基于数据的 Tampered-Data Recovery Strategy With Encoding Against Stealthy Attack for Unknown Discrete-Time Systems.

IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Cybernetics Pub Date : 2024-11-05 DOI:10.1109/TCYB.2024.3485249
Ning Wang;Guang-Hong Yang
{"title":"基于数据的 Tampered-Data Recovery Strategy With Encoding Against Stealthy Attack for Unknown Discrete-Time Systems.","authors":"Ning Wang;Guang-Hong Yang","doi":"10.1109/TCYB.2024.3485249","DOIUrl":null,"url":null,"abstract":"This study addresses a tampered-data recovery problem for linear discrete-time systems with completely unknown system dynamics under stealthy attacks. The basic idea is to identify the stealthy attack, that lies in any of attack-stealthy subspaces, and compensate for it. Different from the existing sparse recovery methods which are applicable to nonstealthy sparse attacks, a novel encoding scheme, where a set of subdecoding matrices is designed specifically for each 1-D attack-stealthy subspace, is developed so that the parameters of the stealthy attack can be identified via a subspace projection technique. A necessary and sufficient condition of determining the targeted subspace by using n parallel attack identification filters is established for this encoding scheme. Especially, a composite encoding matrix characterizes the lower and upper boundaries of the recovery error covariance’s trace. A simulation example of a flight vehicle illustrates the efficiency of the proposed approach.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"54 12","pages":"7261-7271"},"PeriodicalIF":9.4000,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Data-Based Tampered-Data Recovery Strategy With Encoding Against Stealthy Attack for Unknown Discrete-Time Systems\",\"authors\":\"Ning Wang;Guang-Hong Yang\",\"doi\":\"10.1109/TCYB.2024.3485249\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study addresses a tampered-data recovery problem for linear discrete-time systems with completely unknown system dynamics under stealthy attacks. The basic idea is to identify the stealthy attack, that lies in any of attack-stealthy subspaces, and compensate for it. Different from the existing sparse recovery methods which are applicable to nonstealthy sparse attacks, a novel encoding scheme, where a set of subdecoding matrices is designed specifically for each 1-D attack-stealthy subspace, is developed so that the parameters of the stealthy attack can be identified via a subspace projection technique. A necessary and sufficient condition of determining the targeted subspace by using n parallel attack identification filters is established for this encoding scheme. Especially, a composite encoding matrix characterizes the lower and upper boundaries of the recovery error covariance’s trace. A simulation example of a flight vehicle illustrates the efficiency of the proposed approach.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"54 12\",\"pages\":\"7261-7271\"},\"PeriodicalIF\":9.4000,\"publicationDate\":\"2024-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10744037/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10744037/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

本研究解决的是在隐蔽攻击下具有完全未知系统动态的线性离散时间系统的篡改数据恢复问题。其基本思想是识别位于任何攻击-隐蔽子空间中的隐蔽攻击,并对其进行补偿。与适用于非隐身稀疏攻击的现有稀疏恢复方法不同,我们开发了一种新颖的编码方案,即为每个一维攻击-隐身子空间专门设计一组子解码矩阵,从而可以通过子空间投影技术识别隐身攻击的参数。针对该编码方案,建立了使用 n 个并行攻击识别滤波器确定目标子空间的必要条件和充分条件。特别是,复合编码矩阵表征了恢复误差协方差迹线的下界和上界。飞行器的一个仿真实例说明了所提方法的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Data-Based Tampered-Data Recovery Strategy With Encoding Against Stealthy Attack for Unknown Discrete-Time Systems
This study addresses a tampered-data recovery problem for linear discrete-time systems with completely unknown system dynamics under stealthy attacks. The basic idea is to identify the stealthy attack, that lies in any of attack-stealthy subspaces, and compensate for it. Different from the existing sparse recovery methods which are applicable to nonstealthy sparse attacks, a novel encoding scheme, where a set of subdecoding matrices is designed specifically for each 1-D attack-stealthy subspace, is developed so that the parameters of the stealthy attack can be identified via a subspace projection technique. A necessary and sufficient condition of determining the targeted subspace by using n parallel attack identification filters is established for this encoding scheme. Especially, a composite encoding matrix characterizes the lower and upper boundaries of the recovery error covariance’s trace. A simulation example of a flight vehicle illustrates the efficiency of the proposed approach.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Cybernetics
IEEE Transactions on Cybernetics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, CYBERNETICS
CiteScore
25.40
自引率
11.00%
发文量
1869
期刊介绍: The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.
期刊最新文献
Table of Contents IEEE Transactions on Cybernetics IEEE Transactions on Cybernetics IEEE SYSTEMS, MAN, AND CYBERNETICS SOCIETY Enhancing Resilience of Islanded Microgrids Under Disturbances, Delays, and DoS Attacks Through a Novel Digital Predictor Method
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1