Detection of data tampering attack in FIR system identification with binary-valued observations
This paper addresses the security detection of data tampering attack in identification of finite impulse response systems with quantized observations. First, we designed a detection algorithm for data tampering attack based on the prior information of the system and gave its online detection form. S...
Gespeichert in:
Veröffentlicht in: | Transactions of the Institute of Measurement and Control 2025-01, Vol.47 (2), p.390-401 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 401 |
---|---|
container_issue | 2 |
container_start_page | 390 |
container_title | Transactions of the Institute of Measurement and Control |
container_volume | 47 |
creator | Jia, Ruizhe Su, Ruinan Yu, Peng Song, Yong Guo, Jin |
description | This paper addresses the security detection of data tampering attack in identification of finite impulse response systems with quantized observations. First, we designed a detection algorithm for data tampering attack based on the prior information of the system and gave its online detection form. Second, the introduction of the concepts of the false judgment rate and the missed judgment rate gave a specific evaluation index for the performance of the detection algorithm. Considering the high nonlinearity of binary quantized and the difficulty of obtaining distribution function, we provided calculation methods for two indexes and gave expressions under large samples. Then, the effects of the data length, the prior information of the system parameter, and the attack strategy on the detection algorithm are discussed in this paper. Finally, the theoretical results are verified by numerical simulation. |
doi_str_mv | 10.1177/01423312241246838 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3149077407</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sage_id>10.1177_01423312241246838</sage_id><sourcerecordid>3149077407</sourcerecordid><originalsourceid>FETCH-LOGICAL-c264t-f996c0bd803ce6511c85c2c45c04dae9be6336e99f9af48320393f53f5ee11203</originalsourceid><addsrcrecordid>eNp1kE9LAzEQxYMoWKsfwFvA89b822RzlGq1UBBEzyGbndTUdrcmaaXf3m0reBBhYBje-80MD6FrSkaUKnVLqGCcU8YEZUJWvDpBAyqUKgiX-hQN9nqxN5yji5QWhBAhpBggcw8ZXA5dizuPG5stzna1hhjaObY5W_eBQ4sn0xecdinDCocG2hx8cPZAfYX8juvQ2rgrtna5gQZ3dYK4PcjpEp15u0xw9dOH6G3y8Dp-KmbPj9Px3axwTIpceK2lI3VTEe5AlpS6qnTMidIR0VjQNUjOJWjttfWi4oxwzX3ZFwCl_TREN8e969h9biBls-g2se1PGk6FJkoJonoXPbpc7FKK4M06hlX_uqHE7HM0f3LsmdGRSXYOv1v_B74Bux5ypg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3149077407</pqid></control><display><type>article</type><title>Detection of data tampering attack in FIR system identification with binary-valued observations</title><source>SAGE Complete A-Z List</source><creator>Jia, Ruizhe ; Su, Ruinan ; Yu, Peng ; Song, Yong ; Guo, Jin</creator><creatorcontrib>Jia, Ruizhe ; Su, Ruinan ; Yu, Peng ; Song, Yong ; Guo, Jin</creatorcontrib><description>This paper addresses the security detection of data tampering attack in identification of finite impulse response systems with quantized observations. First, we designed a detection algorithm for data tampering attack based on the prior information of the system and gave its online detection form. Second, the introduction of the concepts of the false judgment rate and the missed judgment rate gave a specific evaluation index for the performance of the detection algorithm. Considering the high nonlinearity of binary quantized and the difficulty of obtaining distribution function, we provided calculation methods for two indexes and gave expressions under large samples. Then, the effects of the data length, the prior information of the system parameter, and the attack strategy on the detection algorithm are discussed in this paper. Finally, the theoretical results are verified by numerical simulation.</description><identifier>ISSN: 0142-3312</identifier><identifier>EISSN: 1477-0369</identifier><identifier>DOI: 10.1177/01423312241246838</identifier><language>eng</language><publisher>London, England: SAGE Publications</publisher><subject>Algorithms ; Distribution functions ; Impulse response ; Parameter identification ; System identification</subject><ispartof>Transactions of the Institute of Measurement and Control, 2025-01, Vol.47 (2), p.390-401</ispartof><rights>The Author(s) 2024</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c264t-f996c0bd803ce6511c85c2c45c04dae9be6336e99f9af48320393f53f5ee11203</cites><orcidid>0000-0003-1646-1242</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://journals.sagepub.com/doi/pdf/10.1177/01423312241246838$$EPDF$$P50$$Gsage$$H</linktopdf><linktohtml>$$Uhttps://journals.sagepub.com/doi/10.1177/01423312241246838$$EHTML$$P50$$Gsage$$H</linktohtml><link.rule.ids>314,776,780,21798,27901,27902,43597,43598</link.rule.ids></links><search><creatorcontrib>Jia, Ruizhe</creatorcontrib><creatorcontrib>Su, Ruinan</creatorcontrib><creatorcontrib>Yu, Peng</creatorcontrib><creatorcontrib>Song, Yong</creatorcontrib><creatorcontrib>Guo, Jin</creatorcontrib><title>Detection of data tampering attack in FIR system identification with binary-valued observations</title><title>Transactions of the Institute of Measurement and Control</title><description>This paper addresses the security detection of data tampering attack in identification of finite impulse response systems with quantized observations. First, we designed a detection algorithm for data tampering attack based on the prior information of the system and gave its online detection form. Second, the introduction of the concepts of the false judgment rate and the missed judgment rate gave a specific evaluation index for the performance of the detection algorithm. Considering the high nonlinearity of binary quantized and the difficulty of obtaining distribution function, we provided calculation methods for two indexes and gave expressions under large samples. Then, the effects of the data length, the prior information of the system parameter, and the attack strategy on the detection algorithm are discussed in this paper. Finally, the theoretical results are verified by numerical simulation.