth function Δ, a secret S = { q Δ ( q ) > K } ( K R 0 ), and a set of observable events E o E , G is ( S , E o ) -CSO, if G is ( E o , Δ , K ) -WO.
Proof. 
By contrapositive, suppose that G is not ( S , E o ) -CSO. By Lemma 1, there exists an observation ω such that C ( ω ) S . That is, for any q C ( ω ) , Δ ( q ) > K holds, which leads to the fact that G is not ( E o , Δ , K ) -WO. □
Note that the converse of the above proposition does not hold, as illustrated by the following example.
Example 6.
Consider the system G 2 in Figure 3a, where E o = E = { e 1 } . Let Δ ( q 1 ) = 50 , Δ ( q 2 ) = 200 , and S = { q Δ ( q ) > 100 } = { q 2 } . It is not difficult to verify that system G 2 is ( S 2 , E o ) -CSO. By analysis, we see that the evolution of G 2 satisfies Table 1. From Definition 6, we find that the system is ( E o , Δ , 125 ) -WO, not ( E o , Δ , 100 ) -WO.

4. Verifying Worthy Opacity

Intuitively, to verify the worthy opacity of a given system G, we need to check whether (1) holds for all ω P ( L ( G ) ) , which means that the value of α ω ( q ) needs to be computed for all q Q . In general, this requires an exhaustive enumeration of all possible strings that can be generated by G, which may require infinite memory and thus render the problem unsolvable. In this section, we first provide an online verification procedure, and then propose an algorithm to identify a particular class of systems and verify their worthy opacity.

