Show simple item record

Verification and Enforcement of Opacity Security Properties in Discrete Event Systems.

dc.contributor.authorWu, Yi-Chinen_US
dc.date.accessioned2014-10-13T18:19:54Z
dc.date.availableNO_RESTRICTIONen_US
dc.date.available2014-10-13T18:19:54Z
dc.date.issued2014en_US
dc.date.submitteden_US
dc.identifier.urihttps://hdl.handle.net/2027.42/108905
dc.description.abstractThe need for stringent cybersecurity is becoming significant as computers and networks are integrated into every aspect of our lives. A recent trend in cybersecurity research is to formalize security notions and develop theoretical foundations for designing secure systems. In this dissertation, we address a security notion called opacity based on the control theory for Discrete Event Systems (DES). Opacity is an information-flow property that captures whether a given secret of the system can be inferred by intruders who passively observe the behavior of the system. Finite-state automata are used to capture the dynamics of computer systems that need to be rendered opaque with respect to a given secret. Under the observation of the intruder, the secret of the system is opaque if “whenever the secret has occurred, there exists another non-secret behavior that is observationally equivalent.” This research focuses on the analysis and the enforcement of four notions of opacity. First, we develop algorithms for verifying opacity notions under the attack model of a single intruder and that of multiple colluding intruders. We then consider the enforcement of opacity when the secret is not opaque. Specifically, we propose a novel enforcement mechanism based on event insertion to address opacity enforcement for a class of systems whose dynamics cannot be modified. An insertion function, placed at the output of the system, inserts fictitious observable events to the system’s output without interacting with the system. We develop a finite structure called the All-Insertion Structure (AIS) that enumerates all valid insertion functions. The AIS establishes a necessary and sufficient condition for the existence of a valid insertion function, and provides a structure to synthesize one insertion function. Furthermore, we introduce the maximum total cost and the maximum mean cost to quantify insertion functions. A condition for determining which cost objective to use is established. For each cost, we develop an algorithmic procedure for synthesizing an optimal insertion function from the AIS. Finally, our analysis and enforcement procedure is applied to ensuring location privacy in location-based services.en_US
dc.language.isoen_USen_US
dc.subjectVerification and Enforcement of Opacity Security Properties in Discrete Event Systemsen_US
dc.titleVerification and Enforcement of Opacity Security Properties in Discrete Event Systems.en_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineElectrical Engineering: Systemsen_US
dc.description.thesisdegreegrantorUniversity of Michigan, Horace H. Rackham School of Graduate Studiesen_US
dc.contributor.committeememberLafortune, Stephaneen_US
dc.contributor.committeememberSakallah, Karem A.en_US
dc.contributor.committeememberTeneketzis, Demosthenisen_US
dc.contributor.committeememberHero Iii, Alfred O.en_US
dc.contributor.committeememberAnastasopoulos, Achilleasen_US
dc.contributor.committeememberCompton, Kevin J.en_US
dc.contributor.committeememberLin, Fengen_US
dc.subject.hlbsecondlevelElectrical Engineeringen_US
dc.subject.hlbtoplevelEngineeringen_US
dc.description.bitstreamurlhttp://deepblue.lib.umich.edu/bitstream/2027.42/108905/1/ycwu_1.pdf
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.