二值观测下系统辨识的最优攻击策略:一种基于信息熵的方法

IF 2.7 4区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
Zhongwei Bai, Ruizhe Jia, Peng Yu, Jin Guo
{"title":"二值观测下系统辨识的最优攻击策略:一种基于信息熵的方法","authors":"Zhongwei Bai,&nbsp;Ruizhe Jia,&nbsp;Peng Yu,&nbsp;Jin Guo","doi":"10.1002/asjc.3519","DOIUrl":null,"url":null,"abstract":"<p>With the advancements in network technology and artificial intelligence, the interaction between network nodes is getting more frequent. The malicious data tampering can be extremely damaging to system stability, therefore the network security is of great importance. In this paper, we address the problem of system identification with binary-valued observations under data tampering attacks and an information entropy-based approach to optimal attack strategy from the viewpoint of attacker. Under the constrained attack energy, a method is proposed to obtain the optimal attack strategy using the information entropy as the optimization index. It is interestingly demonstrated that such optimal attack strategy is equivalent to the one by using the estimation error of the identification algorithm as the optimization index. The rationality of the proposed method is verified through numerical simulations.</p>","PeriodicalId":55453,"journal":{"name":"Asian Journal of Control","volume":"27 3","pages":"1172-1182"},"PeriodicalIF":2.7000,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Optimal attack strategy in system identification with binary-valued observations: An information entropy-based approach\",\"authors\":\"Zhongwei Bai,&nbsp;Ruizhe Jia,&nbsp;Peng Yu,&nbsp;Jin Guo\",\"doi\":\"10.1002/asjc.3519\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>With the advancements in network technology and artificial intelligence, the interaction between network nodes is getting more frequent. The malicious data tampering can be extremely damaging to system stability, therefore the network security is of great importance. In this paper, we address the problem of system identification with binary-valued observations under data tampering attacks and an information entropy-based approach to optimal attack strategy from the viewpoint of attacker. Under the constrained attack energy, a method is proposed to obtain the optimal attack strategy using the information entropy as the optimization index. It is interestingly demonstrated that such optimal attack strategy is equivalent to the one by using the estimation error of the identification algorithm as the optimization index. The rationality of the proposed method is verified through numerical simulations.</p>\",\"PeriodicalId\":55453,\"journal\":{\"name\":\"Asian Journal of Control\",\"volume\":\"27 3\",\"pages\":\"1172-1182\"},\"PeriodicalIF\":2.7000,\"publicationDate\":\"2024-10-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Asian Journal of Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3519\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Asian Journal of Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/asjc.3519","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

随着网络技术和人工智能的发展,网络节点之间的交互越来越频繁。恶意数据篡改会极大地破坏系统的稳定性,因此网络安全问题显得尤为重要。本文从攻击者的角度出发,研究了数据篡改攻击下的二值观测系统识别问题,并提出了一种基于信息熵的最优攻击策略。在攻击能量受限的情况下,提出了一种以信息熵为优化指标获取最优攻击策略的方法。有趣的是,这种最优攻击策略与使用识别算法的估计误差作为优化指标的最优攻击策略是等价的。通过数值仿真验证了该方法的合理性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Optimal attack strategy in system identification with binary-valued observations: An information entropy-based approach

With the advancements in network technology and artificial intelligence, the interaction between network nodes is getting more frequent. The malicious data tampering can be extremely damaging to system stability, therefore the network security is of great importance. In this paper, we address the problem of system identification with binary-valued observations under data tampering attacks and an information entropy-based approach to optimal attack strategy from the viewpoint of attacker. Under the constrained attack energy, a method is proposed to obtain the optimal attack strategy using the information entropy as the optimization index. It is interestingly demonstrated that such optimal attack strategy is equivalent to the one by using the estimation error of the identification algorithm as the optimization index. The rationality of the proposed method is verified through numerical simulations.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Asian Journal of Control
Asian Journal of Control 工程技术-自动化与控制系统
CiteScore
4.80
自引率
25.00%
发文量
253
审稿时长
7.2 months
期刊介绍: The Asian Journal of Control, an Asian Control Association (ACA) and Chinese Automatic Control Society (CACS) affiliated journal, is the first international journal originating from the Asia Pacific region. The Asian Journal of Control publishes papers on original theoretical and practical research and developments in the areas of control, involving all facets of control theory and its application. Published six times a year, the Journal aims to be a key platform for control communities throughout the world. The Journal provides a forum where control researchers and practitioners can exchange knowledge and experiences on the latest advances in the control areas, and plays an educational role for students and experienced researchers in other disciplines interested in this continually growing field. The scope of the journal is extensive. Topics include: The theory and design of control systems and components, encompassing: Robust and distributed control using geometric, optimal, stochastic and nonlinear methods Game theory and state estimation Adaptive control, including neural networks, learning, parameter estimation and system fault detection Artificial intelligence, fuzzy and expert systems Hierarchical and man-machine systems All parts of systems engineering which consider the reliability of components and systems Emerging application areas, such as: Robotics Mechatronics Computers for computer-aided design, manufacturing, and control of various industrial processes Space vehicles and aircraft, ships, and traffic Biomedical systems National economies Power systems Agriculture Natural resources.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信