Advertisement

Efficient Analysis to Protect Control into Critical Infrastructures

  • Shuo ZhangEmail author
  • Stephen D. Wolthusen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11260)

Abstract

To protect control into critical infrastructures against single component-dependency attacks or failures, we analyse the importance of any given dependency in maintaining controllability with a minimum set of inputs. Since people use critical, redundant and ordinary categories to clarify how an edge maintains controllability of linear time-invariant(LTI) dynamical networks, according to graph-based models of infrastructures and the minimum input theorem, we firstly use a Erdős-Rényi random digraph with a precomputed maximum matching to model some LTI and controllable infrastructures by a minimum set of inputs. We then efficiently analyse any given arc’s category before and during single-arc removals, as a way to further confirm how related dependency keeps control into infrastructures. After running our label operations with linear time and space complexity, any edge-category analysis can be thus executed in O(1) time in both cases.

Keywords

Network controllability Modelling Edge classification 

References

  1. 1.
    Chartrand, G., Lesniak, L., Zhang, P.: Graphs & Digraphs. CRC Press, Boca Raton (2010)zbMATHGoogle Scholar
  2. 2.
    Cormen, T.H.: Introduction to Algorithms. MIT press, Cambridge (2009)zbMATHGoogle Scholar
  3. 3.
    Hopcroft, J.E., Karp, R.M.: An \(\text{ n }\,{\hat{}}\,{5/2}\) algorithm for maximum matchings in bipartite graphs. SIAM J. Comput. 2(4), 225–231 (1973)Google Scholar
  4. 4.
    Kalman, R.: On the general theory of control systems. IRE Trans. Autom. Control 4(3), 110–110 (1959)CrossRefGoogle Scholar
  5. 5.
    Kalman, R.E.: Mathematical description of linear dynamical systems. J. Soci. Ind. Appl. Math. Ser. A Control 1(2), 152–192 (1963)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Liu, Y.Y., Slotine, J.J., Barabási, A.L.: Controllability of complex networks. Nature 473(7346), 167–173 (2011)CrossRefGoogle Scholar
  7. 7.
    Lopez, J., Setola, R., Wolthusen, S.D. (eds.): Critical Infrastructure Protection 2011. LNCS, vol. 7130. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-28920-0CrossRefGoogle Scholar
  8. 8.
    Svendsen, N.K., Wolthusen, S.D.: Modelling approaches. In: Lopez, J., Setola, R., Wolthusen, S.D. (eds.) Critical Infrastructure Protection 2011. LNCS, vol. 7130, pp. 68–97. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-28920-0_5CrossRefGoogle Scholar
  9. 9.
    Zhang, S., Wolthusen, S.D.: Security-aware network analysis for network controllability. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2018)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Mathematics and Information SecurityRoyal Holloway University of LondonEghamUK

Personalised recommendations