CSpace
System Identification With Binary-Valued Observations Under Data Tampering Attacks
Guo, Jin1,2; Wang, Xuebin1,2; Xue, Wenchao3,4; Zhao, Yanlong3,4
2021-08-01
Source PublicationIEEE TRANSACTIONS ON AUTOMATIC CONTROL
ISSN0018-9286
Volume66Issue:8Pages:3825-3832
AbstractWith the popularization and application of cyber-physical systems in many industry and infrastructure fields, the security issue has been quite an important concern. This article addresses the defense problem against the data tampering attack under the framework of system identification with binary-valued observations. From the perspective of the attacker, it is shown that how to achieve the maximum hit effect with the least attack energy. From the perspective of the defender, a so-called compensation-oriented defense approach is proposed, and the corresponding identification algorithm is designed. The strong consistency of the algorithm is proved, and the asymptotic normality is obtained, based on which the optimal defense scheme is established. A simulation example is provided to illustrate the effectiveness of the defense algorithm and the main theoretical results.
KeywordEstimation Sensor systems Security Communication networks Automation Production Binary-valued observations compensation-oriented defense scheme data tampering attack system identification
DOI10.1109/TAC.2020.3029325
Indexed BySCI
Language英语
Funding ProjectNational Key Research and Development Program of China[2018YFA0703801] ; National Natural Science Foundation of China[61773054] ; National Natural Science Foundation of China[61973299]
WOS Research AreaAutomation & Control Systems ; Engineering
WOS SubjectAutomation & Control Systems ; Engineering, Electrical & Electronic
WOS IDWOS:000678334500039
PublisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Citation statistics
Document Type期刊论文
Identifierhttp://ir.amss.ac.cn/handle/2S8OKBNM/58978
Collection中国科学院数学与系统科学研究院
Corresponding AuthorZhao, Yanlong
Affiliation1.Univ Sci & Technol Beijing, Sch Automat & Elect Engn, Beijing 100083, Peoples R China
2.Minist Educ, Key Lab Knowledge Automat Ind Proc, Beijing 100083, Peoples R China
3.Chinese Acad Sci, Acad Math & Syst Sci, NCMIS, LSC, Beijing 100190, Peoples R China
4.Univ Chinese Acad Sci, Sch Math Sci, Beijing 100049, Peoples R China
Recommended Citation
GB/T 7714
Guo, Jin,Wang, Xuebin,Xue, Wenchao,et al. System Identification With Binary-Valued Observations Under Data Tampering Attacks[J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL,2021,66(8):3825-3832.
APA Guo, Jin,Wang, Xuebin,Xue, Wenchao,&Zhao, Yanlong.(2021).System Identification With Binary-Valued Observations Under Data Tampering Attacks.IEEE TRANSACTIONS ON AUTOMATIC CONTROL,66(8),3825-3832.
MLA Guo, Jin,et al."System Identification With Binary-Valued Observations Under Data Tampering Attacks".IEEE TRANSACTIONS ON AUTOMATIC CONTROL 66.8(2021):3825-3832.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Guo, Jin]'s Articles
[Wang, Xuebin]'s Articles
[Xue, Wenchao]'s Articles
Baidu academic
Similar articles in Baidu academic
[Guo, Jin]'s Articles
[Wang, Xuebin]'s Articles
[Xue, Wenchao]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Guo, Jin]'s Articles
[Wang, Xuebin]'s Articles
[Xue, Wenchao]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.