Optimal Tampering Attack Strategy for FIR System Identification With Multi-Level Quantized Observations

被引:0
|
作者
Liu, Wenke [1 ]
Jing, Fengwei [2 ]
Wang, Yinghui [1 ]
Guo, Jin [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Univ Sci & Technol Beijing, Natl Engn Res Ctr Adv Rolling & Intelligent Mfg, Beijing, Peoples R China
[3] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
关键词
data tampering; multi-valued quantization; optimal attack strategy; system identification; BINARY-VALUED OBSERVATIONS; QUANTIFICATION; OPPORTUNITIES; SECURITY;
D O I
10.1002/rnc.7729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the optimal tampering attack strategy in system identification of Finite Impulse Response (FIR) systems with multi-level quantized observations under data tampering attacks. First, the data tampering attack model based on a multi-level quantization system is established in a conditional probability manner according to the features of the quantization system. Second, a multi-parameter-based system parameter estimation algorithm is designed and its convergence consistency is proved. Then, according to the convergence of the designed identification algorithm under a tampering attack, the infinite paradigm of the difference between the converged value and the actual parameter after the attack is used as the attack index, and the optimal tampering attack strategy is designed to destroy the consistency of the recognition algorithm so as to make the best attack effect achieved. Finally, numerical simulation experiments under different conditions are used to verify the result.
引用
收藏
页码:1437 / 1448
页数:12
相关论文
共 50 条
  • [41] Construction of optimal multi-level supersaturated designs
    Xu, HQ
    Wu, CFJ
    ANNALS OF STATISTICS, 2005, 33 (06): : 2811 - 2836
  • [42] Optimal multi-level thresholding with membrane computing
    Peng, Hong
    Wang, Jun
    Perez-Jimenez, Mario J.
    DIGITAL SIGNAL PROCESSING, 2015, 37 : 53 - 64
  • [43] Purchasing strategy development: A multi-level review
    Hesping, Frank Henrik
    Schiele, Holger
    JOURNAL OF PURCHASING AND SUPPLY MANAGEMENT, 2015, 21 (02) : 138 - 150
  • [44] Statistical results for system identification based on quantized observations
    Gustafsson, Fredrik
    Karlsson, Rickard
    AUTOMATICA, 2009, 45 (12) : 2794 - 2801
  • [45] A Parallel Control Strategy for the Cascaded Multi-Level Inverters in the Distributed Generation System
    Qiao, Daoji
    Wang, Tianzhen
    Tang, Tianhao
    Benbouzid, M. E. H.
    PROCEEDINGS OF THE 36TH CHINESE CONTROL CONFERENCE (CCC 2017), 2017, : 8701 - 8706
  • [46] Research on Multi-level Electromagnetic Leakage Protection Strategy of Industrial Control System
    Li, Yang
    Li, Feng
    Wang, Xu
    Guo, Qingrui
    2017 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING (CTCE2017), 2017, 910
  • [47] Blind system identification using precise and quantized observations
    Yu, Chengpu
    Zhang, Cishen
    Xie, Lihua
    AUTOMATICA, 2013, 49 (09) : 2822 - 2830
  • [48] Multi-level Optimal Control of a Microgrid-supplied Cooling System in a Building
    Gulin, Marko
    Martincevic, Anita
    Lesic, Vinko
    Vasak, Mario
    2016 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2016,
  • [49] Design and application of optimal path service system on multi-level road network
    Chen, Yumin
    Gong, Jianya
    Wu, Chenchen
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 1152 - +
  • [50] Implementation of Multi-level Network Security Management System based Middleware Strategy
    Zou, Yunliang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 77 - 87