On the reliability of a voting system under cyber attacks

被引:6
|
作者
Li, Yijia [1 ]
Hu, Xiaoxiao [1 ]
Zhao, Peng [2 ]
机构
[1] Lanzhou Univ, Ctr Data Sci, Sch Math & Stat, Lanzhou, Peoples R China
[2] Jiangsu Normal Univ, Sch Math & Stat, Xuzhou, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple attacks; Poisson process; Stochastic order; Truncated normal distribution; OPTIMIZATION; REDUNDANCY;
D O I
10.1016/j.ress.2021.107996
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Voting systems have been widely used in many areas due to their technical decision making abilities. However, when a voting system operates on any internet platform, it faces a number of potential vulnerabilities including malware and denial of service attacks. In this work, we study the reliability of a majority voting system under cyber threats. Three multiple attack scenarios are considered including targeted, random, and dynamic attacks. We show that under some conditions, the reliability of a voting system decreases with the number of attacked voting components for the targeted attacks; however, for the random attacks, the reliability of a voting system can increase with the number of attacked voting components. For the dynamic attacks, it is discovered that the reliability of a voting system is significantly impacted by the attack rate and the random proposition time. We further develop efficient algorithms for computing the reliability of voting systems which can be employed in practice.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Secure State Estimation of Cyber-Physical System under Cyber Attacks: Q-Learning vs. SARSA
    Jin, Zengwang
    Ma, Menglu
    Zhang, Shuting
    Hu, Yanyan
    Zhang, Yanning
    Sun, Changyin
    ELECTRONICS, 2022, 11 (19)
  • [42] An adaptive predefined time sliding mode control for uncertain nonlinear cyber-physical servo system under cyber attacks
    Riaz, Saleem
    Li, Bingqiang
    Qi, Rong
    Zhang, Chenda
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [43] Security Control for a Fuzzy System under Dynamic Protocols and Cyber-Attacks with Engineering Applications
    Kchaou, Mourad
    Castro, Cecilia
    Abbassi, Rabeh
    Leiva, Victor
    Jerbi, Houssem
    MATHEMATICS, 2024, 12 (13)
  • [44] Synthesis of resilient fallback control system under cyber-attacks via supervisory control
    Sakata, Kousei
    Sawada, Kenji
    Ogura, Takashi
    Fujita, Junya
    Matsumoto, Noritaka
    ADVANCED ROBOTICS, 2024, 38 (9-10) : 659 - 671
  • [45] Security Risk Assessment and Defense Resource Allocation of Power System Under Synergetic Cyber Attacks
    Chen W.
    Chen W.
    Xue A.
    Dianwang Jishu/Power System Technology, 2019, 43 (07): : 2353 - 2360
  • [46] Non-linear state recovery in power system under bad data and cyber attacks
    Ali TAJER
    Saurabh SIHAG
    Khawla ALNAJJAR
    JournalofModernPowerSystemsandCleanEnergy, 2019, 7 (05) : 1071 - 1080
  • [47] Resilience Evaluation of Cyber-Physical Power System Considering Cyber Attacks
    Kong, Xiangxing
    Lu, Zhigang
    Guo, Xiaoqiang
    Zhang, Jiangfeng
    Li, Huifeng
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 245 - 256
  • [48] Synchronization control of jumping coupled cyber physical system with actuator failures under deception attacks
    Wang S.-X.
    Li J.-Y.
    Zhang B.
    Kongzhi Lilun Yu Yingyong/Control Theory and Applications, 2020, 37 (04): : 863 - 870
  • [49] Non-linear state recovery in power system under bad data and cyber attacks
    Tajer, Ali
    Sihag, Saurabh
    Alnajjar, Khawla
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2019, 7 (05) : 1071 - 1080
  • [50] Coordinated cyber-physical attacks of cyber-physical power system
    Yang Y.
    Lan S.
    Qin Z.
    Liu H.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2020, 40 (02): : 97 - 102