Gramian‐based vulnerability analysis of dynamic networks

Abstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of...

Full description

Bibliographic Details
Main Author: Maryam Babazadeh
Format: Article
Language:English
Published: Wiley 2022-04-01
Series:IET Control Theory & Applications
Online Access:https://doi.org/10.1049/cth2.12265
_version_ 1819110567014563840
author Maryam Babazadeh
author_facet Maryam Babazadeh
author_sort Maryam Babazadeh
collection DOAJ
description Abstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation‐target nodes is carried out by introducing a Gramian‐based measure and reformulating the vulnerability problem as a standard optimisation problem. However, the underlying optimisation problem appears to be a binary program and intractable in large‐dimensional systems. Balanced realisation of the system dynamics, combined with a Gauss–Newton approach is employed to provide a two‐stage algorithm for the selection of the most effective joint sets. The proposed approach relies on QR decomposition and QR pivoting, does not require iterative computation of Gramian matrices, and scales well with the system dimensions. The proposed approach is evaluated on a set of synthetic and real‐life examples including IEEE 118 bus power network.
first_indexed 2024-12-22T03:43:46Z
format Article
id doaj.art-f5b2e2861d884e588ee7230273719712
institution Directory Open Access Journal
issn 1751-8644
1751-8652
language English
last_indexed 2024-12-22T03:43:46Z
publishDate 2022-04-01
publisher Wiley
record_format Article
series IET Control Theory & Applications
spelling doaj.art-f5b2e2861d884e588ee72302737197122022-12-21T18:40:11ZengWileyIET Control Theory & Applications1751-86441751-86522022-04-0116662563710.1049/cth2.12265Gramian‐based vulnerability analysis of dynamic networksMaryam Babazadeh0Department of Electrical Engineering Sharif University of Technology Tehran IranAbstract In this paper, the vulnerability of large‐dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation‐target nodes is carried out by introducing a Gramian‐based measure and reformulating the vulnerability problem as a standard optimisation problem. However, the underlying optimisation problem appears to be a binary program and intractable in large‐dimensional systems. Balanced realisation of the system dynamics, combined with a Gauss–Newton approach is employed to provide a two‐stage algorithm for the selection of the most effective joint sets. The proposed approach relies on QR decomposition and QR pivoting, does not require iterative computation of Gramian matrices, and scales well with the system dimensions. The proposed approach is evaluated on a set of synthetic and real‐life examples including IEEE 118 bus power network.https://doi.org/10.1049/cth2.12265
spellingShingle Maryam Babazadeh
Gramian‐based vulnerability analysis of dynamic networks
IET Control Theory & Applications
title Gramian‐based vulnerability analysis of dynamic networks
title_full Gramian‐based vulnerability analysis of dynamic networks
title_fullStr Gramian‐based vulnerability analysis of dynamic networks
title_full_unstemmed Gramian‐based vulnerability analysis of dynamic networks
title_short Gramian‐based vulnerability analysis of dynamic networks
title_sort gramian based vulnerability analysis of dynamic networks
url https://doi.org/10.1049/cth2.12265
work_keys_str_mv AT maryambabazadeh gramianbasedvulnerabilityanalysisofdynamicnetworks