Optimal Tampering Attack Strategy for FIR System Identification With Multi-Level Quantized Observations

被引:0
|
作者
Liu, Wenke [1 ]
Jing, Fengwei [2 ]
Wang, Yinghui [1 ]
Guo, Jin [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Univ Sci & Technol Beijing, Natl Engn Res Ctr Adv Rolling & Intelligent Mfg, Beijing, Peoples R China
[3] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
关键词
data tampering; multi-valued quantization; optimal attack strategy; system identification; BINARY-VALUED OBSERVATIONS; QUANTIFICATION; OPPORTUNITIES; SECURITY;
D O I
10.1002/rnc.7729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the optimal tampering attack strategy in system identification of Finite Impulse Response (FIR) systems with multi-level quantized observations under data tampering attacks. First, the data tampering attack model based on a multi-level quantization system is established in a conditional probability manner according to the features of the quantization system. Second, a multi-parameter-based system parameter estimation algorithm is designed and its convergence consistency is proved. Then, according to the convergence of the designed identification algorithm under a tampering attack, the infinite paradigm of the difference between the converged value and the actual parameter after the attack is used as the attack index, and the optimal tampering attack strategy is designed to destroy the consistency of the recognition algorithm so as to make the best attack effect achieved. Finally, numerical simulation experiments under different conditions are used to verify the result.
引用
收藏
页码:1437 / 1448
页数:12
相关论文
共 50 条
  • [31] Recursive and optimal multi-level algorithms for the identification of Stochastic systems applications to bipeds control and identification
    Khoukhi, A
    MHS2001: PROCEEDINGS OF THE 2001 INTERNATIONAL SYMPOSIUM ON MICROMECHATRONICS AND HUMAN SCIENCE, 2001, : 169 - 174
  • [32] Asymptotic capacity and optimal precoding strategy of multi-level precode & forward in correlated channels
    Fawaz, Nadia
    Zarifi, Keyvan
    Debbah, Merouane
    Gesbert, David
    2008 IEEE INFORMATION THEORY WORKSHOP, 2008, : 209 - +
  • [33] Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations
    Guo, Jin
    Diao, Jing-Dong
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (01)
  • [34] Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations
    Jin GUO
    Jing-Dong DIAO
    Science China(Information Sciences), 2020, 63 (01) : 140 - 151
  • [35] Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations
    Jin Guo
    Jing-Dong Diao
    Science China Information Sciences, 2020, 63
  • [36] Specific Emitter Identification Based on Multi-Level Sparse Representation in Automatic Identification System
    Qian, Yunhan
    Qi, Jie
    Kuai, Xiaoyan
    Han, Guangjie
    Sun, Haixin
    Hong, Shaohua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 2872 - 2884
  • [37] Easy alignment strategy for multi-level micropatterning
    Esteve, Aurore
    Dollat, Xavier
    Lin, Laura
    Lin, David
    Cerf, Aline
    MICROELECTRONIC ENGINEERING, 2018, 193 : 7 - 12
  • [38] A multi-level and parallel strategy for structural analysis
    Dureisseix, D
    Ladeveze, P
    COMPUTATIONAL PLASTICITY: FUNDAMENTALS AND APPLICATIONS, PTS 1 AND 2, 1997, : 1790 - 1797
  • [39] A strategy of multi-level classification based on SVM
    Lu, Bin
    Yang, Jianwu
    Chen, Xiaoou
    Jisuanji Gongcheng/Computer Engineering, 2005, 31 (01): : 73 - 75
  • [40] A multi-level strategy for software power estimation
    Brandolese, C
    Fornaciari, W
    Pomante, L
    Salice, F
    Sciuto, D
    13TH INTERNATIONAL SYMPOSIUM ON SYSTEM SYNTHESIS, PROCEEDINGS, 2000, : 187 - 192