Next Article in Journal
Existence of Solution to Nonlinear Third-Order Differential Equation and Iterative Method Utilization via Graph-Based Contraction
Previous Article in Journal
Optimal Inventory and Pricing Strategies for Integrated Supply Chains of Growing Items Under Carbon Emission Policies
Previous Article in Special Issue
Large Language Model and Digital Twins Empowered Asynchronous Federated Learning for Secure Data Sharing in Intelligent Labeling
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Verification of Opacity Under a K-Delay Orwellian Observation Mechanism

1
Institute of Systems Engineering, Macau University of Science and Technology, Taipa, Macau SAR 999078, China
2
School of Mathematics and Statistics, Xi’an Jiaotong University, Xi’an 710049, China
3
College of Electronic Information and Automation, Tianjin University of Science and Technology, Tianjin 300457, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(10), 1568; https://doi.org/10.3390/math13101568
Submission received: 30 March 2025 / Revised: 29 April 2025 / Accepted: 8 May 2025 / Published: 9 May 2025
(This article belongs to the Special Issue Advanced Control of Complex Dynamical Systems with Applications)

Abstract

Opacity, an important property of the information flow in discrete-event systems (DESs), characterizes whether the secret information in a system is ambiguous to a passive observer (called an intruder). Observation models play a critical role in the analysis of opacity. In this paper, instead of adopting a fully static observation model or a fully dynamic observation model, we use a novel Orwellian-type observation model to study the verification of the current-state opacity (CSO), where the observability of an unobservable event can be re-interpreted once certain/several specific conditions are met. First, a K-delay Orwellian observation mechanism (KOOM) is proposed as a novel Orwellian-type observation mechanism for extending the existing Orwellian projection. The main characteristics of the KOOM are delaying the inevitable information release and narrowing the release range for historical information to protect the secrets in a system to a greater extent than with the existing Orwellian projection. Second, we formulate the definitions of standard and strong CSO under the KOOM. Finally, we address the verification problem for these two types of opacity by constructing two novel information structures called a standard K-delay verifier and a strong K-delay verifier, respectively. An analysis of the computational complexity and illustrative examples are also presented for the proposed results. Overall, the proposed notions of standard and strong CSO under the KOOM capture the security privacy requirements regarding a delayed release in applications, such as intelligent transportation systems, etc.

1. Introduction

Nowadays, concerns about privacy and information security are becoming increasingly prominent in cyber-physical systems, where undefendable malicious intrusions or physical-layer failures may lead to inevitable releases of information through the information flow. Opacity, one of the properties of information flow, portrays the ability of a system to make a secret in a system absolutely ambiguous to an intruder. The notion of opacity first appeared in [1] and was extended to labeled transition systems in [2,3] afterward. Since then, for different security and privacy requirements, multifarious notions of opacity have been proposed and investigated in discrete-event systems (DESs).
The underlying observation model is essential to modeling and analyzing opacity properties. The work in [3] first systematically summarized the three types of observation models as shown in Table 1. Lots of work on opacity uses static observation models, including current-state opacity (CSO) [4], initial-state opacity [5], initial-and-final-state opacity [6], K-step opacity [7,8], infinite-step opacity [9], pre-opacity [10], etc. Recently, to characterize higher-level security and privacy requirements, various strong versions of the aforementioned opacity have been studied in [11,12,13,14], including strong current-state opacity (SCSO), strong initial-state opacity, strong K-step opacity, and strong infinite-step opacity. Opacity properties are also categorized into state-based opacity [15] and language-based opacity [16] depending on the secret information defined in terms of states or event sequences [3]. It has been shown that regular language-based opacity, CSO, initial-state opacity, and initial-and-final-state opacity can be reduced to each other in polynomial time [6,17]. The enforcement of opacity can be considered if a system violates opacity. The studies in [18,19,20,21] report various techniques for opacity enforcement. Moreover, opacity has been investigated in various models, including Petri nets [3,22], stochastic DESs [23], and networked DESs [24]. For details, refer to the survey paper [25] and the references therein. In terms of the dynamic observation models used to study opacity, the authors in [26,27] considered the maximum information release and the synthesis of dynamic masks to ensure opacity, respectively.
In this paper, we take an interest in the above-mentioned Orwellian-type observation model. In [28,29,30], the authors adopt the Orwellian-type observation model to study the opacity properties under various security requirements. The Orwellian-type observation model characterizes the capability of an intruder to re-interpret previous actions with subsequent knowledge. Compared with the general Orwellian-type observation model, the m-Orwellian observation model restricts the last memory of the observer from infinity to a bounded value m [3]. Therefore, a static observation model can be regarded as a 1-Orwellian observation model. Both dynamic and m-Orwellian observation models are special cases of Orwellian-type observation models.
The work in [29] formally formulates a class of Orwellian observation functions called the Orwellian projection by introducing downgrading events. As the Orwellian projection defines, once a downgrading event happens, the intruder is given access to observing the whole trajectory. However, the release of historical information might be delayed for some time in a generalized context, rather than becoming immediately available after the occurrence of a downgrading event. The reason for this delay is that a system may need to prioritize emergency response tasks to avoid the immediate release of historical information, which could lead to information overload and thus affect the system’s stability and response efficiency. Once the delay has ended, the specific historical information is inevitably released/disclosed. In this case, the release range for the historical information covers the trajectory before the downgrading event, rather than the entire trajectory, where the downgrading event is first triggered and then followed by the run after the completed delay. 
For instance, within a traffic accident processing unit in intelligent transportation systems, the occurrence of a traffic accident can be viewed as a downgrading event that leads to the release of the historical information from prior to this traffic accident. The historical information may include information such as vehicle tracks, driver behavior, driver identities, etc. When an intelligent transportation system detects a traffic accident, it will prioritize the activation of emergency responses, such as notifying emergency centers and adjusting traffic signals, instead of immediately releasing historical information from prior to the accident. The historical information from before the accident is not released until certain emergency responses are completed. The delayed release also avoids letting an intruder know the historical information prematurely such that an intruder’s uncertainty about the state of the system will increase to meet the security and privacy requirements. The existing Orwellian projection cannot fully capture this general scenario with delays.
To characterize the Orwellian projection in a more general setting, we propose in this particular research a new Orwellian-type observation model named a K-delay Orwellian observation mechanism (KOOM) by relaxing the conditions in the Orwellian projection [29]. The critical features of the KOOM are delaying the timing of the inevitable information release until K observations are finished after a downgrading event occurs and narrowing the release range of the historical information so as to protect the secrets in the system to a greater extent than the Orwellian projection.
In this paper, we propose a generalized Orwellian-type observation model and study the verification of standard (For convenience, the notion originally referred to CSO in [4] is renamed standard CSO in this paper.) and strong CSO under this newly proposed observation mechanism. Specifically, we summarize the main contributions of this research as follows.
  • We propose a novel Orwellian-type observation model called a K-delay Orwellian observation mechanism, which is a generalization of the traditional Orwellian projection [29]. In particular, the Orwellian projection is equivalent tp the proposed KOOM projection when K = 0 .
  • We formulate the two notions of standard and strong CSO under the KOOM to characterize the different abilities of a system to hide secret information from an intruder even if some of the strings generated by the system are inevitably disclosed.
  • To verify these two opacity notions under the KOOM, we construct two information structures called a standard K-delay verifier and a strong K-delay verifier, respectively. Based on the constructed information structures, necessary and sufficient conditions are provided to verify standard and strong CSO under the KOOM separately.
The remainder of this paper is structured as follows. The preliminaries used in this paper are presented in Section 2. Section 3 touches upon standard CSO under the KOOM and addresses its verification problem based on the constructed standard K-delay verifier. Section 4 focuses on strong CSO under the KOOM along with its verification using the designed strong K-delay verifier. Finally, Section 5 concludes this paper.

2. Preliminaries

2.1. The System Model

A deterministic finite-state automaton (DFA) is a quadruple
G = ( X , Σ , δ , x 0 ) ,
where
  • X is a finite set of states;
  • Σ is a finite set of events;
  • δ : X × Σ X is the (partial) transition function, which characterizes the dynamics of G: y = δ ( x , σ ) , which denotes that a transition exists, labeled by event σ reaching state y from state x
  • x 0 X is the initial state.
  • The transition function can be extended to δ : X × Σ * X in the usual manner to describe the multi-step dynamic behavior of the system:
  • (1) δ ( x , ϵ ) = x ;
  • (2) δ ( x , s σ ) = δ ( δ ( x , s ) , σ ) for x X , s Σ * ,   and σ Σ , where Σ * is the set of all finite strings over Σ , including the empty string ϵ . For any string s = σ 1 σ 2 σ n Σ * , we use | s | to denote the length of the string s, i.e., | s | = n and | ϵ | = 0 . The notation L a s t ( s ) denotes the last event of the string s, i.e., L a s t ( s ) = σ n . The string s ¯ Σ * is a prefix of s Σ * if t Σ * exists such that s = s ¯ t , which is denoted by s ¯ s . We write δ ( x , σ ) ! if δ ( x , σ ) is defined. L ( G , x ) is used to denote the language generated by G from the state x, i.e., L ( G , x ) = { s Σ * | δ ( x , s ) ! } . In this paper, we call an element of L ( G , x 0 ) an internal string of system G. Consider the string s = σ 1 σ 2 σ n L ( G , x ) . We call x σ 1 x 1 σ 2 x 2 σ 3 σ n x n a run of system G, which can be abbreviated as x s x n . In particular, if s = ϵ , then x ϵ x is called an empty run of G, as referred to in more detail in [31]. An illustrative example is provided to understand these concepts better.
Example 1.
Consider the system G, a DFA, as shown in Figure 1. The state set is X = { 0 , 1 , 2 , 3 , 4 , 5 } , and the event set is Σ = { a , h , u } . The initial state is x 0 = 0 . The state transition includes δ ( 0 , a ) = 1 , δ ( 1 , u ) = 2 , δ ( 2 , h ) = 3 , δ ( 3 , u ) = 4 , δ ( 4 , h ) = 5 , and δ ( 5 , a ) = 5 . Let us take the internal string s = a u h L ( G , x 0 ) for instance, whose length is | s | = 3 and L a s t ( s ) = h . Obviously, s ¯ = a is a prefix of the string s, denoted by a s . The run 0 a 1 u 2 h 3 can be abbreviated as 0 a u h 5 .

