Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack

Vishal Sawant*, Rafal Wisniewski

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

4 Citations (Scopus)
1 Downloads (Pure)

Abstract

In this letter, a finite-duration, magnitude-bounded false data injection (FDI) attack on consensus network is considered. The aim of the attacker is to induce disagreement between nodes and consequently, influence the convergence of consensus algorithm. In order to measure the induced disagreement, a metric, namely induced terminal disagreement (ITD), is defined. The objective of this letter is to determine the criticality of individual nodes in terms of the worst-case ITD resulting from attack on them. To achieve that, for every node, the closed-form expressions for the optimal attack input which results in the maximum ITD and the corresponding value of ITD, are obtained. Based on that, criticality ranks are assigned to all nodes. These ranks are beneficial in allocating security resources and designing resilient architecture. Further, the effect of varying attack duration on the worst-case ITDs and criticality ranks, is analyzed. Finally, it is shown that the criticality ranks of nodes have strong negative correlation with their degrees. A numerical example and simulations are presented to illustrate the proposed results.

Original languageEnglish
JournalIEEE Control Systems Letters
Volume7
Pages (from-to)1435-1440
Number of pages6
ISSN2475-1456
DOIs
Publication statusPublished - 2023

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Consensus
  • cyberattack
  • node criticality

Fingerprint

Dive into the research topics of 'Evaluating Criticality of Nodes in Consensus Network Under False Data Injection Attack'. Together they form a unique fingerprint.

Cite this