2020 7th International Conference on Control, Decision and Information Technologies (CoDIT) 2020
DOI: 10.1109/codit49905.2020.9263882
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Detection of Malicious Attacks on Consensus Algorithms with Applications in Power Networks

Abstract: Consensus-based distributed algorithms are well suited for coordination among agents in a cyber-physical system. These distributed schemes, however, suffer from their vulnerability to cyber attacks that are aimed at manipulating data and control flow. In this article, we present a novel distributed method for detecting the presence of such intrusions for a distributed multi-agent system following ratio consensus. We employ a Max-Min protocol to develop low cost, easy to implement detection strategies where eac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In [13], the decision score is computed by a temporal difference strategy to detect and isolate attackers. Similar score-based methods are also shown in [23]- [25]. While such methods have reasonable performance, the score design is somewhat ad-hoc and relies heavily on the experts to design sophisticated decision functions, and the detection thresholds of these score-based methods need to be adjusted judiciously.…”
Section: Introductionmentioning
confidence: 92%
See 1 more Smart Citation
“…In [13], the decision score is computed by a temporal difference strategy to detect and isolate attackers. Similar score-based methods are also shown in [23]- [25]. While such methods have reasonable performance, the score design is somewhat ad-hoc and relies heavily on the experts to design sophisticated decision functions, and the detection thresholds of these score-based methods need to be adjusted judiciously.…”
Section: Introductionmentioning
confidence: 92%
“…where L i (W ) = 1 q ς∈Di (W , ς). This formulation enables us to state the optimization problem (25) in a distributed manner. This distributed collaborative training problem could be addressed by gossip exchanges [41], [42].…”
Section: A the Distributed Collaborative Training Processmentioning
confidence: 99%
“…The several projects are funded by the different countries in spite of economic problems for the renewable energy sources connection to the power grids. The different energy sources are combined in the SSG like small wind turbines, and integration of the micro turbines with storage devices, like batteries connected at low voltage systems [7,8]. For electric power distribution, there is installation of the different protection systems at every feeder.…”
Section: Introductionmentioning
confidence: 99%
“…These applications need sharing of a high dimensional parameter vector, usually of the order of 32 × 32 × 3 ∼ 1024 × 1024 × 3. Applications such as spectrum sensing in Ad hoc cognitive radio networks, see [21], distributed detection of malicious attacks in finitetime consensus networks [22] and control of autonomous agents like unmanned aerial vehicles (UAVs) for search and survey operations, see [10] also depend on implementing higher dimensional consensus protocols.…”
Section: Introductionmentioning
confidence: 99%