The Community for Technology Leaders
RSS Icon
Issue No.09 - Sept. (2012 vol.23)
pp: 1694-1707
Sandip Roy , Washington State University, Pullman
Mengran Xue , Washington State University, Pullman
Sajal K. Das , University of Texas at Arlington, Arlington
Motivated by the increasing need for developing automated decision-support tools for cyber-physical networks subject to uncertainties, we have been pursuing development of a new control-theoretic framework for network security and vulnerability. In this paper, we build on the proposed framework to put forth concrete definitions for security and (dually) discoverability, for a class of models that can represent dynamics of numerous cyber-physical networks of interest: namely, dynamical network spread models. These security and discoverability definitions capture whether or not, and to what extent, a stakeholder can infer the temporal dynamics of the spread from localized and noisy measurements. We then equivalence these security and security-level definitions to the control-theoretic notions of observability and optimal estimation, and so obtain explicit algebraic and spectral conditions for security and analyses of the security level. Further drawing on graph-theory constructs, a series of graphical conditions for security, as well as characterizations of security levels, are derived. A case study on zoonotic disease spread is also included, to illustrate concrete application of the analyses in management of cyber-physical infrastructure networks.
Security, Estimation, Computational modeling, Biological system modeling, Noise measurement, Vectors, Diseases, graph theory, Security, Estimation, Computational modeling, Biological system modeling, Noise measurement, Vectors, Diseases, control theory., Security, network estimation, dynamical models
Sandip Roy, Mengran Xue, Sajal K. Das, "Security and Discoverability of Spread Dynamics in Cyber-Physical Networks", IEEE Transactions on Parallel & Distributed Systems, vol.23, no. 9, pp. 1694-1707, Sept. 2012, doi:10.1109/TPDS.2012.59
[1] M. Xue, S. Roy, Y. Wan, and S.K. Das, "Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach," Security Cyber-Physical Infrastructures: Foundations and Challenges, S. Das, K. Kant, and N. Zhang, eds. Morgan-Kauffman, 2012.
[2] Y. Wan and S. Roy, "On Inference of Network Time Constants from Impulse Response Data: Graph-Theoretic Cramer-Rao Bounds," Proc. Conf. Decision and Control, pp. 4111-4116, Dec. 2009.
[3] M. Xue, E. Yeung, A. Rai, S. Roy, Y. Wan, and S. Warnick, "Initial-Condition Estimation in Network Synchronization Processes: Graphical Characterizations of Estimator Structure and Performance," Proc. AIAA Guidance, Navigation and Control Conf., Aug. 2011.
[4] M. Xue and S. Roy, "Spectral and Graph-Theoretic Bounds on Steady-State-Probability Estimation Performance for an Ergodic Markov Chain," Proc. Am. Control Conf., July 2011, doi:10.1016/j.jfranklin.2011.07.010.
[5] P. De, Y. Liu, and S.K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 413-425, Mar. 2009.
[6] P. De, Y. Liu, and S.K. Das, "Deployment Aware Modeling of Node Compromise Spread in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 5, no. 3, pp. 413-425, May 2009.
[7] C.R. Rao, "Minimum Variance Quadratic Unbiased Estimation of Variance Components," J. Multivariate Analysis, vol. 1, no. 4, pp. 445-456, 1971.
[8] W.J. Rugh, Linear System Theory, second ed. Prentice-Hall, 1996.
[9] Y. Wan, S. Roy, and A. Saberi, "A New Focus in the Science of Networks: Toward Methods for Design," Proc. Royal Soc. A, vol. 464, pp. 513-555, Mar. 2008.
[10] S. Roy, Y. Wan, A. Saberi, and M. Xue, "Designing Linear Distributed Algorithms with Memory for Fast Convergence," Int'l J. Robust and Nonlinear Control, 2011, doi: 10.1002/rnc.1778.
[11] S. Roy, T. McElwain, and Y. Wan, "A Network Control Theory Approach to Modeling and Optimal Control of Zoonoses: A Case Study of Brucellosis Transmission in Sub-Saharan Africa," PLOS Neglected Tropical Diseases, vol. 10, p. e1259, 2010.
[12] S. Roy, K. Herlugson, and A. Saberi, "A Control-Theoretic Approach to Distributed Discrete-Valued Decision-Making in Networks of Sensing Agents," IEEE Trans. Mobile Computing, vol. 5, no. 8, pp. 945-957, Aug. 2006.
[13] S. Roy, Y. Wan, and A. Saberi, "A Network Control Theory Approach to Virus-Spread Mitigation," Proc. Homeland Security Technology Conf., May 2009.
[14] M. Altmann, "Susceptible-Infected-Removed Epidemic Models with Dynamic Partnerships," J. Math. Biology, vol. 33, no. 6, pp. 661-675, 1995, doi: 10.1007/BF00298647.
[15] M.E.J. Newman, "The Spread of Epidemic Disease on Networks," Physical Rev. E 66, 016128, 2002.
[16] O. Diekmann and J.A. Heesterbeck, Math. Epidemiology of Infectious Diseases. Wiley, 2000.
[17] M. Xue, W. Wang, and S. Roy, "Security Concepts for the Dynamics of Communicating Autonomous-Unmanned-Vehicle Networks," submitted to, Automatica.
[18] A. Papoulis, S.U. Pillai, Probability, Random Variables, and Stochastic Processes. TaTa McGraw-Hill, 2002.
[19] S. Roy, A. Saberi, and Y. Wan, "Majorizations for the Dominant Eigenvector of a Nonnegative Matrix," Proc. Am. Control Conf., pp. 1965-1966, June 2008.
[20] W. Yu, N. Zhang, X. Fu, and W. Zhao, "Self-Disciplinary Worms and Countermeasures: Modeling and Analysis," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 10, pp. 1501-1514, Oct. 2010.
[21] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the Spread of Influence through a Social Network," Proc. Ninth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 137-146, 2003.
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool