Dynamic Resilient Network Games With Applications to Multiagent Consensus
A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover th...
Saved in:
Published in | IEEE transactions on control of network systems Vol. 8; no. 1; pp. 246 - 259 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 2325-5870 2372-2533 |
DOI | 10.1109/TCNS.2020.3016839 |
Cover
Loading…
Abstract | A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multiagent consensus problem, where the game is played repeatedly over time. In this article, we study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results. |
---|---|
AbstractList | A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multiagent consensus problem, where the game is played repeatedly over time. In this article, we study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results. |
Author | Ishii, Hideaki Zhu, Quanyan Cetinkaya, Ahmet Nugraha, Yurid Hayakawa, Tomohisa |
Author_xml | – sequence: 1 givenname: Yurid orcidid: 0000-0003-2054-952X surname: Nugraha fullname: Nugraha, Yurid email: yurid@dsl.sc.e.titech.ac.jp organization: Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo, Japan – sequence: 2 givenname: Ahmet orcidid: 0000-0002-1731-8600 surname: Cetinkaya fullname: Cetinkaya, Ahmet email: cetinkaya@nii.ac.jp organization: Information Systems Architecture Science Research Division, National Institute of Informatics, Tokyo, Japan – sequence: 3 givenname: Tomohisa orcidid: 0000-0002-8221-2757 surname: Hayakawa fullname: Hayakawa, Tomohisa email: hayakawa@sc.e.titech.ac.jp organization: Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo, Japan – sequence: 4 givenname: Hideaki orcidid: 0000-0003-0367-824X surname: Ishii fullname: Ishii, Hideaki email: ishii@c.titech.ac.jp organization: Department of Computer Science, Tokyo Institute of Technology, Yokohama, Japan – sequence: 5 givenname: Quanyan orcidid: 0000-0002-0008-2953 surname: Zhu fullname: Zhu, Quanyan email: quanyan.zhu@nyu.edu organization: Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, USA |
BookMark | eNp9kM1OwzAQhC1UJErpAyAukTin2Oskto9VgFKpgARFHC032YBLmpTYEerbk9CKAwdO-6P5djVzSgZVXSEh54xOGKPqapk-PE-AAp1wyhLJ1REZAhcQQsz5oO8hDmMp6AkZO7emlDKIu5kPyfx6V5mNzYIndLa0WPngAf1X3XwEM7NBF7xa_x5Mt9vSZsbbunKBr4P7tvTWvPXqtFth5Vp3Ro4LUzocH-qIvNzeLNO7cPE4m6fTRZiB4j5UGTApDRVGgQKgBmROaZxwLpjhQoLhplgxFUe4Enkk84QWGZqIYwSYd4ZG5HJ_d9vUny06r9d121TdSw2RkolgnKlOJfaqrKmda7DQmfU_BnxjbKkZ1X10uo9O99HpQ3Qdyf6Q28ZuTLP7l7nYMxYRf_WKJYKrhH8DD156oA |
CODEN | ITCNAY |
CitedBy_id | crossref_primary_10_1109_LCSYS_2023_3257265 crossref_primary_10_1109_TSP_2023_3266975 crossref_primary_10_1016_j_automatica_2025_112137 crossref_primary_10_1016_j_ifacol_2023_10_1578 crossref_primary_10_1016_j_ejcon_2022_100693 crossref_primary_10_1109_TII_2024_3475424 crossref_primary_10_1016_j_arcontrol_2022_01_004 crossref_primary_10_1016_j_nahs_2021_101091 crossref_primary_10_1016_j_hcc_2024_100293 |
