عرض بسيط للتسجيلة

المؤلفTaheri, M.
المؤلفKhorasani, K.
المؤلفShames, I.
المؤلفMeskin, Nader
تاريخ الإتاحة2022-04-14T08:45:39Z
تاريخ النشر2020
اسم المنشورCCTA 2020 - 4th IEEE Conference on Control Technology and Applications
المصدرScopus
المعرّفhttp://dx.doi.org/10.1109/CCTA41146.2020.9206392
معرّف المصادر الموحدhttp://hdl.handle.net/10576/29771
الملخصThis paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is injected by the malicious adversary into the communication links among the agents. The adversary, leveraging the compromised communication links disguises the cyber attack signals and attempts to take control over the entire network of MAS. The adversary aims at achieving this by directly attacking only a subset of the multi-agents. Conditions under which the malicious hacker has control over the entire MAS network are provided. Two notions of security controllability indices are proposed and developed. These notions are utilized as metrics to evaluate the controllability that each agent provides to the adversary for executing the malicious cyber attack. Furthermore, the possibility of introducing zero dynamics cyber attacks on the MAS through compromising the communication links is also investigated. Finally, an illustrative numerical example is provided to demonstrate the effectiveness of our proposed methods.
راعي المشروعNorth Atlantic Treaty Organization; Qatar Foundation; Qatar National Research Fund; Natural Sciences and Engineering Research Council of Canada; Minist?re de la Dfense Nationale
اللغةen
الناشرInstitute of Electrical and Electronics Engineers Inc.
الموضوعComputer crime
Controllability
Crime
Directed graphs
Network security
Numerical methods
Personal computing
Controllability indices
Cyber-attacks
Malicious adversaries
Multi agent
Zero dynamics
Multi agent systems
العنوانMitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
النوعConference Paper
الصفحات857-862


الملفات في هذه التسجيلة

الملفاتالحجمالصيغةالعرض

لا توجد ملفات لها صلة بهذه التسجيلة.

هذه التسجيلة تظهر في المجموعات التالية

عرض بسيط للتسجيلة