quotation:[Copy]
Jin Guo1,2,Xuebin Wang1,et al.[en_title][J].Control Theory and Technology,2022,20(1):114~126.[Copy]
【Print page】 【Online reading】【Download 【PDF Full text】 View/Add CommentDownload reader Close

←Previous page|Page Next →

Back Issue    Advanced search

This Paper:Browse 574   Download 0 本文二维码信息
码上扫一扫!
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
JinGuo1,2,XuebinWang1,2,YanlingZhang1,2,WenchaoXue3,YanlongZhao3
0
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences)
摘要:
In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results.
关键词:  System identification · Denial of service attack · Data tampering attack · Defense scheme
DOI:https://doi.org/10.1007/s11768-021-00074-8
基金项目:This research was supported by the National Key Research and Development Program of China (2018YFA0703801), the National Natural Science Foundation of China (62173030, 62033010).
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
Jin Guo1,2,Xuebin Wang1,2,Yanling Zhang1,2,Wenchao Xue3,Yanlong Zhao3
(1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences)
Abstract:
In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results.
Key words:  System identification · Denial of service attack · Data tampering attack · Defense scheme