4.1. Online Verification of an Observation

Given an observation ω , we develop a notion of run matrix to compute the cardinality of a set Φ q ( ω ) (for any q Q ) based on the transition matrix of automata.
Definition 7
(Transition Matrix [34]). Given an event e E of a system G = ( Q , E , f , Q 0 ) , the transition matrix T e is an N × N matrix, where the typical entry T e i , j is equal to one if q i f ( q j , e ) and to zero otherwise.
Example 7.
Consider the system in Example 1. The transition matrices associated with events e 1 and e 2 are, respectively:
T e 1 = 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 , T e 2 = 0 1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 .
As runs are composed of transitions, we can utilize the transition matrix to calculate the number of runs between two states on a given string s E * . Based on the idea of a transition matrix, we propose the notion of a run matrix.
Definition 8
(Run Matrix). Given a system G = ( Q , E , f , Q 0 ) and a string s E * , the run matrix R s is an N × N matrix whose typical entry R s i , j is equal to the number of runs from q j to q i on string s.
Recall that the values of transition function f of system G are sub-sets of states rather than multi-sets [35], which means that given a state q and an event e, the number of runs from state q to q on the one-length string e is one if q f ( q , e ) and zero otherwise. This coincides with the definition of the transition matrix; hence, R e = T e for all e E . For the empty string ε , to fit the extended definition of transition function, we have R ε = I , where I is an identity matrix of size N.
Remark 1.
For a string s L ( G , Q ) , its corresponding run matrix is a null matrix, indicating no run on s in G from whatever state it starts in.
Even though we specify the run matrices associated with strings of length zero and one for a given system G, it is still a problem to compute the run matrix associated with a string s of length greater than one, which is a more general case. Before we introduce the computation, we prove the following two properties of run matrices.
Proposition 3.
Given two strings s 1 and s 2 that have corresponding run matrices R s 1 and R s 2 , respectively,   
(1) 
In the case that s 1 and s 2 are not identical, the number of runs on string s 1 or s 2 can be described by matrix R s 1 + s 2 = R s 1 + R s 2 , i.e., the number of runs from state q j to q i on string s 1 or s 2 is R s 1 + s 2 i , j ;
(2) 
The number of runs on string s 1 s 2 can be described by matrix R s 1 s 2 = R s 2 · R s 1 , i.e., the number of runs from state q j to q i on string s 1 s 2 is R s 1 s 2 i , j .
Proof. 
(1) As s 1 s 2 , a system cannot generate strings s 1 and s 2 simultaneously, whereas the way the system generates a string is the number of runs it can generate on that string. By Lemma 2, we have that the number of runs on string s 1 or s 2 is equal to the sum of the number of runs on s 1 and the number of runs on s 2 , which is R s 1 i , j + R s 2 i , j = R s 1 + s 2 i , j .
(2) Clearly, a system generates a string s 1 s 2 in the order that first yields s 1 and then generates s 2 . By Lemma 3, we have that the number of runs from state q j to q i on s 1 s 2 is equal to the product of the number of runs from state q j to any state q k Q and the number of runs from that state q k to state q i , which is 1 k N R s 1 k , j · R s 2 i , k = R s 1 s 2 i , j . □
Remark 2.
Given any string s E * , we have R s = R s · R ε = R ε · R s , which also meets the definition of the concatenation of strings.
Based on the second part of the above proposition, we have the following corollary, which can be used to calculate the run matrix associated with a string s E * of length greater than zero.
Corollary 1.
The run matrix associated with a string s = e ( 1 ) e ( 2 ) e ( k ) ( k > 0 ) is
R s = T e ( k ) T e ( k 1 ) T e ( 2 ) T e ( 1 ) .
We can also extend the notion of run matrices to languages, i.e., given a language L, the run matrix R L associated with it is an N × N matrix whose typical entry R L i , j is equal to the total number of runs on all strings in L from q j to q i . It is not difficult to conclude that R L = s L R s . Moreover, the extended run matrix has the following properties.
Proposition 4.
Given two finite languages L 1 and L 2 that have corresponding run matrices R L 1 and R L 2 , respectively,
(1) 
In the case that L 1 and L 2 are disjoint, R L 1 L 2 = R L 1 + R L 2 .
(2) 
R L 1 · L 2 = R L 2 · R L 1 .
Proof. 
(1) As L 1 and L 2 are disjoint, the string in L 1 L 2 either belongs to L 1 or to L 2 . Therefore, we have R L 1 L 2 = s L 1 R s + s L 2 R s = R L 1 + R L 2 .
(2) By L 1 L 2 = { s 1 s 2 s 1 L 1 , s 2 L 2 } , and the definition of extended run matrices, we have R L 1 · L 2 = s 1 L 1 , s 2 L 2 R s 2 · R s 1 = ( s 2 L 2 R s 2 ) · ( s 1 L 1 R s 1 ) = R L 2 · R L 1 , where the first equal sign is due to the second part of Proposition 3. □
Remark 3.
For any finite language L E * , we have R L = R L L ( G , Q ) , as for any s L \ L ( G , Q ) , we have R s = O by Remark 1, where O is a null matrix.
Proposition 5.
