=Paper= {{Paper |id=Vol-3010/PAPER_05 |storemode=property |title=Two Applications of Graph Minor Reduction |pdfUrl=https://ceur-ws.org/Vol-3010/PAPER_05.pdf |volume=Vol-3010 |authors=Ghurumuruhan Ganesan }} ==Two Applications of Graph Minor Reduction== https://ceur-ws.org/Vol-3010/PAPER_05.pdf
Two Applications of Graph Minor Reduction
Ghurumuruhan Ganesan1
1
    Institute of Mathematical Sciences, HBNI, Chennai


                                         Abstract
                                         In this paper, we study two applications of graph minor reduction. In the first part of the paper, we
                                         introduce a variant of the boxicity, called strong boxicity, where the rectangular representation satisfies
                                         an additional condition that each rectangle contains at least one point not present in any other rectangle.
                                         We show how the strong boxicity of a graph 𝐺 can be estimated in terms of the strong boxicity of a
                                         minor 𝐻 and the number of edit operations needed to obtain 𝐻 from 𝐺. In the second part of the paper,
                                         we consider false data injection (attack) in a flow graph 𝐺 and quantify the subsequent effect on the
                                         state of edges of 𝐺 via the edge variation factor πœƒ. We use minor reduction techniques to obtain bounds
                                         on πœƒ in terms of the connectivity parameters of 𝐺, when the attacker has complete knowledge of 𝐺 and
                                         also discuss stealthy attacks with partial knowledge of the flow graph.

                                         Keywords
                                         Strong boxicity, Minor reduction, Flow graphs, Stealthy attacks, Edge variation factor,




1. Introduction
Graph minor reduction is an important problem from both theoretical and application perspec-
tives. In particular, graph minor reduction algorithms are extensively used in computer science
to solve a variety of problems related to network routing and design. For a detailed survey of
algorithmic aspects of graph minor reduction, we refer to the survey [2].
   In this paper, we study two theoretical applications of graph minor reduction in estimating
the strong boxicity of an arbitrary graph and determining conditions for stealthy attacks on
flow graphs. Below we discuss these two issues in that order.

Strong Boxicity
The boxicity of a graph 𝐺 [12] is the smallest integer π‘˜ such that 𝐺 admits a rectangular
representation in Rπ‘˜ , where R denotes the real line. Boxicity as defined above is finite and
is no more than the total number of vertices in 𝐺. Since then many bounds for boxicity has
been obtained in terms of various graph parameters including treewidth [4] and maximum
degree [5, 6] and also in terms of poset dimension [1, 13].
   In the first part of the paper, we define a variant of boxicity which we call strong boxicity
where we impose the additional condition that no rectangle corresponding to a particular vertex
is covered by the rectangles corresponding to the other vertices. We find bounds for strong


Algorithms, Computing and Mathematics Conference (ACM 2021), Chennai, India
" gganesan82@gmail.com (G. Ganesan) ORCID: 0000-0001-5857-5411 (G. Ganesan)
                                       Β© 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
    CEUR
    Workshop
    Proceedings
                  http://ceur-ws.org
                  ISSN 1613-0073
                                       CEUR Workshop Proceedings (CEUR-WS.org)




                                                                                                          66
boxicity in terms of boxicity and estimate the strong boxicity of a general graph in terms of the
strong boxicity of a minor and the number of edit operations needed to obtain the minor.

Stealthy Attacks in Flow Graphs
Flow graphs are expected to play an important role in the future as more and more systems
are being automated through software. This also leads to potential vulnerabilities as software
defined networks are themselves prone to attack and therefore it is important to study malicious
data attacks on such automated flow networks. A typical example is that of a power grid where
power flow through transmission lines is often subject to stealthy attacks (see for example, [9]).
The survey by [8] also describes various aspects of cyber-physical attacks and defence strategies
on the smart grid, from a network layer perspective.
   Flow graphs also frequently arise in the analysis of control systems [10, 7] where the node
variables could be either electrical (like for example voltages, currents etc,) or mechanical
(like position, angle etc.) in nature. Detection of false data injection (either unintentional or
intentional) is crucial here as well and steps must be taken to ensure that the measurements are
as authentic as possible.
   In the second part of the paper, we are interested in studying how stealthy attacks affect the
state of edges in a general flow graph. Different edges are affected differently and we quantify
this effect via the edge variation factor. In our main result Theorem 2 below, we estimate the
maximum possible edge variation factor in terms of connectivity parameters of the flow graph,
when the attacker has complete knowledge of the flow graph. In Section 5, we also discuss
possibility of attacks with partial flow graph knowledge.
   The paper is organized as follows. In Section 2, we define the concept of strong boxicity and
determine bounds for strong boxicity in terms of boxicity and also given examples of graphs
with strong boxicity exactly equal to 2. Next in Section 3, we show how strong boxicity of
a graph can be estimated in terms of the strong boxicity of a minor and the number of edit
operations needed to obtain the corresponding minor. In Section 4, we state and prove our main
result Theorem 2 regarding existence of stealthy attacks in general flow graphs and in Section 5,
we discuss stealthy attacks in the presence of partial information.


2. Strong boxicity
Let R denote
         βˆοΈ€π‘‘ the real line and   for integer 𝑑 β‰₯ 1 define a rectangle 𝐴 βŠ‚ R𝑑 to beβˆοΈ€a closed set of
the form 𝑖=1 [π‘Žπ‘– , 𝑏𝑖 ] βŠ‚ R , where π‘Žπ‘– ≀ 𝑏𝑖 are real numbers. We define 𝐴0 := 𝑛𝑖=1 (π‘Žπ‘– , 𝑏𝑖 ) to
                            𝑑

be the interior of the rectangle 𝐴 where (π‘Žπ‘– , 𝑏𝑖 ) denotes the open interval with endpoints π‘Žπ‘–
and 𝑏𝑖 and Set πœ•π΄ := 𝐴 βˆ– 𝐴0 to be the boundary of the rectangle 𝐴. Also for 𝑦 > 0, π‘₯ ∈ R𝑑 ,
                                  ]︀𝑑
we let 𝐡𝑑 (π‘₯, 𝑦) := π‘₯ + βˆ’ 𝑦2 , 𝑦2 be the π‘‘βˆ’dimensional square of side length 𝑦 centred at π‘₯.
                         [οΈ€

  Let 𝐺 = (𝑉, 𝐸) be a graph with vertex set 𝑉 = {1, 2, . . . , 𝑛} and define (𝑖, 𝑗) ∈ 𝐸 to be the
edge with endvertices 𝑖 and 𝑗.

Definition 1. We say that a set of rectangles {𝐼𝑖 }1≀𝑖≀𝑛 in R𝑑 , 𝑑 β‰₯ 1 is a strong rectangular
representation of 𝐺 if the following two conditions hold:




                                                67
                       (a)                                              (b)
Figure 1: (π‘Ž) The condition (𝑐2) ensures that each rectangle has an exclusive boundary point and a
small surrounding neighbourhood. (𝑏) Strong rectangular representation of the graph 𝐻 with vertex
set {1, 2, 3} and edge set {(1, 2), (2, 3)}.


(𝑐1) For any 1 ≀ 𝑖 ΜΈ= 𝑗 ≀ 𝑛, the rectangles

                              𝐼𝑖 ∩ 𝐼𝑗 ΜΈ= βˆ… if and only if (𝑖, 𝑗) ∈ 𝐸.                         (2.1)

(𝑐2) For every 1 ≀ 𝑣 ≀ 𝑛, there exists a point π‘₯𝑣 ∈ πœ•πΌπ‘£ and a number π‘Žπ‘£ > 0 such that
                                               βŽ›             βŽžπ‘
                                                    ⋃︁
                               𝐡𝑑 (π‘₯𝑣 , π‘Žπ‘£ ) βŠ‚ ⎝          𝐼𝑒 ⎠ .                              (2.2)
                                                 1≀𝑒̸=𝑣≀𝑛

