quotation:[Copy]
Jin Guo1,2,Xuebin Wang1,et al.[en_title][J].Control Theory and Technology,2022,20(1):127~138.[Copy]
【Print page】 【Online reading】【Download 【PDF Full text】 View/Add CommentDownload reader Close

←Previous page|Page Next →

Back Issue    Advanced search

This Paper:Browse 582   Download 0 本文二维码信息
码上扫一扫!
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
JinGuo1,2,XuebinWang1,2,YanlingZhang1,2,WenchaoXue3,YanlongZhao3
0
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences)
摘要:
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
关键词:  System identification · Binary-valued observations · Denial-of-service attacks · Data tampering attacks
DOI:https://doi.org/10.1007/s11768-021-00075-7
基金项目:This work was supported by the National Key Research and Development Program of China (2018YFA0703801) and the National Natural Science Foundation of China (62173030, 62033010).
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
Jin Guo1,2,Xuebin Wang1,2,Yanling Zhang1,2,Wenchao Xue3,Yanlong Zhao3
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences)
Abstract:
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
Key words:  System identification · Binary-valued observations · Denial-of-service attacks · Data tampering attacks