Given a system G = ( Q , E , f , Q 0 ) , define an N-dimensional column vector π such that [ π ] i = 1 if q i Q 0 and [ π ] i = 0 otherwise. Then, [ R L · π ] i is the total number of runs generated by system G on strings in language L, where the ending state of these runs is q i .
Proof. 
It can be directly obtained from the definition of the multiplication of matrices and the meaning of run matrices. □
Based on the above discussions, we can use matrix operations to calculate the number of runs between different states on observations. It is not difficult to find that given an observation ω = o ( 1 ) o ( 2 ) o ( l ) , we have S ( ω ) = E u o * { o ( 1 ) } E u o * { o ( 2 ) } E u o * E u o * { o ( l ) } E u o * L ( G ) . Based on Definition 5, we know that the cardinality of set Φ q ( ω ) is the total number of runs generated by the system on all strings in language S ( ω ) that can reach state q, i.e., | Φ q i ( ω ) | = [ R S ( ω ) · π ] i ( 1 i N ). With Remark 3, once the run matrix corresponding to the language E u o * { o ( 1 ) } E u o * { o ( 2 ) } E u o * E u o * { o ( l ) } E u o * is obtained, the cardinality of set Φ q ( ω ) for any q Q is calculated.
Clearly, for any e E o , we have R { e } = R e = T e . The remaining problem is how to determine the run matrix associated with E u o * . Considering the set of unobservable events E u o as a language, we have R E u o = e E u o R e = e E u o T e . By the second part of Proposition 4, we have R E u o i = R E u o i for i > 0 . Note that by E u o 0 = { ε } , there is R E u o 0 = R ε = I .
Theorem 1.
Given a system G = ( Q , E , f , Q 0 ) with no unobservable cycles, the run matrix R E u o * associated with E u o * is ( I R E u o ) 1 .
Proof. 
Since E u o * = { ε } E u o E u o 2 and any two sets in { E u o i i N } are disjoint, by Proposition 4, we have R E u o * = i N R E u o i . Suppose that there exists a run r of length N generated by G with N + 1 states, where N is the number of states in G. By Lemma 4, we can find a duplicate state q d in r. This indicates the existence of an unobservable cycle in r, which violates the premise that there are no unobservable cycles in G. Therefore, the length of unobservable runs generated by G cannot be greater than N. Naturally, we have R E u o i = O for all i > N . From this, we obtain R E u o * = i = 0 N R E u o i .
R E u o * · ( I R E u o ) = ( I + R E u o + R E u o 2 + + R E u o N ) · ( I R E u o ) = I R E u o N + 1 = I
Furthermore, by (3), we conclude that the matrix ( I R E u o ) is invertible and R E u o * = ( I R E u o ) 1 . □
Remark 4.
In the following, we will notate the run matrix associated with E u o * as R u o for brevity of notation. If there are no unobservable events in the system G, then R E u o = O , leading to R u o = I without affecting the results below.
In light of the above discussion, it is natural to present Algorithm 1 for the online verification of worthy opacity. Lines 3 to 8 are the initialization of the marker variable f l a g and the count vector π , where f l a g is set to be T r u e to indicate that the system is worthy opaque, and the i-th entry of π indicates the number of system-generated runs ending in state q i , inferred by an intruder from the observation. Lines 9 to 23 are the intruder’s online judgment of worthy opacity, whereas lines 10 to 14 are calculations of the expected worth of the currently revealed information. Once the expected worth exceeds K, which means that the system is not worthy opaque, set the f l a g to be F a l s e and stop observing as shown in lines 15 to 18; otherwise, continue the observation as shown in lines 19 to 22. As regards the complexity of Algorithm 1, we note that the complexity of the recursive step k (observe the kth event) is O ( k · N ) .
Example 8.
Consider the system G 1 in Example 1, where its state-worth function is shown in Example 4. Given an observation ω = e 1 2 , we verify online the ( E o , Δ , 100 ) -worthy opacity of ω using Algorithm 1. Initially, ω is set to be the empty string, i.e., ω = ε . By Algorithm 1, we have that the expected worth for this system is 50, which is less than 100, implying that the null observation ε is ( E o , Δ , 100 ) -WO. Similarly, after observing e 1 , the value of w o r t h becomes 80 < 100 , so e 1 is also ( E o , Δ , 100 ) -WO. Continuing to run the algorithm, after observing e 1 again, we have w o r t h = 100 , implying that e 1 2 is ( E o , Δ , 100 ) -WO.
Algorithm 1 Online verification of worthy opacity
Input: 
A system G = ( Q , E , f , Q 0 ) with E = E o ˙ E u o , a state-worth function Δ , and a non-negative value K
Output: 
( E o , Δ , K ) -WO of ω upon observing an event e
1:
f l a g T r u e , π 0
2:
for i 1 to N do
3:
   if  q i Q 0  then
4:
      [ π ] i 1
5:
   end if
6:
end for
7:
while  f l a g  do
8:
    π R u o · π , w o r t h 0
9:
    π n norm ( π )
10:
   for  i 1 to N do
11:
      w o r t h w o r t h + Δ ( q i ) · [ π n ] i
12:
   end for
13:
   if  w o r t h > K  then
14:
      f l a g F a l s e
15:
   end if
16:
   Output f l a g
17:
   if  f l a g  then
18:
     Wait until a new event e is observed
19:
      π T e · π
20:
   end if
21:
end while

