Attack Stealthiness and Detection of Multiagent Systems : A Zero-Sum Formulation
(2024) 63rd IEEE Conference on Decision and Control, CDC 2024 p.464-469- Abstract
Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to... (More)
Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to quantify the stealthiness, and formulate the stealthiness problem as one of zero-sum games. We solve the problem explicitly, which gives rise to a fundamental bound on the stealthiness achievable, and as well optimal attack and defense strategies that achieve the optimal stealthiness, both of which can be obtained in terms of certain augmented controllability Gramians associated with the agents. The stealthiness bound is seen to depend on agent dynamics and network characteristics including a measure of connectivity.
(Less)
- author
- Zhu, Shiyong
LU
; Wang, Miaomiao
; Chen, Jie
and Rantzer, Anders
LU
- organization
- publishing date
- 2024
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- consensus, game theory, Gramian matrices, malicious attackers, Multiagent systems, vulnerability measure
- host publication
- Proceedings of the IEEE Conference on Decision and Control
- pages
- 6 pages
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- 63rd IEEE Conference on Decision and Control, CDC 2024
- conference location
- Milan, Italy
- conference dates
- 2024-12-16 - 2024-12-19
- external identifiers
-
- scopus:86000593558
- ISBN
- 9798350316339
- DOI
- 10.1109/CDC56724.2024.10886878
- language
- English
- LU publication?
- yes
- id
- b0a2c6c4-7394-42ce-9253-72d45f8d91fd
- date added to LUP
- 2025-06-03 09:38:04
- date last changed
- 2025-06-03 10:45:14
@inproceedings{b0a2c6c4-7394-42ce-9253-72d45f8d91fd, abstract = {{<p>Cybersecurity has in recent years emerged as a paramount concern in the design and operation of industrial systems and civil infrastructures, due mainly to their susceptibility to malicious cyber attacks which take advantage of the vulnerability of communication networks and IT devices. In this paper, we investigate such an attack and counter attack scenario by considering multiagent systems, a somewhat basic prototype of cyberphysical systems. We study false data injection attacks launched on the agent sensors, and possible defense of such attacks at the agent actuators. The primary issue under consideration is the stealthiness of the attacks, while steering a multiagent system away from its consensual state. We propose a metric to quantify the stealthiness, and formulate the stealthiness problem as one of zero-sum games. We solve the problem explicitly, which gives rise to a fundamental bound on the stealthiness achievable, and as well optimal attack and defense strategies that achieve the optimal stealthiness, both of which can be obtained in terms of certain augmented controllability Gramians associated with the agents. The stealthiness bound is seen to depend on agent dynamics and network characteristics including a measure of connectivity.</p>}}, author = {{Zhu, Shiyong and Wang, Miaomiao and Chen, Jie and Rantzer, Anders}}, booktitle = {{Proceedings of the IEEE Conference on Decision and Control}}, isbn = {{9798350316339}}, keywords = {{consensus; game theory; Gramian matrices; malicious attackers; Multiagent systems; vulnerability measure}}, language = {{eng}}, pages = {{464--469}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Attack Stealthiness and Detection of Multiagent Systems : A Zero-Sum Formulation}}, url = {{http://dx.doi.org/10.1109/CDC56724.2024.10886878}}, doi = {{10.1109/CDC56724.2024.10886878}}, year = {{2024}}, }