Dynamic Resilient Network Games With Applications to Multiagent Consensus

A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover th...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on control of network systems Vol. 8; no. 1; pp. 246 - 259
Main Authors Nugraha, Yurid, Cetinkaya, Ahmet, Hayakawa, Tomohisa, Ishii, Hideaki, Zhu, Quanyan
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.03.2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2325-5870
2372-2533
DOI10.1109/TCNS.2020.3016839

Cover

Loading…
Abstract A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multiagent consensus problem, where the game is played repeatedly over time. In this article, we study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results.
AbstractList A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges, whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multiagent consensus problem, where the game is played repeatedly over time. In this article, we study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results.
Author Ishii, Hideaki
Zhu, Quanyan
Cetinkaya, Ahmet
Nugraha, Yurid
Hayakawa, Tomohisa
Author_xml – sequence: 1
  givenname: Yurid
  orcidid: 0000-0003-2054-952X
  surname: Nugraha
  fullname: Nugraha, Yurid
  email: yurid@dsl.sc.e.titech.ac.jp
  organization: Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo, Japan
– sequence: 2
  givenname: Ahmet
  orcidid: 0000-0002-1731-8600
  surname: Cetinkaya
  fullname: Cetinkaya, Ahmet
  email: cetinkaya@nii.ac.jp
  organization: Information Systems Architecture Science Research Division, National Institute of Informatics, Tokyo, Japan
– sequence: 3
  givenname: Tomohisa
  orcidid: 0000-0002-8221-2757
  surname: Hayakawa
  fullname: Hayakawa, Tomohisa
  email: hayakawa@sc.e.titech.ac.jp
  organization: Department of Systems and Control Engineering, Tokyo Institute of Technology, Tokyo, Japan
– sequence: 4
  givenname: Hideaki
  orcidid: 0000-0003-0367-824X
  surname: Ishii
  fullname: Ishii, Hideaki
  email: ishii@c.titech.ac.jp
  organization: Department of Computer Science, Tokyo Institute of Technology, Yokohama, Japan
– sequence: 5
  givenname: Quanyan
  orcidid: 0000-0002-0008-2953
  surname: Zhu
  fullname: Zhu, Quanyan
  email: quanyan.zhu@nyu.edu
  organization: Department of Electrical and Computer Engineering, New York University, Brooklyn, NY, USA
BookMark eNp9kM1OwzAQhC1UJErpAyAukTin2Oskto9VgFKpgARFHC032YBLmpTYEerbk9CKAwdO-6P5djVzSgZVXSEh54xOGKPqapk-PE-AAp1wyhLJ1REZAhcQQsz5oO8hDmMp6AkZO7emlDKIu5kPyfx6V5mNzYIndLa0WPngAf1X3XwEM7NBF7xa_x5Mt9vSZsbbunKBr4P7tvTWvPXqtFth5Vp3Ro4LUzocH-qIvNzeLNO7cPE4m6fTRZiB4j5UGTApDRVGgQKgBmROaZxwLpjhQoLhplgxFUe4Enkk84QWGZqIYwSYd4ZG5HJ_d9vUny06r9d121TdSw2RkolgnKlOJfaqrKmda7DQmfU_BnxjbKkZ1X10uo9O99HpQ3Qdyf6Q28ZuTLP7l7nYMxYRf_WKJYKrhH8DD156oA
CODEN ITCNAY
CitedBy_id crossref_primary_10_1109_LCSYS_2023_3257265
crossref_primary_10_1109_TSP_2023_3266975
crossref_primary_10_1016_j_automatica_2025_112137
crossref_primary_10_1016_j_ifacol_2023_10_1578
crossref_primary_10_1016_j_ejcon_2022_100693
crossref_primary_10_1109_TII_2024_3475424
crossref_primary_10_1016_j_arcontrol_2022_01_004
crossref_primary_10_1016_j_nahs_2021_101091
crossref_primary_10_1016_j_hcc_2024_100293
Cites_doi 10.1109/CDC40024.2019.9029630
10.1109/TIFS.2019.2924130
10.1016/j.automatica.2010.10.015
10.1016/j.automatica.2017.01.031
10.1109/MCS.2014.2364708
10.3934/naco.2013.3.1
