52nd IEEE Conference on Decision and Control 2013
DOI: 10.1109/cdc.2013.6759984
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability of continuous-time network synchronization processes: A minimum energy perspective

Abstract: We characterize the vulnerability of a linear network synchronization process to intrusion by an adversary that can actuate a single network component. Specifically, we model the intruder as seeking to move the state of the synchronization process to an undesirable value or set (which may or may not be known to system operators) via a local actuation. We evaluate the network vulnerability in terms of the whether or not the intruder can achieve its goal, and also the minimum actuation energy (or expected minimu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…The analysis of the eigenvalues follows immediately from the classical work of Chua [12]. The eigenvector analysis turns out to be more intricate because of the possibility for non-simple eigenvalue, but closely follows the analyses given in [13,3]. Since this is the case, we simply present the result in the following lemma and corollary, relegating the proofs to Appendices A and B.…”
Section: Spectral Analysismentioning
confidence: 91%
See 2 more Smart Citations
“…The analysis of the eigenvalues follows immediately from the classical work of Chua [12]. The eigenvector analysis turns out to be more intricate because of the possibility for non-simple eigenvalue, but closely follows the analyses given in [13,3]. Since this is the case, we simply present the result in the following lemma and corollary, relegating the proofs to Appendices A and B.…”
Section: Spectral Analysismentioning
confidence: 91%
“…In general, one finds that the uncontrollability of the DIN dynamics results from the presence of certain sub-structures in the network graph. For instance, partial symmetry of the graph Ψ with respect to certain vertices, presence of identically-interconnected vertex sets, and presence of bottleneck node sets in the graph can all lead to uncontrollability (see [13,3] for details). However, typical or generic network graphs do not have these sub-structures.…”
Section: Controllabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Formal algebraic analyses of these problems can be completed by applying and building on control-theory techniques. These analyses then give a starting point for developing topological insights into threat impact, using recent results that tie network structure to reachability and robustness levels [17][18][19]. They also bring forth interesting new questions regarding reachability and robustness in networks with layered structures, as well as reachability using sign-definite inputs.…”
Section: Linearized Approximation and Control-theory Perspective On Tmentioning
confidence: 99%
“…Relative to this literature, the main innovation here is to study the spatiotemporal impacts of disruptions from a graph-theory and network-controls perspective, and to develop models and analyses for meshed cyber, traffic, and weather dynamics. The research described here also connects to a broader effort to evaluate threats to cyber-physical systems from a network-controls perspective, but achieves a keener analysis focused on the specific models used in air traffic management (e.g., [19,[27][28][29]). …”
Section: Introductionmentioning
confidence: 99%