System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy

被引:5
|
作者
Guo, Jin [1 ,2 ]
Wang, Xuebin [1 ,2 ]
Zhang, Yanling [1 ,2 ]
Xue, Wenchao [3 ]
Zhao, Yanlong [3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
[3] Chinese Acad Sci, Acad Math & Syst Sci, Inst Syst Sci, Key Lab Syst & Control, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
System identification; Binary-valued observations; Denial-of-service attacks; Data tampering attacks; CYBER-PHYSICAL SYSTEMS; FIR SYSTEMS;
D O I
10.1007/s11768-021-00075-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min-max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
引用
收藏
页码:127 / 138
页数:12
相关论文
共 50 条
  • [31] Cluster synchronization control for coupled genetic oscillator networks under denial-of-service attacks: Pinning partial impulsive strategy
    Guo, Junfeng
    Wang, Fei
    Xue, Qianwen
    Wang, Mengqing
    CHAOS SOLITONS & FRACTALS, 2023, 177
  • [32] Parameter identification of FIR systems with binary-valued observations: when the event-driven communication mechanism encounters DoS attacks
    Fan, Jiahua
    Jia, Ruizhe
    Zhang, Kun
    Guo, Jin
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025,
  • [33] Resilient event-triggered control for Markov jump system under state constraint and denial-of-service attacks
    Li, Hongchao
    Feng, Qiang
    Gao, Hongjie
    Liu, Jiao
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 4664 - 4669
  • [34] Distributed guaranteed cost control of networked interconnected systems under denial-of-service attacks: a switched system approach
    Miao, Ke-Lei
    Zhu, Jun-Wei
    Zhang, Wen-An
    PROCEEDINGS 2018 33RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2018, : 911 - 915
  • [35] Binary observation-based identification for finite impulse response systems under denial of service attacks
    Wei, Jingliang
    Jia, Ruizhe
    Jing, Fengwei
    Guo, Jin
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2024, 38 (06) : 2106 - 2127
  • [36] Resilient Load Frequency Control of Islanded AC Microgrids Under Concurrent False Data Injection and Denial-of-Service Attacks
    Hu, Songlin
    Ge, Xiaohua
    Chen, Xiaoli
    Yue, Dong
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (01) : 690 - 700
  • [37] Sampled-data bipartite consensus control of nonlinear multi-agent systems under denial-of-service attacks
    Pan, Weihao
    Zhang, Xianfu
    Fan, Debao
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2023, 37 (03) : 694 - 709
  • [38] Finite-Time Control for Connected Vehicles Under Denial-of-Service Attacks: A Dynamic Event-Triggered Control Strategy
    Yang, Fan
    Song, Xiang
    IEEE ACCESS, 2022, 10 : 106005 - 106016
  • [39] Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach
    Yuan, Yuan
    Yuan, Huanhuan
    Ho, Daniel W. C.
    Guo, Lei
    IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (01) : 48 - 60
  • [40] Almost Sure Stability of Complex-Valued Complex Networks: A Noise-Based Delayed Coupling Under Random Denial-of-Service Attacks
    Li, Sen
    Gao, Xueqing
    Ding, Xiaohua
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024, 35 (05) : 6520 - 6530