4.2. Run Status Recorder and 1-Cycle Returned

It is not difficult to find that for any observation ω , there is Φ q ( ω ) = if q C ( ω ) , which leads to α ω ( q ) = 0 if q C ( ω ) , and implies that we can narrow the computation from { α ω ( q ) q Q } to { α ω ( q ) q C ( ω ) } . We call the set { α ω ( q ) q C ( ω ) } the current-state probability distribution estimate associated with ω , denoted by A ( ω ) . Note that the observer mentioned in Definition 3 represents, in a compact structure, all possible current state estimates during the evolution of a system. Inspired by this idea, it seems that we can also represent all current-state probability distribution estimates in a finite structure. Unfortunately, as the system evolves, there may be an infinite number of sets A ( ω ) , as the sets A ( ω ) and C ( ω ) do not correspond one-to-one.
By analyzing the evolution of a system, we find that if there is no cycle in its observer. Then, the observations generated by that system are finite, which means that the number of set A ( ω ) is also finite. Thus, the verification of worthy opacity can be achieved by traversing all observations to determine whether (1) holds. In contrast, if there is a cycle in the observer of a system, then this system can generate an infinite number of observations.
Given a cycle c o of an observer, the system associated with that observer can generate an infinite number of observations of the form ω c o i ( i N ), assuming that the observation when the observer first enters the cycle is ω . If A ( ω ) = A ( ω c o ) , we say that the cycle is 1-cycle returned (1-CR), and if all cycles in an observer of a system are 1-CR, then we say that this system is 1-CR. Fortunately, if a system G is 1-CR, then the current-state probability distribution estimate that can be generated by G is finite, i.e., the worthy opacity of system G is verifiable, as shown in Example 6.
Given a system G, we check whether G is 1-CR by Algorithm 2 and, if so, construct a run status recorder, which is an automaton that enumerates all possible current-state probability distribution estimates generated by system G (see Figure 4). The core idea of Algorithm 2 comes from Proposition 6.
Proposition 6.
Given two N-dimensional column vectors π 1 and π 1 that satisfy  norm ( π 1 ) = norm ( π 2 ) , for any N × N matrix R , it holds that norm ( R · π 1 ) = norm ( R · π 2 ) .
Proof. 
Let norm ( π 1 ) = norm ( π 2 ) = π . We have π 1 = k 1 π and π 2 = k 2 π , where k 1 and k 2 are 1-norms of π 1 and π 2 , respectively. Hence, one obtains
norm ( R · π 1 ) = R · k 1 π R · k 1 π = k 1 R · π k 1 R · π = k 2 R · π k 2 R · π = R · k 2 π R · k 2 π = norm ( R · π 2 ) .
This completes the proof. □
Algorithm 2 Construction of the run status recorder and and verification of the 1-CR of system G
Input: 
A system G = ( Q , E , f , Q 0 ) with E = E o ˙ E u o
Output: 
Run status recorder G r = ( Y , E o , f r , y 0 )
1:
for i 1 to N do
2:
   if  q i Q 0  then
3:
      [ π ] i 1
4:
   end if
5:
end for
6:
π R u o · π
7:
y 0 ( π , norm ( π ) )
8:
Y { y 0 } , n s { norm ( π ) }
9:
u n { y 0 }
10:
while  u n  do
11:
   Select a state y u n
12:
   for all  e E o  do
13:
      π R u o · T e · y ( 1 )
14:
     if  π 0 and norm ( π ) n s  then
15:
        if  y y such that eig ( y ( 1 ) ) = eig ( π )  then
16:
          return NOT 1-CR
17:
        end if
18:
         n s n s { norm ( π ) }
19:
         y n ( π , norm ( π ) ) , Y Y { y n }
20:
         u n u n { y n }
21:
   else
22:
     Select y n Y with y n ( 2 ) = norm ( π )
23:
   end if
24:
      f r ( y , e ) y n
25:
   end for
26:
     u n u n \ { y }
27:
end while
Each state in the run status recorder G r is an ordered pair of two vectors, whose first component is the count vector mentioned in Algorithm 1, denoting the number of runs that reach each state after the system generates a certain observation. Its second component is the L1-normalization of the first vector. Proposition 6 shows that we can merge count vectors that have the same L1-normalization because we are only interested in the current-state probability distribution estimates, which is why we use the second component of the state to identify the different states.
Algorithm 2 works as follows: Lines 3 to 11 are the initialization of the key parameters of the algorithm, where set n s includes all possible current-state probability distribution estimates generated by the input system and set u n contains the states generated by the algorithm for which subsequent states are not computed. Function eig : N N N N in line 16 of Algorithm 2 is defined as [ eig ( π ) ] i = 1 if [ π ] i 0 otherwise [ eig ( π ) ] i = 0 , representing a current-state estimate of system G. Once the judgment condition in line 16 is satisfied, it means that the newly generated current-state probability distribution estimate, which different from some previously calculated current-state probability distribution estimate, corresponds to the same current-state estimate, i.e., this system is not 1-CR.