   In other words, we prefer that no rectangle has its boundary covered completely by the
remaining rectangles. The strong boxicity of 𝐺 denoted by 𝑠(𝐺) is defined to be the smallest
integer 𝑑 such that both the conditions (𝑐1) βˆ’ (𝑐2) hold. In Figure 1, we illustrate condition (𝑐2)
with a example involving a strong rectangular representation in R2 . The solid rectangle 𝐴𝐡𝐢𝐷
is 𝐼𝑣 , the point 𝑋 = π‘₯𝑣 and the dotted rectangle corresponds to 𝐡𝑑 (π‘₯𝑣 , π‘Žπ‘£ ).
   We recall that the boxicity 𝐺 denoted by 𝑏(𝐺) is defined to be smallest integer 𝑑 such that
condition (𝑐1) alone holds [12]. By definition we therefore have 𝑏(𝐺) ≀ 𝑠(𝐺). To see that
strong boxicity is not always equal to boxicity, we consider the graph 𝐻 with vertex set {1, 2, 3}
and edge set {(1, 2), (2, 3)}. Setting 𝐽1 = [0, 2], 𝐽2 = [1, 4] and 𝐽3 = [2, 5], we see that
condition (𝑐1) in definition 1 holds and so 𝑏(𝐻) = 1. However, condition (𝑐2) does not hold
and so 𝑠(𝐻) β‰₯ 2. Considering 𝐽1 , 𝐽2 and 𝐽3 to be squares such that 𝐽1 and 𝐽3 are disjoint
and 𝐽2 intersects both 𝐽1 and 𝐽3 partially, as shown in Figure 1(𝑏), we get that 𝑠(𝐻) = 2.
   From the discussion in the above paragraph, we deduce that any connected graph containing
at least two edges must have strong boxicity at least two. In the following result, we give
examples of graphs whose strong boxicity is exactly 2 and also obtain bounds for the strong




                                                68
boxicity in terms of the boxicity. We begin with some definitions. A tree is a connected graph
containing 𝑛 vertices and 𝑛 βˆ’ 1 edges for some 𝑛 β‰₯ 2. A clique in a graph 𝐺 is a complete
subgraph of 𝐺. We say that ℐ is a stable set in 𝐺 if no two vertices are adjacent in 𝐺. The
graph 𝐺 with vertex set {1, 2, . . . , 𝑛+π‘Ÿ} is called a threshold graph [11] if 𝐺 contains a clique 𝐾
with vertex set {1, 2, . . . , 𝑛} and a stable set 𝐼 = {𝑛 + 1, . . . , 𝑛 + π‘Ÿ} satisfying the following
nested neighbourhood property: If 𝒩 (𝑣) is the set of all neighbours of 𝑣 in the graph 𝐺, then

                           𝒩 (𝑛 + 1) βŠ‡ 𝒩 (𝑛 + 2) βŠ‡ . . . βŠ‡ 𝒩 (𝑛 + π‘Ÿ).                            (2.3)

Proposition 1. If 𝐺 is a tree or a threshold graph containing at least three vertices, then the strong
boxicity 𝑠(𝐺) = 2. In general, for any graph 𝐺 we have that

                                    𝑏(𝐺) ≀ 𝑠(𝐺) ≀ 𝑏(𝐺) + 2.                                      (2.4)

   From (2.4), we see that any bound for boxicity can also be used to estimate the strong boxicity.
Therefore using 𝑏(𝐺) ≀ min(π‘š, 𝑛) where π‘š is the number of edges of 𝐺 [12], we get from (2.4)
that 𝑠(𝐺) ≀ min(π‘š, 𝑛) + 2.
   Proof of Proposition 1: First, we see that any tree or threshold graph containing at least three
vertices has strong boxicity of exactly two.
Trees: We prove by induction on 𝑛, the number of vertices in the tree. For 𝑛 = 3 the tree 𝑇3
contains two edges, say (1, 2) and (2, 3). To see that 𝑠(𝑇3 ) = 2, we define 𝐽1 , 𝐽2 and 𝐽3 to be
squares such that 𝐽1 and 𝐽3 are disjoint and 𝐽2 intersects both 𝐽1 and 𝐽3 partially, as shown in
Figure 1(𝑏).
   Now, let 𝑇𝑛+1 be a tree with vertex set {1, 2, . . . , 𝑛 + 1} and suppose the vertex 𝑛 + 1 is a
leaf attached to the vertex 𝑣 ∈ 𝑇𝑛 := 𝑇𝑛+1 βˆ– {𝑛 + 1}. The tree 𝑇𝑛 has strong boxicity two by
induction assumption and so there exists a strong rectangular representation {𝐽𝑖 }1≀𝑖≀𝑛 βŠ‚ R2
of 𝑇𝑛 . Moreover,(οΈ€there exists   a vertex π‘₯𝑣 ∈ 𝐽𝑣 and a real number π‘Žπ‘£ > 0 satisfying (2.2). Set-
ting 𝐽𝑛+1 := 𝐡2 π‘₯𝑣 , π‘Ž2𝑣 , we get that {𝐽𝑖 }1≀𝑖≀𝑛+1 forms a strong rectangular representation
                           )οΈ€

of 𝑇𝑛+1 .
   This is illustrated in Figure 1(π‘Ž), where 𝐽𝑣 = 𝐸𝐹 𝐺𝐻 intersects other rectangles in the
rectangular representation. However, the point 𝑋 = π‘₯𝑣 and a small surrounding neighbourhood
is unique to 𝐽𝑣 . The rectangle 𝐽𝑛+1 = 𝐴𝐡𝐢𝐷 intersecting only 𝐽𝑣 is shown in dotted lines.
   Threshold graphs: Let 𝐺 = (𝐾, 𝐼) be any threshold graph with
𝐾 = {1, 2, . . . , 𝑛} being a clique of size 𝑛 and 𝐼 = {𝑛 + 1, . . . , 𝑛 + π‘Ÿ} being a stable set.
Because of the nested neighbourhood property (2.3), we assume that 𝑁 (𝑛 + 𝑖) = {1, 2, . . . , 𝑙𝑖 }
for some 𝑛 β‰₯ 𝑙1 β‰₯ 𝑙2 β‰₯ . . . β‰₯ π‘™π‘Ÿ β‰₯ 1.
   For 1 ≀ 𝑖 ≀ 𝑛, let 𝐽𝑖 be the 1𝑖 Γ— 𝑖 rectangle in R2 centred at the origin. The rectan-
gles {𝐽𝑖 }1≀𝑖≀𝑛 form a strong representation of 𝐾. We then let 𝐽𝑛+1 , . . . , 𝐽𝑛+π‘Ÿ be small dis-
joint rectangles with the property that 𝐽𝑛+𝑖 intersects only the rectangles 𝐽1 , . . . , 𝐽𝑙𝑖 and no
other rectangle; this is illustrated in Figure 2 for the case 𝐾 = {1, 2, 3, 4} and 𝐼 = {5, 6}
having neighbourhoods 𝒩 (5) = {1, 2, 3} and 𝒩 (6) = {1, 2}. The rectangles with corners
labelled 𝑖, 1 ≀ 𝑖 ≀ 4 form the strong rectangular representation of 𝐾. The rectangles labelled 5
and 6 are 𝐽5 and 𝐽6 , respectively. This completes the proof that any threshold graph containing
at least three vertices has a strong boxicity of exactly two.




                                                 69
Figure 2: Strong rectangular representation of a threshold graph.


  In the rest of the proof we
                            βˆοΈ€π‘‘prove (2.4). We𝑑 use the following boundary relation throughout.
For integer 𝑑 β‰₯ 1 let π‘ˆπ‘‘ = 𝑖=1 [π‘Žπ‘– , 𝑏𝑖 ] βŠ‚ R be any rectangle and let πœ•π‘ˆπ‘‘ be its boundary. We
then have that
                                   πœ•π‘ˆπ‘‘ βŠ‡ πœ•π‘ˆπ‘‘βˆ’1 Γ— [π‘Žπ‘‘ , 𝑏𝑑 ].                              (2.5)
Indeed, writing πœ•π‘ˆπ‘‘ = π‘ˆπ‘‘ βˆ– π‘ˆπ‘‘0 = π‘ˆπ‘‘βˆ’1 Γ— [π‘Žπ‘‘ , 𝑏𝑑 ] βˆ– π‘ˆπ‘‘βˆ’1
                                                      0   Γ— (π‘Žπ‘‘ , 𝑏𝑑 ) and using
                                          0
                                          (οΈ€            )οΈ€
                   π‘ˆπ‘‘βˆ’1 Γ— [π‘Žπ‘‘ , 𝑏𝑑 ] =  π‘ˆπ‘‘βˆ’1 βˆͺ πœ•π‘ˆπ‘‘βˆ’1 Γ— [π‘Žπ‘‘ , 𝑏𝑑 ]
                                                         ⋃︁
                                        0
                                     βŠ‡ π‘ˆπ‘‘βˆ’1 Γ— (π‘Žπ‘‘ , 𝑏𝑑 ) πœ•π‘ˆπ‘‘βˆ’1 Γ— [π‘Žπ‘‘ , 𝑏𝑑 ],

we get (2.5).
   To prove (2.4), we let {𝐼𝑖 }1≀𝑖≀𝑛 βŠ‚ R𝑏 , 𝑏 = 𝑏(𝐺) be a rectangular representation of 𝐺. For 1 ≀
𝑖 ≀ 𝑛, we define the rectangle 𝐽𝑖 := 𝐼𝑖 Γ— [0, 𝑖] Γ— [𝑖, 𝑛] and show first that {𝐽𝑖 }1≀𝑖≀𝑛 βŠ‚ R𝑏+2
forms a rectangular representation of 𝐺. Indeed if (𝑖, 𝑗) is an edge in 𝐺 then 𝐼𝑖 ∩ 𝐼𝑗 ΜΈ= βˆ… and so

                    𝐽𝑖 ∩ 𝐽𝑗 = (𝐼𝑖 ∩ 𝐼𝑗 ) Γ— [0, min(𝑖, 𝑗)] Γ— [max(𝑖, 𝑗), 𝑛] ΜΈ= βˆ….

