Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure
Nowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze th...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8932468/ |
id |
doaj-ef01ef797f304de4b7443fceba58cd83 |
---|---|
record_format |
Article |
spelling |
doaj-ef01ef797f304de4b7443fceba58cd832021-03-30T00:33:49ZengIEEEIEEE Access2169-35362019-01-01718014718015410.1109/ACCESS.2019.29589878932468Resilience Analysis of Discrete-Time Networked System in the Presence of Information DisclosureZiqian Zheng0https://orcid.org/0000-0002-8214-0861Chao Yang1https://orcid.org/0000-0002-5441-2540Wen Yang2https://orcid.org/0000-0003-4943-7919Key Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaKey Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaKey Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai, ChinaNowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze the convergence properties of the networked system. Then we provide necessary and sufficient conditions under which the eavesdropper can infer the states of the networked system by observing the states of partial of nodes, and also provide necessary conditions when the network has some nodes with zero out-degree. Finally, we verify all the derived theoretical results by numerical simulations, and show the relation of the node role in the network and the eavesdropping performance in some typical networks.https://ieeexplore.ieee.org/document/8932468/Network securityobservabilityeavesdropping attackcyber-physical systems |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ziqian Zheng Chao Yang Wen Yang |
spellingShingle |
Ziqian Zheng Chao Yang Wen Yang Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure IEEE Access Network security observability eavesdropping attack cyber-physical systems |
author_facet |
Ziqian Zheng Chao Yang Wen Yang |
author_sort |
Ziqian Zheng |
title |
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure |
title_short |
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure |
title_full |
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure |
title_fullStr |
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure |
title_full_unstemmed |
Resilience Analysis of Discrete-Time Networked System in the Presence of Information Disclosure |
title_sort |
resilience analysis of discrete-time networked system in the presence of information disclosure |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
Nowadays, security attacks on cyber physical systems have been reported frequently, wherein the eavesdropping attack is an usual hidden type of passive attack. In this paper, we consider the resilience of a discrete-time networked system in the presence of eavesdropping attacks. First, we analyze the convergence properties of the networked system. Then we provide necessary and sufficient conditions under which the eavesdropper can infer the states of the networked system by observing the states of partial of nodes, and also provide necessary conditions when the network has some nodes with zero out-degree. Finally, we verify all the derived theoretical results by numerical simulations, and show the relation of the node role in the network and the eavesdropping performance in some typical networks. |
topic |
Network security observability eavesdropping attack cyber-physical systems |
url |
https://ieeexplore.ieee.org/document/8932468/ |
work_keys_str_mv |
AT ziqianzheng resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure AT chaoyang resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure AT wenyang resilienceanalysisofdiscretetimenetworkedsysteminthepresenceofinformationdisclosure |
_version_ |
1724188181890334720 |