2.2. The K-Delay Orwellian Observation Mechanism

In [29], the authors propose the notion of downgrading events in DESs. As usual, the event set Σ is divided into two disjoint subsets Σ o and Σ u o , denoting the set of observable events and the set of events that are initially unobservable, respectively. The notation Σ d Σ o is used to denote the set of downgrading events. In the evolution of a system, some events in Σ u o dynamically become observable upon the occurrence of a downgrading event in Σ d . The Orwellian projection [29] is a mapping π o , d : Σ * Σ * defined by π o , d ( ϵ ) = ϵ   and
π o , d ( s σ ) = s σ , if σ Σ d , π o , d ( s ) σ , if σ Σ o Σ d , π o , d ( s ) , otherwise .
where s Σ * and σ Σ .
Let Σ ˜ Σ . The projection operator P Σ ˜ : Σ * Σ ˜ * is recursively defined by P Σ ˜ ( ϵ ) = ϵ   and
P Σ ˜ ( s σ ) = P Σ ˜ ( s ) σ , if σ Σ ˜ , P Σ ˜ ( s ) , otherwise .
where s Σ * and σ Σ .
Based on the above discussions, we now introduce a K-delay Orwellian observation mechanism (KOOM) projection. Let the event set Σ be divided into two disjoint subsets Σ o and Σ u o , i.e., Σ = Σ o ˙ Σ u o , where Σ o = Σ d ˙ Σ n d is the set of observable events with Σ d being the set of downgrading events and Σ n d being that of observable events that are not downgrading. Σ u o is the set of events that are initially unobservable. However, some events in Σ u o may become observable, depending not only on the occurrence of a downgrading event but also the number of observable events followed by this downgrading event. Let the string s = ω 1 d 1 ω n d n ω n + 1 Σ * , where ω 1 , ω 2 , , ω n + 1 ( Σ n d Σ u o ) * , d 1 , d 2 , , d n Σ d , and 𝓁 i ( s ) = | P Σ o ( ω i d i ω n + 1 ) | . Given K N ( N is the set of non-negative integers.), the KOOM projection R K : Σ * Σ * is defined by
R K ( s ) = P Σ o ( s ) , if s ( Σ n d Σ u o ) * or 𝓁 2 ( s ) < K , ω 1 d 1 ω j d j P Σ o ( ω j + 1 d j + 1 ω n + 1 ) , otherwise .
where j = m a x { k | 𝓁 k ( s ) K } 1 .
According to the above definition, the proposed KOOM projection is an extension of the Orwellian projection in [29]. Specifically, the Orwellian projection is equivalent to the KOOM projection when K = 0 . In the Orwellian projection, once a downgrading event σ Σ d occurs, the intruder is allowed to observe the whole trajectory. Thus, the intruder can immediately and accurately discover the current state. However, in the proposed KOOM projection, the historical information is not released immediately once a downgrading event occurs but only when K observations have followed this downgrading event. In this case, the range of the inevitable information release is narrowed down to the trajectory before the downgrading event. We use a simple numerical example in Table 2 to show how the parameter K impacts the KOOM projection of the string s, where a , h Σ o , h Σ d , and u Σ u o . From the table, one can see that the release of the same previous information occurs later as K becomes larger, which provides a degree of protection against premature access to the system information by intruders.
There are several differences between the KOOM and DIRM. First, the observability of the so-called “downgrading event” under the KOOM projection differs from the “release event” in the DIRM projection. Specifically, an event σ Σ d is always observable in the KOOM projection. However, in the DIRM projection, an event σ Σ r ( Σ r is a set of events that may not be immediately observable but can be released later.) is released and observable simultaneously until the system reaches a release state x X r ( X r is a set of states where the events in Σ r that have occurred can be released). Second, different information is released under the KOOM and DIRM. The former releases the information in Σ u o , while the latter releases the information in Σ r . Third, the timing of the information release is also different. The KOOM depends on the occurrence of a downgrading event σ Σ d and the value of K, while the DIRM is determined by the arrival of a release state x X r . In other words, the KOOM projection is both trajectory-dependent and K-dependent, while the DIRM projection is solely state-dependent. Next, we illustrate the KOOM projection defined by Equation (2) through an example.
Example 2.
Consider the system G shown in Figure 1, where Σ o = { a , h } , Σ u o = { u } , and Σ d = { h } . Write s = a u h u h as s = ω 1 d 1 ω 2 d 2 ω 3 , where ω 1 = a u , d 1 = h , ω 2 = u , d 2 = h , and ω 3 = ϵ . We can obtain 𝓁 2 ( s ) = | P Σ o ( u h ϵ ) | = 1 and 𝓁 3 ( s ) = | P Σ o ( ϵ ) | = 0 . When K = 0 , the KOOM projection of the string s is R 0 ( s ) = ω 1 d 1 ω 2 d 2 P Σ o ( ω 3 ) = a u h u h P Σ o ( ϵ ) = a u h u h , which is consistent with the Orwellian projection of string s = a u h u h . Comparatively, when K = 1 , the KOOM projection of the string s corresponds to the second case in Equation (2). We have R 1 ( s ) = ω 1 d 1 P Σ o ( ω 2 d 2 ω 3 ) = a u h P Σ o ( u h ) = a u h h .

3. Standard Current-State Opacity Under the KOOM

Weak CSO [32], standard CSO [4], and strong CSO [14] have been investigated in the literature. In this paper, we only focus on standard and strong CSO. This section formally defines standard CSO under the KOOM for a system. And then, we propose a standard K-delay verifier, a new information structure, to address its verification.

3.1. Standard Current-State Opacity Under the KOOM

In [29], the authors generalized opacity to the Orwellian projection in a language-based setting. The Orwellian projection requires the whole trajectory to be completely disclosed once a downgrading event σ Σ d appears, which discloses certain internal strings from the system immediately and weakens the ability of the system to protect secrets. As a generalization of the Orwellian projection, the proposed KOOM projection enhances the ability to protect the system to some extent since it delays the inevitable information release and restricts the range of the information released. Now, to portray the security and privacy requirements that the secret of a system should be ambiguous to an intruder when the release of information from inside the system is delayed, we extend the opacity under the Orwellian projection to the KOOM projection and formulate the standard CSO under the KOOM as follows.
Definition 1.
Given the system G = ( X , Σ , δ , x 0 ) with the set Σ o of observable events, the set Σ u o , the set Σ d of downgrading events, the set S X of secret states, and a KOOM projection R K with K N , G is said to be standardly current-state opaque with relation to S and R K if for any string s L ( G , x 0 ) such that δ ( x 0 , s ) S , the following holds:
( t L ( G , x 0 ) ) [ δ ( x 0 , t ) S R K ( t ) = R K ( s ) ] .
Remark 1.
The relationship between standard CSO under the natural projection defined in [4] and standard CSO under the KOOM projection presented in Definition 1 is as follows. If a system G satisfies standard CSO under KOOM projections, then G also satisfies standard CSO under natural projections, but not vice versa.
Note that the standard CSO in Definition 1 requires the secret in the system to remain ambiguous to an intruder, though some internal strings may inevitably be released. When K = 0 , Definition 1 reduces to the standard CSO under the Orwellian projection [29]. Obviously, based on the KOOM projection, a system exposes less information under the KOOM than it does under Orwellian projection. Therefore, it is possible for G to satisfy standard CSO with relation S and R K > 0 but not standard CSO with relation to S and R K = 0 . It is trivially true that G satisfies standard CSO with relation to S and R K > 0 if G satisfies standard CSO with relation to S and R K = 0 . Now, let us consider a simple example.
Example 3.
Consider a traffic accident processing unit in an intelligent transportation system, as shown in Figure 2. As seen, this unit can be modeled using a DFA G, as shown in Figure 3. The specific meanings of all events and all states are listed in Table 3.
Case 1: Let K = 0 . Set the accident state 5 as the secret state, i.e., S = { 5 } . When a traffic accident is detected, the historical information from prior to the accident is immediately released, i.e., the release of the internal string “ u a h " is simultaneously triggered and truly released at the state 5. An intruder can accurately determine at the current moment that the system is in the secret accident state 5. G does not satisfy standard CSO with relation to S = { 5 } and R K = 0 since the string s = u a h is the exclusive string that has the KOOM projection R 0 ( u a h ) = u a h and reaches the secret state 5. Comparatively, if S = { 7 } , then G satisfies standard CSO with relation to S = { 7 } and R K = 0 . For the string s = u a h b reaching the secret state 7, we can find another string t = u a h b u reaching the non-secret state 9 such that R 0 ( t ) = R 0 ( s ) = u a h b .
Case 2: Let K = 1 . If S = { 5 } , when a traffic accident is detected, the system prioritizes notifying emergency centers, to prevent the immediate release of historical information, which may result in information overload, before releasing the historical information from prior to the accident; i.e., the release of the internal string “ u a h " is triggered at state 5 while it is truly released at state 7. G is standard current-state opaque with relation to S = { 5 } and R K = 1 since a string t = a u h exists such that R 1 ( t ) = R 1 ( s ) = a h reaches the non-secret state 6. This means that an intruder cannot infer whether the system is in a secret accident state 5 currently. Compared with the situation in Case 1, one sees that the delayed release also increases the uncertainty of the intruder’s estimation of the system state by not letting the intruder know the historical information prematurely. If S = { 7 } , a string t = u a h b u also exists such that R 1 ( t ) = R 1 ( s ) = u a h b reaches the non-secret state 9, suggesting that the intruder remains unsure about whether G is in a secret state even though the internal strings “ u a h " and “ a u h " of the system have been released. Thus, G satisfies standard CSO with relation to S = { 7 } and R K = 1 .

