Gramian‐based vulnerability analysis of dynamic networks
Abstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-04-01
|
Series: | IET Control Theory & Applications |
Online Access: | https://doi.org/10.1049/cth2.12265 |
_version_ | 1819110567014563840 |
---|---|
author | Maryam Babazadeh |
author_facet | Maryam Babazadeh |
author_sort | Maryam Babazadeh |
collection | DOAJ |
description | Abstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation‐target nodes is carried out by introducing a Gramian‐based measure and reformulating the vulnerability problem as a standard optimisation problem. However, the underlying optimisation problem appears to be a binary program and intractable in large‐dimensional systems. Balanced realisation of the system dynamics, combined with a Gauss–Newton approach is employed to provide a two‐stage algorithm for the selection of the most effective joint sets. The proposed approach relies on QR decomposition and QR pivoting, does not require iterative computation of Gramian matrices, and scales well with the system dimensions. The proposed approach is evaluated on a set of synthetic and real‐life examples including IEEE 118 bus power network. |
first_indexed | 2024-12-22T03:43:46Z |
format | Article |
id | doaj.art-f5b2e2861d884e588ee7230273719712 |
institution | Directory Open Access Journal |
issn | 1751-8644 1751-8652 |
language | English |
last_indexed | 2024-12-22T03:43:46Z |
publishDate | 2022-04-01 |
publisher | Wiley |
record_format | Article |
series | IET Control Theory & Applications |
spelling | doaj.art-f5b2e2861d884e588ee72302737197122022-12-21T18:40:11ZengWileyIET Control Theory & Applications1751-86441751-86522022-04-0116662563710.1049/cth2.12265Gramian‐based vulnerability analysis of dynamic networksMaryam Babazadeh0Department of Electrical Engineering Sharif University of Technology Tehran IranAbstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation‐target nodes is carried out by introducing a Gramian‐based measure and reformulating the vulnerability problem as a standard optimisation problem. However, the underlying optimisation problem appears to be a binary program and intractable in large‐dimensional systems. Balanced realisation of the system dynamics, combined with a Gauss–Newton approach is employed to provide a two‐stage algorithm for the selection of the most effective joint sets. The proposed approach relies on QR decomposition and QR pivoting, does not require iterative computation of Gramian matrices, and scales well with the system dimensions. The proposed approach is evaluated on a set of synthetic and real‐life examples including IEEE 118 bus power network.https://doi.org/10.1049/cth2.12265 |
spellingShingle | Maryam Babazadeh Gramian‐based vulnerability analysis of dynamic networks IET Control Theory & Applications |
title | Gramian‐based vulnerability analysis of dynamic networks |
title_full | Gramian‐based vulnerability analysis of dynamic networks |
title_fullStr | Gramian‐based vulnerability analysis of dynamic networks |
title_full_unstemmed | Gramian‐based vulnerability analysis of dynamic networks |
title_short | Gramian‐based vulnerability analysis of dynamic networks |
title_sort | gramian based vulnerability analysis of dynamic networks |
url | https://doi.org/10.1049/cth2.12265 |
work_keys_str_mv | AT maryambabazadeh gramianbasedvulnerabilityanalysisofdynamicnetworks |