Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Attack Stealthiness and Detection of Multiagent Systems : A Zero-Sum Formulation

Zhu, Shiyong LU ; Wang, Miaomiao ; Chen, Jie and Rantzer, Anders LU orcid (2024) 63rd IEEE Conference on Decision and Control, CDC 2024 p.464-469
Abstract

Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to... (More)

Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to quantify the stealthiness, and formulate the stealthiness problem as one of zero-sum games. We solve the problem explicitly, which gives rise to a fundamental bound on the stealthiness achievable, and as well optimal attack and defense strategies that achieve the optimal stealthiness, both of which can be obtained in terms of certain augmented controllability Gramians associated with the agents. The stealthiness bound is seen to depend on agent dynamics and network characteristics including a measure of connectivity.

(Less)
Please use this url to cite or link to this publication:
author
; ; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
consensus, game theory, Gramian matrices, malicious attackers, Multiagent systems, vulnerability measure
host publication
Proceedings of the IEEE Conference on Decision and Control
pages
6 pages
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
63rd IEEE Conference on Decision and Control, CDC 2024
conference location
Milan, Italy
conference dates
2024-12-16 - 2024-12-19
external identifiers
  • scopus:86000593558
ISBN
9798350316339
DOI
10.1109/CDC56724.2024.10886878
language
English
LU publication?
yes
id
b0a2c6c4-7394-42ce-9253-72d45f8d91fd
date added to LUP
2025-06-03 09:38:04
date last changed
2025-06-03 10:45:14
@inproceedings{b0a2c6c4-7394-42ce-9253-72d45f8d91fd,
  abstract     = {{<p>Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to quantify the stealthiness, and formulate the stealthiness problem as one of zero-sum games. We solve the problem explicitly, which gives rise to a fundamental bound on the stealthiness achievable, and as well optimal attack and defense strategies that achieve the optimal stealthiness, both of which can be obtained in terms of certain augmented controllability Gramians associated with the agents. The stealthiness bound is seen to depend on agent dynamics and network characteristics including a measure of connectivity.</p>}},
  author       = {{Zhu, Shiyong and Wang, Miaomiao and Chen, Jie and Rantzer, Anders}},
  booktitle    = {{Proceedings of the IEEE Conference on Decision and Control}},
  isbn         = {{9798350316339}},
  keywords     = {{consensus; game theory; Gramian matrices; malicious attackers; Multiagent systems; vulnerability measure}},
  language     = {{eng}},
  pages        = {{464--469}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  title        = {{Attack Stealthiness and Detection of Multiagent Systems : A Zero-Sum Formulation}},
  url          = {{http://dx.doi.org/10.1109/CDC56724.2024.10886878}},
  doi          = {{10.1109/CDC56724.2024.10886878}},
  year         = {{2024}},
}