3.2. Verification of Standard Current-State Opacity Under the KOOM

To verify standard CSO under KOOM, some concepts and symbols used thereafter are introduced. Given a system G = ( X , Σ , δ , x 0 ) and a non-negative integer K N , let
X T = { x t X | x X , σ Σ d : δ ( x , σ ) = x t }
be the set of trigger states. If a state x t X T , a string s L ( G , x t ) , and a state x X exist such that δ ( x t , s ) = x , | P Σ o ( s ) | = K , and L a s t ( s ) Σ o { ϵ } , then x t s x is said to be a K-delay run. The set
Γ = ( x t , s , x ) | x t X T , s L ( G , x t ) , x X : δ ( x t , s ) = x | P Σ o ( s ) | = K L a s t ( s ) Σ o { ϵ }
collects all triples for the starting states, K-delay strings, and final states of all K-delay runs under all trigger states of the system G. Let the string s = σ 1 σ 2 σ n Σ * . If x 1 σ 1 x 2 σ 2 σ n x n + 1 is a K-delay run of G, and x i σ i x i + 1 is called a 1-length sub-K-delay run for all i = 1 , 2 , , n . Additionally, the unobservable reach of set q 2 X is defined by
U R ( q ) = { x X | x q , s Σ u o * : δ ( x , s ) = x } .
The current-state estimates of a string s L ( G , x 0 ) under the KOOM are defined by
X ^ K ( s ) = x X | t L ( G , x 0 ) : δ ( x 0 , t ) = x R K ( s ) = R K ( t ) .
Note that there are two types of observations under the KOOM in G when an event σ Σ o occurs:
  • The normal instant observation: This observation can be obtained when the conditions for the release of the KOOM are not fulfilled at this instant;
  • The specific release observation: This observation can be obtained when the specific historical information (the internal string) is released, which implies that the conditions for the release of the KOOM are fulfilled simultaneously.
Example 4.
Consider again the DFA G shown in Figure 3. Let K = 0 . Suppose that G is currently at state 0. If event a occurs, then the intruder can obtain the normal instant observation “a". Comparatively, assume that G is now at state 3. If event h occurs, then the intruder can obtain the observation “ u a h ", which is the specific release observation. Concurrent with the occurrence of the event h, the internal string " u a h " satisfies the release condition and is exposed.
We consider the evolution of a set of states q 2 X under normal instant observations. If the conditions for the release of the KOOM are not fulfilled when an event σ Σ o occurs, then the set of states reached instantly with relation to q and σ Σ o is defined by
Q ^ ( q , σ ) = { x ˜ X | x q : δ ( x , σ ) = x ˜ σ Σ o } .
We now turn to the state estimates under specific release observations. First, the definition of the release position is given.
Definition 2.
Given a system G = ( X , Σ , δ , x 0 ) with the set of observable events Σ o , the set of downgrading events Σ d , and a KOOM projection R K with K N , let Γ be the set of triples of all K-delay runs. State x is said to be the release position with relation to ( x t , s , x ) Γ if state x is reached from a trigger state x t with a string s L ( G , x t ) such that ( x t , s , x ) Γ .
By definition, the conditions for the release of the KOOM are fulfilled once state x, the release position with relation to ( x t , s , x ) Γ , is reached. In this case, the state estimate of the instant at which state x is reached is defined by
Q ¯ ( x t , s , x ) = x ˜ X | t L ( G , x t ) : δ ( x t , t ) = x ˜ P Σ o ( t ) = P Σ o ( s ) .
Recalling the above introduction of the notations related to verifying standard CSO under the KOOM, we summarize them in a table for greater clarity, as shown in Table 4.
Now, we concentrate on the computation of current-state estimates under the KOOM. The computation of current-state estimates under specific release observations is challenging and critical, where determining the release position accurately plays an important role. To accurately capture the release position and avoid a situation where the same state may have different properties when reached using different strings, we use a binary label l { N , R } to denote that certain internal string will be released inevitably at some future instant if l = R and l = N otherwise. Note that the conventional observer cannot characterize the state estimates accurately under the KOOM. To this end, we construct a standard K-delay verifier, which is a novel information structure, as well as a DFA
V K = ( Q , Σ , f , q 0 )
where
  • Q : X × { N , R } × 2 X is a set of states.
  • Σ is a finite set of events.
  • q 0 = ( x 0 , N , U R ( { x 0 } ) ) is the initial state of V K .
  • f : Q × Σ Q is the (partial) transition function, defined as follows: For any q = ( x , l , q ˜ ) Q with l { N , R } and σ Σ , f ( q , σ ) is defined if and only if δ ( x , σ ) is defined. Further, we have f ( ( x , l , q ˜ ) , σ ) = ( x , l , q ˜ ) if f ( q , σ ) is defined, where
    x = δ ( x , σ ) , l = R , if σ Σ d   or   x σ x is   a   1 - length sub - K - delay   run , N , otherwise . q ˜ = q ˜ , if σ Σ u o , Q ¯ ( x t , s , x ) , if x is   the   release   position   with   relation   to ( x t , s , x ) Γ , U R ( Q ^ ( q ˜ , σ ) ) , otherwise .
The form of any state in V K is q = ( x , l , q ˜ ) , where the left component is the actual state of system G while the right component is the current-state estimate under the KOOM, as is shown later. The middle component is the binary label. The left, middle, and right components of any state q Q are denoted as L ( q ) , M ( q ) , and R ( q ) , respectively. Next, we illustrate the construction of the standard K-delay verifier V K for a system G.
Example 5.
Reconsider system G shown in Figure 3. When K = 0 , the standard 0-delay verifier V K = 0 for G is shown in Figure 4. We illustrate the construction of V K = 0 . The set Γ = { ( 5 , ϵ , 5 ) , ( 6 , ϵ , 6 ) } can be obtained from G and K = 0 . The initial state is q 0 = ( 0 , N , { 0 , 1 } ) according to  U R ( { 0 } ) = { 0 , 1 } .
If the event " a " occurs at the initial state q 0 = ( 0 , N , { 0 , 1 } ) , we have f ( q 0 , a ) = ( 2 , N , { 2 , 3 , 4 } ) . Specifically, the left part is updated to 2 = δ ( 0 , a ) . Since a Σ d holds and 0 a 2 is not a 1-length sub-K-delay run, the middle part is still " N " . The right part is updated to U R ( Q ^ ( { 0 , 1 } , a ) ) = { 2 , 3 , 4 } on account of a Σ u o and state 2 not being a release position.
If the event " u " occurs at the state ( 2 , N , { 2 , 3 , 4 } ) , the left component becomes 4 = δ ( 2 , u ) . The middle component remains " N " since u Σ d holds and 2 u 4 is not a 1-length sub-K-delay run. The right component also stays unchanged thanks to u Σ u o .
For the string " a u h " , the left part is updated to 6 = δ ( 4 , h ) . Due to h Σ d and K = 0 , one can see that state 6 is the release position with relation to ( 6 , ϵ , 6 ) . Thus, the middle component becomes " R " , and the right component is updated to Q ¯ ( 6 , ϵ , 6 ) = { 6 } .
Now, we show that the right component of a state q Q in the verifier V K = ( Q , Σ , f , q 0 ) can capture the current-state estimates of G under the KOOM.
Proposition 1.
Let V K = ( Q , Σ , f , q 0 ) be the standard K-delay verifier of system G = ( X , Σ , δ , x 0 ) . It holds
s L ( G , x 0 ) : R ( f ( q 0 , s ) ) = X ^ K ( s ) .
Proof. 
We use mathematical induction on the length of the string s to prove this. The basis step: Assume that | s | = 0 , which implies that s = ϵ and R K ( ϵ ) = ϵ hold. We have
X ^ K ( ϵ ) = x X | t L ( G , x 0 ) : δ ( x 0 , t ) = x R K ( t ) = ϵ .
According to the definition of U R and the fact that x 0 is included in both X ^ K ( ϵ ) and U R ( { x 0 } ) , one has X ^ K ( ϵ ) = U R ( { x 0 } ) ; i.e., the basis holds.
The induction step: Suppose that R ( f ( q 0 , s ) ) = X ^ K ( s ) for all strings s L ( G , x 0 ) with | s | = k . Next, consider s σ L ( G , x 0 ) for the following two cases, where σ Σ .
Case 1: State δ ( x 0 , s σ ) is not a release position.
In this case, if σ Σ o ,
X ^ K ( s σ ) = δ ( x 0 , s ) | s L ( G , x 0 ) R K ( s ) = R K ( s σ ) = δ ( x 0 , s ) | s = t σ σ 1 σ n L ( G , x 0 ) R K ( t ) = R K ( s ) σ 1 σ n Σ u o * = δ ( x , σ ω ) | ω = σ 1 σ n x X ^ K ( s ) σ 1 σ n Σ u o * = δ ( x , ω ) | ω = σ 1 σ n x Q ^ ( X ^ K ( s ) , σ ) σ 1 σ n Σ u o * = U R ( Q ^ ( X ^ K ( s ) , σ ) ) .
According to the definition of q ˜ and R ( f ( q 0 , s ) ) = X ^ K ( s ) , we have
R ( f ( q 0 , s σ ) ) = U R ( Q ^ ( R ( f ( q 0 , s ) ) , σ ) ) = U R ( Q ^ ( X ^ K ( s ) , σ ) ) = X ^ K ( s σ ) .
If σ Σ u o , then we have R K ( s σ ) = R K ( s ) , which implies X ^ K ( s σ ) = X ^ K ( s ) . Thus, it holds that R ( f ( q 0 , s σ ) ) = R ( f ( q 0 , s ) ) = X ^ K ( s ) = X ^ K ( s σ ) .
Case 2: State δ ( x 0 , s σ ) is the release position with relation to ( x t , v , δ ( x 0 , s σ ) ) Γ . In this case, we have either σ Σ o or σ = ϵ . If σ Σ o ,
X ^ K ( s σ ) = δ ( x 0 , s ) | s L ( G , x 0 ) R K ( s ) = R K ( s σ ) = δ ( x 0 , s ) | p L ( G , x t ) : δ ( x t , p ) = δ ( x 0 , s ) P Σ o ( v ) = P Σ o ( p ) = Q ¯ ( x t , v , δ ( x 0 , s σ ) ) .
If σ = ϵ , X ^ K ( s σ ) = Q ¯ ( x t , v , δ ( x 0 , s σ ) ) is automatically true. Then, we have R ( f ( q 0 , s σ ) ) = Q ¯ ( x t , v , δ ( x 0 , s σ ) ) = X ^ K ( s σ ) .    □
Remark 2.
Compared with the current-state estimates under normal instant observations, the specific release observations make the current-state estimates under the KOOM more accurate. This means that for a state q = ( x , l , q ˜ ) Q in V K such that f ( ( x , l , q ˜ ) , σ ) = q and x is the release position with relation to ( x t , s , x ) Γ , we have q ˜ = Q ¯ ( x t , s , x ) U R ( Q ^ ( q ˜ , σ ) ) .
Next, we provide the main result on the verification of standard CSO under the KOOM based on the constructed standard K-delay verifier V K .
Theorem 1.
Given the system G = ( X , Σ , δ , x 0 ) , let V K = ( Q , Σ , f , q 0 ) be its standard K-delay verifier. G is standardly current-state opaque with relation to S and R K if and only if
q Q : R ( q ) S R ( q ) ( X S ) .
Proof. 
(if) Assume that condition (4) holds. Through the construction of V K and L ( G , x 0 ) = L ( V K , q 0 ) , a state x α R ( q ) S (resp. x β R ( q ) ( X S ) ) exists such that δ ( x 0 , s ) = x α S (resp. δ ( x 0 , t ) = x β S ) from R ( q ) S (resp. R ( q ) ( X S ) ). According to Proposition 1, a string ω L ( G , x 0 ) should exist to satisfy R ( q ) = X ^ K ( ω ) . Thus, we have x α , x β X ^ K ( ω ) and R K ( s ) = R K ( t ) . Since q Q is arbitrary, s L ( G , x 0 ) is also arbitrary. Therefore, we conclude that G satisfies standard CSO with relation to S and R K .
(only if) Assume that G is standardly current-state opaque with relation to S and R K . According to Definition 1, for any string s L ( G , x 0 ) reaching a secret state, at least one string t L ( G , x 0 ) should exist to reach a non-secret state and satisfy R K ( t ) = R K ( s ) . Consequently, we have δ ( x 0 , s ) = x α S and δ ( x 0 , t ) = x β ( X S ) . According to the definition of current-state estimates under the KOOM, one has x α , x β X ^ K ( s ) . By Proposition 1 and L ( G , x 0 ) = L ( V K , q 0 ) , a state q = f ( q 0 , s ) Q should exist to satisfy R ( q ) = X ^ K ( s ) . Thus, we have x α , x β R ( q ) , leading to the truth of the predicate R ( q ) S R ( q ) ( X S ) . In addition, the arbitrariness of s L ( G , x 0 ) determines that q Q is arbitrary. Therefore, condition (4) holds.    □
According to Theorem 1, we summarize an algorithm for verifying standard CSO under the KOOM as shown in Algorithm 1.
Algorithm 1 Verification of standard CSO under the KOOM
Require: 
A DES G = ( X , Σ , δ , x 0 ) , Σ o , Σ u o , Σ d Σ , S X , and K N .
Ensure: 
“YES” if G satisfies standard CSO with relation to S and R K , and “NO” otherwise
1:
Construct the standard K-delay verifier V K for G
2:
for  q Q   do
3:
       if  R ( q ) S  then
4:
             if  R ( q ) ( X S ) =  then
5:
             return “NO”
6:
             end if
7:
       end if
8:
end for
9:
return “YES”
We analyze the computational complexity of using a standard K-delay verifier to verify the standard CSO under the KOOM. The maximum numbers of states and transitions in a standard K-delay verifier are 2 · | X | · 2 | X | and 2 · | Σ | · | X | · 2 | X | , respectively. Thus, the complexity of line 1 is O ( | Σ | | X | 2 | X | ) . For lines 2–9, we can use “the Breadth-First Search Algorithm", whose complexity is polynomial. Consequently, the overall complexity is single-exponential in the size of the system G; i.e., O ( | Σ | | X | 2 | X | ) .
Example 6.
Reconsider system G in Example 3. Its standard K-delay verifiers V K = 0 and V K = 1 are shown in Figure 4 and Figure 5, respectively.
Case 1: K = 0 . If S = { 5 } , a state q = ( 5 , R , { 5 } ) Q in V K = 0 exists such that R ( q ) S = { 5 } but R ( q ) ( X S ) = , which contradicts Theorem 1. Therefore, G does not satisfy standard CSO with relation to S = { 5 } and R K = 0 . If S = { 7 } , then G becomes opaque with relation to S = { 7 } and R K = 0 since for any q Q in V K = 0 , R ( q ) ( X S ) always holds if R ( q ) S .
Case 2: K = 1 . G satisfies standard CSO with relation to S = { 5 } (resp. S = { 7 } ) and R K = 1 . Since for all q Q in V K = 1 , R ( q ) ( X S ) always holds if R ( q ) S whenever either S = { 5 } or S = { 7 } . The verification results for Cases 1 and 2 are consistent with Example 3.