Cites_doi | 10.1109/CDC40024.2019.9029630 10.1109/TIFS.2019.2924130 10.1016/j.automatica.2010.10.015 10.1016/j.automatica.2017.01.031 10.1109/MCS.2014.2364708 10.3934/naco.2013.3.1 10.1007/s13235-018-00291-y 10.1109/TWC.2013.071913121570 10.1515/9781400835355 10.23919/ACC.2019.8814607 10.1287/moor.19.1.24 10.1017/CBO9780511814075 10.1109/TAC.2015.2461851 10.1109/JSAC.2013.130413 10.1109/CDC.2012.6426869 10.1109/TAC.2015.2416924 10.1016/j.automatica.2020.108960 10.1109/TCNS.2016.2549640 10.1109/TAC.2005.846556 10.1016/j.automatica.2010.06.016 10.3182/20120914-2-US-4030.00065 10.1109/TAC.2016.2612818 10.1109/LRA.2017.2654550 10.1145/2332432.2332505 10.1109/GAMENETS.2014.7043719 10.1109/TCNS.2017.2668901 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/TCNS.2020.3016839 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2372-2533 |
EndPage | 259 |
ExternalDocumentID | 10_1109_TCNS_2020_3016839 9167396 |
Genre | orig-research |
GrantInformation_xml | – fundername: JST ERATO HASUO Metamathematics for Systems Design Project grantid: JPMJER1603 – fundername: National Science Foundation grantid: CNS-1544782; ECCS-1847056 funderid: 10.13039/501100008982 – fundername: JST CREST grantid: JPMJCR15K3 – fundername: JSPS KAKENHI grantid: 18H01460; 18H03774; 20K14771 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-9c2188a07a929220a28d00563371a3782a3afb1954eb7d48d60fcea43e42ed253 |
IEDL.DBID | RIE |
ISSN | 2325-5870 |
IngestDate | Mon Jun 30 06:59:07 EDT 2025 Tue Jul 01 04:05:23 EDT 2025 Thu Apr 24 22:59:20 EDT 2025 Wed Aug 27 02:48:55 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-9c2188a07a929220a28d00563371a3782a3afb1954eb7d48d60fcea43e42ed253 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-2054-952X 0000-0002-1731-8600 0000-0002-8221-2757 0000-0003-0367-824X 0000-0002-0008-2953 |
PQID | 2498671319 |
PQPubID | 2040410 |
PageCount | 14 |
ParticipantIDs | proquest_journals_2498671319 crossref_citationtrail_10_1109_TCNS_2020_3016839 crossref_primary_10_1109_TCNS_2020_3016839 ieee_primary_9167396 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-03-01 |
PublicationDateYYYYMMDD | 2021-03-01 |
PublicationDate_xml | – month: 03 year: 2021 text: 2021-03-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE transactions on control of network systems |
PublicationTitleAbbrev | TCNS |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 nugraha (ref29) 0 alpcan (ref5) 2010 ref12 ref15 ref14 ref11 ref10 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 sandberg (ref4) 2015; 35 ref22 ref21 ref28 ref27 bullo (ref3) 2019 ref8 ref7 ref9 ref6 |
References_xml | – ident: ref24 doi: 10.1109/CDC40024.2019.9029630 – ident: ref25 doi: 10.1109/TIFS.2019.2924130 – ident: ref22 doi: 10.1016/j.automatica.2010.10.015 – ident: ref15 doi: 10.1016/j.automatica.2017.01.031 – volume: 35 start-page: 20 year: 2015 ident: ref4 article-title: Special issue on cyberphysical security in networked control systems publication-title: IEEE Control Syst Mag doi: 10.1109/MCS.2014.2364708 – ident: ref23 doi: 10.3934/naco.2013.3.1 – ident: ref6 doi: 10.1007/s13235-018-00291-y – ident: ref11 doi: 10.1109/TWC.2013.071913121570 – ident: ref2 doi: 10.1515/9781400835355 – ident: ref26 doi: 10.23919/ACC.2019.8814607 – ident: ref28 doi: 10.1287/moor.19.1.24 – ident: ref27 doi: 10.1017/CBO9780511814075 – ident: ref8 doi: 10.1109/TAC.2015.2461851 – ident: ref18 doi: 10.1109/JSAC.2013.130413 – start-page: 3483 year: 0 ident: ref29 article-title: Dynamic resilient graph games for state-dependent