10.1007/s13235-018-00291-y
10.1109/TWC.2013.071913121570
10.1515/9781400835355
10.23919/ACC.2019.8814607
10.1287/moor.19.1.24
10.1017/CBO9780511814075
10.1109/TAC.2015.2461851
10.1109/JSAC.2013.130413
10.1109/CDC.2012.6426869
10.1109/TAC.2015.2416924
10.1016/j.automatica.2020.108960
10.1109/TCNS.2016.2549640
10.1109/TAC.2005.846556
10.1016/j.automatica.2010.06.016
10.3182/20120914-2-US-4030.00065
10.1109/TAC.2016.2612818
10.1109/LRA.2017.2654550
10.1145/2332432.2332505
10.1109/GAMENETS.2014.7043719
10.1109/TCNS.2017.2668901
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1109/TCNS.2020.3016839
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2372-2533
EndPage 259
ExternalDocumentID 10_1109_TCNS_2020_3016839
9167396
Genre orig-research
GrantInformation_xml – fundername: JST ERATO HASUO Metamathematics for Systems Design Project
  grantid: JPMJER1603
– fundername: National Science Foundation
  grantid: CNS-1544782; ECCS-1847056
  funderid: 10.13039/501100008982
– fundername: JST CREST
  grantid: JPMJCR15K3
– fundername: JSPS KAKENHI
  grantid: 18H01460; 18H03774; 20K14771
GroupedDBID 0R~
4.4
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABJNI
ABQJQ
ABVLG
AGQYO
AGSQL
AHBIQ
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
IFIPE
IPLJI
JAVBF
M43
OCL
PQQKQ
RIA
RIE
AAYXX
CITATION
RIG
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c293t-9c2188a07a929220a28d00563371a3782a3afb1954eb7d48d60fcea43e42ed253
IEDL.DBID RIE
ISSN 2325-5870
IngestDate Mon Jun 30 06:59:07 EDT 2025
Tue Jul 01 04:05:23 EDT 2025
Thu Apr 24 22:59:20 EDT 2025
Wed Aug 27 02:48:55 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-9c2188a07a929220a28d00563371a3782a3afb1954eb7d48d60fcea43e42ed253
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-2054-952X
0000-0002-1731-8600
0000-0002-8221-2757
0000-0003-0367-824X
0000-0002-0008-2953
PQID 2498671319
PQPubID 2040410
PageCount 14
ParticipantIDs proquest_journals_2498671319
crossref_citationtrail_10_1109_TCNS_2020_3016839
crossref_primary_10_1109_TCNS_2020_3016839
ieee_primary_9167396
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-03-01
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 03
  year: 2021
  text: 2021-03-01
  day: 01
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE transactions on control of network systems
PublicationTitleAbbrev TCNS
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
nugraha (ref29) 0
alpcan (ref5) 2010
ref12
ref15
ref14
ref11
ref10
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
sandberg (ref4) 2015; 35
ref22
ref21
ref28
ref27
bullo (ref3) 2019
ref8
ref7
ref9
ref6
References_xml – ident: ref24
  doi: 10.1109/CDC40024.2019.9029630
– ident: ref25
  doi: 10.1109/TIFS.2019.2924130
– ident: ref22
  doi: 10.1016/j.automatica.2010.10.015
– ident: ref15
  doi: 10.1016/j.automatica.2017.01.031
– volume: 35
  start-page: 20
  year: 2015
  ident: ref4
  article-title: Special issue on cyberphysical security in networked control systems
  publication-title: IEEE Control Syst Mag
  doi: 10.1109/MCS.2014.2364708
– ident: ref23
  doi: 10.3934/naco.2013.3.1
– ident: ref6
  doi: 10.1007/s13235-018-00291-y
– ident: ref11
  doi: 10.1109/TWC.2013.071913121570
– ident: ref2
  doi: 10.1515/9781400835355
– ident: ref26
  doi: 10.23919/ACC.2019.8814607
– ident: ref28
  doi: 10.1287/moor.19.1.24
– ident: ref27
  doi: 10.1017/CBO9780511814075
– ident: ref8
  doi: 10.1109/TAC.2015.2461851
– ident: ref18
  doi: 10.1109/JSAC.2013.130413
– start-page: 3483
  year: 0
  ident: ref29
  article-title: Dynamic resilient graph games for state-dependent jamming attacks analysis on multi-agent systems
  publication-title: Proc IFAC World Congr
– ident: ref9
  doi: 10.1109/CDC.2012.6426869
– ident: ref16
  doi: 10.1109/TAC.2015.2416924
– ident: ref14
  doi: 10.1016/j.automatica.2020.108960
– ident: ref7
  doi: 10.1109/TCNS.2016.2549640
– ident: ref1
  doi: 10.1109/TAC.2005.846556
– ident: ref21
  doi: 10.1016/j.automatica.2010.06.016
– ident: ref12
  doi: 10.3182/20120914-2-US-4030.00065
– ident: ref17
  doi: 10.1109/TAC.2016.2612818
– year: 2010
  ident: ref5
  publication-title: Network Security A Decision and Game-Theoretic Approach
– ident: ref20
  doi: 10.1109/LRA.2017.2654550
– ident: ref19
  doi: 10.1145/2332432.2332505
– year: 2019
  ident: ref3
  publication-title: Lectures on Network Systems
– ident: ref10
  doi: 10.1109/GAMENETS.2014.7043719
– ident: ref13
  doi: 10.1109/TCNS.2017.2668901
SSID ssj0001255873
Score 2.288069
Snippet A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 246
SubjectTerms Computer security
Control systems
Cyber security
Cybersecurity
energy constraints
Game theory
Games
Graph theory
Jamming
jamming attacks
Multi-agent systems
multiagent consensus
Multiagent systems
Title Dynamic Resilient Network Games With Applications to Multiagent Consensus
URI https://ieeexplore.ieee.org/document/9167396
https://www.proquest.com/docview/2498671319
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED1RJhj4RhQK8sCESJvYSeOMqHxLdIBWsEWOfREVVYtouvDr8TlpFQFCbB5syfLZvnv2u3sAp0J2MdSh8ERmLEDJc_QyYbhnkQRiEGOYO7b7Q797OwzvX6KXFThf5sIgoiOfYZua7i_fTPWcnso6NpSJRdJtQMMCtzJXq_aeEkUyFtXHZeAnnUGv_2QBILe41MY1kuTAa67Haan8uICdV7nehIfFfEoyyVt7XmRt_fmtVON_J7wFG1V4yS7K_bANKzjZgfVa0cFduLssRejZI85GY0qHZP2SC85uiDLLnkfFK7uofWyzYspcoq6iPCxGGp8kkDHbg-H11aB361WCCp62Xr3wEm0dulR-rGxQxLmvuDRUC1SIOFDCxgpKqDyjGnCYxSaUpuvnGlUoMORoeCT2YXUyneABMKmSQCtjT3tmj70KlI65lJrEy2NtwqgJ_mKtU11VGyfRi3HqUIefpGSelMyTVuZpwtlyyHtZauOvzru03MuO1Uo3obUwaFodxllqESZV8bOXzeHvo45gjRNVxVHLWrBafMzx2MYaRXbiNtkXuLLQsQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGICBN6JQwAMTIiWxk8YZUXmURztAEWyRY18EArWIpgu_Hp-TVhUgxObBliyf7buzv_s-gEMhmxjqUHgiMzZByXP0MmG4ZzMJxCDGMHdo90632X4Ir5-ipxk4ntTCIKIDn2GDmu4v3wz0iJ7KTmwoE4ukOQvz1u9HQVmtNfWiEkUyFtXXZeAnJ71W996mgNxmpjaykSQIPuV8nJrKjyvY-ZWLFeiMZ1TCSV4boyJr6M9vZI3_nfIqLFcBJjstd8QazGB_HZamaAc34OqslKFndzh8eaOCSNYt0eDskkCz7PGleGanU1_brBgwV6qrqBKLkconSWQMN-Hh4rzXanuVpIKnrV8vvERbly6VHysbFnHuKy4NsYEKEQdK2GhBCZVnxAKHWWxCaZp-rlGFAkOOhkdiC-b6gz5uA5MqCbQy9rxn9uCrQOmYS6lJvjzWJoxq4I_XOtUV3zjJXrylLu_wk5TMk5J50so8NTiaDHkvyTb-6rxByz3pWK10Depjg6bVcRymNsckHj973ez8PuoAFtq9zm16e9W92YVFTsAVBzSrw1zxMcI9G3kU2b7bcF_HNtP6
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Dynamic+Resilient+Network+Games+With+Applications+to+Multiagent+Consensus&rft.jtitle=IEEE+transactions+on+control+of+network+systems&rft.au=Nugraha%2C+Yurid&rft.au=Cetinkaya%2C+Ahmet&rft.au=Hayakawa%2C+Tomohisa&rft.au=Ishii%2C+Hideaki&rft.date=2021-03-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.eissn=2372-2533&rft.volume=8&rft.issue=1&rft.spage=246&rft_id=info:doi/10.1109%2FTCNS.2020.3016839&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2325-5870&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2325-5870&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2325-5870&client=summon