On the reliability of a voting system under cyber attacks

被引:6
|
作者
Li, Yijia [1 ]
Hu, Xiaoxiao [1 ]
Zhao, Peng [2 ]
机构
[1] Lanzhou Univ, Ctr Data Sci, Sch Math & Stat, Lanzhou, Peoples R China
[2] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple attacks; Poisson process; Stochastic order; Truncated normal distribution; OPTIMIZATION; REDUNDANCY;
D O I
10.1016/j.ress.2021.107996
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Voting systems have been widely used in many areas due to their technical decision making abilities. However, when a voting system operates on any internet platform, it faces a number of potential vulnerabilities including malware and denial of service attacks. In this work, we study the reliability of a majority voting system under cyber threats. Three multiple attack scenarios are considered including targeted, random, and dynamic attacks. We show that under some conditions, the reliability of a voting system decreases with the number of attacked voting components for the targeted attacks; however, for the random attacks, the reliability of a voting system can increase with the number of attacked voting components. For the dynamic attacks, it is discovered that the reliability of a voting system is significantly impacted by the attack rate and the random proposition time. We further develop efficient algorithms for computing the reliability of voting systems which can be employed in practice.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Cyber-Physical System-Based Path Tracking Control of Autonomous Vehicles Under Cyber-Attacks
    Guo, Jinghua
    Li, Lubin
    Wang, Jingyao
    Li, Keqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (05) : 6624 - 6635
  • [32] A multidisciplinary detection system for cyber attacks on Powertrain Cyber Physical Systems
    Stabili, Dario
    Romagnoli, Raffaele
    Marchetti, Mirco
    Sinopoli, Bruno
    Colajanni, Michele
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 144 : 151 - 164
  • [33] Architecture for Preventing and Detecting Cyber Attacks in Cyber-Manufacturing System
    Prasad, Romesh
    Moon, Young
    IFAC PAPERSONLINE, 2022, 55 (10): : 2246 - 2251
  • [34] Review of Cyber Attacks on Power System Operations
    Chatterjee, Kaustav
    Padmini, V.
    Khaparde, S. A.
    2017 IEEE REGION 10 INTERNATIONAL SYMPOSIUM ON TECHNOLOGIES FOR SMART CITIES (IEEE TENSYMP 2017), 2017,
  • [35] TOWARDS A TAXONOMY OF CYBER ATTACKS ON SCADA SYSTEM
    Banga, Aashima
    Gupta, Deep A.
    Bathla, Ruchika
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 343 - 347
  • [36] Investigation of Cyber Attacks on a Water Distribution System
    Adepu, Sridhar
    Palleti, Venkata Reddy
    Mishra, Gyanendra
    Mathur, Aditya
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 274 - 291
  • [37] Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey
    Xing, Wei
    Shen, Jun
    SENSORS, 2024, 24 (12)
  • [38] Vulnerability analysis of cyber physical systems under the false alarm cyber attacks
    Tu, Haicheng
    Xia, Yongxiang
    Chen, Xi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 599
  • [39] A Study On Various Cyber Attacks And A Proposed Intelligent System For Monitoring Such Attacks
    Choudhary, Atul S.
    Choudhary, Pankaj P.
    Salve, Shrikant
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 612 - 617
  • [40] Dynamic State Estimation of Generators Under Cyber Attacks
    Li, Yang
    Li, Zhi
    Chen, Liang
    IEEE ACCESS, 2019, 7 : 125253 - 125267