首页 | 本学科首页   官方微博 | 高级检索  
     

System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
作者姓名:Jin Guo  Xuebin Wang  Yanling Zhang  Wenchao Xue  Yanlong Zhao
作者单位:1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences
基金项目:This research was supported by the National Key Research and Development Program of China (2018YFA0703801), the National Natural Science Foundation of China (62173030, 62033010).
摘    要:In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results.

关 键 词:System  identification  ·  Denial  of  service  attack  ·  Data  tampering  attack  ·  Defense  scheme

System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality
Jin Guo,Xuebin Wang,Yanling Zhang,Wenchao Xue,Yanlong Zhao.System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality[J].Journal of Control Theory and Applications,2022,20(1):114-126.
Authors:Jin Guo  Xuebin Wang  Yanling Zhang  Wenchao Xue  Yanlong Zhao
Affiliation:1 University of Science and Technology Beijing · 2 Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education;3 Chinese Academy of Sciences
Abstract:In this paper, we investigate the defense problem against the joint attacks of denial-of-service attacks and data tampering attacks in the framework of system identification with binary-valued observations. By estimating the key parameters of the joint attack and compensating them in the identification algorithm, a compensation-oriented defense scheme is proposed. Then the identification algorithm of system parameter is designed and is further proved to be consistent. The asymptotic normality of the algorithm is obtained, and on this basis, we propose the optimal defense scheme. Furthermore, the implementation of the optimal defense scheme is discussed. Finally, a simulation example is presented to verify the effectiveness of the main results.
Keywords:
点击此处可从《控制理论与应用(英文版)》浏览原始摘要信息
点击此处可从《控制理论与应用(英文版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号