Binary Observation-Based FIR System Identification Against Replay Attacks

被引:0
|
作者
Zhang, Qingxiang [1 ]
Guo, Jin [1 ,2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
binary observation; FIR system identification; grid search method; replay attack; NETWORKED CONTROL-SYSTEMS; VALUED OBSERVATIONS; NOISE; PERFORMANCE;
D O I
10.1002/rnc.7706
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the context of the increasing security issues of cyber-physical systems (CPSs), this paper addresses the parameter identification of binary observation-based finite impulse response (FIR) systems under replay attacks, overcoming the problem of high nonlinearity of quantized systems and greater data sparsity caused by replay attacks. For the attacker, based on the energy-constrained condition, an optimization attack model is established to maximize the absolute error of identification, giving the method of obtaining the optimal attack strategy. Following the defender, the identifiability of unknown parameters is discussed and a robust defense scheme is proposed. This scheme involves a joint identification strategy for both the attack strategy and unknown parameters. By enhancing the excitability of system inputs, consistent identification is ensured despite replay attacks. An algorithm for the accomplishment of the joint identification strategy is presented based on the grid search method. Rationality of the method is confirmed with performing numerical simulations.
引用
收藏
页码:1145 / 1157
页数:13
相关论文
共 50 条
  • [31] System Identification With Binary-Valued Observations Under Data Tampering Attacks
    Guo, Jin
    Wang, Xuebin
    Xue, Wenchao
    Zhao, Yanlong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3825 - 3832
  • [32] Detection of data tampering attack in FIR system identification with binary-valued observations
    Jia, Ruizhe
    Su, Ruinan
    Yu, Peng
    Song, Yong
    Guo, Jin
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2025, 47 (02) : 390 - 401
  • [33] Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
    Zhang, Bowen
    Tondi, Benedetta
    Barni, Mauro
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2020, 197
  • [34] An improvement of the password-based authentication protocol (K1P) on security against replay attacks
    Kwon, T
    Kang, M
    Jung, S
    Song, J
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1999, E82B (07) : 991 - 997
  • [35] Gait Identification based on FIR system Characterizing Motion of Leg
    Thumwarin, P.
    Srisuk, K.
    Matsuura, T.
    6TH BIOMEDICAL ENGINEERING INTERNATIONAL CONFERENCE (BMEICON 2013), 2013,
  • [36] Electrooculogram Identification from Eye Movement Based on FIR System
    Puttasakul, T.
    Archawut, K.
    Matsuura, T.
    Thumwarin, P.
    Airphaiboon, S.
    2016 9TH BIOMEDICAL ENGINEERING INTERNATIONAL CONFERENCE (BMEICON), 2016,
  • [37] An observation-based evaluation and ranking of historical Earth system model simulations in the northwest North Atlantic Ocean
    Laurent, Arnaud
    Fennel, Katja
    Kuhn, Angela
    BIOGEOSCIENCES, 2021, 18 (05) : 1803 - 1822
  • [38] FIR system identification under congruential summation-triggered communication scheme with binary observations
    Cui, Xu
    Zhang, Qingxiang
    Yu, Peng
    Jing, Fengwei
    Guo, Jin
    NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2024, 52
  • [39] POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
    Agrawal, Anand
    Maiti, Rajib Ranjan
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 1958 - 1960
  • [40] Static output feedback secure control for cyber-physical systems based on multisensor scheme against replay attacks
    Su, Lei
    Ye, Dan
    Zhao, Xingang
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (18) : 8313 - 8326