Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack

被引:2
|
作者
Sawant, Vishal [1 ]
Wisniewski, Rafal [1 ]
机构
[1] Aalborg Univ, Dept Elect Syst, DK-9220 Aalborg, Denmark
来源
关键词
Consensus; cyberattack; node criticality; METRICS; AGENTS;
D O I
10.1109/LCSYS.2023.3257265
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, a finite-duration, magnitude-bounded false data injection (FDI) attack on consensus network is considered. The aim of the attacker is to induce disagreement between nodes and consequently, influence the convergence of consensus algorithm. In order to measure the induced disagreement, a metric, namely induced terminal disagreement (ITD), is defined. The objective of this letter is to determine the criticality of individual nodes in terms of the worst-case ITD resulting from attack on them. To achieve that, for every node, the closed-form expressions for the optimal attack input which results in the maximum ITD and the corresponding value of ITD, are obtained. Based on that, criticality ranks are assigned to all nodes. These ranks are beneficial in allocating security resources and designing resilient architecture. Further, the effect of varying attack duration on the worst-case ITDs and criticality ranks, is analyzed. Finally, it is shown that the criticality ranks of nodes have strong negative correlation with their degrees. A numerical example and simulations are presented to illustrate the proposed results.
引用
收藏
页码:1435 / 1440
页数:6
相关论文
共 50 条
  • [31] Secure Control Design for Cooperative Adaptive Cruise Control Under False Data Injection Attack
    Ansari-Bonab, Parisa
    Holland, James C.
    Cunningham-Rush, Jonas
    Noei, Shirin
    Sargolzaei, Arman
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (08) : 9723 - 9732
  • [32] Petri net-based voltage control strategy under false data injection attack
    Fu, Rong
    Xu, Yue
    Tang, Yi
    Wang, Qi
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2020, 42 (14) : 2622 - 2631
  • [33] Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid
    Zhang, Heng
    Meng, Wenchao
    Qi, Junjian
    Wang, Xiaoyu
    Zheng, Wei Xing
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2019, 66 (02) : 1543 - 1551
  • [34] Secure distributed estimation against false data injection attack
    Hua, Yi
    Chen, Feng
    Deng, Shuwei
    Duan, Shukai
    Wang, Lidan
    INFORMATION SCIENCES, 2020, 515 : 248 - 262
  • [35] Boosting False Data Injection Attack Detection with Structural Knowledge
    Huang, Qiushi
    Wu, Chenye
    2022 AMERICAN CONTROL CONFERENCE, ACC, 2022, : 4595 - 4600
  • [36] A Survey on the Effects of False Data Injection Attack on Energy Market
    Rahman, Md. Ashfaqur
    Venayagamoorthy, Ganesh Kumar
    2018 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2018,
  • [37] Forensic Analysis on False Data Injection Attack on IoT Environment
    Nizam, Saiful Amin Sharul
    Ibrahim, Zul-Azri
    Rahim, Fiza Abdul
    Fadzil, Hafizuddin Shahril
    Abdullah, Haris Iskandar Mohd
    Mustaffa, Muhammad Zulhusni
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (10) : 265 - 271
  • [38] A Controllable False Data Injection Attack for a Cyber Physical System
    Yang, Janghoon
    IEEE ACCESS, 2021, 9 : 6721 - 6728
  • [39] A novel strategy for locational detection of false data injection attack
    Mukherjee, Debottam
    SUSTAINABLE ENERGY GRIDS & NETWORKS, 2022, 31
  • [40] False Data Injection Attack Detection in a Platoon of CACC in RSU
    Gao, Kai
    Cheng, Xiangyu
    Huang, Hao
    Li, Xunhao
    Yuan, Tingyu
    Du, Ronghua
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1324 - 1329