{"title":"Data-Based Attack Identification Strategy With Complex Field Encoding for Unknown Discrete-Time Systems","authors":"Ning Wang;Guang-Hong Yang","doi":"10.1109/TII.2025.3574433","DOIUrl":null,"url":null,"abstract":"This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition that characterizes stealthy and nonstealthy attacks in a sparse subspace-based form, the considered problem is transformed into the decoupled identification of two subsignals: 1) the subsignal in attack-identifiable space; and 2) the subsignal in attack-unidentifiable space. A novel complex field encoding scheme, through which the two subsignals are projected into different attack-identifiable subspaces, is then proposed so that the two subsignals get identified independently by subspace projection technique. Compared with the previous results that are limited to the identification of either sparse sensor attacks or stealthy ones, the restriction on sparsity is removed and the identification of stealthy attacks is unaffected by nonstealthy ones. Finally, the effectiveness of the proposed approach is illustrated by two simulation examples.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 9","pages":"7108-7119"},"PeriodicalIF":9.9000,"publicationDate":"2025-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11029688/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article studies the problem of identifying both stealthy and nonstealthy integrity attacks for unknown linear discrete-time systems. By establishing a necessary and sufficient condition that characterizes stealthy and nonstealthy attacks in a sparse subspace-based form, the considered problem is transformed into the decoupled identification of two subsignals: 1) the subsignal in attack-identifiable space; and 2) the subsignal in attack-unidentifiable space. A novel complex field encoding scheme, through which the two subsignals are projected into different attack-identifiable subspaces, is then proposed so that the two subsignals get identified independently by subspace projection technique. Compared with the previous results that are limited to the identification of either sparse sensor attacks or stealthy ones, the restriction on sparsity is removed and the identification of stealthy attacks is unaffected by nonstealthy ones. Finally, the effectiveness of the proposed approach is illustrated by two simulation examples.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.