{"title":"具有二值观测值的 FIR 系统的篡改攻击检测和参数识别:输入设计方法","authors":"Ruizhe Jia, Peng Yu, Yan Liu, Jin Guo","doi":"10.1016/j.nahs.2024.101529","DOIUrl":null,"url":null,"abstract":"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>","PeriodicalId":49011,"journal":{"name":"Nonlinear Analysis-Hybrid Systems","volume":"54 ","pages":"Article 101529"},"PeriodicalIF":3.7000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach\",\"authors\":\"Ruizhe Jia, Peng Yu, Yan Liu, Jin Guo\",\"doi\":\"10.1016/j.nahs.2024.101529\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.</p></div>\",\"PeriodicalId\":49011,\"journal\":{\"name\":\"Nonlinear Analysis-Hybrid Systems\",\"volume\":\"54 \",\"pages\":\"Article 101529\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2024-07-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nonlinear Analysis-Hybrid Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1751570X24000669\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nonlinear Analysis-Hybrid Systems","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1751570X24000669","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Detection of tampering attacks and parameter identification for FIR systems with binary-valued observations: An input design approach
This paper investigates the issues of data tampering attacks detection and system parameter identification in finite impulse response (FIR) systems with binary-valued observations. Without the need to acquire system-related prior information or perform operations such as adding watermarks or encryption to the data, a detection and identification joint algorithm is proposed using input design. This algorithm can detect potential data tampering attacks in the system while achieving consistent identification of system parameters. Subsequently, a pair of metrics for evaluating the detection performance of the algorithm, namely the missing detection rate and false detection rate, are introduced, and approximate expressions for both are provided, followed by a discussion on the impact of data length and detection threshold on these metrics. Finally, numerical simulations are conducted to validate the conclusions obtained and the results of the discussions.
期刊介绍:
Nonlinear Analysis: Hybrid Systems welcomes all important research and expository papers in any discipline. Papers that are principally concerned with the theory of hybrid systems should contain significant results indicating relevant applications. Papers that emphasize applications should consist of important real world models and illuminating techniques. Papers that interrelate various aspects of hybrid systems will be most welcome.