Security Analysis of a Distributed Networked System Under Eavesdropping Attacks

被引:44
作者
Yang, Wen [1 ]
Zheng, Ziqian [1 ]
Chen, Guanrong [2 ]
Tang, Yang [1 ]
Wang, Xiaofan [3 ]
机构
[1] East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Shanghai 200237, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
[3] Shanghai Univ, Sch Mech Engn & Automat, Shanghai 200072, Peoples R China
基金
中国国家自然科学基金;
关键词
Networked system; eavesdropping attack; observability; complex network; cyber-physical system; CONTROLLABILITY; OBSERVABILITY;
D O I
10.1109/TCSII.2019.2928558
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this brief, we consider the security problem for a network of linear time-invariant dynamical systems under eavesdropping attacks, where an eavesdropper can measure the states of some nodes in the network. We provide a necessary and sufficient condition for the eavesdropper to reveal the states of the networked system. We also present some necessary conditions for the case when the network has tail nodes or at least one node not monitored by the eavesdropper. In addition, we investigate several typical network structures and show that the networked system can be completely observed provided that the eavesdropper can monitor one node in each cycle. Further, we characterize the minimal set of necessarily monitored nodes with the upper bound set of such nodes. Finally, we verify the theoretical results by numerical simulations.
引用
收藏
页码:1254 / 1258
页数:5
相关论文
共 23 条
[1]   An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems [J].
Al-Dabbagh, Ahmad W. ;
Li, Yuzhe ;
Chen, Tongwen .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2018, 65 (08) :1049-1053
[2]   Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures [J].
Bayat-Sarmadi, Siavash ;
Kermani, Mehran Mozaffari ;
Azarderakhsh, Reza ;
Lee, Chiou-Yng .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2014, 61 (02) :125-129
[3]   Controllability and Observability of Network-of-Networks via Cartesian Products [J].
Chapman, Airlie ;
Nabi-Abdolyousefi, Marzieh ;
Mesbahi, Mehran .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (10) :2668-2679
[4]   Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems [J].
Chen, Yu-Jia ;
Wang, Li-Chun ;
Liao, Chen-Hung .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (08) :2261-2273
[5]   A Numerical Study on the Wiretap Network With a Simple Network Topology [J].
Cheng, Fan ;
Tan, Vincent Y. F. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) :2481-2492
[6]   Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control [J].
Chhaya, Lipi ;
Sharma, Paawan ;
Bhagwatikar, Govind ;
Kumar, Adesh .
ELECTRONICS, 2017, 6 (01)
[7]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[8]  
HAUTUS MLJ, 1969, P K NED AKAD A MATH, V72, P443
[9]   Node capture attack detection and defence in wireless sensor networks [J].
Jokhio, S. H. ;
Jokhio, I. A. ;
Kemp, A. H. .
IET WIRELESS SENSOR SYSTEMS, 2012, 2 (03) :161-169
[10]   STRUCTURAL CONTROLLABILITY [J].
LIN, CT .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1974, AC19 (03) :201-208