The construction of a run status recorder shows that the number of its states is related to the number of cycles in the observer of the input system G. The number of cycles in an observer of system G containing i different states is 2 N i ( i 1 ) ! , where the observer is considered as the worst case. Then, these 2 N i ( i 1 ) ! cycles can produce i · 2 N i ( i 1 ) ! = ( 2 N ) ! / ( 2 N i ) ! different states in G r in the worst case. Therefore, the complexity of Algorithm 2 is O ( 2 N ! ) . Although the complexity of Algorithm 2 looks formidable, there are few systems that can reach the worst case that we analyze. If there is no cycle in the observer of a system, then the complexity of Algorithm 2 is reduced to O ( 2 N ) .
Theorem 2.
Given a system G = ( Q , E , f , Q 0 ) with state-worth function Δ, a set of observable events E o E , and a non-negative value K R 0 , if system G is 1-CR, then construct the run status recorder G r = ( Y , E o , f r , y 0 ) as in Algorithm 2. System G is worthy opaque with respect to E o , Δ and K if and only if for any states y Y , Δ · y ( 2 ) K holds, where Δ is an N-dimensional row vector with [ Δ ] i = Δ ( q i ) .
Proof. 
(Sufficiency) By contrapositive, assume that there exists a state y in G r such that Δ · y ( 2 ) > K . Let ω be the observation that leads to y from y 0 . By the construction of G r , we have that, for the observation ω , q Q α ω ( q ) · Δ ( q ) > K holds. By Definition 6, G is not worthy opaque with respect to E o , Δ and K.
(Necessity) Also by contrapositive, assume that G is not worthy opaque with respect to E o , Δ and K. By Definition 6, there exists an observation ω such that q Q α ω ( q ) · Δ ( q ) > K . By the construction of G r , we conclude that there is a state y Y with Δ · y ( 2 ) > K . □
Example 9.
Consider a single-story smart building with five rooms marked with R 1 , R 2 , R 3 , R 4 , and R 5 , as shown in Figure 5a. A bi-directional door exists between R 1 and R 2 , R 3 and R 4 , R 3 and R 5 , R 1 and R 5 , while R 2 to R 4 have a uni-directional door. And these five rooms are provided to three different departments according to R 1 and R 2 , R 3 and R 4 , and R 5 . A smart vehicle provides different services to staff depending on the department, with sensors inside the vehicle that identify the current department. Five levels of confidential documents need to be stored in these five rooms, ranging in value from 1 to 5. Now, suppose that an intruder can read the sensor data of a smart vehicle; how does one allot the five rooms to store confidential documents such as to minimize the worth of information exposed by the vehicle?
The vehicle’s trajectory can be represented by the model shown in Figure 5b. The five states q 1 to q 5 correspond to the five rooms R 1 to R 5 , respectively. Events e 1 to e 3 represent the sensor readings of the vehicle reaching each room, respectively. Since the intruder does not know the exact location of the vehicle but can obtain the sensor readings, the initial state of this model is Q 0 = Q = { q 1 , q 2 , q 3 , q 4 , q 5 } and the observable event set is E o = E = { e 1 , e 2 , e 3 } . Now, running Algorithm 2 with system G 3 as input, we can obtain the corresponding run status recorder G r , 3 as shown in Figure 6.
By assumption, the state-worth function Δ of system G 3 is a one-to-one mapping from Q to { 1 , 2 , 3 , 4 , 5 } . Let Δ be an N-dimensional row vector with [ Δ ] i = Δ ( q i ) . Then, the problem of allotting the rooms where the confidential documents are to be stored is transformed into how to define the function Δ such that the maximum value in { Δ · y i ( 2 ) i = 0 , 1 , 2 , 3 , 4 , 5 , 6 } is minimized. Based on states y 4 , y 5 , and y 6 , we know that the two documents with the highest level of confidentiality can only be placed in rooms R 1 and R 2 , respectively. Once this is done, it is not difficult to verify that max { Δ · y i ( 2 ) i = 0 , 1 , 2 , 3 , 4 , 5 , 6 } = Δ · y 0 ( 2 ) = 3 , which means the system G 3 is ( E 0 , Δ , 3 ) -WO.
In plain words, we only need to place the documents with the highest and second-highest level of confidentiality in rooms R 1 and R 2 , respectively; then, no matter how the sensor data of the vehicle is exposed, the worth of the information it reveals to the outside world will not exceed 3.