   To see that the rectangles {𝐽𝑖 } form a strong rectangular representation of the graph 𝐺, we
let 𝑣 ∈ 𝐺 be any vertex and let π‘₯𝑣 ∈ πœ•πΌπ‘£ be any point in the boundary of 𝐼𝑣 . Setting 𝑦𝑣 :=
(π‘₯𝑣 , 𝑣, 𝑣) we have from (2.5) that 𝑦𝑣 ∈ πœ•π½π‘£ . Also⋃︀𝑦𝑣 ∈
                                                        / 𝐽𝑒 for any 𝑒 ΜΈ= 𝑣. Letting π‘Žπ‘£ := 14 , we
also get that no point of 𝐡𝑏+2 (𝑦𝑣 , π‘Žπ‘£ ) belongs to 1≀𝑖̸=𝑣≀𝑛 𝐽𝑖 . Therefore 𝑠(𝐺) ≀ 𝑏(𝐺) + 2 and
this proves (2.4).


3. Minor Reduction
In this subsection, we estimate the strong boxicity of a graph 𝐺 by β€œconverting" 𝐺 into a
graph 𝐻 with small strong boxicity through appropriate edit operations. Formally, a deletion




                                                70
operation on 𝐺 is either a vertex deletion or edge deletion and a contraction operation is defined
as follows. Let 𝑒 = (𝑒, 𝑛) be an edge in 𝐺 for some 1 ≀ 𝑒 ≀ 𝑛 βˆ’ 1. The graph 𝐻 obtained by
contracting the edge 𝑒 has vertex set {1, 2, . . . , 𝑛 βˆ’ 1} and still has all edges not containing 𝑛
as an endvertex. In addition, in the graph 𝐻, the vertex 𝑒 is now adjacent to every vertex
of 𝑁𝐺 (𝑛) βˆ– {𝑒}. Henceforth, we denote a deletion operation or a contraction as an edit operation.
   The graph 𝐻 obtained from an edit operation on 𝐺 as described above, is called a minor
of 𝐺. We say that a minor 𝐻 is obtained from 𝐺 after π‘Ž1 vertex deletions, π‘Ž2 edge deletions
and π‘Ž3 contractions if there are graphs
𝐺 = 𝐻0 , 𝐻1 , 𝐻2 , . . . , π»π‘Ÿ = 𝐻, π‘Ÿ = π‘Ž1 + π‘Ž2 + π‘Ž3 such that 𝐻𝑖 is obtained by either a vertex
deletion, edge deletion or contraction of π»π‘–βˆ’1 and the total number of vertex deletions is π‘Ž1
and the total number of edge deletions is π‘Ž2 . We have the following result regarding the strong
boxicity.

Theorem 1. If 𝐻 is a minor that is obtained from 𝐺 after 𝛼𝑣 vertex deletions and 𝛼𝑒 edge deletions,
then
                          𝑠(𝐻) βˆ’ 𝛼𝑒 ≀ 𝑠(𝐺) ≀ 𝑠(𝐻) + 𝛼𝑣 + 𝛼𝑒 .                                 (3.1)
  If 𝐹 is a minor that is obtained from 𝐺 after 𝛽𝑣 vertex deletions, 𝛽𝑒 edge deletions and 𝛽𝑐
contractions, then
                               𝑠(𝐺) ≀ 𝑠(𝐹 ) + 𝛽𝑣 + 𝛽𝑒 + 2𝛽𝑐 .                            (3.2)
Moreover both (3.1) and (3.2) hold with strong boxicity 𝑠(.) replaced by boxicity 𝑏(.).

   In practice, we choose 𝐻 to be a known graph with low strong boxicity. As an example,
suppose 𝐺 is a connected graph on 𝑛 vertices having 𝑛 + π‘Ÿ edges. We pick and remove π‘Ÿ + 1
edges from 𝐺 to get a tree 𝐻, whose strong boxicity is two by proposition 1. From relation (3.1)
in theorem 1, we therefore get that 𝑠(𝐺) ≀ π‘Ÿ + 3.
   It suffices to prove Theorem 1 for a single edit operation and we consider the three cases
vertex deletion, edge deletion and edge contraction separately below. Also we prove for strong
boxicity throughout and an analogous analysis holds for boxicity.
   Vertex deletion: We show that for any vertex 𝑣 ∈ 𝐺, the strong boxicity

                                  𝑠 (𝐹𝑣 ) ≀ 𝑠(𝐺) ≀ 𝑠 (𝐹𝑣 ) + 1,                                (3.3)

where 𝐹𝑣 = 𝐺 βˆ– {𝑣} is the graph obtained by removing the vertex 𝑣 ∈ 𝐺. We prove for 𝑣 = 𝑛
and an analogous analysis holds for every other vertex. If ℐ = {𝐼𝑖 }1≀𝑖≀𝑛 βŠ‚ R𝑠 , 𝑠 = 𝑠(𝐺) is a
strong rectangular representation of 𝐺 satisfying (2.1), then ℐ βˆ– {𝐼𝑛 } is a strong rectangular
representation of 𝐺 βˆ– {𝑛} and so the first inequality in (3.3) is true.
   For the second inequality, we let 𝑁 (𝑛) be the neighbours of 𝑛 in 𝐺 and βˆοΈ€let {𝐽𝑖 }1β‰€π‘–β‰€π‘›βˆ’1 βŠ‚
Rπ‘˜ , π‘˜ = 𝑠 (𝐹𝑛 ) be a strong rectangular representation of 𝐹𝑛 with 𝐽𝑖 = π‘˜π‘™=1 [π‘Žπ‘–,𝑙 , 𝑏𝑖,𝑙 ]. Set-
ting 𝑀𝑒𝑝 := max𝑖,𝑙 𝑏𝑖,𝑙 and π‘€π‘™π‘œπ‘€ = min𝑖,𝑙 π‘Žπ‘–,𝑙 we define the rectangles {𝐼𝑀 }1≀𝑀≀𝑛 βŠ‚ Rπ‘˜+1
as
                                                       for 𝑀 ∈
                         ⎧
                         ⎨         𝐽𝑀 Γ— [0, 3]                / {𝑛} βˆͺ 𝑁 (𝑛)
                  𝐼𝑀 :=            𝐽𝑀 Γ— [2, 5]             for 𝑀 ∈ 𝑁 (𝑛)                    (3.4)
                                          π‘˜
                            [π‘€π‘™π‘œπ‘€ , 3𝑀𝑒𝑝 ] Γ— [4, 6]          for 𝑀 = 𝑛.
                         ⎩




                                                71
By construction, the rectangles {𝐼𝑖 }1≀𝑖≀𝑛 form a rectangular representation of 𝐺. We now
use (2.5) to see that {𝐼𝑖 } also form a strong rectangular representation of 𝐺. Indeed for 𝑀 ∈/
{𝑛} βˆͺ 𝑁 (𝑛), we let π‘₯𝑀 ∈ πœ•π½π‘€ and π‘Žπ‘€ > 0 be such that
                                                 βŽ›            βŽžπ‘
                                                     ⋃︁
                                 π΅π‘˜ (π‘₯𝑀 , π‘Žπ‘€ ) βŠ‚ ⎝         𝐽𝑒 ⎠ .                          (3.5)
                                                    1≀𝑒̸=𝑀≀𝑛

