Security and Infiltration of Networks: A Structural Controllability and Observability Perspective

7Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper examines the role of structural controllability (s-controllability) in the design of secure linear-time-invariant networked systems. We reason about secure network design in the face of two attack vectors: a "Disrupt" attack where the infiltrator's objective is to perturb the network to render it unusable, and a "Highjack and eavesdrop" attack to actively control and probe the network. For the former attack, strong s-controllable input sets are chosen to control the network to provide robustness to these attacks. Weak s-controllable input sets are selected by infiltrators for the "Highjack and eavesdrop" attack so as to generically guarantee a successful attack. We provide necessary and sufficient conditions for weak and strong s-controllability involving matchings over a bipartite graph representation of the network. We also provide a brief analysis of s-controllability over special families of networks. © Springer International Publishing Switzerland 2013.

Cite

CITATION STYLE

APA

Chapman, A., & Mesbahi, M. (2013). Security and Infiltration of Networks: A Structural Controllability and Observability Perspective. In Lecture Notes in Control and Information Sciences (Vol. 449 LNCIS, pp. 143–160). Springer Verlag. https://doi.org/10.1007/978-3-319-01159-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free