Optimal Tampering Attack Strategy for FIR System Identification With Multi-Level Quantized Observations

被引:0
作者
Liu, Wenke [1 ]
Jing, Fengwei [2 ]
Wang, Yinghui [1 ]
Guo, Jin [1 ,3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing, Peoples R China
[2] Univ Sci & Technol Beijing, Natl Engn Res Ctr Adv Rolling & Intelligent Mfg, Beijing, Peoples R China
[3] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing, Peoples R China
关键词
data tampering; multi-valued quantization; optimal attack strategy; system identification; BINARY-VALUED OBSERVATIONS; QUANTIFICATION; OPPORTUNITIES; SECURITY;
D O I
10.1002/rnc.7729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the optimal tampering attack strategy in system identification of Finite Impulse Response (FIR) systems with multi-level quantized observations under data tampering attacks. First, the data tampering attack model based on a multi-level quantization system is established in a conditional probability manner according to the features of the quantization system. Second, a multi-parameter-based system parameter estimation algorithm is designed and its convergence consistency is proved. Then, according to the convergence of the designed identification algorithm under a tampering attack, the infinite paradigm of the difference between the converged value and the actual parameter after the attack is used as the attack index, and the optimal tampering attack strategy is designed to destroy the consistency of the recognition algorithm so as to make the best attack effect achieved. Finally, numerical simulation experiments under different conditions are used to verify the result.
引用
收藏
页码:1437 / 1448
页数:12
相关论文
共 33 条
  • [1] A review of uncertainty quantification in deep learning: Techniques, applications and challenges
    Abdar, Moloud
    Pourpanah, Farhad
    Hussain, Sadiq
    Rezazadegan, Dana
    Liu, Li
    Ghavamzadeh, Mohammad
    Fieguth, Paul
    Cao, Xiaochun
    Khosravi, Abbas
    Acharya, U. Rajendra
    Makarenkov, Vladimir
    Nahavandi, Saeid
    [J]. INFORMATION FUSION, 2021, 76 : 243 - 297
  • [2] Challenges and Opportunities in Cyberphysical Systems Security: A Physics-Based Perspective
    Ahmed, Chuadhry Mujeeb
    Zhou, Jianying
    [J]. IEEE SECURITY & PRIVACY, 2020, 18 (06) : 14 - 22
  • [3] Alfalah Adel Abdulmohsen., 2023, International Journal of Information Management Data Insights, V3, P100143, DOI [DOI 10.1016/J.JJIMEI.2022.100143, 10.1016/j.jjimei.2022.100143]
  • [4] A References Architecture for Human Cyber Physical Systems, Part II: Fundamental Design Principles for Human-CPS Interaction
    Bengler, Klaus
    Damm, Werner
    Luedtke, Andreas
    Jochem, Reiger
    Austel, Benedikt
    Biebl, Bianca
    Fraenzle, Martin
    Hagemann, Willem
    Held, Moritz
    Hess, David
    Ihme, Klas
    Kacianka, Severin
    Kerscher, Alyssa J.
    Forrest, Laine
    Lehnhoff, Sebastian
    Pretschner, Alexander
    Rakow, Astrid
    Sonntag, Daniel
    Sztipanovits, Janos
    Schwammberger, Maike
    Schweda, Mark
    Unni, Anirudh
    Veith, Eric
    [J]. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2024, 8 (01)
  • [5] A connective framework to minimize the anxiety of collaborative Cyber-Physical System
    Bin Islam, Syed Osama
    Lughmani, Waqas Akbar
    Qureshi, Waqar S.
    Khalid, Azfar
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2024, 37 (04) : 454 - 472
  • [6] A unified modeling of muti-sources cyber-attacks with uncertainties for CPS security control
    Ge, Hui
    Yue, Dong
    Xie, Xiangpeng
    Deng, Song
    Dou, Chunxia
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (01): : 89 - 113
  • [7] Identification of FIR Systems With Binary-Valued Observations Against Data Tampering Attacks
    Guo, Jin
    Jia, Ruizhe
    Su, Ruinan
    Zhao, Yanlong
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (09): : 5861 - 5873
  • [8] System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
    Guo, Jin
    Wang, Xuebin
    Zhang, Yanling
    Xue, Wenchao
    Zhao, Yanlong
    [J]. CONTROL THEORY AND TECHNOLOGY, 2022, 20 (01) : 127 - 138
  • [9] System Identification With Binary-Valued Observations Under Data Tampering Attacks
    Guo, Jin
    Wang, Xuebin
    Xue, Wenchao
    Zhao, Yanlong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3825 - 3832
  • [10] Identification of Wiener systems with quantized inputs and binary-valued output observations
    Guo, Jin
    Wang, Le Yi
    Yin, George
    Zhao, Yanlong
    Zhang, Ji-Feng
    [J]. AUTOMATICA, 2017, 78 : 280 - 286