jamming attacks analysis on multi-agent systems publication-title: Proc IFAC World Congr – ident: ref9 doi: 10.1109/CDC.2012.6426869 – ident: ref16 doi: 10.1109/TAC.2015.2416924 – ident: ref14 doi: 10.1016/j.automatica.2020.108960 – ident: ref7 doi: 10.1109/TCNS.2016.2549640 – ident: ref1 doi: 10.1109/TAC.2005.846556 – ident: ref21 doi: 10.1016/j.automatica.2010.06.016 – ident: ref12 doi: 10.3182/20120914-2-US-4030.00065 – ident: ref17 doi: 10.1109/TAC.2016.2612818 – year: 2010 ident: ref5 publication-title: Network Security A Decision and Game-Theoretic Approach – ident: ref20 doi: 10.1109/LRA.2017.2654550 – ident: ref19 doi: 10.1145/2332432.2332505 – year: 2019 ident: ref3 publication-title: Lectures on Network Systems – ident: ref10 doi: 10.1109/GAMENETS.2014.7043719 – ident: ref13 doi: 10.1109/TCNS.2017.2668901 |
SSID | ssj0001255873 |
Score | 2.288069 |
Snippet | A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 246 |
SubjectTerms | Computer security Control systems Cyber security Cybersecurity energy constraints Game theory Games Graph theory Jamming jamming attacks Multi-agent systems multiagent consensus Multiagent systems |
Title | Dynamic Resilient Network Games With Applications to Multiagent Consensus |
URI | https://ieeexplore.ieee.org/document/9167396 https://www.proquest.com/docview/2498671319 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED1RJhj4RhQK8sCESJvYSeOMqHxLdIBWsEWOfREVVYtouvDr8TlpFQFCbB5syfLZvnv2u3sAp0J2MdSh8ERmLEDJc_QyYbhnkQRiEGOYO7b7Q797OwzvX6KXFThf5sIgoiOfYZua7i_fTPWcnso6NpSJRdJtQMMCtzJXq_aeEkUyFtXHZeAnnUGv_2QBILe41MY1kuTAa67Haan8uICdV7nehIfFfEoyyVt7XmRt_fmtVON_J7wFG1V4yS7K_bANKzjZgfVa0cFduLssRejZI85GY0qHZP2SC85uiDLLnkfFK7uofWyzYspcoq6iPCxGGp8kkDHbg-H11aB361WCCp62Xr3wEm0dulR-rGxQxLmvuDRUC1SIOFDCxgpKqDyjGnCYxSaUpuvnGlUoMORoeCT2YXUyneABMKmSQCtjT3tmj70KlI65lJrEy2NtwqgJ_mKtU11VGyfRi3HqUIefpGSelMyTVuZpwtlyyHtZauOvzru03MuO1Uo3obUwaFodxllqESZV8bOXzeHvo45gjRNVxVHLWrBafMzx2MYaRXbiNtkXuLLQsQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6JQwAMTIiWxk8YZUXmURztAEWyRY18EArWIpgu_Hp-TVhUgxObBliyf7buzv_s-gEMhmxjqUHgiMzZByXP0MmG4ZzMJxCDGMHdo90632X4Ir5-ipxk4ntTCIKIDn2GDmu4v3wz0iJ7KTmwoE4ukOQvz1u9HQVmtNfWiEkUyFtXXZeAnJ71W996mgNxmpjaykSQIPuV8nJrKjyvY-ZWLFeiMZ1TCSV4boyJr6M9vZI3_nfIqLFcBJjstd8QazGB_HZamaAc34OqslKFndzh8eaOCSNYt0eDskkCz7PGleGanU1_brBgwV6qrqBKLkconSWQMN-Hh4rzXanuVpIKnrV8vvERbly6VHysbFnHuKy4NsYEKEQdK2GhBCZVnxAKHWWxCaZp-rlGFAkOOhkdiC-b6gz5uA5MqCbQy9rxn9uCrQOmYS6lJvjzWJoxq4I_XOtUV3zjJXrylLu_wk5TMk5J50so8NTiaDHkvyTb-6rxByz3pWK10Depjg6bVcRymNsckHj973ez8PuoAFtq9zm16e9W92YVFTsAVBzSrw1zxMcI9G3kU2b7bcF_HNtP6 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamic+Resilient+Network+Games+With+Applications+to+Multiagent+Consensus&rft.jtitle=IEEE+transactions+on+control+of+network+systems&rft.au=Nugraha%2C+Yurid&rft.au=Cetinkaya%2C+Ahmet&rft.au=Hayakawa%2C+Tomohisa&rft.au=Ishii%2C+Hideaki&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-2533&rft.volume=8&rft.issue=1&rft.spage=246&rft_id=info:doi/10.1109%2FTCNS.2020.3016839&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2325-5870&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2325-5870&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2325-5870&client=summon |