5. Conclusions

In this article, we introduce a notion of worthy opacity to quantify the worth of information released by a partially observed DES modeled with an automaton. We propose an online verification algorithm that considers an intruder who waits and observes the occurrence of observable events and determines whether the observation is worthy opaque. We also present a 1-CR system to verify the worthy opacity offline.
We believe that there are multiple interesting directions for future work related to the notion of worthy opacity. An attractive direction is to synthesize a supervisor that enforces worthy opacity when the verification result is negative. Also, we would like to apply the notion of worthy opacity to more complex, realistic environments.

Author Contributions

Conceptualization, S.Z. and L.Y.; methodology, S.Z.; software, S.Z.; validation, J.Y. and L.Y.; formal analysis, Z.L.; investigation, J.Y.; resources, Z.L.; writing— original draft preparation, S.Z.; writing—review and editing, Z.L.; visualization, S.Z.; supervision, L.Y.; project administration, L.Y. and Z.L.; funding acquisition, L.Y. and Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Guangzhou Innovation and Entrepreneurship Leading Team Project Funding under grant No. 202009020008 and the Science and Technology Fund, FDCT, Macau SAR, under grant No. 0101/2022/A.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
DESDiscrete Event System
DFADeterministic Finite Automaton
IoTInternet of Things
NFANon-deterministic Finite Automaton
1-CR1-Cycle Returned