4. Strong Current-State Opacity Under the KOOM

In this section, we deal with SCSO under the KOOM and verify it. The properties of the proposed standard and strong CSO under the KOOM are articulated in detail.
To facilitate the description of the paths in SCSO, we define secret and non-secret paths. Given the system G = ( X , Σ , δ , x 0 ) with S X being the set of secret states, let x 0 σ 1 x 1 σ 2 x 2 σ 3 σ n x n be a run of G. If x n S , then string s is said to be a secret path of G. If x i ( X S ) for all i = 0 , 1 , , n , then string s is called a non-secret path of G.

4.1. Strong Current-State Opacity Under KOOM

For higher-level security and privacy requirements, a more rigorous opacity notion called SCSO is proposed under the natural projection, which is a stronger version of the standard CSO. Specifically, SCSO under the natural projection requires that for any secret path, a non-secret path that is indistinguishable from the secret path from an intruder’s perspective and that never enters any secret state should exist. Inspired by SCSO under the natural projection, we extend SCSO to the KOOM projection to characterize the higher security and privacy requirements than those with the standard CSO under the KOOM.
Definition 3.
Given system G = ( X , Σ , δ , x 0 ) with a set Σ o of observable events, set Σ u o , a set Σ d of downgrading events, a set S X of secret states, and a KOOM projection R K with K N , G is said to be strongly current-state opaque with relation to S and R K if for any string s L ( G , x 0 ) such that δ ( x 0 , s ) S , the following holds:
( t L ( G , x 0 ) ) [ R K ( t ) = R K ( s ) ( t ¯ t ) δ ( x 0 , t ¯ ) S ] .
The SCSO under the KOOM demands that even if some internal strings of a system are released to an intruder, for any secret path, i.e., a string generated by G from the initial state and capable of reaching a secret state, a non-secret path should exist, i.e., the string generated by G from the initial state that never passes through any secret state, that looks the same as the secret path under the KOOM projection to guarantee that the secret in the system is absolutely ambiguous. Obviously, according to Definitions 1 and 3, the SCSO is stronger than the standard CSO under the KOOM. In other words, if G satisfies SCSO with relation to S and R K , then G satisfies standard CSO with relation to S and R K , but not vice versa. A simple example is provided to illustrate this scenario.
Example 7.
Reconsider the system G shown in Figure 3. Assume that S = { 7 } . When K = 1 , according to Example 3, G satisfies standard CSO under the KOOM. However, G does not satisfy SCSO with relation to S = { 7 } and R K = 1 since for the secret path s = u a h b , a non-secret path that has the same KOOM projection as s = u a h b does not exist.
When K = 2 , for the secret path s = u a h b , we can find a non-secret path t = a u h b that makes R 2 ( s ) = R 2 ( t ) = a h b hold. According to Definition 3 (resp., Definition 1), G satisfies strong (resp., standard) CSO with relation to S = { 7 } and R K = 2 .

