{"title":"Optimal attack strategy in system identification with binary-valued observations: An information entropy-based approach","authors":"Zhongwei Bai, Ruizhe Jia, Peng Yu, Jin Guo","doi":"10.1002/asjc.3519","DOIUrl":null,"url":null,"abstract":"<p>With the advancements in network technology and artificial intelligence, the interaction between network nodes is getting more frequent. The malicious data tampering can be extremely damaging to system stability, therefore the network security is of great importance. In this paper, we address the problem of system identification with binary-valued observations under data tampering attacks and an information entropy-based approach to optimal attack strategy from the viewpoint of attacker. Under the constrained attack energy, a method is proposed to obtain the optimal attack strategy using the information entropy as the optimization index. It is interestingly demonstrated that such optimal attack strategy is equivalent to the one by using the estimation error of the identification algorithm as the optimization index. The rationality of the proposed method is verified through numerical simulations.</p>","PeriodicalId":55453,"journal":{"name":"Asian Journal of Control","volume":"27 3","pages":"1172-1182"},"PeriodicalIF":2.7000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3519","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
With the advancements in network technology and artificial intelligence, the interaction between network nodes is getting more frequent. The malicious data tampering can be extremely damaging to system stability, therefore the network security is of great importance. In this paper, we address the problem of system identification with binary-valued observations under data tampering attacks and an information entropy-based approach to optimal attack strategy from the viewpoint of attacker. Under the constrained attack energy, a method is proposed to obtain the optimal attack strategy using the information entropy as the optimization index. It is interestingly demonstrated that such optimal attack strategy is equivalent to the one by using the estimation error of the identification algorithm as the optimization index. The rationality of the proposed method is verified through numerical simulations.
期刊介绍:
The Asian Journal of Control, an Asian Control Association (ACA) and Chinese Automatic Control Society (CACS) affiliated journal, is the first international journal originating from the Asia Pacific region. The Asian Journal of Control publishes papers on original theoretical and practical research and developments in the areas of control, involving all facets of control theory and its application.
Published six times a year, the Journal aims to be a key platform for control communities throughout the world.
The Journal provides a forum where control researchers and practitioners can exchange knowledge and experiences on the latest advances in the control areas, and plays an educational role for students and experienced researchers in other disciplines interested in this continually growing field. The scope of the journal is extensive.
Topics include:
The theory and design of control systems and components, encompassing:
Robust and distributed control using geometric, optimal, stochastic and nonlinear methods
Game theory and state estimation
Adaptive control, including neural networks, learning, parameter estimation
and system fault detection
Artificial intelligence, fuzzy and expert systems
Hierarchical and man-machine systems
All parts of systems engineering which consider the reliability of components and systems
Emerging application areas, such as:
Robotics
Mechatronics
Computers for computer-aided design, manufacturing, and control of
various industrial processes
Space vehicles and aircraft, ships, and traffic
Biomedical systems
National economies
Power systems
Agriculture
Natural resources.