Loading...

Gramian-based vulnerability analysis of dynamic networks

Babazadeh, M ; Sharif University of Technology | 2022

73 Viewed
  1. Type of Document: Article
  2. DOI: 10.1049/cth2.12265
  3. Publisher: John Wiley and Sons Inc , 2022
  4. Abstract:
  5. In this paper, the vulnerability of large-dimensional dynamic networks to false data injections is analysed. The malicious data can manipulate input injection at the control nodes and affect the outputs of the network. The objective is to analyse and quantify the potential vulnerability of the dynamics by such adversarial inputs when the opponents try to avoid being detected as much as possible. A joint set of most effective actuation nodes and most vulnerable target nodes are introduced with minimal detectability by the monitoring system. Detection of this joint set of actuation-target nodes is carried out by introducing a Gramian-based measure and reformulating the vulnerability problem as a standard optimisation problem. However, the underlying optimisation problem appears to be a binary program and intractable in large-dimensional systems. Balanced realisation of the system dynamics, combined with a Gauss–Newton approach is employed to provide a two-stage algorithm for the selection of the most effective joint sets. The proposed approach relies on QR decomposition and QR pivoting, does not require iterative computation of Gramian matrices, and scales well with the system dimensions. The proposed approach is evaluated on a set of synthetic and real-life examples including IEEE 118 bus power network. © 2022 The Authors. IET Control Theory & Applications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology
  6. Keywords:
  7. Electric power transmission networks ; Iterative methods ; Network security ; Control nodes ; Detectability ; Dimensional dynamics ; Dynamic network ; False data injection ; Gramians ; Joint set ; Optimization problems ; Target nodes ; Vulnerability analysis ; Optimization
  8. Source: IET Control Theory and Applications ; Volume 16, Issue 6 , 2022 , Pages 625-637 ; 17518644 (ISSN)
  9. URL: https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cth2.12265