典型文献
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy
文献摘要:
With the development of wireless communication technology, cyber physical systems are applied in various fields such as industrial production and infrastructure, where lots of information exchange brings cyber security threats to the systems. From the perspective of system identification with binary-valued observations, we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks. The packet loss rate and the data tampering rate caused by the attack is given, and the estimation error is derived. Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints. The explicit expression of the optimal attack strategy is obtained. Simulation examples are presented to verify the effectiveness of the main conclusions.
文献关键词:
中图分类号:
作者姓名:
Jin Guo;Xuebin Wang;Yanling Zhang;Wenchao Xue;Yanlong Zhao
作者机构:
School of Automation and Electrical Engineering,University of Science and Technology Beijing,Beijing 100083,China;Key Laboratory of Knowledge Automation for Industrial Processes,Ministry of Education,Beijing 100083,China;Key Laboratory of Systems and Control,Institute of Systems Science,Academy of Mathematics and Systems Science,Chinese Academy of Sciences,Beijing 100190,China
文献出处:
引用格式:
[1]Jin Guo;Xuebin Wang;Yanling Zhang;Wenchao Xue;Yanlong Zhao-.System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy)[J].控制理论与技术(英文版),2022(01):127-138
A类:
tampering
B类:
System,identification,binary,valued,observations,under,both,denial,service,attacks,data,optimality,strategy,With,development,wireless,communication,technology,cyber,physical,systems,are,applied,various,fields,such,industrial,production,infrastructure,where,lots,information,exchange,brings,security,threats,From,perspective,we,study,problem,when,is,subject,packet,loss,caused,by,given,estimation,error,derived,Then,maximize,least,energy,described,optimization,constraints,explicit,expression,obtained,Simulation,examples,presented,verify,effectiveness,main,conclusions
AB值:
0.524592
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。