System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy

被引:5
作者
Guo, Jin [1 ,2 ]
Wang, Xuebin [1 ,2 ]
Zhang, Yanling [1 ,2 ]
Xue, Wenchao [3 ]
Zhao, Yanlong [3 ]
机构
[1] Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
[2] Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
[3] Chinese Acad Sci, Acad Math & Syst Sci, Inst Syst Sci, Key Lab Syst & Control, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
System identification; Binary-valued observations; Denial-of-service attacks; Data tampering attacks; CYBER-PHYSICAL SYSTEMS; FIR SYSTEMS;
D O I
10.1007/s11768-021-00075-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min-max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
引用
收藏
页码:127 / 138
页数:12
相关论文
共 24 条
  • [1] Vulnerabilities and safety assurance methods in Cyber-Physical Systems: A comprehensive review
    Bolbot, Victor
    Theotokatos, Gerasimos
    Bujorianu, Luminita Manuela
    Boulougouris, Evangelos
    Vassalos, Dracos
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2019, 182 : 179 - 193
  • [2] Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks
    Chen, Bo
    Ho, Daniel W. C.
    Hu, Guoqiang
    Yu, Li
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) : 1862 - 1876
  • [3] Variational Bayesian approach for ARX systems with missing observations and varying time-delays
    Chen, Jing
    Huang, Biao
    Ding, Feng
    Gu, Ya
    [J]. AUTOMATICA, 2018, 94 : 194 - 204
  • [4] Event-triggered identification of FIR systems with binary-valued output observations
    Diao, Jing-Dong
    Guo, Jin
    Sun, Chang-Yin
    [J]. AUTOMATICA, 2018, 98 : 95 - 102
  • [5] Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing
    Drayer, Elisabeth
    Routtenberg, Tirza
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (02): : 1886 - 1896
  • [6] Optimal periodic watermarking schedule for replay attack detection in cyber-physical systems
    Fang, Chongrong
    Qi, Yifei
    Cheng, Peng
    Zheng, Wei Xing
    [J]. AUTOMATICA, 2020, 112
  • [7] [高洋 Gao Yang], 2020, [工程科学学报, Chinese Journal of Engineering], V42, P455
  • [8] System Identification With Binary-Valued Observations Under Data Tampering Attacks
    Guo, Jin
    Wang, Xuebin
    Xue, Wenchao
    Zhao, Yanlong
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3825 - 3832
  • [9] Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations
    Guo, Jin
    Diao, Jing-Dong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (01)
  • [10] Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs
    Guo, Jin
    Wang, Le Yi
    Yin, George
    Zhao, Yanlong
    Zhang, Ji-Feng
    [J]. AUTOMATICA, 2015, 57 : 113 - 122