Data-Based Attack Identification Strategy With Complex Field Encoding for Unknown Discrete-Time Systems

IF 9.9 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS
Ning Wang;Guang-Hong Yang
{"title":"Data-Based Attack Identification Strategy With Complex Field Encoding for Unknown Discrete-Time Systems","authors":"Ning Wang;Guang-Hong Yang","doi":"10.1109/TII.2025.3574433","DOIUrl":null,"url":null,"abstract":"This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition that characterizes stealthy and nonstealthy attacks in a sparse subspace-based form, the considered problem is transformed into the decoupled identification of two subsignals: 1) the subsignal in attack-identifiable space; and 2) the subsignal in attack-unidentifiable space. A novel complex field encoding scheme, through which the two subsignals are projected into different attack-identifiable subspaces, is then proposed so that the two subsignals get identified independently by subspace projection technique. Compared with the previous results that are limited to the identification of either sparse sensor attacks or stealthy ones, the restriction on sparsity is removed and the identification of stealthy attacks is unaffected by nonstealthy ones. Finally, the effectiveness of the proposed approach is illustrated by two simulation examples.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 9","pages":"7108-7119"},"PeriodicalIF":9.9000,"publicationDate":"2025-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11029688/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition that characterizes stealthy and nonstealthy attacks in a sparse subspace-based form, the considered problem is transformed into the decoupled identification of two subsignals: 1) the subsignal in attack-identifiable space; and 2) the subsignal in attack-unidentifiable space. A novel complex field encoding scheme, through which the two subsignals are projected into different attack-identifiable subspaces, is then proposed so that the two subsignals get identified independently by subspace projection technique. Compared with the previous results that are limited to the identification of either sparse sensor attacks or stealthy ones, the restriction on sparsity is removed and the identification of stealthy attacks is unaffected by nonstealthy ones. Finally, the effectiveness of the proposed approach is illustrated by two simulation examples.
未知离散系统的复杂域编码数据攻击识别策略
研究了未知线性离散系统的隐身和非隐身完整性攻击识别问题。通过建立基于稀疏子空间的隐身攻击和非隐身攻击的充分必要条件,将所考虑的问题转化为两个子信号的解耦识别:1)攻击可识别空间中的子信号;2)攻击不可识别空间中的子信号。提出了一种新的复域编码方案,将两个子信号投影到不同的攻击可识别子空间中,利用子空间投影技术实现两个子信号的独立识别。与以往仅局限于识别稀疏传感器攻击或隐身攻击的结果相比,消除了对稀疏度的限制,隐身攻击的识别不受非隐身攻击的影响。最后,通过两个仿真实例验证了所提方法的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Industrial Informatics
IEEE Transactions on Industrial Informatics 工程技术-工程:工业
CiteScore
24.10
自引率
8.90%
发文量
1202
审稿时长
5.1 months
期刊介绍: The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信