Verification of Opacity Under a K-Delay Orwellian Observation Mechanism
Abstract
1. Introduction
- We propose a novel Orwellian-type observation model called a K-delay Orwellian observation mechanism, which is a generalization of the traditional Orwellian projection [29]. In particular, the Orwellian projection is equivalent tp the proposed KOOM projection when .
- We formulate the two notions of standard and strong CSO under the KOOM to characterize the different abilities of a system to hide secret information from an intruder even if some of the strings generated by the system are inevitably disclosed.
- To verify these two opacity notions under the KOOM, we construct two information structures called a standard K-delay verifier and a strong K-delay verifier, respectively. Based on the constructed information structures, necessary and sufficient conditions are provided to verify standard and strong CSO under the KOOM separately.
2. Preliminaries
2.1. The System Model
- X is a finite set of states;
- is a finite set of events;
- is the (partial) transition function, which characterizes the dynamics of G: , which denotes that a transition exists, labeled by event reaching state y from state x;
- is the initial state.
- The transition function can be extended to in the usual manner to describe the multi-step dynamic behavior of the system:
- (1) ;
- (2) , where is the set of all finite strings over , including the empty string . For any string , we use to denote the length of the string s, i.e., and . The notation denotes the last event of the string s, i.e., . The string is a prefix of if exists such that , which is denoted by . We write if is defined. is used to denote the language generated by G from the state x, i.e., . In this paper, we call an element of an internal string of system G. Consider the string . We call a run of system G, which can be abbreviated as . In particular, if , then is called an empty run of G, as referred to in more detail in [31]. An illustrative example is provided to understand these concepts better.
2.2. The K-Delay Orwellian Observation Mechanism
3. Standard Current-State Opacity Under the KOOM
3.1. Standard Current-State Opacity Under the KOOM
3.2. Verification of Standard Current-State Opacity Under the KOOM
- The normal instant observation: This observation can be obtained when the conditions for the release of the KOOM are not fulfilled at this instant;
- The specific release observation: This observation can be obtained when the specific historical information (the internal string) is released, which implies that the conditions for the release of the KOOM are fulfilled simultaneously.
- is a set of states.
- is a finite set of events.
- is the initial state of .
- is the (partial) transition function, defined as follows: For any with and , is defined if and only if is defined. Further, we have if is defined, where
Algorithm 1 Verification of standard CSO under the KOOM |
|
4. Strong Current-State Opacity Under the KOOM
4.1. Strong Current-State Opacity Under KOOM
4.2. Verification of Strong Current-State Opacity Under the KOOM
- is a set of non-secret states;
- is a set of events;
- is the (partial) transition function, defined by us having if for all and all ;
- (Note that, if , then does not exist.) is the initial state.
- is a set of states;
- is a finite set of events;
- is the initial state;
- is the (partial) transition function, defined by us having defined if and only if is defined for any with and .Further, we have if is defined, where
Algorithm 2 Verification of SCSO under the KOOM |
|
4.3. The Properties of Standard and Strong Current-State Opacity Under the KOOM
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
KOOM | K-delay Orwellian Observation Mechanism |
DESs | Discrete-Event Systems |
DIRM | Dynamic Information Release Mechanism |
DFA | Deterministic Finite-State Automaton |
CSO | Current-State Opacity |
SCSO | Strong Current-State Opacity |
Appendix A. The Proof for Proposition 2
References
- Mazaré, L. Using unification for opacity properties. In Proceedings of the 4th Workshop on Issues in the Theory of Security (WITS), Barcelona, Spain, 3–4 April 2004; pp. 165–176. [Google Scholar]
- Bryans, J.W.; Koutny, M.; Ryan, P.Y.A. Modelling opacity using Petri nets. Electron. Notes Theor. Comput. Sci. 2005, 121, 101–115. [Google Scholar] [CrossRef]
- Bryans, J.W.; Koutny, M.; Mazaré, L.; Ryan, P.Y.A. Opacity generalised to transition systems. Int. J. Inf. Secur. 2008, 7, 421–435. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Notions of security and opacity in discrete event systems. In Proceedings of the 46th IEEE Conference on Decision and Control (CDC), New Orleans, LA, USA, 12–14 December 2007; pp. 5056–5061. [Google Scholar]
- Saboori, A.; Hadjicostis, C.N. Verification of initial-state opacity in security applications of discrete event systems. Inf. Sci. 2013, 246, 115–132. [Google Scholar] [CrossRef]
- Wu, Y.C.; Lafortune, S. Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst.-Theory Appl. 2013, 23, 307–339. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Verification of K-step opacity and analysis of its complexity. IEEE Trans. Autom. Sci. Eng. 2011, 8, 549–559. [Google Scholar] [CrossRef]
- Yin, X.; Lafortune, S. A new approach for the verification of infinite-step and K-step opacity using two-way observers. Automatica 2017, 80, 162–171. [Google Scholar] [CrossRef]
- Saboori, A.; Hadjicostis, C.N. Verification of infinite-step opacity and complexity considerations. IEEE Trans. Autom. Control 2012, 57, 1265–1269. [Google Scholar] [CrossRef]
- Yang, S.; Yin, X. Secure your intention: On notions of pre-opacity in discrete-event systems. IEEE Trans. Autom. Control 2023, 68, 4754–4766. [Google Scholar] [CrossRef]
- Falcone, Y.; Marchand, H. Enforcement and validation (at runtime) of various notions of opacity. Discret. Event Dyn. Syst.-Theory Appl. 2015, 25, 531–570. [Google Scholar] [CrossRef]
- Ma, Z.; Yin, X.; Li, Z. Verification and enforcement of strong infinite- and K-step opacity using state recognizers. Automatica 2021, 133, 109838. [Google Scholar] [CrossRef]
- Balun, J.; Masopust, T. Verifying weak and strong k-step opacity in discrete-event systems. Automatica 2023, 155, 111153. [Google Scholar] [CrossRef]
- Zhang, K. A unified concurrent-composition method to state/event inference and concealment in labeled finite-state automata as discrete-event systems. Annu. Rev. Control 2023, 56, 100902. [Google Scholar] [CrossRef]
- Zhang, Z.; Xia, C.; Qi, G.; Fu, J. Multi-step state-based opacity for unambiguous weighted machines. Sci. China-Inf. Sci. 2024, 67, 212204. [Google Scholar] [CrossRef]
- Lin, F. Opacity of discrete event systems and its applications. Automatica 2011, 47, 496–503. [Google Scholar] [CrossRef]
- Balun, J.; Masopust, T. Comparing the notions of opacity for discrete-event systems. Discret. Event Dyn. Syst.-Theory Appl. 2021, 31, 553–582. [Google Scholar] [CrossRef]
- Ji, Y.; Yin, X.; Lafortune, S. Opacity enforcement using nondeterministic publicly-known edit functions. IEEE Trans. Autom. Control 2019, 64, 4369–4376. [Google Scholar] [CrossRef]
- Wu, Y.C.; Lafortune, S. Synthesis of insertion functions for enforcement of opacity security properties. Automatica 2014, 50, 1336–1348. [Google Scholar] [CrossRef]
- Keroglou, C.; Lafortune, S. Embedded insertion functions for opacity enforcement. IEEE Trans. Autom. Control 2021, 66, 4184–4191. [Google Scholar] [CrossRef]
- Mohajerani, S.; Ji, Y.; Lafortune, S. Compositional and abstraction-based approach for synthesis of edit functions for opacity enforcement. IEEE Trans. Autom. Control 2020, 65, 3349–3364. [Google Scholar] [CrossRef]
- Tong, Y.; Lan, H.; Seatzu, C. Verification of K-step and infinite-step opacity of bounded labeled Petri nets. Automatica 2022, 140, 110221. [Google Scholar] [CrossRef]
- Yin, X.; Li, Z.; Wang, W.; Li, S. Infinite-step opacity and K-step opacity of stochastic discrete-event systems. Automatica 2019, 99, 266–274. [Google Scholar] [CrossRef]
- Lin, F.; Wang, L.; Chen, W.; Wang, W.; Wang, F. Information control in networked discrete event systems and its application to battery management systems. Discret. Event Dyn. Syst.-Theory Appl. 2020, 30, 243–268. [Google Scholar] [CrossRef]