From the first line in (3.4) and (2.5) we get that 𝑦𝑀 := (π‘₯𝑀 , 0) ∈ πœ•πΌπ‘€ and from (3.5) and the
second and third lines in (3.4) we further get
                                                      βŽ›              βŽžπ‘
                                                           ⋃︁
                         𝑦𝑀 + π΅π‘˜ (0, π‘Žπ‘€ ) Γ— [βˆ’1, 1] βŠ‚ ⎝           𝐼𝑒 ⎠ .                  (3.6)
                                                            1≀𝑒̸=𝑀≀𝑛

Therefore choosing π‘Žπ‘€ smaller if necessary we get
                                             βŽ›                      βŽžπ‘
                                                         ⋃︁
                                π΅π‘˜+1 (𝑦𝑀 , π‘Žπ‘€ ) βŠ‚ ⎝               𝐼𝑒 ⎠ .                          (3.7)
                                                       1≀𝑒̸=𝑀≀𝑛

  If 𝑀 ∈ 𝑁 (𝑛) then letting π‘₯𝑀 be as in (3.5), we choose 𝑦𝑀 = (π‘₯𝑀 , 2). Arguing as before and
choosing π‘Žπ‘€ smaller if necessary, we get (3.7). Finally, if 𝑀 = 𝑛, then we choose 𝑦𝑀 to be
the (π‘˜ + 1)-tuple (3𝑀𝑒𝑝 , . . . , 3𝑀𝑒𝑝 , 6) so that 𝑦𝑀 ∈ πœ•πΌπ‘€ . Setting π‘Žπ‘€ = 𝑀𝑒𝑝 and using the
definition of 𝑀𝑒𝑝 we again get (3.7). Thus the strong boxicity 𝑠(𝐺) ≀ π‘˜ + 1.
  Edge deletion: For any edge 𝑒 = (𝑒, 𝑣) ∈ 𝐺 we show that

                                 𝑠 (𝐻𝑒 ) βˆ’ 1 ≀ 𝑠(𝐺) ≀ 𝑠 (𝐻𝑒 ) + 1,                                (3.8)

where 𝐻𝑒 = 𝐺 βˆ– {𝑒} is the graph obtained by removing the edge 𝑒.
  To prove the lower bound in (3.8), we let {𝐼𝑖 }1≀𝑖≀𝑛 βŠ‚ R𝑠 , 𝑠 = 𝑠(𝐺) be a strong rectangular
representation of 𝐺. We define the rectangles {𝐴𝑖 }1≀𝑖≀𝑛 βŠ‚ R𝑠+1 as follows:

                                   ⎨ 𝐼𝑖 Γ— [0, 4] for 𝑖 ΜΈ= 𝑒, 𝑣
                                   ⎧

                             𝐴𝑖 :=     𝐼𝑖 Γ— [1, 2]    for 𝑖 = 𝑒
                                       𝐼𝑖 Γ— [3, 5]   for 𝑖 = 𝑣.
                                   ⎩

Arguing as in the vertex deletion case, we get that the rectangles {𝐴𝑖 }1≀𝑖≀𝑛 form a strong
rectangular representation of 𝐻𝑒 and so the strong boxicity 𝑠 (𝐻𝑒 ) ≀ 𝑠 + 1.
   For the upper bound in (3.8), we use the fact that the graph 𝐻𝑒 has 𝑛 vertices and let
                                                                                      βˆοΈ€π‘ŸπΏ1 , . . . , 𝐿𝑛 βŠ‚
R , π‘Ÿ = 𝑠(𝐻𝑒 ) be a strong rectangular representation of 𝐻𝑒 . As before if 𝐿𝑖 = 𝑙=1 [π‘Žπ‘–,𝑙 , 𝑏𝑖,𝑙 ]
  π‘Ÿ

then we set π‘Šπ‘’π‘ := max𝑖,𝑙 𝑏𝑖,𝑙 and π‘Šπ‘™π‘œπ‘€ := min𝑖,𝑙 π‘Žπ‘–,𝑙 .
   Letting 𝑁𝑒 (𝑣) be the neighbours of 𝑣 in 𝐻𝑒 , we now define the rectangles {𝑅𝑖 }1≀𝑖≀𝑛 βŠ‚ Rπ‘Ÿ+1
as follows:
                                                          for 𝑖 ∈
                          ⎧
                          ⎨         𝐿𝑖 Γ— [0, 3]                 / {𝑒, 𝑣} βˆͺ 𝑁𝑒 (𝑣)
                   𝑅𝑖 :=            𝐿𝑖 Γ— [2, 5]            for 𝑖 ∈ {𝑒} βˆͺ 𝑁𝑒 (𝑣)
                             [π‘Šπ‘™π‘œπ‘€ , 3π‘Šπ‘’π‘ ]π‘Ÿ Γ— [4, 6]            for 𝑖 = 𝑣.
                          ⎩




                                                  72
Arguing as in the vertex deletion case, we get that the rectangles {𝑅𝑖 }1≀𝑖≀𝑛 form a strong
rectangular representation of 𝐺 and so the strong boxicity 𝑠(𝐺) ≀ π‘Ÿ + 1.
  Edge contraction: We now consider the remaining case where 𝐺𝑒 is the graph obtained by
the contracting the edge 𝑒 = (𝑒, 𝑛) ∈ 𝐺 to the vertex 𝑒 ∈ 𝐺𝑒 and show that
                                       𝑠(𝐺) ≀ 𝑠(𝐺𝑒 ) + 2.                                      (3.9)
   The graph 𝐺𝑒 has 𝑛 βˆ’ 1 vertices and we let {𝑆𝑖 }1β‰€π‘–β‰€π‘›βˆ’1 βŠ‚ Rπ‘ž , π‘ž = 𝑠(𝐺𝑒 ), be a strong
rectangular representation of 𝐺𝑒 . If 𝑁 (𝑒) and 𝑁 (𝑛) are the neighbours of 𝑒 and 𝑛 respectively
in 𝐺, then 𝑛 ∈ 𝑁 (𝑒) and 𝑒 ∈ 𝑁 (𝑛) and we define the rectangles {𝑇𝑖 }1≀𝑖≀𝑛 βŠ‚ Rπ‘ž+2 as follows:
                                                             for 𝑖 = 𝑒
                     ⎧
                     βŽͺ    𝑆𝑒 Γ— [0, 6] Γ— [3, 7]
                                                             for 𝑖 = 𝑛
                     βŽͺ
                     ⎨ 𝑆𝑒 Γ— [4, 10] Γ— [6, 10]
                     βŽͺ
                     βŽͺ
               𝑇𝑖 :=     𝑆𝑖 Γ— [0, 10] Γ— [0, 5]    for 𝑖 ∈ 𝑁 (𝑒) βˆ– ({𝑛} βˆͺ 𝑁 (𝑛))           (3.10)
                         𝑆  Γ— [8, 10] Γ—  [0, 10]  for 𝑖 ∈ 𝑁 (𝑛)  βˆ– ({𝑒} βˆͺ 𝑁 (𝑒))
                     βŽͺ
                          𝑖
                     βŽͺ
                     βŽͺ
                     βŽͺ
                         𝑆𝑖 Γ— [0, 10] Γ— [0, 10]             otherwise .
                     ⎩

