Three New Versions of Strong Opacity Based on the Security Quantification Consideration
Yingrui Zhou,Zengqiang Chen,Zhipeng Zhang,Zhongxin Liu
DOI: https://doi.org/10.1109/tsmc.2024.3441730
2024-01-01
Abstract:Privacy security research is one of the most important issues for the cyber-physical systems, and opacity as an information flow property, provides a new perspective for studying privacy security in complex information interaction scenarios. In the context of the discrete event systems, vital privacy can be modeled as secret states and based on the available observations (i.e., the sequence of observable events), intruders would analyse whether something secret has occurred. In this article, three kinds of strong W-limited opacity, named strong W, (W, M), and (W,8) opacity for the partially observed discrete event system are investigated based on the security quantification consideration. It is assumed that the vicious eavesdropper has a complete knowledge of given systems' structure and analyses something secret by limited observable information. Meanwhile, in addition to the current and delayed information analysis, predictive information analysis is first added to the strong opacity setting. W denotes the limited observable information and M (8) represents the finite (infinite) predictability. Subsequently, a pivotal technique called labeled W-limited state estimator is constructed, based on which, verifications for the three kinds of strong W-limited opacity are accomplished with the help of secret-labeled states and secret-reaching states. The current work shows that the complexity is O(22|X| (W + 1)| -o|). Finally, the upper bounds of W and M are also discussed, and it is proved to be |X|(2|X| - 1) and 2|X\XS| - 1. (X is the state set, XS is the secret state set, and Sigma o denotes the observable events set.)