- Lafortune, S.; Lin, F.; Hadjicostis, C.N. On the history of diagnosability and opacity in discrete event systems. Annu. Rev. Control 2018, 45, 257–266. [Google Scholar] [CrossRef]
- Zhang, B.; Shu, S.; Lin, F. Maximum information release while ensuring opacity in discrete event systems. IEEE Trans. Autom. Sci. Eng. 2015, 12, 1067–1079. [Google Scholar] [CrossRef]
- Yin, X.; Li, S. Synthesis of dynamic masks for infinite-step opacity. IEEE Trans. Autom. Control 2020, 65, 1429–1441. [Google Scholar] [CrossRef]
- Hou, J.; Yin, X.; Li, S. A framework for current-state opacity under dynamic information release mechanism. Automatica 2022, 140, 110238. [Google Scholar] [CrossRef]
- Mullins, J.; Yeddes, M. Opacity with Orwellian observers and intransitive non-interference. In Proceedings of the 12th IFAC/IEEE International Workshop on Discrete Event Systems (WODES), Cachan, France, 14–16 May 2014; pp. 344–349. [Google Scholar]
- Yeddes, M. Enforcing opacity with Orwellian observation. In Proceedings of the 13th IEEE International Workshop on Discrete Event Systems (WODES), Xi’an, China, 30 May–1 June 2016; pp. 306–312. [Google Scholar]
- Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems, 3rd ed.; Springer: Cham, Switzerland, 2021. [Google Scholar]
- Hadjicostis, C.N. Estimation and Inference in Discrete Event Systems; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Zhang, J.; Zhang, K.; Han, X.; Li, Z. Matlab Tool for Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Website. Available online: https://github.com/jiahuizhang623/Verify-CSO-SCSO-under-KOOM.git (accessed on 29 April 2025).
Observation Model Type | Assumption | Observation for Events |
---|---|---|
static | – | fixed at any time |
dynamic | an intruder has potentially infinite memory | determined by the prefixes of actions observed so far |
Orwellian | an intruder has potentially infinite memory | determined by both the prefixes and subsequent actions |
String s | |||
---|---|---|---|
a | a | a | a |
a | a | a | |
Event | Meanings of Events | State | Meanings of States |
---|---|---|---|
a | abnormal vehicle trajectory detected | 0 | the initial state of the system |
b | notification of the emergency center | 1 | an abnormal state in terms of road conditions |
c | the road conditions are back to normal | 2 | an abnormal state in terms of the vehicle trajectory |
d | the vehicle’s trajectory is back to normal | 3 | an abnormal state in terms of the vehicle’s trajectory (based on abnormal road conditions) |
h | a traffic accident is detected | 4 | an abnormal state in terms of road conditions (based on an abnormal vehicle trajectory) |
u | abnormal road conditions are detected | 5 | car accident state |
v | adjustment of the signal lights | 6 | the car drives off the road |
7 | notification sent to the emergency center | ||
8 | notification sent to the emergency center | ||
9 | abnormal road conditions after notification | ||
10 | a normal state |
Notation | Meanings |
---|---|
set of trigger states | |
set of all K-delay runs | |
unobservable reach of q | |
current-state estimates of string s under KOOM | |
state estimates under the normal instant observation | |
state estimates under the specific release observation |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, J.; Zhang, K.; Han, X.; Li, Z. Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics 2025, 13, 1568. https://doi.org/10.3390/math13101568
Zhang J, Zhang K, Han X, Li Z. Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics. 2025; 13(10):1568. https://doi.org/10.3390/math13101568
Chicago/Turabian StyleZhang, Jiahui, Kuize Zhang, Xiaoguang Han, and Zhiwu Li. 2025. "Verification of Opacity Under a K-Delay Orwellian Observation Mechanism" Mathematics 13, no. 10: 1568. https://doi.org/10.3390/math13101568
APA StyleZhang, J., Zhang, K., Han, X., & Li, Z. (2025). Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics, 13(10), 1568. https://doi.org/10.3390/math13101568