   We first argue that the rectangles {𝑇𝑖 }1≀𝑖≀𝑛 form a rectangular representation of 𝐺. Let (𝑖, 𝑗)
be an edge not in 𝐺. If (𝑖, 𝑗) is not of the form 𝑖 = 𝑒, 𝑗 ∈ 𝑁 (𝑛)βˆ–π‘ (𝑒) or 𝑖 = 𝑛, 𝑗 ∈ 𝑁 (𝑒)βˆ–π‘ (𝑛),
then the edge (𝑖, 𝑗) is not present in 𝐺𝑒 as well and so 𝑆𝑖 ∩ 𝑆𝑗 = βˆ…. Consequently 𝑇𝑖 ∩ 𝑇𝑗 = βˆ….
   If 𝑖 = 𝑒 and 𝑗 ∈ 𝑁 (𝑛) βˆ– 𝑁 (𝑒), then by definition of contraction we have that (𝑒, 𝑗) ∈ 𝐺𝑒
and so 𝑆𝑒 ∩ 𝑆𝑗 ΜΈ= βˆ…. But from the first and fourth lines in (3.10), we get that 𝑇𝑒 ∩ 𝑇𝑗 = βˆ….
Similarly if 𝑖 = 𝑛 and 𝑗 ∈ 𝑁 (𝑒) βˆ– 𝑁 (𝑛), then 𝑆𝑖 ∩ 𝑆𝑗 = 𝑆𝑒 ∩ 𝑆𝑗 ΜΈ= βˆ…. But from the second and
third lines in (3.10) we get that 𝑇𝑖 ∩ 𝑇𝑗 = βˆ….
   Next let (𝑖, 𝑗) be an edge present in 𝐺. If 𝑖, 𝑗 ΜΈ= 𝑒 or 𝑛, then (𝑖, 𝑗) ∈ 𝐺𝑒 and so 𝑆𝑖 ∩ 𝑆𝑗 ΜΈ= βˆ….
From the last three lines of (3.10) we then get that
                           𝑇𝑖 ∩ 𝑇𝑗 βŠ‡ (𝑆𝑖 ∩ 𝑆𝑗 ) Γ— [8, 10] Γ— [0, 5] ΜΈ= βˆ….
If 𝑖 = 𝑒 and 𝑗 = 𝑛 ∈ 𝑁 (𝑒), then from the first two lines of (3.10) we get that
                               𝑇𝑒 ∩ 𝑇𝑛 = 𝑆𝑒 Γ— [4, 6] Γ— [6, 7] ΜΈ= βˆ….                           (3.11)
If 𝑖 = 𝑒 and 𝑗 ∈ 𝑁 (𝑒) βˆ– ({𝑛} βˆͺ 𝑁 (𝑛)) then 𝑆𝑒 ∩ 𝑆𝑗 ΜΈ= βˆ… and so from the first and third lines
in (3.10), we get that
                          𝑇𝑒 ∩ 𝑇𝑗 = (𝑆𝑒 ∩ 𝑆𝑗 ) Γ— [0, 6] Γ— [3, 5] ΜΈ= βˆ….
  Finally if 𝑖 = 𝑛 and 𝑗 ∈ 𝑁 (𝑛) βˆ– {𝑒} then using the fact that 𝑆𝑒 ∩ 𝑆𝑗 ΜΈ= βˆ… and the second and
fourth lines in (3.10), we get that
                          𝑇𝑛 ∩ 𝑇𝑗 βŠƒ (𝑆𝑒 ∩ 𝑆𝑗 ) Γ— [8, 10] Γ— [6, 10] ΜΈ= βˆ….
This proves the rectangles {𝑇𝑖 } for a rectangular representation of 𝐺.
   To see that {𝑇𝑖 } in fact form a strong rectangular representation, it suffices to see that (2.2)
in condition (𝑐2) holds for 𝑣 = 𝑒 and 𝑣 = 𝑛. Using the fact that {𝑆𝑖 } βŠ‚ R𝑠 form a strong
rectangular representation of 𝐺𝑒 , we let π‘₯𝑒 ∈ R𝑠 and π‘Žπ‘’ > 0 be such that
                                                βŽ›              βŽžπ‘
                                                    ⋃︁
                                π΅π‘ž (π‘₯𝑒 , π‘Žπ‘’ ) βŠ‚ ⎝           𝑆𝑖 ⎠ .
                                                 1≀𝑖̸=π‘’β‰€π‘›βˆ’1




                                                73
Figure 3: Rectangles used in constructing a strong rectangular representation for 𝐺.


Using the first and second lines of (3.10), we then set 𝑦𝑒 := (π‘₯𝑒 , 0, 3) and 𝑦𝑛 := (π‘₯𝑒 , 10, 6)
respectively and choose π‘Žπ‘’ smaller if necessary to get
                             βŽ›            βŽžπ‘                      βŽ›             βŽžπ‘
                                ⋃︁                                      ⋃︁
           π΅π‘ž+2 (𝑦𝑒 , π‘Žπ‘’ ) βŠ‚ ⎝         𝑇𝑖 ⎠ and π΅π‘ž+2 (𝑦𝑛 , π‘Žπ‘’ ) βŠ‚ ⎝          𝑇𝑖 ⎠ .
                                1≀𝑖̸=𝑒≀𝑛                                  1β‰€π‘–β‰€π‘›βˆ’1

By (2.5), we have that 𝑦𝑒 ∈ πœ•π‘‡π‘’ and 𝑦𝑛 ∈ πœ•π‘‡π‘› and so 𝑠(𝐺𝑒 ) ≀ π‘ž + 2.
   Finally, in Figure 3, we pictorially represent a possible choice for the rectangles in R2 that
can be used to construct a strong rectangular representation for 𝐺 as follows: The rectangle 𝐿π‘₯
with corners labelled π‘₯ ∈ {𝑒, 𝑛} is used for the vertex π‘₯ and so we set 𝑇π‘₯ = 𝑆π‘₯ Γ— 𝐿π‘₯ . Similarly,
the rectangle 𝐿1 with corners labelled 1 is for neighbours of 𝑒 that are not adjacent to 𝑛 and the
rectangle 𝐿2 with corners labelled 2 is for neighbours of 𝑛 that are not adjacent to 𝑣. For the rest
of the vertices, we pick any rectangle 𝐿0 that is adjacent all the rectangles in Figure 3. Defining
the appropriate rectangles 𝑇𝑖 , 1 ≀ 𝑖 ≀ 𝑛, we then get a strong rectangular representation of 𝐺
in R𝑏+2 .
   Proof of Theorem 1: Follows from (3.3), (3.8) and (3.9).


4. Stealthy Attacks on Flow Graphs
A flow graph is a graph 𝐺 = (𝑉, 𝐸) with vertex set 𝑉 = {1, 2, . . . , 𝑛} and edge set 𝐸 (which
we index as {𝑛 + 1, . . . , 𝑑}) along with the following additional properties: The state of the
system is given by a real valued vector x = [π‘₯1 , . . . , π‘₯𝑛 ]𝑇 where π‘₯𝑖 denotes the state of vector 𝑖.
An edge with index 𝑓 joining vertices 𝑖 and 𝑗 is assigned a gain 𝐡𝑖,𝑗 = 𝐡𝑗,𝑖 > 0 and the flow
through the edge 𝑓 from 𝑗 to 𝑖 is given by
                                      𝐡𝑖,𝑗 (π‘₯𝑖 βˆ’ π‘₯𝑗 ) = h𝑓 Β· x,                                   (4.1)
where h𝑓 is the 1 Γ— 𝑛 vector with exactly two non-zero entries: 𝐡𝑖,𝑗 in π‘–π‘‘β„Ž position and βˆ’π΅π‘–,𝑗 in
the 𝑗 π‘‘β„Ž position. The net flow into the vertex 𝑖 equals the sum of flows from all edges connected




                                                  74
to 𝑖 and is given by
                       βˆ‘οΈ                           βˆ‘οΈ             βˆ‘οΈ
                             𝐡𝑖,𝑗 (π‘₯𝑖 βˆ’ π‘₯𝑗 ) = π‘₯𝑖         𝐡𝑖,𝑗 βˆ’         𝐡𝑖,𝑗 π‘₯𝑗 = h𝑖 Β· x,         (4.2)
                       π‘—βˆΌπ‘–                          π‘—βˆΌπ‘–            π‘—βˆΌπ‘–

with 𝑗 ∼ 𝑖 denoting that vertices 𝑗 and 𝑖 are connected by an edge in 𝐺. The 1βˆ‘οΈ€         Γ— 𝑛 vector h𝑖
has values βˆ’π΅π‘–,𝑗 for positions 1 ≀ 𝑗 ΜΈ= 𝑖 ≀ 𝑛, 𝑗 ∼ 𝑖 and has the value 𝐻𝑖,𝑖 = π‘’βˆΌπ‘– 𝐡𝑖,𝑒 . All
other entries of h𝑖 are zero. Letting H = [h𝑇1 , . . . , h𝑇𝑑 ]𝑇 be the 𝑑 Γ— 𝑛 gain matrix, we then have
                                               𝑛
                                              βˆ‘οΈ
                                                      𝐻𝑖,𝑗 = 0                                     (4.3)
                                              𝑗=1

for all 1 ≀ 𝑖 ≀ 𝑑.
   Given the flow vector H Β· x, the gain matrix H and a reference state (say π‘₯1 ), it is possible to
calculate the overall state x : We first use (4.1) to get π‘₯𝑖 βˆ’ π‘₯𝑗 across every edge (𝑖, 𝑗) ∈ 𝐸. We
then calculate the states of all vertices adjacent to the vertex 1 and then iteratively calculate the
states of the rest of the vertices.
   We see how the differential state calculation procedure described above can be affected by
stealthy attacks. For a subset β„± of edges in 𝐺, we define a β„±βˆ’attack vector or simply an
attack vector to be a 𝑑 Γ— 1 vector a = [π‘Ž1 , . . . , π‘Žπ‘‘ ]𝑇 satisfying π‘Žπ‘™ ΜΈ= 0 if and only if the index 𝑙
corresponds to an edge in β„± or is a vertex adjacent to an edge in β„±.
   We say that β„± is stealthily attackable if there exists an attack vector a of the form a = H Β· s
for some 𝑛 Γ— 1 vector s = [𝑠1 , . . . , 𝑠𝑛 ]𝑇 . For convenience, we denote a = H Β· s to be a stealthy
attack vector and denote s to be the β„±βˆ’stealth vector or simply the stealth vector corresponding
to the attack vector a. In other words, we say that an attack vector a is stealthy if a is also a
flow vector.
   By definition the attack vector a affects only edges of β„± or vertices adjacent to edges of β„±.
From the flow equation (4.1), we therefore have that 𝑠𝑖 βˆ’ 𝑠𝑗 ΜΈ= 0 if and only if the edge (𝑖, 𝑗)
of 𝐺 with endvertices 𝑖 and 𝑗 belongs to β„±. Given the corrupted flow vector H Β· x + H Β· s,
the differential state calculation procedure described before obtains the difference between the
values of the states at vertices 𝑖 and 𝑗 to be