4.2. Verification of Strong Current-State Opacity Under the KOOM

To capture all non-secret paths of the system G, we construct a new DFA called a non-secret subautomaton G n s , which is derived from G by deleting all secret states and all transitions attached to them. Formally,
G n s = ( X n s , Σ n s , δ n s , x n s , 0 ) ,
where
  • X n s ( X S ) is a set of non-secret states;
  • Σ n s = { σ Σ | x , x X n s : x = δ ( x , σ ) } Σ is a set of events;
  • δ n s : X n s × Σ n s X n s is the (partial) transition function, defined by us having x = δ n s ( x , σ ) if x = δ ( x , σ ) for all x , x X n s and all σ Σ n s
  • x n s , 0 = x 0 ( X S ) (Note that, if x 0 S , then G n s does not exist.) is the initial state.
Note that Σ n s = Σ n s , o ˙ Σ n s , u o , where Σ n s , o = Σ n s , d ˙ Σ n s , n d is the set of observable events with Σ n s , d = Σ n s Σ d being the set of downgrading events and Σ n s , n d = Σ n s Σ n d being the set of observable events that are not downgrading. In particular, Σ n s , o = Σ n s Σ o . Σ n s , u o = Σ n s Σ u o is the set of events that are initially unobservable. Since G n s is a subautomaton of G, we have L ( G n s , x n s , 0 ) L ( G , x 0 ) . The unobservable reach of set q 2 X n s in G n s is defined by
U R N ( q ) = { x X n s | x q , s Σ n s , u o * : δ n s ( x , s ) = x } .
In addition, the non-secret current-state estimates of a string s L ( G , x 0 ) under the KOOM are defined by
X ^ n s K ( s ) = x X n s | t L ( G n s , x n s , 0 ) : δ n s ( x n s , 0 , t ) = x R K ( t ) = R K ( s ) .
Now, we consider how a set of non-secret states q 2 X n s evolves under normal instant observations. When an event σ Σ o occurs, if the conditions for the release of the KOOM are not met, then the set of non-secret states reached instantly with relation to q and σ Σ o is defined as
Q ^ s ( q , σ ) = { x ¯ X n s | x q : δ n s ( x , σ ) = x ¯ σ Σ o } .
Then, we discuss the acquisition of the non-secret state estimates under specific release observations. Assume that the system G reaches state x which is the release position with relation to ( x t , s , x ) Γ . Then, the set of non-secret state estimates of the instant at which state x is reached is defined by
Q ¯ s ( x t , s , x ) = x ¯ X n s | t L ( G n s , x t ) : δ n s ( x t , t ) = x ¯ P Σ o ( t ) = P Σ o ( s ) .
To verify SCSO under the KOOM, we construct a new DFA called a strong K-delay verifier V K S . The binary label l { N , R } is also used here to capture the release positions more accurately. Formally,
V K S = ( Q S , Σ , f S , q 0 S ) ,
where
  • Q S : X × { N , R } × 2 X n s is a set of states;
  • Σ is a finite set of events;
  • q 0 S = ( x 0 , N , U R N ( { x n s , 0 } ) ) is the initial state;
  • f S : Q S × Σ Q S is the (partial) transition function, defined by us having f S ( q s , σ ) defined if and only if δ ( x , σ ) is defined for any q s = ( x , l , q ˜ s ) Q S with l { N , R } and σ Σ .
    Further, we have f S ( ( x , l , q ˜ s ) , σ ) = ( x , l , q s ˜ ) if f S ( q s , σ ) is defined, where
    x = δ ( x , σ ) l = R , if σ Σ d   or   x σ x   is   a 1 - length sub - K - delay   run ; N , otherwise . q s ˜ = q ˜ s , if σ Σ u o ; Q ¯ s ( x t , s , x ) , if x   is   the   release   position   with   relation   to   ( x t , s , x ) Γ ; U R N ( Q ^ s ( q s ˜ , σ ) ) , otherwise .
The notations L ( q s ) and R ( q s ) are used to denote the left and right components of q s Q S , respectively. The middle component is the binary label. The left component L ( q s ) describes the state of the system G, while the right component R ( q s ) captures the non-secret current-state estimates that are all the non-secret states reached by non-secret paths. For any state ( x , l , q ˜ s ) Q S , the intruder has access to the non-secret current-state estimates q ˜ s reached through non-secret paths that have the same KOOM projection as the string reaching the state x. Note that if the initial state of a system is a secret state, i.e., x 0 S , then the strong K-delay verifier will not exist. Naturally, one concludes that this system does not satisfy SCSO under the KOOM. The following example illustrates the details of the construction of the strong K-delay verifier for a system G.
Example 8.
Consider the DFA G shown in Figure 3. Assume that S = { 7 } and K = 1 . The non-secret subautomaton G n s and the strong 1-delay verifier V K = 1 S are shown in Figure 6. We have Γ = { ( 5 , b , 7 ) , ( 6 , b , 8 ) } according to G and K = 1 . The initial state of V K = 1 S is q 0 S = ( 0 , N , { 0 , 1 } ) .
If the event " u " occurs at the initial state, we have f S ( q 0 S , u ) = ( 1 , N , { 0 , 1 } ) . The left component is updated to 1 = δ ( 0 , u ) . The middle component remains " N " since u Σ d holds and 0 u 1 is not a 1-length sub-K-delay run. The right component remains { 0 , 1 } thanks to u Σ u o .
If event " a " occurs at state ( 1 , N , { 0 , 1 } ) , the left component is updated to 3 = δ ( 1 , a ) . Since a Σ d holds and 1 a 3 is not a 1-length sub-K-delay run, the middle component remains unchanged. Since state 3 is not a release position, the right component is updated to U R N ( Q ^ s ( { 0 , 1 } , a ) ) = { 2 , 3 , 4 } .
For the string " u a h " , the left component is updated to 5 = δ ( 3 , h ) . Given h Σ d , the middle part becomes " R " . The right part is updated to U R N ( Q ^ s ( { 2 , 3 , 4 } , h ) ) = { 5 , 6 } since state 5 is not a release position.
If the event " b " occurs at state ( 5 , R , { 5 , 6 } ) , then the left component becomes 7 = δ ( 5 , b ) . Since 5 b 7 is a 1-length sub-K-delay run, the middle component is still kept as " R " . The right part is updated to Q ¯ s ( 5 , b , 7 ) = since state 7 is the release position with relation to ( 5 , b , 7 ) .
Now, we show that the right component of a state q s Q S in V K S = ( Q S , Σ , f S , q 0 S ) truly tracks the corresponding non-secret current-state estimates.
Proposition 2.
Let V K S = ( Q S , Σ , f S , q 0 S ) be the strong K-delay verifier of system G = ( X , Σ , δ , x 0 ) . It holds that
s L ( G , x 0 ) : R ( f S ( q 0 S , s ) ) = X ^ n s K ( s ) .
Proof. 
For economy of space, we present the proof in Appendix A, which is similar to the proof for Proposition 1.    □
Remark 3.
The non-secret current-state estimates can be refined when some internal strings are inevitably released to an intruder, i.e., under specific release observations. For a state q s = ( x , l , q s ˜ ) Q S in V K S with f S ( ( x , l , q ˜ s ) , σ ) = q s , where x is the release position with relation to ( x t , s , x ) Γ , one has q s ˜ = Q ¯ s ( x t , s , x ) U R N ( Q ^ s ( q ˜ s , σ ) ) .
The main result for the verification of SCSO under the KOOM using the strong K-delay verifier V K S is given.
Theorem 2.
Given the system G = ( X , Σ , δ , x 0 ) , let V K S = ( Q S , Σ , f S , q 0 S ) be its strong K-delay verifier. G is strongly current-state opaque with relation to S and R K if and only if
q s Q S : L ( q s ) S R ( q s ) .
Proof. 
(if) Assume that condition (7) holds. Let the string s L ( V K S , q 0 S ) with f S ( q 0 S , s ) = q s , where L ( q s ) S . Through the construction of V K S and L ( G , x 0 ) = L ( V K S , q 0 S ) , L ( q s ) S means that a secret state x s = L ( q s ) is reached via a string s L ( G , x 0 ) , i.e., δ ( x 0 , s ) = x s . From R ( q s ) , a state x n s R ( q s ) exists. According to Proposition 2 and Definition 3, one has x n s X ^ n s K ( s ) , which implies that a non-secret path t L ( G n s , x n s , 0 ) should exist with R K ( s ) = R K ( t ) . According to the definition of the non-secret path and the construction of G n s , we have δ ( x 0 , t ¯ ) S for all t ¯ t . Since q s Q S is arbitrary, s L ( G , x 0 ) is also arbitrary. According to Definition 3, the system G satisfies SCSO with relation to S and R K .
(only if) Assume that G satisfies SCSO with relation to S and R K . According to Definition 3 and the definition of a non-secret path, for any string s L ( G , x 0 ) reaching a secret state, i.e., δ ( x 0 , s ) = x s S , at least one non-secret path t L ( G , x 0 ) should exist that satisfies both δ ( x 0 , t ¯ ) S for all t ¯ t and R K ( s ) = R K ( t ) . Thus, we have x s S and x n s = δ ( x 0 , t ) S . According to the definition of the non-secret current-state estimate under the KOOM and the construction of G n s , x n s X ^ n s K ( s ) can be obtained. Based on Proposition 2 and the construction of V K S , a state q s = f S ( q 0 S , s ) Q S exists such that x s = L ( q s ) S and x n s R ( q s ) , leading to R ( q s ) . Since s L ( G , x 0 ) is arbitrary, q s Q S is also arbitrary, verifying the truth of condition (7).    □
Based on the above discussions, we shape the verification procedure for SCSO under the KOOM as shown in Algorithm 2. In line 1, the complexity of constructing G n s from G is polynomial, i.e., O ( | Σ | | X | ) . The construction of V K S suggests that its number of states and transitions could be as high as O ( 2 | X | 2 | X | ) and O ( 2 | X | | Σ | 2 | X | ) , respectively. Thus, the complexity of line 2 is single-exponential. “The Breadth-First Search Algorithm” can be used for lines 3–10, whose complexity is polynomial. Overall, the complexity of Algorithm 2 is single-exponential in the size of the original system G, i.e., O ( | Σ | | X | 2 | X | ) .
Algorithm 2 Verification of SCSO under the KOOM
Require: 
A DES G = ( X , Σ , δ , x 0 ) , Σ o , Σ u o , Σ d Σ , S X , and K N .
Ensure: 
“YES” if G satisfies SCSO with relation to S, and R K , “NO” otherwise
1:
Construct the non-secret subautomaton G n s of G
2:
Construct the strong K-delay verifier V K S for G
3:
for  q s Q S  do
4:
       if  L ( q s ) S  then
5:
             if  R ( q s ) =  then
6:
             return “NO”
7:
             end if
8:
       end if
9:
end for
10:
return “YES”
Example 9.
Let us still consider the system G in Example 7, where S = { 7 } . When K = 1 , the strong 1-delay verifier V K = 1 S is shown in Figure 6. For the state q s = { 7 , R , } , we have L ( q s ) = 7 S and R ( q s ) = . According to Theorem 2, G does not satisfy SCSO with relation to S = { 7 } and R K = 1 .
When K = 2 , the strong 2-delay verifier V K = 2 S is shown in Figure 7. In V K = 2 S , no such state whose left component is a secret state and right component is ∅ exists. G satisfies SCSO with relation to S = { 7 } and R K = 2 according to Theorem 2. The verification results are consistent with Example 7.
Note that the standard (resp., strong) K-delay verifier V K (resp., V K S ) may stay in some states in finite transitions due to K-delayed runs. We illustrate this situation with the example of a strong K-delay verifier. When K = 3 , the strong 3-delay verifier of G is shown in Figure 7. In V K = 3 S , we use ( 10 , R , { 8 } ) c ( 10 , N , ) to denote the run ( 10 , R , { 8 } ) c ( 10 , R , { 8 } ) c ( 10 , N , ) generated by V K = 3 S , where the event “c” and the circled number “➁” marked next to the dotted arrow indicate that V K = 3 S transfers to a new state after the event “c” occurs twice.

