TY - JOUR
T1 - Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack
AU - Sawant, Vishal
AU - Wisniewski, Rafal
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2023
Y1 - 2023
N2 - In this letter, a finite-duration, magnitude-bounded false data injection (FDI) attack on consensus network is considered. The aim of the attacker is to induce disagreement between nodes and consequently, influence the convergence of consensus algorithm. In order to measure the induced disagreement, a metric, namely induced terminal disagreement (ITD), is defined. The objective of this letter is to determine the criticality of individual nodes in terms of the worst-case ITD resulting from attack on them. To achieve that, for every node, the closed-form expressions for the optimal attack input which results in the maximum ITD and the corresponding value of ITD, are obtained. Based on that, criticality ranks are assigned to all nodes. These ranks are beneficial in allocating security resources and designing resilient architecture. Further, the effect of varying attack duration on the worst-case ITDs and criticality ranks, is analyzed. Finally, it is shown that the criticality ranks of nodes have strong negative correlation with their degrees. A numerical example and simulations are presented to illustrate the proposed results.
AB - In this letter, a finite-duration, magnitude-bounded false data injection (FDI) attack on consensus network is considered. The aim of the attacker is to induce disagreement between nodes and consequently, influence the convergence of consensus algorithm. In order to measure the induced disagreement, a metric, namely induced terminal disagreement (ITD), is defined. The objective of this letter is to determine the criticality of individual nodes in terms of the worst-case ITD resulting from attack on them. To achieve that, for every node, the closed-form expressions for the optimal attack input which results in the maximum ITD and the corresponding value of ITD, are obtained. Based on that, criticality ranks are assigned to all nodes. These ranks are beneficial in allocating security resources and designing resilient architecture. Further, the effect of varying attack duration on the worst-case ITDs and criticality ranks, is analyzed. Finally, it is shown that the criticality ranks of nodes have strong negative correlation with their degrees. A numerical example and simulations are presented to illustrate the proposed results.
KW - Consensus
KW - cyberattack
KW - node criticality
UR - http://www.scopus.com/inward/record.url?scp=85151333672&partnerID=8YFLogxK
U2 - 10.1109/LCSYS.2023.3257265
DO - 10.1109/LCSYS.2023.3257265
M3 - Journal article
AN - SCOPUS:85151333672
SN - 2475-1456
VL - 7
SP - 1435
EP - 1440
JO - IEEE Control Systems Letters
JF - IEEE Control Systems Letters
ER -