On optimal sensor placement for mitigation of vulnerabilities to cyber attacks in large-scale networks

U. Vaidya, M. Fardad

Research output: Chapter in Book/Entry/PoemConference contribution

11 Scopus citations

Abstract

We propose a system theoretic approach to the identification and mitigation of vulnerabilities to cyber attacks, in networks of dynamical systems. Using the controllability and observability gramians, we define a network's vulnerability in terms of the impact of an attack input and the degree of difficulty with which this impact can be detected. In this framework, a network is deemed as vulnerable if it is easy for an attacker to steer it to a certain state and yet such a state is hard to observe through the network's sensing mechanisms. We propose strategies for finding the optimal location of a small number of sensors that minimize the network's vulnerability. Such strategies are obtained as the solution of convex optimization problems, formulated so as to strike a balance between maximal reduction of the system's vulnerability and employing a minimal number of sensors. The utility of the developed framework is demonstrated on a standard IEEE nine bus power system network model.

Original languageEnglish (US)
Title of host publication2013 European Control Conference, ECC 2013
PublisherIEEE Computer Society
Pages3548-3553
Number of pages6
ISBN (Print)9783033039629
DOIs
StatePublished - 2013
Event2013 12th European Control Conference, ECC 2013 - Zurich, Switzerland
Duration: Jul 17 2013Jul 19 2013

Publication series

Name2013 European Control Conference, ECC 2013

Other

Other2013 12th European Control Conference, ECC 2013
Country/TerritorySwitzerland
CityZurich
Period7/17/137/19/13

Keywords

  • Convex optimization
  • large-scale systems
  • power networks
  • relaxation
  • semidefinite programming
  • sensing strategy
  • smart grid

ASJC Scopus subject areas

  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'On optimal sensor placement for mitigation of vulnerabilities to cyber attacks in large-scale networks'. Together they form a unique fingerprint.

Cite this