4.3. The Properties of Standard and Strong Current-State Opacity Under the KOOM

In this subsection, we discuss the properties of the proposed standard and strong CSO under the KOOM. Intuitively, under the KOOM framework, the system discloses less information when K becomes larger. The following lemma shows this case from the viewpoint of current-state estimates and non-secret current-state estimates.
Lemma 1.
Given system G = ( X , Σ , δ , x 0 ) , let K 1 , K 2 N be two non-negative integers satisfying 0 K 1 < K 2 . It holds that
s L ( G , x 0 ) : X ^ K 1 ( s ) X ^ K 2 ( s ) X ^ n s K 1 ( s ) X ^ n s K 2 ( s ) .
Proof. 
First, we show that for any s L ( G , x 0 ) , X ^ K 1 ( s ) X ^ K 2 ( s ) holds. Let V K 1 = ( Q 1 , Σ , f 1 , q 0 ) and V K 2 = ( Q 2 , Σ , f 2 , q 0 ) be two standard K-delay verifiers of G. If no event σ Σ d in string s L ( G , x 0 ) exists, i.e., s ( Σ n d Σ u o ) * , then we have R K 1 ( s ) = R K 2 ( s ) for any string s L ( G , x 0 ) . This means that X ^ K 1 ( s ) = X ^ K 2 ( s ) always holds for any s L ( G , x 0 ) . Assume s = σ 1 σ 2 σ n Σ * , where σ i Σ for 1 i n . If event σ Σ d in string s L ( G , x 0 ) exists, then we have two runs q 1 0 σ 1 q 1 1 σ t q 1 t σ r q 1 r σ n q 1 n and q 2 0 σ 1 q 2 1 σ t q 2 t σ r q 2 r σ n q 2 n in V K 1 and V K 2 , respectively. According to the constructions of V K 1 and V K 2 , one has f 1 ( q 1 0 , s ) = q 1 n and f 2 ( q 2 0 , s ) = q 2 n , where q 1 0 = q 2 0 = q 0 and L ( q 1 i ) = L ( q 2 i ) , 0 i n . To determine the relationships between X ^ K 1 ( s ) and X ^ K 2 ( s ) , we have the following cases:
Case 1: 𝓁 2 ( s ) < K 1 . In this case, according to 0 K 1 < K 2 , 𝓁 2 ( s ) < K 2 is trivial. Thus, we have R K 1 ( s ) = R K 2 ( s ) = P Σ o ( s ) , and the conditions for release of the KOOM are not fulfilled. Furthermore, R ( q 1 j ) = U R ( Q ^ ( q ˜ 1 j 1 , σ j ) ) and R ( q 2 j ) = U R ( Q ^ ( q ˜ 2 j 1 , σ j ) ) , 1 j n can be obtained. From the definition of U R ( Q ^ ( q , σ ) ) , we obtain R ( q 1 j ) = R ( q 2 j ) , 1 j n . Therefore, it holds that R ( q 1 n ) = R ( q 2 n ) . According to Proposition 1, one has X ^ K 1 ( s ) = X ^ K 2 ( s ) .
Case 2: 𝓁 2 ( s ) K 1 . In this case, we have 𝓁 2 ( s ) = | P Σ o ( σ t + 1 σ n ) | , ( L ( q 1 t ) , σ t + 1 σ r , L ( q 1 r ) ) Γ 1 , and L ( q 1 r ) is the release position with relation to ( L ( q 1 t ) , σ t + 1 σ r , L ( q 1 r ) ) , while L ( q 2 r ) is not a release position. Also, we have R ( q 1 r ) = Q ¯ ( L ( q 1 t ) , σ t + 1 σ r , L ( q 1 r ) ) and R ( q 2 r ) = U R ( Q ^ ( R ( q 2 r 1 ) , σ r ) ) . According to R ( q 1 r 1 ) = R ( q 2 r 1 ) , one has U R ( Q ^ ( R ( q 2 r 1 ) , σ r ) ) = U R ( Q ^ ( R ( q 1 r 1 ) , σ r ) ) . According to Remark 2, R ( q 1 r ) R ( q 2 r ) is derived. Then, R ( q 1 n ) R ( q 2 n ) is trivially true. From Proposition 1, it holds that X ^ K 1 ( s ) X ^ K 2 ( s ) .
Based on the above discussions, it follows that X ^ K 1 ( s ) X ^ K 2 ( s ) holds for any string s L ( G , x 0 ) . To save space, we omit the proof for X ^ n s K 1 ( s ) X ^ n s K 2 ( s ) for any string s L ( G , x 0 ) , which is similar to the aforementioned reasoning. □
Based on Lemma 1, given a system G with S X and two non-negative integers K 1 , K 2 N satisfying 0 K 1 < K 2 , we have the following result, which is visualized along with the results of Lemma 1 in Figure 8.
Proposition 3.
Given system G = ( X , Σ , δ , x 0 ) with S X and non-negative integers K 1 , K 2 N satisfying 0 K 1 < K 2 , if G is standardly (resp., strongly) current-state opaque with relation to S and R K 1 , then G is standardly (resp., strongly) current-state opaque with relation to S and R K 2 .
Proof. 
First, we show that it holds for the case of standard CSO. Let V K 1 = ( Q 1 , Σ , f 1 , q 0 ) and V K 2 = ( Q 2 , Σ , f 2 , q 0 ) be two standard K-delay verifiers of G. According to Theorem 1, R ( q ) S R ( q ) ( X S ) holds for any q Q 1 . According to Proposition 1, one concludes that X ^ K 1 ( s ) S X ^ K 1 ( s ) ( X S ) for any string s L ( G , x 0 ) . According to Lemma 1, X ^ K 2 ( s ) S X ^ K 2 ( s ) ( X S ) holds for any string s L ( G , x 0 ) , which implies that R ( q ) S R ( q ) ( X S ) is true for any q Q 2 . According to Theorem 1, G satisfies standard CSO with relation to S and R K 2 .
Next, we show that it holds for strong current-state opacity. Let V K 1 S = ( Q 1 S , Σ , f 1 S , q 0 S ) and V K 2 S = ( Q 2 S , Σ , f 2 S , q 0 S ) be two strong K-delay verifiers of G. From Theorem 2, L ( q s ) S R ( q s ) holds for any state q s Q 1 S . Proposition 2 leads to the fact that L ( f 1 S ( q 0 S , s ) ) S X ^ n s K 1 ( s ) for all strings s L ( G , x 0 ) . According to Lemma 1, we have L ( f 2 S ( q 0 S , s ) ) S X ^ n s K 2 ( s ) for all string s L ( G , x 0 ) in terms of L ( f 1 S ( q 0 S , s ) ) = L ( f 2 S ( q 0 S , s ) ) . Thus, L ( q s ) S R ( q s ) is derived for any state q s Q 2 S . From Theorem 2, we conclude that G satisfies SCSO with relation to S and R K 2 . □
In the standard CSO under the KOOM problem, we are interested in finding whether the current-state estimate under the KOOM is a member of the set of secret states. From the results in Proposition 1, one finds that the right component of a state in the verifier V K can capture the current-state estimates of G under the KOOM. Since the verifier V K has at most 2 | X | · ( 2 | X | 1 ) states, we are guaranteed that for any reachable state in V K , a string exists whose corresponding KOOM projection of the delayed observation sequence’s length does not exceed K when K 2 | X | · ( 2 | X | 1 ) . Therefore, an upper bound for K should exist in terms of the standard CSO under KOOM. A similar situation exists in terms of the SCSO under KOOM. The following proposition gives two different upper bounds on K in standard and strong CSO under the KOOM, respectively.
Proposition 4.
Given a system G = ( X , Σ , δ , x 0 ) , for any K ^ > K 2 | X | · ( 2 | X | 1 ) (resp., 2 | X | 2 | X | ), system G is standardly (resp., strongly) current-state opaque with relation to S and R K ^ if and only if system G is standardly (resp., strongly) current-state opaque with relation to S and R K .
Proof. 
(if) First, we derive the upper bound on K in standard CSO defined in Definition 1. Given Proposition 3, the fact that G satisfies standard CSO with relation to S and R K implies that G satisfies standard CSO with relation to S and R K ^ , which completes the “if” part of the proof.
(only if) Contrapositively, we assume that G is not standardly current-state opaque with relation to S and R K . Let V K = ( Q , Σ , f , q 0 ) (resp., V K ^ = ( Q K ^ , Σ , f K ^ , q 0 ) ) be the standard K-delay (resp., K ^ -delay) verifier of system G.
Case 1: A string s L ( G , x 0 ) satisfying s ( Σ n d Σ u o ) * or 𝓁 2 ( s ) < K makes X ^ K ( s ) S hold. In this case, we have R K ( s ) = R K ^ ( s ) , implying X ^ K ( s ) = X ^ K ^ ( s ) . The maximum number of states in X ^ K ( s ) (resp., X ^ K ^ ( s ) ) is 2 | X | · ( 2 | X | 1 ) . Thus, we have X ^ K ^ ( s ) S based on X ^ K ( s ) S , which further means that R ( f K ^ ( q 0 , s ) ) S but R ( f K ^ ( q 0 , s ) ) ( X S ) = . According to Theorem 1, G is not standardly current-state opaque with relation to S and R K ^ .
Case 2: A string s L ( G , x 0 ) satisfying 𝓁 2 ( s ) K makes X ^ K ( s ) S hold. In this case, the maximum number of states in X ^ K ( t ) is 2 | X | · ( 2 | X | 1 ) . Any string t L ( G , x 0 ) satisfies 𝓁 2 ( t ) < K . This means that a string t necessarily exists that satisdies X ^ K ( s ) = X ^ K ( t ) . Since string t L ( G , x 0 ) also satisfies 𝓁 2 ( t ) < K ^ , we conclude that X ^ K ( t ) = X ^ K ^ ( t ) . Then, X ^ K ^ ( t ) S is true based on X ^ K ( s ) S , implying R ( f K ^ ( q 0 , t ) ) S but R ( f K ^ ( q 0 , t ) ) ( X S ) = . According to Theorem 1, G is not standardly current-state opaque with relation to S and R K ^ . The “only if” part is completed.
The proof of the upper bound for SCSO under the KOOM is similar to that for standard CSO under yjr KOOM. We have omitted it here due to the limited space. □
On the basis of the above properties, we visualize the relationships among the CSO under the Orwellian projection and the proposed notions of standard and strong CSO under the KOOM in Figure 9.

