Optimal Tampering Attack Strategy for FIR System Identification With Multi-Level Quantized Observations

被引:0
|
作者
Liu, Wenke [1 ]
Jing, Fengwei [2 ]
Wang, Yinghui [1 ]
Guo, Jin [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Univ Sci & Technol Beijing, Natl Engn Res Ctr Adv Rolling & Intelligent Mfg, Beijing, Peoples R China
[3] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
关键词
data tampering; multi-valued quantization; optimal attack strategy; system identification; BINARY-VALUED OBSERVATIONS; QUANTIFICATION; OPPORTUNITIES; SECURITY;
D O I
10.1002/rnc.7729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the optimal tampering attack strategy in system identification of Finite Impulse Response (FIR) systems with multi-level quantized observations under data tampering attacks. First, the data tampering attack model based on a multi-level quantization system is established in a conditional probability manner according to the features of the quantization system. Second, a multi-parameter-based system parameter estimation algorithm is designed and its convergence consistency is proved. Then, according to the convergence of the designed identification algorithm under a tampering attack, the infinite paradigm of the difference between the converged value and the actual parameter after the attack is used as the attack index, and the optimal tampering attack strategy is designed to destroy the consistency of the recognition algorithm so as to make the best attack effect achieved. Finally, numerical simulation experiments under different conditions are used to verify the result.
引用
收藏
页码:1437 / 1448
页数:12
相关论文
共 50 条
  • [1] Detection of data tampering attack in FIR system identification with binary-valued observations
    Jia, Ruizhe
    Su, Ruinan
    Yu, Peng
    Song, Yong
    Guo, Jin
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2025, 47 (02) : 390 - 401
  • [2] Optimal strategy of data tampering attacks for FIR system identification with average entropy and binary-valued observations
    Bai, Zhongwei
    Liu, Yan
    Wang, Yinghui
    Guo, Jin
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (10) : 3329 - 3345
  • [3] Linear System Identification-Oriented Optimal Tampering Attack Strategy and Implementation Based on Information Entropy with Multiple Binary Observations
    Bai, Zhongwei
    Yu, Peng
    Liu, Yan
    Guo, Jin
    ALGORITHMS, 2024, 17 (06)
  • [4] Tampering Attack Detection for Remote State Estimation With Quantized Observations
    Li, Mengqi
    Hu, Yanpeng
    Guo, Jin
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 2185 - 2189
  • [5] Asymptotically Efficient Recursive Identification Method for FIR System with Quantized Observations
    Yang, Xiaolong
    Fang, Hai-Tao
    2014 33RD CHINESE CONTROL CONFERENCE (CCC), 2014, : 6832 - 6837
  • [6] Identification of FIR Systems with Quantized Inputs and Observations
    Guo, Jin
    Wang, Le Yi
    Yin, George
    Zhao, Yalong
    Zhang, Ji-Fong
    IFAC PAPERSONLINE, 2015, 48 (28): : 674 - 679
  • [7] An Extension on the Quantized Input Condition for FIR Systems Identification with Quantized Observations
    He, Yanyu
    Guo, Jin
    Zhao, Yanlong
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 2156 - 2160
  • [8] Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs
    Guo, Jin
    Wang, Le Yi
    Yin, George
    Zhao, Yanlong
    Zhang, Ji-Feng
    AUTOMATICA, 2015, 57 : 113 - 122
  • [9] Energy Optimal Configuration Strategy of Distributed Photovoltaic Power System for Multi-Level Distribution Network
    Wang, Yanmin
    Zhang, Hanqing
    Zhang, Weiqi
    Han, Song
    Yang, Yuzhuo
    APPLIED SCIENCES-BASEL, 2025, 15 (01):
  • [10] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
    Guo, Jin
    Wang, Xuebin
    Zhang, Yanling
    Xue, Wenchao
    Zhao, Yanlong
    CONTROL THEORY AND TECHNOLOGY, 2022, 20 (01) : 127 - 138