具有二值观测值的 FIR 系统的篡改攻击检测和参数识别:输入设计方法

IF 3.7 2区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS Nonlinear Analysis-Hybrid Systems Pub Date : 2024-07-17 DOI:10.1016/j.nahs.2024.101529
{"title":"具有二值观测值的 FIR 系统的篡改攻击检测和参数识别:输入设计方法","authors":"","doi":"10.1016/j.nahs.2024.101529","DOIUrl":null,"url":null,"abstract":"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>","PeriodicalId":49011,"journal":{"name":"Nonlinear Analysis-Hybrid Systems","volume":null,"pages":null},"PeriodicalIF":3.7000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach\",\"authors\":\"\",\"doi\":\"10.1016/j.nahs.2024.101529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>\",\"PeriodicalId\":49011,\"journal\":{\"name\":\"Nonlinear Analysis-Hybrid Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nonlinear Analysis-Hybrid Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1751570X24000669\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nonlinear Analysis-Hybrid Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1751570X24000669","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本文研究了具有二值观测值的有限脉冲响应(FIR)系统中的数据篡改攻击检测和系统参数识别问题。无需获取与系统相关的先验信息,也无需对数据进行添加水印或加密等操作,本文提出了一种使用输入设计的检测和识别联合算法。该算法可以检测系统中潜在的数据篡改攻击,同时实现系统参数的一致识别。随后,介绍了一对用于评估算法检测性能的指标,即漏检率和误检率,并给出了这两个指标的近似表达式,然后讨论了数据长度和检测阈值对这些指标的影响。最后,进行了数值模拟,以验证所获得的结论和讨论结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach

This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Nonlinear Analysis-Hybrid Systems
Nonlinear Analysis-Hybrid Systems AUTOMATION & CONTROL SYSTEMS-MATHEMATICS, APPLIED
CiteScore
8.30
自引率
9.50%
发文量
65
审稿时长
>12 weeks
期刊介绍: Nonlinear Analysis: Hybrid Systems welcomes all important research and expository papers in any discipline. Papers that are principally concerned with the theory of hybrid systems should contain significant results indicating relevant applications. Papers that emphasize applications should consist of important real world models and illuminating techniques. Papers that interrelate various aspects of hybrid systems will be most welcome.
期刊最新文献
Cluster synchronization of complex dynamic networks under pinning control via a limited capacity communication channel Globally convergent path-aware optimization with mobile robots Editorial Board Predefined-time convergence strategies for multi-cluster games in hybrid heterogeneous systems Sampled-data feedback control design in the presence of quantized actuators
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1