5. Conclusions

This paper proposes a K-delay Orwellian observation mechanism (KOOM), a generalization of the existing Orwellian projection: upon a downgrading event, the KOOM delays the inevitable information release until K subsequent observations are finished while restricting the scope of the leak to the historical information from prior to the aforementioned degradation event (rather than the entire trajectories). This design strategically increases the uncertainty of an intruder’s state estimate by preventing the intruder from learning the release information prematurely. Furthermore, we formalize the notions of standard and strong CSO under the KOOM and design two novel information structures called the standard K-delay verifier and the strong K-delay verifier for their verification, respectively. Two algorithms and MATLAB R2024b tools [33] for verifying standard and strong CSO under the KOOM are presented, respectively.
Although the proposed KOOM provides a theoretical foundation for a delayed information release, some challenges persist in operationalizing and generalizing this framework, including (1) enforcing opacity when a system does not satisfy the security requirements (e.g., considering dynamic K-adjustment algorithms or runtime monitoring in smart grids), (2) adding a time factor (e.g., timed automata with bounded delays for autonomous vehicle platoons), etc. Further research is needed to optimize the delay parameter K for security–performance trade-offs, quantify the cost of delayed disclosure, and develop efficient online enforcement mechanisms.

Author Contributions

Conceptualization: J.Z. and X.H. Methodology: J.Z. Validation: K.Z. and X.H. Formal analysis: K.Z. and X.H. Investigation: J.Z. Writing—original draft preparation: J.Z. Writing—review and editing: K.Z., X.H. and Z.L. Supervision: X.H. Project administration: Z.L. Funding acquisition: Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Science and Technology Fund, FDCT, Macau SAR, under Grant No. 0029/2023/RIA1 and the National Natural Science Foundation of China under Grant No. 61903274.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
KOOMK-delay Orwellian Observation Mechanism
DESsDiscrete-Event Systems
DIRMDynamic Information Release Mechanism
DFADeterministic Finite-State Automaton
CSOCurrent-State Opacity
SCSOStrong Current-State Opacity

Appendix A. The Proof for Proposition 2

Proof. 
We use mathematical induction on the length of the string s to prove it. The basis step: Assume that | s | = 0 , which implies that s = ϵ and R K ( ϵ ) = ϵ hold. We have
X ^ n s K ( ϵ ) = x X n s | t L ( G n s , x n s , 0 ) : δ n s ( x n s , 0 , t ) = x R K ( t ) = ϵ .
According to the definition of U R N and the fact that x n s , 0 is included in both X ^ n s K ( ϵ ) and U R N ( { x n s , 0 } ) , one has X ^ n s K ( ϵ ) = U R N ( { x n s , 0 } ) ; i.e., the basis holds.
The induction step: Suppose that R ( f S ( q 0 S , s ) ) = X ^ n s K ( s ) for all strings s L ( G , x 0 ) with | s | = k . Next, consider s σ L ( G , x 0 ) for the following two cases, where σ Σ .
Case 1: State δ ( x 0 , s σ ) is not a release position.
In this case, if σ Σ o ,
X ^ n s K ( s σ ) = δ n s ( x n s , 0 , s ) | s L ( G n s , x n s , 0 ) R K ( s ) = R K ( s σ ) = δ n s ( x n s , 0 , s ) | s = t σ σ 1 σ n L ( G n s , x n s , 0 ) R K ( t ) = R K ( s ) σ 1 σ n Σ n s , u o * = δ n s ( x , σ ω ) | ω = σ 1 σ n x X ^ n s K ( s ) σ 1 σ n Σ n s , u o * = δ n s ( x , ω ) | ω = σ 1 σ n x Q ^ s ( X ^ n s K ( s ) , σ ) σ 1 σ n Σ n s , u o * = U R N ( Q ^ s ( X ^ n s K ( s ) , σ ) ) .
According to the definition of q ˜ and R ( f S ( q 0 S , s ) ) = X ^ n s K ( s ) , we have
R ( f ( q 0 , s σ ) ) = U R ( Q ^ ( R ( f S ( q 0 S , s ) ) , σ ) ) = U R N ( Q ^ s ( X ^ n s K ( s ) , σ ) ) = X ^ n s K ( s σ ) .
If σ Σ u o , then we have R K ( s σ ) = R K ( s ) , which implies that X ^ n s K ( s σ ) = X ^ n s K ( s ) . Thus, it holds that R ( f S ( q 0 S , s σ ) ) = R ( f S ( q 0 S , s ) ) = X ^ n s K ( s ) = X ^ n s K ( s σ ) .
Case 2: State δ ( x 0 , s σ ) is the release position with relation to ( x t , v , δ ( x 0 , s σ ) ) Γ . In this case, we have either σ Σ o or σ = ϵ . If σ Σ o ,
X ^ n s K ( s σ ) = δ n s ( x n s , 0 , s ) | s L ( G n s , x n s , 0 ) R K ( s ) = R K ( s σ ) = δ n s ( x n s , 0 , s ) | p L ( G n s , x t ) : δ n s ( x t , p ) = δ n s ( x n s , 0 , s ) P Σ o ( v ) = P Σ o ( p ) = Q ¯ s ( x t , v , δ n s ( x n s , 0 , s σ ) ) .
If σ = ϵ , X ^ n s K ( s σ ) = Q ¯ s ( x t , v , δ n s ( x n s , 0 , s σ ) ) is automatically true. Then, we have R ( f S ( q 0 S , s σ ) ) = Q ¯ s ( x t , v , δ n s ( x n s , 0 , s σ ) ) = X ^ n s K ( s σ ) .