                              (π‘₯𝑖 βˆ’ π‘₯𝑗 ) + (𝑠𝑖 βˆ’ 𝑠𝑗 ) if edge (𝑖, 𝑗) ∈ β„±
                           {οΈ‚
                                                                                                    (4.4)
                                    (π‘₯𝑖 βˆ’ π‘₯𝑗 )                otherwise.

  From (4.4), we have that different edges in β„± are affected differently due to stealthy attacks
and so we define the edge variation factor πœƒ(β„±) as

                                                    max(𝑖,𝑗)βˆˆβ„± |𝑠𝑖 βˆ’ 𝑠𝑗 |
                                   πœƒ(β„±) := inf                            ,                        (4.5)
                                              s     min(𝑖,𝑗)βˆˆβ„± |𝑠𝑖 βˆ’ 𝑠𝑗 |

where the infimum is taken over all β„±βˆ’stealth vectors s. The edge variation factor measures
the variation in the corruption of the state vector x due to stealthy attacks.
  We have the following result regarding the variation factor of stealthy attacks on β„±.




                                                      75
Theorem 2. The set of edges β„± is stealthily attackable if and only if for every cycle 𝐢 ∈ 𝐺,
either 𝐢 ∩ β„± = βˆ… or #𝐢 ∩ β„± β‰₯ 2. Moreover, if β„± is stealthily attackable, then

                                       1 ≀ πœƒ(β„±) ≀ π‘˜(β„±) βˆ’ 1,                                        (4.6)

where π‘˜(β„±) is the number of components in the graph 𝐺 βˆ– β„± obtained after removing the edges
in β„±.

  A single edge is stealthily attackable if and only if it is a bridge; i.e., removal of the edge
results in disconnection of the graph 𝐺 into two distinct components.
  In general, stealthily attacking multiple β€œnon-critical" edges whose disconnection results in
few components, creates a more β€œuniform" corruption across the attacked edges. Therefore from
the designer perspective, it would be beneficial to have extra protection in these non-critical
edges.

Proof of Theorem 2
Suppose β„± is stealthily attackable and there exists a cycle 𝐢 such that
#𝐢 ∩ β„± = 1; i.e., there exists exactly one edge 𝑒 = (𝑒, 𝑣) ∈ 𝐢 present in β„±. We arrive
at a contradiction as follows. Let a = H Β· s be the stealthy attack vector on β„± and let s =
[𝑠1 , . . . , 𝑠𝑛 ]𝑇 be the corresponding stealth vector. As argued prior to (4.4), we have that 𝑠𝑖 βˆ’π‘ π‘— ΜΈ=
0 if and only if (𝑖, 𝑗) ∈ β„±. Thus 𝑠𝑒 ΜΈ= 𝑠𝑣 .
   Denoting the cycle 𝐢 = (𝑒, 𝑒1 , 𝑒2 , . . . , 𝑒𝑑 , 𝑣, 𝑒), we then have that the edge (𝑒, 𝑒1 ) ∈/ β„± and
so 𝑠𝑒 = 𝑠𝑒1 . Similarly (𝑒1 , 𝑒2 ) ∈  / β„± and so 𝑠𝑒1 = 𝑠𝑒2 . Continuing this way, we get 𝑠𝑒 = 𝑠𝑒1 =
𝑠𝑒2 = . . . = 𝑠𝑒𝑑 . Finally, the edge (𝑒𝑑 , 𝑣) is also not in β„± and so 𝑠𝑒 = 𝑠𝑒𝑑 = 𝑠𝑣 , a contradiction.
   Conversely, suppose every cycle 𝐢 in 𝐺 contains either zero or at least two edges of β„±. We now
use minor reduction to obtain the desired stealth vector, by extracting appropriate components
of 𝐺 that allow the vector construction. The details are as follows. First we remove the edges
in β„± to get π‘˜ = π‘˜(β„±) connected components π’ž1 , . . . , π’žπ‘˜ of 𝐺. Every edge 𝑒 = (𝑀, 𝑦) ∈ 𝐺
satisfies the following property:

                   The edge 𝑒 ∈ β„± if and only if the vertices 𝑀 ∈ π’žπ‘€1 and 𝑦 ∈ π’žπ‘¦1
                   belong to distinct components π’žπ‘€1 ΜΈ= π’žπ‘¦1 .                                      (4.7)

Indeed, by construction, we have that if the vertices 𝑀 and 𝑦 belong to distinct components π’žπ‘€1
and π’žπ‘¦1 , then the edge (𝑀, 𝑦) necessarily belongs to β„±. Conversely if (𝑀, 𝑦) ∈ β„± and both 𝑀
and 𝑦 were to belong to the same component π’žπ‘— , then 𝑀 and 𝑦 would be connected by a path 𝑃𝑀𝑦
in π’žπ‘— . This in turn would imply that 𝑒 βˆͺ 𝑃𝑀𝑦 is a cycle in 𝐺 containing only one edge 𝑒 of β„±, a
contradiction.
   We now construct the stealth vector s = [𝑠1 , . . . , 𝑠𝑛 ] as follows. Let πœ† > 0 be a real number
to be determined later. For a vertex 𝑣 ∈ 𝐺 we set

                            𝑠𝑣 = 𝑠𝑣 (πœ†) = πœ†π‘–βˆ’1 , if 𝑣 ∈ π’žπ‘– ,     1β‰€π‘–β‰€π‘˜                             (4.8)

so that s(πœ†) = [𝑠1 (πœ†), . . . , 𝑠𝑛 (πœ†)]. Letting a = H Β· s we first argue that π‘Žπ‘™ = 0 if 𝑙 is neither a
vertex adjacent to some edge of β„± nor the index of some edge in β„±. Indeed if 𝑙 is the index of




                                                  76
an edge (𝑒, 𝑣) ∈/ β„± then both 𝑒 and 𝑣 belong to the same component π’žπ‘–0 for some 1 ≀ 𝑖0 ≀ π‘˜
(property (4.7)). This implies that 𝑠𝑒 = 𝑠𝑣 = πœ†π‘–0 βˆ’1 and so from (4.1), we get that

                                     |π‘Žπ‘™ | = 𝐡𝑒,𝑣 |𝑠𝑒 βˆ’ 𝑠𝑣 | = 0.

Next if 𝑙 is a vertex and the vertex 𝑙 is not the endvertex of any edge in β„±, then by property (4.7)
all neighbours of 𝑙 are present in the same component π’žπ‘—0 for some 1 ≀ 𝑗0 ≀ π‘˜. This implies
that 𝑠𝑀 = 𝑠𝑙 = πœ†π‘—0 βˆ’1 for every neighbour 𝑀 of 𝑙 and from (4.2), we again get that π‘Žπ‘™ = 0.
   We now see that π‘Žπ‘™ ΜΈ= 0 if either 𝑙 is the index of some edge (𝑀, 𝑦) ∈ β„± or is a vertex adjacent
to some edge of β„±. First suppose that 𝑙 is the index of (𝑀, 𝑦) ∈ β„±. From property (4.7) above,
we have that 𝑀 and 𝑦 belong to distinct components π’žπ‘€1 ΜΈ= π’žπ‘¦1 and so by construction

                                    𝑠𝑀 = πœ†π‘€1 βˆ’1 ΜΈ= πœ†π‘¦1 βˆ’1 = 𝑠𝑦 .

From (4.1), this implies that |π‘Žπ‘™ | = 𝐡𝑀,𝑦 |𝑠𝑀 βˆ’ 𝑠𝑦 | =
                                                      ΜΈ 0.
  Finally, choosing πœ† appropriately, we now show that π‘Žπ‘™ ΜΈ= 0 if 𝑙 is a vertex adjacent to some
edge in β„±. Suppose the vertex 𝑙 belongs to the component π’žπ‘—1 for some 1 ≀ 𝑗1 ≀ π‘˜ so that
the corresponding entry 𝑠𝑙 = πœ†π‘—1 βˆ’1 . Since 𝑙 is the endvertex of some edge in β„±, we have from
property (4.7) that 𝑙 has at least one neighbour outside π’žπ‘—1 . Let π’žπ‘—1 , . . . , π’žπ‘—π‘€ be the set of all
components containing either 𝑙 or a neighbour of 𝑙. Using the flow equation (4.2) we then get
that
                                                         βˆ‘οΈπ‘€
                           π‘Žπ‘™ = π‘Žπ‘™ (πœ†) = 𝛽1,𝑙 Β· πœ†π‘—1 βˆ’1 βˆ’     π›½π‘Ÿ,𝑙 Β· πœ†π‘—π‘Ÿ βˆ’1                       (4.9)
                                                               π‘Ÿ=2

where                                    βˆ‘οΈ               βˆ‘οΈ
                               𝛽1,𝑙 :=         𝐡𝑙,π‘ž βˆ’               𝐡𝑙,π‘ž > 0
                                         π‘žβˆΌπ‘™            π‘žβˆΌπ‘™,π‘žβˆˆπ’žπ‘—1

and for 2 ≀ π‘Ÿ ≀ 𝑀 the term                        βˆ‘οΈ
                                     π›½π‘Ÿ,𝑙 :=                𝐡𝑙,π‘ž > 0
                                                π‘žβˆΌπ‘™,π‘žβˆˆπ’žπ‘—π‘Ÿ

is the sum of the gains of edges adjacent to the vertex 𝑙 and present in the component π’žπ‘—π‘Ÿ so
that
                                              𝑀
                                             βˆ‘οΈ
                                      𝛽1,𝑙 βˆ’    π›½π‘Ÿ,𝑙 = 0.                              (4.10)
                                                  π‘Ÿ=2

   Let Λ𝑙 be the⋃︀finite set of the roots of the equation π‘Žπ‘™ (π‘₯) = 0 so that 1 ∈ Λ𝑙 by (4.10)
and set Ξ›π‘‘π‘œπ‘‘ = 𝑣 Λ𝑣 , where the union is taken over all vertices adjacent to an edge in β„±.
Choosing πœ† ∈   / Ξ›π‘‘π‘œπ‘‘ we have that π‘Žπ‘™ (πœ†) ΜΈ= 0 and since 𝑙 is arbitrary this implies that a(πœ†) =
H Β· s(πœ†) is a stealthy attack vector.
   From (4.8) and property (4.7), we also get for any edge (𝑖, 𝑗) ∈ β„± that the corresponding
difference |𝑠𝑖 (πœ†)βˆ’π‘ π‘— (πœ†)| is of the form |πœ†π‘–1 βˆ’πœ†π‘—1 | for some distinct integers 𝑖1 , 𝑗1 β‰₯ 0. Therefore
if {πœ†π‘ž }π‘žβ‰₯1 , πœ†π‘ž ∈
                 / Ξ›π‘‘π‘œπ‘‘ , πœ†π‘ž < 1 is a sequence converging to one as π‘ž β†’ ∞ then using

        max |𝑠𝑖 (πœ†π‘ž ) βˆ’ 𝑠𝑗 (πœ†π‘ž )| = 1 βˆ’ πœ†π‘˜βˆ’1
                                         π‘ž   and min |𝑠𝑖 (πœ†π‘ž ) βˆ’ 𝑠𝑗 (πœ†π‘ž )| = πœ†π‘˜βˆ’2
                                                                              π‘ž   βˆ’ πœ†π‘˜βˆ’1
                                                                                     π‘ž
      (𝑖,𝑗)βˆˆβ„±                                           (𝑖,𝑗)βˆˆβ„±




                                                    77
we get that
                    max(𝑖,𝑗)βˆˆβ„± |𝑠𝑖 (πœ†π‘ž ) βˆ’ 𝑠𝑗 (πœ†π‘ž )|    1 βˆ’ πœ†π‘žπ‘˜βˆ’1
                                                     = π‘˜βˆ’2         βˆ’β†’ π‘˜ βˆ’ 1                    (4.11)
                    min(𝑖,𝑗)βˆˆβ„± |𝑠𝑖 (πœ†π‘ž ) βˆ’ 𝑠𝑗 (πœ†π‘ž )|  πœ†π‘ž (1 βˆ’ πœ†π‘ž )
as π‘ž β†’ ∞. This implies that πœƒ(β„±) ≀ π‘˜(β„±) βˆ’ 1 and completes the proof of Theorem 2.


5. Extension of results in Theorem 2
In this section, we extend the result of Theorem 2 in two directions. In the first subsection, we
use the structure of the graph 𝐺 βˆ– β„± to improve the bound for the edge variation factor and in
the second subsection, we study stealthy attacks with partial information.

Improved Bound for the Variation Factor
We now describe a slight modification of the proof of Theorem 2 to obtain stealth vectors with
lesser variation. Consider the component graph πΊπ‘π‘œπ‘šπ‘ = (π‘‰π‘π‘œπ‘šπ‘ , πΈπ‘π‘œπ‘šπ‘ ) constructed as follows:
We represent the component π’žπ‘– by a node 𝑛𝑖 ∈ π‘‰π‘π‘œπ‘šπ‘ and connect nodes 𝑛𝑖 and 𝑛𝑗 if there
exists an edge 𝑒 ∈ β„± with one endvertex in π’žπ‘– and other endvertex in π’žπ‘— . A proper colouring
of πΊπ‘π‘œπ‘šπ‘ using π‘Ž β‰₯ 1 colours is a map 𝑔 : π‘‰π‘π‘œπ‘šπ‘ β†’ {1, 2, . . . , π‘Ž} such that 𝑔(𝑣) ΜΈ= 𝑔(𝑒) if
vertices 𝑒 and 𝑣 are adjacent in πΊπ‘π‘œπ‘šπ‘ . The chromatic number πœ’0 of πΊπ‘π‘œπ‘šπ‘ is the smallest
integer 𝑧 such that πΊπ‘π‘œπ‘šπ‘ admits a proper colouring using 𝑧 colours [3].
   Letting 𝑔0 : π‘‰π‘π‘œπ‘šπ‘ β†’ {1, 2, . . . , πœ’0 } be a proper colouring of πΊπ‘π‘œπ‘šπ‘ using πœ’0 colours, we
define the stealth vector y = [𝑦1 , . . . , 𝑦𝑛 ]𝑇 as follows. If 𝑔0 (𝑛𝑖 ) = 𝑗, we assign 𝑦𝑣 = 𝑦𝑣 (πœ†) =
πœ†π‘—βˆ’1 for all vertices 𝑣 ∈ π’žπ‘– . Finally, letting y = [𝑦1 , . . . , 𝑦𝑛 ]𝑇 , we set c = H Β· y.
   To see that c is a stealthy attack vector, we consider any edge (𝑒, 𝑣) ∈ 𝐺 with index 𝑙. If 𝑒
and 𝑣 belong to the same component in {π’žπ‘– }, then 𝑦𝑒 βˆ’ 𝑦𝑣 = 0 and so we have from (4.1) that
the corresponding entry 𝑐𝑙 = 𝐡𝑒,𝑣 (𝑦𝑒 βˆ’ 𝑦𝑣 ) = 0. Similarly if a vertex 𝑒 is not adjacent to any
edge in β„± then using property (4.7) as before, we get that all neighbours of 𝑒 belong to the same
component in {π’žπ‘– } as 𝑒. As before, we use (4.2) to get that the corresponding entry 𝑐𝑒 = 0.
   If an edge (𝑒, 𝑣) ∈ β„± then by property (4.7), the vertices 𝑒 ∈ π’žπ‘’1 and 𝑣 ∈ π’žπ‘£1 belong to
distinct components π’žπ‘’1 ΜΈ= π’žπ‘£1 . In the graph πΊπ‘π‘œπ‘šπ‘ constructed above, the nodes 𝑛𝑒1 and 𝑛𝑣1
are joined by an edge and so have different colours 𝑔(𝑛𝑒1 ) ΜΈ= 𝑔(𝑛𝑣1 ). This in turn implies
that 𝑦𝑒 ΜΈ= 𝑦𝑣 and so 𝑐𝑙 = 𝐡𝑒,𝑣 (𝑦𝑒 βˆ’ 𝑦𝑣 ) ΜΈ= 0, by (4.1).
   Finally, for a vertex adjacent to an edge in β„±, we argue as in (4.9) to get the corresponding
polynomial expression for 𝑐𝑙 (πœ†). The expressions here have different degrees than in (4.9) and
therefore different set of roots. Again we choose an appropriate sequence {πœ†π‘ž } converging to
one so that
                                        1 βˆ’ πœ†πœ’π‘ž 0 βˆ’1
                                                        βˆ’β†’ πœ’0 βˆ’ 1
                                    πœ†πœ’π‘ž 0 βˆ’2 βˆ’ πœ†πœ’π‘ž 0 βˆ’1
as π‘ž β†’ ∞. This implies that πœƒ(β„±) ≀ πœ’0 βˆ’ 1.




                                                 78
Partial Knowledge
In this subsection, we see how stealth attacks could possibly be carried out with coarse informa-
tion regarding the gain matrix H. This situation arises for example, when measurement noise
results in imperfect estimates of the gain values.
   Suppose the attacker does not exactly know the true gains {𝐡𝑖,𝑗 } but knows that

                                                    πœ–1 ≀ 𝐡𝑖,𝑗 ≀ πœ–2                                             (5.1)

for some positive finite constants πœ–1 , πœ–2 .
   We construct the stealth vector s as follows. For a vertex 𝑣 ∈ 𝐺, we choose 𝑠𝑣 as in (4.8)
and get from the proof of Theorem 2 that π‘Žπ‘™ = 0 if 𝑙 is neither the index of an edge in β„± nor
is a vertex adjacent to any edges in β„±. Moreover π‘Žπ‘™ ΜΈ= 0 if 𝑙 is the index of an edge of β„±. The
knowledge of edge gains is required only to determine an appropriate value of πœ† so that π‘Žπ‘™ ΜΈ= 0
for a vertex 𝑙 adjacent to some edge in β„±. Indeed from (4.9), we have that
                                                                          𝑀
                                                                         βˆ‘οΈ
                          π‘Žπ‘™ = π‘Žπ‘™ (πœ†, H) = 𝛽1,𝑙 Β· πœ†π‘—1 βˆ’1 βˆ’                      π›½π‘Ÿ,𝑙 Β· πœ†π‘—π‘Ÿ βˆ’1                  (5.2)
                                                                         π‘Ÿ=2

where the positive {π›½π‘Ÿ,𝑙 } are as in (4.9).
   We now see that if πœ† > 0 is chosen large, then |π‘Žπ‘™ | β‰₯ 𝐷 for some constant
𝐷 = 𝐷(πœ†, πœ–1 , πœ–2 ) not depending on the choice of H. Indeed, assuming
𝑗1 > 𝑗2 . . . > 𝑗𝑀 in (5.2) and using (5.1) we have
                                                   βƒ’                      βƒ’
                                                        𝑀
                                                   βƒ’   βˆ‘οΈ        π›½π‘Ÿ,𝑙
                                                                          βƒ’
                             |π‘Žπ‘™ | = 𝛽1,𝑙 πœ†π‘—1 βˆ’1 βƒ’1 βˆ’
                                                   βƒ’                      βƒ’
                                                           𝛽1,𝑙 Β· πœ†π‘—1 βˆ’π‘—π‘Ÿ βƒ’
                                                                          βƒ’
                                                   βƒ’
                                                       π‘Ÿ=2
                                                        𝑀
                                                 (οΈƒ                     )οΈƒ
                                           𝑗1 βˆ’1
                                                       βˆ‘οΈ       πœ–2
                                   β‰₯ πœ–1 πœ†           1βˆ’
                                                           πœ–1 Β· πœ†π‘—1 βˆ’π‘—π‘Ÿ
                                                                   π‘Ÿ=2

so that                                (οΈ‚                     )οΈ‚                    (οΈ‚                    )οΈ‚
                               𝑗1 βˆ’1              𝑀 Β· πœ–2                    𝑗1 βˆ’1             π‘˜ Β· πœ–2
                |π‘Žπ‘™ | β‰₯ πœ–1 πœ†                1βˆ’                     β‰₯ πœ–1 πœ†             1βˆ’                       (5.3)
                                               πœ–1 Β· πœ†π‘—1 βˆ’π‘—π‘Ÿ                                πœ–1 Β· πœ†π‘—1 βˆ’π‘—π‘Ÿ
where π‘˜ = π‘˜(β„±) is the number of components of πΊβˆ–β„±. The final relation in (5.3) is true because,
the number of distinct powers of πœ† in the stealth vector s is π‘˜. Thus for all πœ† β‰₯ πœ†0 (𝑙, π‘˜, πœ–1 , πœ–2 ) > 1
large we have from (5.3) that
                                              πœ–1 πœ†π‘—1 βˆ’1   πœ–1
                                      |π‘Žπ‘™ | β‰₯           β‰₯ .
                                                  2        2
Choosing πœ† > πœ†1 = πœ†1 (π‘˜, πœ–1 , πœ–2 ) large enough, we get that |π‘Žπ‘™ | β‰₯ πœ–21 for all vertices 𝑙 adjacent
to some edge in β„±. This obtains our desired stealth vector s = s(πœ†).
   As a concluding remark, we state here that though the attack as described is possible, the
edge variation πœƒ(β„±) could be quite large and therefore be possibly detected.




                                                          79
6. Conclusion and Future Work
In this paper, we have studied two applications of graph minor reduction in boxicity and stealthy
attacks on flowgraphs. We have used minor reduction recursively to estimate the boxicity of an
arbitrary graph. Similarly, we used a component reduction technique to determine necessary
and sufficient conditions that allows stealthy attacks in a flowgraph.
   In the above, we have considered deterministic graphs. In the future, we plan to incorporate
and study analogous problems in random graphs.


Acknowledgments
I thank Professors V. Raman, C. R. Subramanian and the referee for crucial comments that led
to an improvement of the paper. I also thank IMSc for my fellowships.


References
 [1] A. Adiga, D. Bhowmick and L. S. Chandran, Boxicity and Poset Dimension, SIAM Journal
     of Discrete Mathematics, 25 (2011) 1687–1698.
 [2] D. Bienstock, M. A. Langston, Chapter 8: Algorithmic Implications of the Graph Minor
     Theorem, Handbooks in Operations Research and Management Science, Elsevier, 7 (1995)
     481–502.
 [3] B. BollobΓ‘s, Modern Graph Theory, Springer, 1998.
 [4] L. S. Chandran and N. Sivadasan, Boxicity and Treewidth, Journal of Combinatorial Theory,
     Series B, 97 (2007) 733–744.
 [5] L. S. Chandran, M. C. Francis and N. Sivadasan, Boxicity and maximum degree, Journal of
     Combinatorial Theory, Series B, 98(2008) 443–445.
 [6] L. Esperet, Boxicity of graphs with bounded degree, European Journal of Combinatorics,
     30 (2009) 1277–1280.
 [7] H. Fawzi, P. Tabuada and S. Diggavi, Secure estimation and control for cyber-physical
     systems under adversarial attacks, IEEE Transactions on Automatic Control, 59(2014)
     1454–1467.
 [8] H. He and J. Yan, Cyber-physical attacks and defences in the smart grid: a survey,IET
     Cyber-Physical Systems: Theory and Applications, 1(2016) 13–27.
 [9] O. Kosut, L. Jia, R. J. Thomas and L. Tong, Malicious data attacks on the smart grid, IEEE
     Transactions on Smart Grid, 2(2011), 645–658.
[10] B. Kuo, Automatic control systems, Prentice Hall, 1995.
[11] N. V. R. Mahadev and U. N. Peled, Threshold graphs and related topics, North Holland,
     First Edition, 1995.
[12] F. S. Roberts, On the boxicity and cubicity of a graph, Recent Progress in Combinatorics
     (Proc. Third Waterloo Conf. on Combinatorics, 1968) Academic Press, New York, 1969, pp.
     301–310.
[13] A. Scott and D. R. Wood, Better bounds for poset dimension and boxicity, Transactions of
     the American Mathematical Society, (2019), https://doi.org/10.1090/tran/7962.




                                               80