</description><subject>Algorithms</subject><subject>Distribution functions</subject><subject>Impulse response</subject><subject>Parameter identification</subject><subject>System identification</subject><issn>0142-3312</issn><issn>1477-0369</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2025</creationdate><recordtype>article</recordtype><recordid>eNp1kE9LAzEQxYMoWKsfwFvA89b822RzlGq1UBBEzyGbndTUdrcmaaXf3m0reBBhYBje-80MD6FrSkaUKnVLqGCcU8YEZUJWvDpBAyqUKgiX-hQN9nqxN5yji5QWhBAhpBggcw8ZXA5dizuPG5stzna1hhjaObY5W_eBQ4sn0xecdinDCocG2hx8cPZAfYX8juvQ2rgrtna5gQZ3dYK4PcjpEp15u0xw9dOH6G3y8Dp-KmbPj9Px3axwTIpceK2lI3VTEe5AlpS6qnTMidIR0VjQNUjOJWjttfWi4oxwzX3ZFwCl_TREN8e969h9biBls-g2se1PGk6FJkoJonoXPbpc7FKK4M06hlX_uqHE7HM0f3LsmdGRSXYOv1v_B74Bux5ypg</recordid><startdate>20250101</startdate><enddate>20250101</enddate><creator>Jia, Ruizhe</creator><creator>Su, Ruinan</creator><creator>Yu, Peng</creator><creator>Song, Yong</creator><creator>Guo, Jin</creator><general>SAGE Publications</general><general>Sage Publications Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>7U5</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope><orcidid>https://orcid.org/0000-0003-1646-1242</orcidid></search><sort><creationdate>20250101</creationdate><title>Detection of data tampering attack in FIR system identification with binary-valued observations</title><author>Jia, Ruizhe ; Su, Ruinan ; Yu, Peng ; Song, Yong ; Guo, Jin</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c264t-f996c0bd803ce6511c85c2c45c04dae9be6336e99f9af48320393f53f5ee11203</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2025</creationdate><topic>Algorithms</topic><topic>Distribution functions</topic><topic>Impulse response</topic><topic>Parameter identification</topic><topic>System identification</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jia, Ruizhe</creatorcontrib><creatorcontrib>Su, Ruinan</creatorcontrib><creatorcontrib>Yu, Peng</creatorcontrib><creatorcontrib>Song, Yong</creatorcontrib><creatorcontrib>Guo, Jin</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Transactions of the Institute of Measurement and Control</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jia, Ruizhe</au><au>Su, Ruinan</au><au>Yu, Peng</au><au>Song, Yong</au><au>Guo, Jin</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Detection of data tampering attack in FIR system identification with binary-valued observations</atitle><jtitle>Transactions of the Institute of Measurement and Control</jtitle><date>2025-01-01</date><risdate>2025</risdate><volume>47</volume><issue>2</issue><spage>390</spage><epage>401</epage><pages>390-401</pages><issn>0142-3312</issn><eissn>1477-0369</eissn><abstract>This paper addresses the security detection of data tampering attack in identification of finite impulse response systems with quantized observations. First, we designed a detection algorithm for data tampering attack based on the prior information of the system and gave its online detection form. Second, the introduction of the concepts of the false judgment rate and the missed judgment rate gave a specific evaluation index for the performance of the detection algorithm. Considering the high nonlinearity of binary quantized and the difficulty of obtaining distribution function, we provided calculation methods for two indexes and gave expressions under large samples. Then, the effects of the data length, the prior information of the system parameter, and the attack strategy on the detection algorithm are discussed in this paper. Finally, the theoretical results are verified by numerical simulation.</abstract><cop>London, England</cop><pub>SAGE Publications</pub><doi>10.1177/01423312241246838</doi><tpages>12</tpages><orcidid>https://orcid.org/0000-0003-1646-1242</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0142-3312 |
ispartof | Transactions of the Institute of Measurement and Control, 2025-01, Vol.47 (2), p.390-401 |
issn | 0142-3312 1477-0369 |
language | eng |
recordid | cdi_proquest_journals_3149077407 |
source | SAGE Complete A-Z List |
subjects | Algorithms Distribution functions Impulse response Parameter identification System identification |
title | Detection of data tampering attack in FIR system identification with binary-valued observations |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-09T20%3A11%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Detection%20of%20data%20tampering%20attack%20in%20FIR%20system%20identification%20with%20binary-valued%20observations&rft.jtitle=Transactions%20of%20the%20Institute%20of%20Measurement%20and%20Control&rft.au=Jia,%20Ruizhe&rft.date=2025-01-01&rft.volume=47&rft.issue=2&rft.spage=390&rft.epage=401&rft.pages=390-401&rft.issn=0142-3312&rft.eissn=1477-0369&rft_id=info:doi/10.1177/01423312241246838&rft_dat=%3Cproquest_cross%3E3149077407%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3149077407&rft_id=info:pmid/&rft_sage_id=10.1177_01423312241246838&rfr_iscdi=true |