References

  1. Mazaré, L. Using unification for opacity properties. In Proceedings of the 4th Workshop on Issues in the Theory of Security (WITS), Barcelona, Spain, 3–4 April 2004; pp. 165–176. [Google Scholar]
  2. Bryans, J.W.; Koutny, M.; Ryan, P.Y.A. Modelling opacity using Petri nets. Electron. Notes Theor. Comput. Sci. 2005, 121, 101–115. [Google Scholar] [CrossRef]
  3. Bryans, J.W.; Koutny, M.; Mazaré, L.; Ryan, P.Y.A. Opacity generalised to transition systems. Int. J. Inf. Secur. 2008, 7, 421–435. [Google Scholar] [CrossRef]
  4. Saboori, A.; Hadjicostis, C.N. Notions of security and opacity in discrete event systems. In Proceedings of the 46th IEEE Conference on Decision and Control (CDC), New Orleans, LA, USA, 12–14 December 2007; pp. 5056–5061. [Google Scholar]
  5. Saboori, A.; Hadjicostis, C.N. Verification of initial-state opacity in security applications of discrete event systems. Inf. Sci. 2013, 246, 115–132. [Google Scholar] [CrossRef]
  6. Wu, Y.C.; Lafortune, S. Comparative analysis of related notions of opacity in centralized and coordinated architectures. Discret. Event Dyn. Syst.-Theory Appl. 2013, 23, 307–339. [Google Scholar] [CrossRef]
  7. Saboori, A.; Hadjicostis, C.N. Verification of K-step opacity and analysis of its complexity. IEEE Trans. Autom. Sci. Eng. 2011, 8, 549–559. [Google Scholar] [CrossRef]
  8. Yin, X.; Lafortune, S. A new approach for the verification of infinite-step and K-step opacity using two-way observers. Automatica 2017, 80, 162–171. [Google Scholar] [CrossRef]
  9. Saboori, A.; Hadjicostis, C.N. Verification of infinite-step opacity and complexity considerations. IEEE Trans. Autom. Control 2012, 57, 1265–1269. [Google Scholar] [CrossRef]
  10. Yang, S.; Yin, X. Secure your intention: On notions of pre-opacity in discrete-event systems. IEEE Trans. Autom. Control 2023, 68, 4754–4766. [Google Scholar] [CrossRef]
  11. Falcone, Y.; Marchand, H. Enforcement and validation (at runtime) of various notions of opacity. Discret. Event Dyn. Syst.-Theory Appl. 2015, 25, 531–570. [Google Scholar] [CrossRef]
  12. Ma, Z.; Yin, X.; Li, Z. Verification and enforcement of strong infinite- and K-step opacity using state recognizers. Automatica 2021, 133, 109838. [Google Scholar] [CrossRef]
  13. Balun, J.; Masopust, T. Verifying weak and strong k-step opacity in discrete-event systems. Automatica 2023, 155, 111153. [Google Scholar] [CrossRef]
  14. Zhang, K. A unified concurrent-composition method to state/event inference and concealment in labeled finite-state automata as discrete-event systems. Annu. Rev. Control 2023, 56, 100902. [Google Scholar] [CrossRef]
  15. Zhang, Z.; Xia, C.; Qi, G.; Fu, J. Multi-step state-based opacity for unambiguous weighted machines. Sci. China-Inf. Sci. 2024, 67, 212204. [Google Scholar] [CrossRef]
  16. Lin, F. Opacity of discrete event systems and its applications. Automatica 2011, 47, 496–503. [Google Scholar] [CrossRef]
  17. Balun, J.; Masopust, T. Comparing the notions of opacity for discrete-event systems. Discret. Event Dyn. Syst.-Theory Appl. 2021, 31, 553–582. [Google Scholar] [CrossRef]
  18. Ji, Y.; Yin, X.; Lafortune, S. Opacity enforcement using nondeterministic publicly-known edit functions. IEEE Trans. Autom. Control 2019, 64, 4369–4376. [Google Scholar] [CrossRef]
  19. Wu, Y.C.; Lafortune, S. Synthesis of insertion functions for enforcement of opacity security properties. Automatica 2014, 50, 1336–1348. [Google Scholar] [CrossRef]
  20. Keroglou, C.; Lafortune, S. Embedded insertion functions for opacity enforcement. IEEE Trans. Autom. Control 2021, 66, 4184–4191. [Google Scholar] [CrossRef]
  21. Mohajerani, S.; Ji, Y.; Lafortune, S. Compositional and abstraction-based approach for synthesis of edit functions for opacity enforcement. IEEE Trans. Autom. Control 2020, 65, 3349–3364. [Google Scholar] [CrossRef]
  22. Tong, Y.; Lan, H.; Seatzu, C. Verification of K-step and infinite-step opacity of bounded labeled Petri nets. Automatica 2022, 140, 110221. [Google Scholar] [CrossRef]
  23. Yin, X.; Li, Z.; Wang, W.; Li, S. Infinite-step opacity and K-step opacity of stochastic discrete-event systems. Automatica 2019, 99, 266–274. [Google Scholar] [CrossRef]
  24. Lin, F.; Wang, L.; Chen, W.; Wang, W.; Wang, F. Information control in networked discrete event systems and its application to battery management systems. Discret. Event Dyn. Syst.-Theory Appl. 2020, 30, 243–268. [Google Scholar] [CrossRef]
  25. Lafortune, S.; Lin, F.; Hadjicostis, C.N. On the history of diagnosability and opacity in discrete event systems. Annu. Rev. Control 2018, 45, 257–266. [Google Scholar] [CrossRef]
  26. Zhang, B.; Shu, S.; Lin, F. Maximum information release while ensuring opacity in discrete event systems. IEEE Trans. Autom. Sci. Eng. 2015, 12, 1067–1079. [Google Scholar] [CrossRef]
  27. Yin, X.; Li, S. Synthesis of dynamic masks for infinite-step opacity. IEEE Trans. Autom. Control 2020, 65, 1429–1441. [Google Scholar] [CrossRef]
  28. Hou, J.; Yin, X.; Li, S. A framework for current-state opacity under dynamic information release mechanism. Automatica 2022, 140, 110238. [Google Scholar] [CrossRef]
  29. Mullins, J.; Yeddes, M. Opacity with Orwellian observers and intransitive non-interference. In Proceedings of the 12th IFAC/IEEE International Workshop on Discrete Event Systems (WODES), Cachan, France, 14–16 May 2014; pp. 344–349. [Google Scholar]
  30. Yeddes, M. Enforcing opacity with Orwellian observation. In Proceedings of the 13th IEEE International Workshop on Discrete Event Systems (WODES), Xi’an, China, 30 May–1 June 2016; pp. 306–312. [Google Scholar]
  31. Cassandras, C.G.; Lafortune, S. Introduction to Discrete Event Systems, 3rd ed.; Springer: Cham, Switzerland, 2021. [Google Scholar]
  32. Hadjicostis, C.N. Estimation and Inference in Discrete Event Systems; Springer: Cham, Switzerland, 2020. [Google Scholar]
  33. Zhang, J.; Zhang, K.; Han, X.; Li, Z. Matlab Tool for Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Website. Available online: https://github.com/jiahuizhang623/Verify-CSO-SCSO-under-KOOM.git (accessed on 29 April 2025).
Figure 1. System G.
Figure 1. System G.
Mathematics 13 01568 g001
Figure 2. A traffic accident processing unit in an intelligent transportation system.
Figure 2. A traffic accident processing unit in an intelligent transportation system.
Mathematics 13 01568 g002
Figure 3. A system G with Σ o = { a , b , c , d , h } , Σ u o = { u , v } , and Σ d = { h } .
Figure 3. A system G with Σ o = { a , b , c , d , h } , Σ u o = { u , v } , and Σ d = { h } .
Mathematics 13 01568 g003
Figure 4. The standard 0-delay verifier V K = 0 .
Figure 4. The standard 0-delay verifier V K = 0 .
Mathematics 13 01568 g004
Figure 5. The standard 1-delay verifier V K = 1 .
Figure 5. The standard 1-delay verifier V K = 1 .
Mathematics 13 01568 g005
Figure 6. The non-secret subautomaton G n s (left) and the strong 1-delay verifier V K = 1 S (right).
Figure 6. The non-secret subautomaton G n s (left) and the strong 1-delay verifier V K = 1 S (right).
Mathematics 13 01568 g006
Figure 7. The strong 2-delay verifier V K = 2 S (left) and the strong 3-delay verifier V K = 3 S (right).
Figure 7. The strong 2-delay verifier V K = 2 S (left) and the strong 3-delay verifier V K = 3 S (right).
Mathematics 13 01568 g007
Figure 8. The visualized results of Lemma 1 and Proposition 3.
Figure 8. The visualized results of Lemma 1 and Proposition 3.
Mathematics 13 01568 g008
Figure 9. Relationships among the CSO under the Orwellian projection and the standard and strong CSO under the KOOM.
Figure 9. Relationships among the CSO under the Orwellian projection and the standard and strong CSO under the KOOM.
Mathematics 13 01568 g009
Table 1. Three types of observation models summarized in [3].
Table 1. Three types of observation models summarized in [3].
Observation Model TypeAssumptionObservation for Events
staticfixed at any time
dynamican intruder has potentially
infinite memory
determined by the prefixes
of actions observed so far
Orwellianan intruder has potentially
infinite memory
determined by both the prefixes
and subsequent actions
Table 2. A simple numerical example of the KOOM projection of the string s.
Table 2. A simple numerical example of the KOOM projection of the string s.
String s R 0 ( s ) R 1 ( s ) R 2 ( s )
aaaa
a u aaa
a u h a u h a h a h
a u h u a u h a h a h
a u h u h a u h u h a u h h a h h
Table 3. List of notations used for the subsequent verifier construction.
Table 3. List of notations used for the subsequent verifier construction.
EventMeanings of EventsStateMeanings of States
aabnormal vehicle trajectory detected0the initial state of the system
bnotification of the emergency center1an abnormal state in terms of road conditions
cthe road conditions are back to normal2an abnormal state in terms of the vehicle trajectory
dthe vehicle’s trajectory is back to normal3an abnormal state in terms of the vehicle’s trajectory
(based on abnormal road conditions)
ha traffic accident is detected4an abnormal state in terms of road conditions
(based on an abnormal vehicle trajectory)
uabnormal road conditions are detected5car accident state
vadjustment of the signal lights6the car drives off the road
7notification sent to the emergency center
8notification sent to the emergency center
9abnormal road conditions after notification
10a normal state
Table 4. The list of notations used for the subsequent verifier construction.
Table 4. The list of notations used for the subsequent verifier construction.
NotationMeanings
X T set of trigger states
Γ set of all K-delay runs
U R ( q ) unobservable reach of q
X ^ K ( s ) current-state estimates of string s under KOOM
U R ( Q ^ ( q , σ ) ) state estimates under the normal instant observation
Q ¯ ( x t , s , x ) state estimates under the specific release observation
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, J.; Zhang, K.; Han, X.; Li, Z. Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics 2025, 13, 1568. https://doi.org/10.3390/math13101568

AMA Style

Zhang J, Zhang K, Han X, Li Z. Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics. 2025; 13(10):1568. https://doi.org/10.3390/math13101568

Chicago/Turabian Style

Zhang, Jiahui, Kuize Zhang, Xiaoguang Han, and Zhiwu Li. 2025. "Verification of Opacity Under a K-Delay Orwellian Observation Mechanism" Mathematics 13, no. 10: 1568. https://doi.org/10.3390/math13101568

APA Style

Zhang, J., Zhang, K., Han, X., & Li, Z. (2025). Verification of Opacity Under a K-Delay Orwellian Observation Mechanism. Mathematics, 13(10), 1568. https://doi.org/10.3390/math13101568

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop