System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy

被引:5
|
作者
Guo, Jin [1 ,2 ]
Wang, Xuebin [1 ,2 ]
Zhang, Yanling [1 ,2 ]
Xue, Wenchao [3 ]
Zhao, Yanlong [3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
[3] Chinese Acad Sci, Acad Math & Syst Sci, Inst Syst Sci, Key Lab Syst & Control, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
System identification; Binary-valued observations; Denial-of-service attacks; Data tampering attacks; CYBER-PHYSICAL SYSTEMS; FIR SYSTEMS;
D O I
10.1007/s11768-021-00075-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min-max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
引用
收藏
页码:127 / 138
页数:12
相关论文
共 50 条
  • [1] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
    Jin Guo
    Xuebin Wang
    Yanling Zhang
    Wenchao Xue
    Yanlong Zhao
    Control Theory and Technology, 2022, 20 : 127 - 138
  • [2] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
    Jin Guo
    Xuebin Wang
    Yanling Zhang
    Wenchao Xue
    Yanlong Zhao
    Control Theory and Technology, 2022, 20 : 114 - 126
  • [3] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
    Guo, Jin
    Wang, Xuebin
    Zhang, Yanling
    Xue, Wenchao
    Zhao, Yanlong
    CONTROL THEORY AND TECHNOLOGY, 2022, 20 (01) : 114 - 126
  • [4] System Identification With Binary-Valued Observations Under Data Tampering Attacks
    Guo, Jin
    Wang, Xuebin
    Xue, Wenchao
    Zhao, Yanlong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3825 - 3832
  • [5] Identification of FIR systems with binary-valued observations against denial-of-service attacks
    Guo, Jin
    Jia, Ruizhe
    Su, Ruinan
    Zhao, Yanlong
    Song, Yong
    APPLIED MATHEMATICS AND COMPUTATION, 2023, 450
  • [6] Optimal strategy of data tampering attacks for FIR system identification with average entropy and binary-valued observations
    Bai, Zhongwei
    Liu, Yan
    Wang, Yinghui
    Guo, Jin
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (10) : 3329 - 3345
  • [7] Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks
    Guo, Jin
    Jia, Ruizhe
    Su, Ruinan
    Zhao, Yanlong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (09): : 5861 - 5873
  • [8] Detection of data tampering attack in FIR system identification with binary-valued observations
    Jia, Ruizhe
    Su, Ruinan
    Yu, Peng
    Song, Yong
    Guo, Jin
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2025, 47 (02) : 390 - 401
  • [9] Identification of FIR Systems with binary-valued observations under replay attacks
    Guo, Jin
    Zhang, Qingxiang
    Zhao, Yanlong
    AUTOMATICA, 2025, 172
  • [10] Game learning-based system identification with binary-valued observations under DoS attacks
    Hu, Chongyuan
    Jia, Ruizhe
    Zhang, Yanling
    Guo, Jin
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (02) : 621 - 639