Game learning-based system identification with binary-valued observations under DoS attacks

被引:0
|
作者
Hu, Chongyuan [1 ]
Jia, Ruizhe [1 ]
Zhang, Yanling [2 ,3 ,5 ]
Guo, Jin [1 ,4 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Univ Sci & Technol Beijing, Sch Intelligence Sci & Technol, Beijing, Peoples R China
[3] Minist Educ, Key Lab Intelligent Bion Unmanned Syst, Beijing, Peoples R China
[4] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
[5] Univ Sci & Technol Beijing, Sch Intelligence Sci & Technol, Beijing 100083, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
binary-valued observations; DoS attacks; game learning; system identification; SECURITY;
D O I
10.1002/acs.3718
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid progress in computer, communication, and sensor technology has led to the proliferation of cyber-physical systems (CPSs) which have become integral to various sectors. However, their heavy dependence on open communication networks makes them vulnerable to network-based attacks. To tackle these security concerns, this paper delves into game learning-based system identification with binary-valued observations in the presence of Denial-of-Service (DoS) attacks. We first formulate a game model to capture interactions between the attacker and defender. Focusing on piecewise constant DoS attacks, we then devise a defense strategy grounded in game learning principles. This strategy paves the way for crafting estimation algorithms for both the attack strategy and system parameters, with their performance scrutinized in specific stages. Through meticulous analysis and comprehensive numerical simulations, we have observed that the game learning approach outperforms the randomly selected defense strategy in terms of parameter estimation. This provides a novel and reliable approach to address security challenges within CPSs.
引用
收藏
页码:621 / 639
页数:19
相关论文
共 50 条
  • [1] System Identification With Binary-Valued Observations Under Data Tampering Attacks
    Guo, Jin
    Wang, Xuebin
    Xue, Wenchao
    Zhao, Yanlong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3825 - 3832
  • [2] Identification of FIR Systems with binary-valued observations under replay attacks
    Guo, Jin
    Zhang, Qingxiang
    Zhao, Yanlong
    AUTOMATICA, 2025, 172
  • [3] DoS attack detection in identification of FIR systems with binary-valued observations
    Guo, Jin
    Jia, Ruizhe
    Su, Ruinan
    Song, Yong
    Jing, Fengwei
    ASIAN JOURNAL OF CONTROL, 2023, 25 (04) : 2469 - 2481
  • [4] Information Security Protocol Based System Identification with Binary-Valued Observations
    Xu, Changbao
    Zhao, Yanlong
    Zhang, Ji-Feng
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 31 (04) : 946 - 963
  • [5] Information Security Protocol Based System Identification with Binary-Valued Observations
    XU Changbao
    ZHAO Yanlong
    ZHANG Ji-Feng
    JournalofSystemsScience&Complexity, 2018, 31 (04) : 946 - 963
  • [6] Information Security Protocol Based System Identification with Binary-Valued Observations
    Changbao Xu
    Yanlong Zhao
    Ji-Feng Zhang
    Journal of Systems Science and Complexity, 2018, 31 : 946 - 963
  • [7] Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks
    Guo, Jin
    Jia, Ruizhe
    Su, Ruinan
    Zhao, Yanlong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (09): : 5861 - 5873
  • [8] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
    Jin Guo
    Xuebin Wang
    Yanling Zhang
    Wenchao Xue
    Yanlong Zhao
    Control Theory and Technology, 2022, 20 : 127 - 138
  • [9] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
    Guo, Jin
    Wang, Xuebin
    Zhang, Yanling
    Xue, Wenchao
    Zhao, Yanlong
    CONTROL THEORY AND TECHNOLOGY, 2022, 20 (01) : 127 - 138
  • [10] Identification of ARMA models with binary-valued observations
    Wang, Ting
    Li, Xin
    Guo, Jin
    Zhao, Yanlong
    AUTOMATICA, 2023, 149