Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure

Nowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze th...

Full description

Bibliographic Details
Main Authors: Ziqian Zheng, Chao Yang, Wen Yang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8932468/
id doaj-ef01ef797f304de4b7443fceba58cd83
record_format Article
spelling doaj-ef01ef797f304de4b7443fceba58cd832021-03-30T00:33:49ZengIEEEIEEE Access2169-35362019-01-01718014718015410.1109/ACCESS.2019.29589878932468Resilience Analysis of Discrete-Time Networked System in the Presence of Information DisclosureZiqian Zheng0https://orcid.org/0000-0002-8214-0861Chao Yang1https://orcid.org/0000-0002-5441-2540Wen Yang2https://orcid.org/0000-0003-4943-7919Key Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaKey Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaKey Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaNowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze the convergence properties of the networked system. Then we provide necessary and sufficient conditions under which the eavesdropper can infer the states of the networked system by observing the states of partial of nodes, and also provide necessary conditions when the network has some nodes with zero out-degree. Finally, we verify all the derived theoretical results by numerical simulations, and show the relation of the node role in the network and the eavesdropping performance in some typical networks.https://ieeexplore.ieee.org/document/8932468/Network securityobservabilityeavesdropping attackcyber-physical systems
collection DOAJ
language English
format Article
sources DOAJ
author Ziqian Zheng
Chao Yang
Wen Yang
spellingShingle Ziqian Zheng
Chao Yang
Wen Yang
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
IEEE Access
Network security
observability
eavesdropping attack
cyber-physical systems
author_facet Ziqian Zheng
Chao Yang
Wen Yang
author_sort Ziqian Zheng
title Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
title_short Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
title_full Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
title_fullStr Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
title_full_unstemmed Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
title_sort resilience analysis of discrete-time networked system in the presence of information disclosure
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description Nowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze the convergence properties of the networked system. Then we provide necessary and sufficient conditions under which the eavesdropper can infer the states of the networked system by observing the states of partial of nodes, and also provide necessary conditions when the network has some nodes with zero out-degree. Finally, we verify all the derived theoretical results by numerical simulations, and show the relation of the node role in the network and the eavesdropping performance in some typical networks.
topic Network security
observability
eavesdropping attack
cyber-physical systems
url https://ieeexplore.ieee.org/document/8932468/
work_keys_str_mv AT ziqianzheng resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure
AT chaoyang resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure
AT wenyang resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure
_version_ 1724188181890334720