Security Analysis of a Distributed Networked System Under Eavesdropping Attacks

In this brief, we consider the security problem for a network of linear time-invariant dynamical systems under eavesdropping attacks, where an eavesdropper can measure the states of some nodes in the network. We provide a necessary and sufficient condition for the eavesdropper to reveal the states of the networked system. We also present some necessary conditions for the case when the network has tail nodes or at least one node not monitored by the eavesdropper. In addition, we investigate several typical network structures and show that the networked system can be completely observed provided that the eavesdropper can monitor one node in each cycle. Further, we characterize the minimal set of necessarily monitored nodes with the upper bound set of such nodes. Finally, we verify the theoretical results by numerical simulations.

[1]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[2]  Vincent Y. F. Tan,et al.  A Numerical Study on the Wiretap Network With a Simple Network Topology , 2016, IEEE Transactions on Information Theory.

[3]  Tong Zhou,et al.  On the controllability and observability of networked dynamic systems , 2014, Autom..

[4]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[5]  Adesh Kumar,et al.  Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control , 2017 .

[6]  Li-Chun Wang,et al.  Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.

[7]  Chao Yang,et al.  Nodes selection strategy in cooperative tracking problem , 2016, Autom..

[8]  Hao Wang,et al.  On Modeling Eavesdropping Attacks in Underwater Acoustic Sensor Networks † , 2016, Sensors.

[9]  Mehran Mesbahi,et al.  Controllability and Observability of Network-of-Networks via Cartesian Products , 2014, IEEE Transactions on Automatic Control.

[10]  Reza Azarderakhsh,et al.  Dual-Basis Superserial Multipliers for Secure Applications and Lightweight Cryptographic Architectures , 2014, IEEE Transactions on Circuits and Systems II: Express Briefs.

[11]  Andre Teixeira,et al.  Toward Cyber-Secure and Resilient Networked Control Systems , 2014 .

[12]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[13]  Guo-Ping Jiang,et al.  Reference-Modulated DCSK: A Novel Chaotic Communication Scheme , 2013, IEEE Transactions on Circuits and Systems II: Express Briefs.

[14]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[15]  Yu Wang,et al.  Controllability and observability analysis for vertex domination centrality in directed networks , 2014, Scientific reports.

[16]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[17]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[18]  Tongwen Chen,et al.  An Intrusion Detection System for Cyber Attacks in Wireless Networked Control Systems , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[19]  Chao Yang,et al.  Event-based distributed state estimation under deception attack , 2017, Neurocomputing.

[20]  Ching-tai Lin Structural controllability , 1974 .

[21]  M.L.J. Hautus,et al.  Controllability and observability conditions of linear autonomous systems , 1969 .

[22]  Sana Hoor Jokhio,et al.  Node capture attack detection and defence in wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[23]  Yang Xiang,et al.  A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.