Distributed Detection of Malicious Attacks on Consensus Algorithms with Applications in Power Networks

Sourav Patel, Vivek Khatana, Govind Saraswat, Murti V. Salapaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Consensus-based distributed algorithms are well suited for coordination among agents in a cyber-physical system. These distributed schemes, however, suffer from their vulnerability to cyber attacks that are aimed at manipulating data and control ow. In this article, we present a novel distributed method for detecting the presence of such intrusions for a distributed multi-agent system following ratio consensus. We employ a Max-Min protocol to develop low cost, easy to implement detection strategies where each participating node detects the intrusion independently, eliminating the need for a trusted certifying agent in the network. The effectiveness of the detection method is demonstrated by numerical simulations on a 1000 node network to demonstrate the efficacy and simplicity of implementation.

Original languageEnglish (US)
Title of host publication7th International Conference on Control, Decision and Information Technologies, CoDIT 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages397-402
Number of pages6
ISBN (Electronic)9781728159539
DOIs
StatePublished - Jun 29 2020
Event7th International Conference on Control, Decision and Information Technologies, CoDIT 2020 - Prague, Czech Republic
Duration: Jun 29 2020Jul 2 2020

Publication series

Name7th International Conference on Control, Decision and Information Technologies, CoDIT 2020

Conference

Conference7th International Conference on Control, Decision and Information Technologies, CoDIT 2020
Country/TerritoryCzech Republic
CityPrague
Period6/29/207/2/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • Ratio consensus
  • cybersecurity
  • distributed algorithm
  • distributed intruder detection
  • smart microgrids

Fingerprint

Dive into the research topics of 'Distributed Detection of Malicious Attacks on Consensus Algorithms with Applications in Power Networks'. Together they form a unique fingerprint.

Cite this