References

  1. Khor, N.; Arimah, B.; Otieno, R.; Oostrum, M.; Mutinda, M.; Martins, J. World Cities Report 2022: Envisaging the Future of Cities. 2022. Available online: https://unhabitat.org/sites/default/files/2022/06/wcr_2022.pdf (accessed on 29 June 2022).
  2. Yang, J.; Lee, T.Y.; Zhang, W. Smart cities in China: A brief overview. IT Prof. 2021, 23, 89–94. [Google Scholar] [CrossRef]
  3. Jia, M.; Komeily, A.; Wang, Y.; Srinivasan, R.S. Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Autom. Constr. 2019, 101, 111–126. [Google Scholar] [CrossRef]
  4. Verma, A.; Prakash, S.; Srivastava, V.; Kumar, A.; Mukhopadhyay, S.C. Sensing, controlling, and IoT infrastructure in smart building: A Review. IEEE Sens. J. 2019, 19, 9036–9046. [Google Scholar] [CrossRef]
  5. Shaikh, P.H.; Nor, N.B.M.; Nallagownden, P.; Elamvazuthi, I.; Ibrahim, T. A review on optimized control systems for building energy and comfort management of smart sustainable buildings. Renew. Sustain. Energy Rev. 2014, 34, 409–429. [Google Scholar] [CrossRef]
  6. Carli, R.; Cavone, G.; Dotoli, M.; Epicoco, N.; Scarabaggio, P. Model predictive control for thermal comfort optimization in building energy management systems. In Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy, 6–9 October 2019; pp. 2608–2613. [Google Scholar]
  7. Ascione, F.; Bianco, N.; De Stasio, C.; Mauro, G.M.; Vanoli, G.P. Simulation-based model predictive control by the multi-objective optimization of building energy performance and thermal comfort. Energy Build. 2016, 111, 131–144. [Google Scholar] [CrossRef]
  8. Komninos, N.; Philippou, E.; Pitsillides, A. Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 2014, 16, 1933–1954. [Google Scholar] [CrossRef]
  9. Wendzel, S. How to increase the security of smart buildings? Commun. ACM 2016, 59, 47–49. [Google Scholar] [CrossRef]
  10. Hu, J.; Zhang, Z.; Lu, J.; Yu, J.; Cao, J. Demand response control of smart buildings integrated with security interconnection. IEEE Trans. Cloud Comput. 2022, 10, 43–55. [Google Scholar] [CrossRef]
  11. Mazaré, L. Using unification for opacity properties. In Proceedings of the 4th IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security, Barcelona, Spain, 3–4 April 2004. [Google Scholar]
  12. Bryans, J.; Koutny, M.; Mazaré, L.; Ryan, P. Opacity generalised to transition systems. Int. J. Inf. Secur. 2008, 7, 421–435. [Google Scholar] [CrossRef]
  13. Lin, F. Opacity of discrete event systems and its applications. Automatica 2011, 47, 496–503. [Google Scholar] [CrossRef]
  14. Jacob, R.; Lesage, J.J.; Faure, J.M. Overview of discrete event systems opacity: Models, validation, and quantification. Annu. Rev. Control 2016, 41, 135–146. [Google Scholar] [CrossRef]
  15. Tong, Y.; Ma, Z.; Li, Z.; Seatzu, C.; Giua, A. Verification of language-based opacity in Petri nets using verifier. In Proceedings of the 2016 American Control Conference, Boston, MA, USA, 6–8 July 2016. [Google Scholar]
  16. Saboori, A.; Hadjicostis, C.N. Notions of security and opacity in discrete event systems. In Proceedings of the 46th IEEE Conference on Decision and Control, New Orleans, LA, USA, 12–14 December 2007. [Google Scholar]
  17. Dong, Y.; Li, Z.; Wu, N. Symbolic verification of current-state opacity of discrete event systems using Petri nets. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 7628–7641. [Google Scholar] [CrossRef]
  18. Saboori, A.; Hadjicostis, C.N. Verification of initial-state opacity in security applications of discrete event systems. Inf. Sci. 2013, 246, 115–132. [Google Scholar] [CrossRef]
  19. Wu, Y.C.; Lafortune, S. Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst. 2013, 23, 307–339. [Google Scholar] [CrossRef]
  20. Saboori, A.; Hadjicostis, C.N. Verification of K-step opacity and analysis of its complexity. IEEE Trans. Autom. Sci. Eng. 2011, 8, 549–559. [Google Scholar] [CrossRef]
  21. Saboori, A.; Hadjicostis, C.N. Verification of infinite-step opacity and complexity considerations. IEEE Trans. Autom. Control 2011, 57, 1265–1269. [Google Scholar] [CrossRef]
  22. Yang, S.; Yin, X. Secure Your Intention: On Notions of Pre-Opacity in Discrete-Event Systems. IEEE Trans. Autom. Control 2023, 68, 4754–4766. [Google Scholar] [CrossRef]
  23. Bérard, B.; Mullins, J.; Sassolas, M. Quantifying opacity. Math. Struct. Comput. Sci. 2015, 25, 361–403. [Google Scholar] [CrossRef]
  24. Saboori, A.; Hadjicostis, C.N. Current-state opacity formulations in probabilistic finite automata. IEEE Trans. Autom. Control 2014, 59, 120–133. [Google Scholar] [CrossRef]
  25. Li, D.; Yin, L.; Wang, J.; Wu, N. Game current-state opacity formulation in probabilistic resource automata. Inf. Sci. 2022, 613, 96–113. [Google Scholar] [CrossRef]
  26. Bourouis, A.; Klai, K.; Hadj-Alouane, N.B. Measuring opacity for non-probabilistic DES: A SOG-based approach. In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, Guangzhou, China, 10–13 November 2019. [Google Scholar]
  27. Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems; Springer Nature: Cham, Switzerland, 2021. [Google Scholar]
  28. Tong, Y.; Li, Z.; Seatzu, C.; Giua, A. Verification of state-based opacity using Petri nets. IEEE Trans. Autom. Control 2017, 62, 2823–2837. [Google Scholar] [CrossRef]
  29. Jiang, S.; Kumar, R.; Garcia, H.E. Diagnosis of repeated/intermittent failures in discrete event systems. IEEE Trans. Robot. Autom. 2003, 19, 310–323. [Google Scholar] [CrossRef]
  30. Reinhardt, K. Counting as Method, Model and Task in Theoretical Computer Science. Habilitation Thesis, University of Tübingen, Tübingen, Germany, 2005. [Google Scholar]
  31. Bertsekas, D.P.; Tsitsiklis, J.N. Introduction to Probability; Athena Scientific: Nashua, New Hampshire, 2008. [Google Scholar]
  32. Brualdi, R. Introductory Combinatorics; Pearson Education: Upper Saddle River, NJ, USA, 2010. [Google Scholar]
  33. Rosen, K. Discrete Mathematics and Its Applications; McGraw-Hill: New York, NY, USA, 2019. [Google Scholar]
  34. Hadjicostis, C.N. Estimation and Inference in Discrete Event Systems: A Model-Based Approach with Finite Automata; Springer: New York, NY, USA, 2020. [Google Scholar]
  35. Blizard, W. Multiset theory. Notre Dame J. Form. Log. 1989, 30, 36–66. [Google Scholar] [CrossRef]
Figure 1. (a) A system G 1 and (b) the observer G 1 , o b s with respect to G 1 .
Figure 1. (a) A system G 1 and (b) the observer G 1 , o b s with respect to G 1 .
Mathematics 11 03629 g001
Figure 2. The generation of observations.
Figure 2. The generation of observations.
Mathematics 11 03629 g002
Figure 3. (a) A system G 2 and (b) the observer G 2 , o b s with respect to G 2 .
Figure 3. (a) A system G 2 and (b) the observer G 2 , o b s with respect to G 2 .
Mathematics 11 03629 g003
Figure 4. Input and output of Algorithm 2.
Figure 4. Input and output of Algorithm 2.
Mathematics 11 03629 g004
Figure 5. (a) A single-story building with five rooms and (b) the constructed automaton model G 3 .
Figure 5. (a) A single-story building with five rooms and (b) the constructed automaton model G 3 .
Mathematics 11 03629 g005
Figure 6. The run status recorder of G 3 .
Figure 6. The run status recorder of G 3 .
Mathematics 11 03629 g006
Table 1. Number of runs in G 2 .
Table 1. Number of runs in G 2 .
Observation ω ( i Z + ) | Φ q 1 ( ω ) | | Φ q 2 ( ω ) |
ε 10
e 1 i 2 i 1 2 i 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, S.; Yu, J.; Yin, L.; Li, Z. Security Quantification for Discrete Event Systems Based on the Worth of States. Mathematics 2023, 11, 3629. https://0-doi-org.brum.beds.ac.uk/10.3390/math11173629

AMA Style

Zhou S, Yu J, Yin L, Li Z. Security Quantification for Discrete Event Systems Based on the Worth of States. Mathematics. 2023; 11(17):3629. https://0-doi-org.brum.beds.ac.uk/10.3390/math11173629

Chicago/Turabian Style

Zhou, Sian, Jiaxin Yu, Li Yin, and Zhiwu Li. 2023. "Security Quantification for Discrete Event Systems Based on the Worth of States" Mathematics 11, no. 17: 3629. https://0-doi-org.brum.beds.ac.uk/10.3390/math11173629

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop