Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Maximum likelihood-based identification for FIR systems with binary observations and data tampering attacks

  • The security issue of CPS (cyber-physical systems) is of great importance for their stable operation. Within the framework of system identification, this paper proposed a maximum likelihood estimation algorithm for FIR (finite impulse response) systems with binary observations and data tampering attacks. In the case of data transmission in the communication network being subjected to data tampering attacks after the FIR system sends out data, the objective of this study was to design an algorithm for estimating the system parameters and infer the attack strategies using the proposed algorithm. To begin, the maximum likelihood function of the available data was established. Then, parameter estimation algorithms were proposed for both known and unknown attack strategies. Meanwhile, the convergence condition and convergence proof of these algorithms were provided. Finally, the effectiveness of the designed algorithm was verified by numerical simulations.

    Citation: Xinchang Guo, Jiahao Fan, Yan Liu. Maximum likelihood-based identification for FIR systems with binary observations and data tampering attacks[J]. Electronic Research Archive, 2024, 32(6): 4181-4198. doi: 10.3934/era.2024188

    Related Papers:

    [1] Sahar Badri . HO-CER: Hybrid-optimization-based convolutional ensemble random forest for data security in healthcare applications using blockchain technology. Electronic Research Archive, 2023, 31(9): 5466-5484. doi: 10.3934/era.2023278
    [2] Yang Song, Beiyan Yang, Jimin Wang . Stability analysis and security control of nonlinear singular semi-Markov jump systems. Electronic Research Archive, 2025, 33(1): 1-25. doi: 10.3934/era.2025001
    [3] Duhui Chang, Yan Geng . Distributed data-driven iterative learning control for multi-agent systems with unknown input-output coupled parameters. Electronic Research Archive, 2025, 33(2): 867-889. doi: 10.3934/era.2025039
    [4] Xiaoming Wang, Yunlong Bai, Zhiyong Li, Wenguang Zhao, Shixing Ding . Observer-based event triggering security load frequency control for power systems involving air conditioning loads. Electronic Research Archive, 2024, 32(11): 6258-6275. doi: 10.3934/era.2024291
    [5] Hangyu Hu, Fan Wu, Xiaowei Xie, Qiang Wei, Xuemeng Zhai, Guangmin Hu . Critical node identification in network cascading failure based on load percolation. Electronic Research Archive, 2023, 31(3): 1524-1542. doi: 10.3934/era.2023077
    [6] Ramalingam Sakthivel, Palanisamy Selvaraj, Oh-Min Kwon, Seong-Gon Choi, Rathinasamy Sakthivel . Robust memory control design for semi-Markovian jump systems with cyber attacks. Electronic Research Archive, 2023, 31(12): 7496-7510. doi: 10.3934/era.2023378
    [7] Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot . Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks. Electronic Research Archive, 2024, 32(10): 5592-5614. doi: 10.3934/era.2024259
    [8] Yawei Liu, Guangyin Cui, Chen Gao . Event-triggered synchronization control for neural networks against DoS attacks. Electronic Research Archive, 2025, 33(1): 121-141. doi: 10.3934/era.2025007
    [9] Arvind Prasad, Shalini Chandra, Ibrahim Atoum, Naved Ahmad, Yazeed Alqahhas . A collaborative prediction approach to defend against amplified reflection and exploitation attacks. Electronic Research Archive, 2023, 31(10): 6045-6070. doi: 10.3934/era.2023308
    [10] Yongtao Zheng, Jialiang Xiao, Xuedong Hua, Wei Wang, Han Chen . A comparative analysis of the robustness of multimodal comprehensive transportation network considering mode transfer: A case study. Electronic Research Archive, 2023, 31(9): 5362-5395. doi: 10.3934/era.2023272
  • The security issue of CPS (cyber-physical systems) is of great importance for their stable operation. Within the framework of system identification, this paper proposed a maximum likelihood estimation algorithm for FIR (finite impulse response) systems with binary observations and data tampering attacks. In the case of data transmission in the communication network being subjected to data tampering attacks after the FIR system sends out data, the objective of this study was to design an algorithm for estimating the system parameters and infer the attack strategies using the proposed algorithm. To begin, the maximum likelihood function of the available data was established. Then, parameter estimation algorithms were proposed for both known and unknown attack strategies. Meanwhile, the convergence condition and convergence proof of these algorithms were provided. Finally, the effectiveness of the designed algorithm was verified by numerical simulations.


    Cyber-physical system (CPS) is an emerging technology that integrates computation, communication, and physical devices. Introduction of network technology in CPS offers significant advantages in system efficiency, scalability, and maintainability. CPS is widely applied in various fields due to its robustness, high reliability, and fast operation speed [1,2,3]. Due to the close interaction among computation, sensing, communication, and actuation in CPS, it is highly susceptible to network security threats.Additionally, intelligent CPS presents new challenges and threats different from existing issues [4,5]. Notably, CPS closely integrated with national infrastructure can lead to immeasurable severe consequences if subjected to malicious attacks. Therefore, ensuring the secure operation of CPS-related devices is an urgent problem that needs to be addressed [6,7].

    There have been many security incidents of CPS in the world, which have brought huge losses [8,9]. In June 2010, Iran's nuclear facilities were attacked by the Stuxnet virus, which seriously damaged nuclear power plants and other facilities, seriously jeopardizing Iran's nuclear security. In 2014, the Havex Trojan attacked numerous European industrial manufacturing systems. In addition to attacks on industrial systems, attacks on the power grid also occur frequently. In 2015, the Ukrainian power grid suffered a Black-Energy attack. In 2016, the Israeli power grid suffered a serious cyber attack, and in 2019, several South American countries suffered a cyber attack on the power system. An attack on the power grid would lead to widespread power outages, which would render factories inoperable and infrastructure paralyzed, causing serious inconvenience and impact to society.

    In recent years, scholars have conducted extensive research on the security of CPSs. Attack detection is one of the important strategies to ensure the safe operation of CPS, aiming to identify malicious behaviors such as network attacks and take appropriate countermeasures as early as possible to minimize or prevent significant losses [10,11]. As the complexity of attacks in CPS increases, traditional anomaly detection methods have limitations and require the design of detection algorithms with specific characteristics for a particular domain [12,13]. Reference [14] tackles the design problem of intrusion detection systems by creatively combining feature-based intrusion detection system (SIDS) and anomaly-based intrusion detection system (AIDS) to form an improved stacked ensemble algorithm (ISEA). This algorithm significantly reduces the false positive rate (FPR) through a false positive elimination strategy (FPES). Reference [15] argues that in the era of Industry 4.0, a layered and distributed approach is required for intrusion detection. This approach includes perception-execution layer monitoring based on Kalman filters, network transmission layer monitoring based on recursive Gaussian mixture models, and application control layer monitoring based on sparse deep belief network models. It enables comprehensive and efficient identification of covert attacks and ensures security protection. Reference [16] proposes a federated deep learning scheme to address the attack problem in large-scale and complex industrial networked physical systems. This scheme utilizes a deep learning-based intrusion detection model combined with federated learning framework and secure communication protocols to enhance the privacy of industrial CPS while ensuring resilience against network threats.

    Data tampering attacks are a prevalent and typical type of network attack targeting CPSs. They have also gained widespread attention in recent years[13,17,18]. The main method of data tampering attacks is to manipulate the data transmitted in the network, affecting the estimation and control center of CPS, leading to incorrect judgments or decisions, and issuing erroneous instructions, which may result in abnormal or even damaged physical devices[19,20,21]. Such attacks are often difficult to be detected by existing intrusion detection systems, thus they can quietly penetrate CPS systems and affect their stable operation[22,23].

    In recent years, the detection algorithms for data tampering attacks have received attention, and some scholars have conducted in-depth analysis and research on these attacks. Reference [24] proposes a solution to mitigate the computational cost and enhance privacy for smart grid aggregation faced with deletion and tampering attacks, targeted specifically at data tampering attacks. Reference [25] addresses firmware tampering attack defense and forensics issues by designing a detection method based on joint testing action groups and memory comparison to detect firmware tampering attacks. Reference [26] addresses the problem of the χ2 detector being difficult to detect false data injection attacks with white noise. It proposes a novel summation (SUM) detector that not only utilizes current compromise information but also collects all historical information to reveal the threat. It also has good identification for improved false data injection. Reference [27] studies the identification problem of finite impulse response (FIR) systems with binary measurements under data tampering, and the optimal attack strategy and defense method are given. Reference [28] introduces a novel secure key aggregation searchable encryption scheme and anti-tampering blockchain technology to propose a data sharing system that selectively shares and retrieves vehicle sensor data, detecting unauthorized data tampering attacks.

    This paper focuses on the data tampering attack problem in binary quantization FIR systems. Under the framework of system identification, a novel algorithm is designed to solve the system parameters and attack strategies using the maximum likelihood method and binary measurement data. The computation method is also provided. To begin, the maximum likelihood function of the measurement data is established. Then, parameter estimation algorithms are proposed for both known and unknown attack strategies. The closeness between the estimated system parameter values obtained from this estimation algorithm and the true values depends on the sample data size and whether the attack strategy is known or unknown. In the case of an unknown attack strategy, the difficulty in algorithm design increases due to the coupling between unknown parameters and attack strategies. The unknown variables in the maximum likelihood function are simplified to the system of equations. The Newton-Raphson iteration method is used to train the back propagation neural network (BPNN), and the attack strategy is estimated in advance. The estimated value of the attack strategy is then substituted into the algorithm to obtain the unknown parameter estimates. The results obtained from the algorithm show that with a small sample data size, the estimation algorithm produces large fluctuations in the solved system parameters. However, as the sample data size increases, the estimated values of the system parameters tend to become closer to the true values.

    The structure of this paper is as follows. Section 2 describes the data tampering detection problem in binary quantization FIR systems; Section 3 presents the expression of the maximum likelihood function of the system; Section 4 discusses the use of maximum likelihood estimation to solve the system parameters in the case of a known attack strategy; Section 5 discusses the step-by-step solution of system parameters and attack strategies in the case of an unknown attack strategy; Section 6 validates the estimation algorithm through numerical simulations; and Section 7 provides a summary and outlook for this paper.

    Consider a single-input single-output discrete-time FIR system:

    yk=a1uk+a2uk1++anukn1+dk=ϕTkθ+dk,k=1,2,, (1)

    where uk is the quantized system input and its possible value is in {μ1,μ2,,μr}, i.e., uk{μ1,μ2,,μr}; ϕk=[uk,,ukn1]T is the regression vector composed of quantized inputs, since uk can only take r different values, ϕk has l=rn possible values, which can be represented as π1,π2,,πl, that is, ϕk{π1,π2,,πl}; θ=[a1,,an]T is the unknown parameters of the system; dk is the system noise; yk is the system output, measured by a binary sensor with threshold C(,), and it can be represented by an indicator function as:

    s0k=I{ykC}={1,ykC;0,else. (2)

    From here on, the superscript T denotes the transpose of a matrix or vector.

    As shown in Figure 1, s0k is transmitted through a communication network to a data center, but it is susceptible to data tampering attacks during the communication process. The data received by the data center is denoted as sk, and its relationship with s0k is as follows:

    {Pr(sk=1|s0k=0)=p0;Pr(sk=0|s0k=1)=p1. (3)
    Figure 1.  System block diagram.

    The above equation essentially describes a data tampering attack strategy, which is denoted as (p0,p1).

    In this paper, a maximum likelihood estimation method is used to provide an estimation algorithm for the unknown parameters θ, and the convergence performance of the algorithm is also analyzed.

    Assumption 1. The system noise {dk} is an independent and identically distributed (i.i.d.) sequence of normal random variables with zero mean and variance σ2, and its probability distribution function and probability density function are denoted as F() and f(), respectively.

    Remark 1. 1) This paper is concerned with the binary observation. For the case of multi-threshold quantization, it can be converted into multiple binary values for processing [29]. 2) The attack process here is independent, and the existing literature often studies the cases where it is dependent and modeled as Markov processes [30]. The method in this paper can provide reference for the case of nonindependent attack process.

    Maximum likelihood estimate is a commonly used parameter estimation method in statistics that estimates model parameters by maximizing the likelihood function of the sample data. This section presents the maximum likelihood function of the data received at the receiving center, laying the foundation for the subsequent algorithm design.

    From Eqs (1) and (2), we can determine the probability of s0k=1 being equal to

    Pr(ykC)=Pr(ϕTkθ+dkC)=Pr(dkCϕTkθ)=F(CϕTkθ). (4)

    Combining this with Eq (3) and using the law of total probability, we obtain:

    Pr(sk=1)=Pr(sk=1|s0k=0)Pr(s0k=0)+Pr(sk=1|s0k=1)Pr(s0k=1)=p0Pr(yk>C)+(1p1)Pr(ykC)=p0(1F(CϕTkθ))+(1p1)F(CϕTkθ)def=gk. (5)

    Then,

    Pr(sk)=gskk(1gk)(1sk). (6)

    Based on Eq (5), gk can be simplified as:

    gk=(1p0p1)F(CϕTkθ)+p0. (7)

    Hence, for a data length of N, the maximum likelihood function of s1,s2,,sN is:

    L(θ|s1,s2,,sN)=Pr(s1,s2,,sN)=Pr(s1)Pr(s2)Pr(sN)=Nk=1gskk(1gk)(1sk). (8)

    The principle of maximum likelihood estimation is based on the intuitive idea that a parameter is the most reasonable estimate if it gives the greatest probability that the sample data will occur. For the maximum likelihood function, the parameters at its maximum value are called the maximum likelihood estimates. In this section, the attack strategy (p0,p1) is assumed to be known. Two functions are defined as follows:

    h1(x)=(1p0p1)f(Cx)(1p0p1)F(Cx)+p0,h2(x)=(1p0p1)f(Cx)(p0+p11)F(Cx)+1p0. (9)

    Let

    θlnL(s1,s2,,sN)=0. (10)

    The solution of the equation is denoted as ˆθN=ˆθN(s1,s2,,sN), which is the maximum likelihood estimate of θ.

    Since Eq (10) is highly nonlinear, an explicit solution generally doesn't exist. Here, an approximate solution method is presented. Taking the logarithm of Eq (8), we have

    lnL(θ|s1,s2,,sN)=Nk=1[sklngk+(1sk)ln(1gk)]=Nk=1skln[F(CϕTkθ)(1p0p1)+p0]+Nk=1(1sk)ln[F(CϕTkθ)(p0+p11)+1p0]. (11)

    Taking the partial derivative of the above equation with respect to θ, we get

    θlnL(θ|s1,s2,,sN)=Nk=1sk(1p0p1)f(CϕTkθ)(ϕTk)(1p0p1)F(CϕTkθ)+p0+Nk=1(sk1)(1p0p1)f(CϕTkθ)(ϕTk)(p0+p11)F(CϕTkθ)+1p0. (12)

    By Eq (9), Eq (12) can be expressed as:

    θlnL(θ)=Nk=1skh1(ϕTkθ)(ϕTk)+Nk=1(sk1)h2(ϕTkθ)(ϕTk). (13)

    Since ϕTk can take the values π1,π2,,πl, grouping the above expression based on these values, we can rearrange it as:

    θlnL(θ)=Nk=1,ϕTk=π1skh1(π1θ)(π1)+Nk=1,ϕTk=π1(sk1)h2(π1θ)(π1)+Nk=1,ϕTk=π2skh1(π2θ)(π2)+Nk=1,ϕTk=π2(sk1)h2(π2θ)(π2)++Nk=1,ϕTk=πlskh1(πlθ)(πl)+Nk=1,ϕTk=πl(sk1)h2(πlθ)(πl). (14)

    In Eq (15), if we have

    Nk=1,ϕTk=πiskh1(πiθ)+Nk=1,ϕTk=πi(sk1)h2(πiθ)=0,i=1,2,,l, (15)

    then θlnL(θ)=0. Thus, the problem of solving the equation θlnL(θ)=0 is reduced to solving the system of Eq (15).

    By rearranging (15), we get

    [h1(πiθ)+h2(πiθ)]Nk=1,ϕTk=πisk=h2(πiθ)Nk=1,ϕTk=πi1.

    As a result, we obtain

    Nk=1skI{ϕTk=πi}Nk=1I{ϕTk=πi}=h2(πiθ)h1(πiθ)+h2(πiθ)=H(πiθ), (16)

    where H(x)=h2(x)h1(x)+h2(x), h1(x), and h2(x) are given by (9). Let the H(x) reverse function be H1(x), and we have

    H(x)=(1p0p1)F(Cx)+p0H(x)p0=(1p0p1)F(Cx)H(x)p01p0p1=F(Cx) (17)
    F1(H(x)p01p0p1)=Cx. (18)

    Therefore, from (16), we have

    πiθ=CF1(Nk=1skI{ϕTk=πi}Nk=1I{ϕTk=πi}p01p0p1),i=1,2,,l.

    Expressing the above equation set in matrix form, we have

    [π1πl]θ=[CF1(Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1}p01p0p1)CF1(Nk=1skI{ϕTk=πl}Nk=1I{ϕTk=πl}p01p0p1)]. (19)

    Let Φ=[πT1,πT2,,πTl]T, ηN,i=CF1(Nk=1skI{ϕTk=πi}Nk=1I{ϕTk=πi}p01p0p1), i=1,2,,l. The maximum likelihood estimate of θ is obtained as:

    ˆθN=Φ+[ηN,1,,ηN,l]T, (20)

    where + denotes the Moore-Penrose inverse of the matrix.

    Remark 2. From the above, it can be seen that the distribution function of the system noise plays an important role in the algorithm design. For the unknown case, an estimation algorithm can be designed to estimate it, and then the estimated value can be used instead of the true value, so as to realize the adaptive identification of unknown parameters [29].

    Theorem 1. Consider the system (1) and the binary observation (2) under the data tampering attack (3). If Assumption 1 holds, the matrix Φ generated by the system input is full rank, and Nk=1I{ϕTk=πi} as N for i=1,2,,l, then the maximum likelihood-based parameter estimate ˆθN given by (20) converges strongly to the true value θ, i.e.,

    ˆθNθ,N,w.p.1.

    Proof. By (5), it is known that

    E(skI{ϕTk=πi})=p0(1F(Cπiθ))+(1p1)F(Cπiθ)=p0+(1p0p1)F(Cπiθ).

    According to the Law of Large Numbers, for i=1,2,,l, we have

    Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1}p0+(1p0p1)F(Cπiθ),N, (21)

    which implies that

    CF1(Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1}p01p0p1)πiθ,N. (22)

    Since Φ is full rank, from (19) and (20), the theorem is proved.

    In the previous section, an identification algorithm with unknown parameters was designed under the assumption of known attack strategies. In the case of unknown attack strategies, the design of the identification algorithm becomes more difficult. This is mainly because the unknown parameters and attack strategies are coupled together. This section primarily addresses this problem.

    Using the maximum likelihood function, Eq (11) is used to obtain the maximum likelihood estimates of θ, p0, and p1, which results in a system of equations consisting of n+2 equations involving θ, p0, and p1. Solving this system of equations yields the estimates ˆθ, ^p0, and ^p1. However, solving a system of n+2 dimensional equations numerically will be challenging and time-consuming. The solution process is illustrated in Figure 2, divided into three steps below.

    Figure 2.  Solution steps.

    Step 1: Construction of system of equations for θ and (p0,p1)

    Based on the analysis process, when the attack strategies are known, the likelihood function L(θ|s1,s2,,sN) is first logarithmically transformed into a logarithmic form and then differentiated. From Eqs (16) and (17), it can be determined that the problem of solving the extremum of the maximum likelihood function is equivalent to the problem of solving the following system of equations:

    {F(Cπ1θ)=Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1}p01p0p1;F(Cπ2θ)=Nk=1skI{ϕTk=π2}Nk=1I{ϕTk=π2}p01p0p1;F(Cπlθ)=Nk=1skI{ϕTk=πl}Nk=1I{ϕTk=πl}p01p0p1. (23)

    If πiθ is treated as an unknown variable, then the above system of equations has l+2 unknowns but only l equations. Therefore, it is generally unsolvable. To address this, the correlation between πi is utilized, which leads to the second step.

    Step 2: Solve the system of equations for θ and (p0,p1), and obtain the estimated values of the attack strategies (ˆpN,0,ˆpN,1)

    Let the number of maximal linearly independent sets of π1,π2,,πl be denoted as l0. Without loss of generality, assume that π1,π2,,πl0 form a maximal linearly independent set of π1,π2,,πl. Then, each πi can be expressed as a linear combination of π1,π2,,πl0, as follows:

    πi=l0j=1αi,jπj,i=1,2,,l. (24)

    Substituting the above equation into Eq (23), we get

    {F(Cl0j=1α1,jπjθ)=Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1}p01p0p1;F(Cl0j=1α2,jπjθ)=Nk=1skI{ϕTk=π2}Nk=1I{ϕTk=π2}p01p0p1;F(Cl0j=1αl,jπjθ)=Nk=1skI{ϕTk=πl}Nk=1I{ϕTk=πl}p01p0p1. (25)

    The above system of equations consists of l equations, and the number of unknowns is reduced to l0+2. Solving the above system of equations, denoted as g(s1,s2,,sN)=(g1,g2,,gl0+2), which gives the estimated values of π1θ,π2θ,,πl0θ, and (p0,p1) as follows:

    ^π1θN=g1(s1,s2,,sN); (26)
    (27)
    ^πl0θN=gl0(s1,s2,,sN); (28)
    ˆpN,0=gl0+1(s1,s2,,sN); (29)
    ˆpN,1=gl0+2(s1,s2,,sN). (30)

    Equations (29) and (30) provide the estimated values of the attack strategies.

    The most critical part is how to obtain the expression of g(s1,s2,,sN), which can be divided into two cases. One case is when the system of Eq (25) has an analytical solution, in which case the expression of g() can be obtained through mathematical operations. The other case is when (25) does not have an analytical solution, in which case the expression of g() can be approximated using numerical methods and neural networks. The process is as follows.

    Consider the following system of equations:

    {F(Cl0j=1α1,jxj)=β1xl0+11xl0+1xl0+2;F(Cl0j=1α2,jxj)=β2xl0+11xl0+1xl0+2;F(Cl0j=1αl,jxj)=βlxl0+11xl0+1xl0+2, (31)

    where X=[x1,x2,,xl0+2]TRl0+2 is the unknown variable, and β1,β2,,βl are known parameters.

    Given a step size Δ(0,1), we uniformly sample the interval [0,1] to obtain a set

    Γ={(j1)Δ:j=1,2,,1Δ}, (32)

    where denotes the ceiling function. We randomly take any element β=[β1,β2,,βl] from Γl and substitute it into Eq (31). Then, we solve the Eq (31) using the Newton-Raphson iteration method to obtain the solution X=X(β). Specifically, let ϖi(x1,x2,,xl0+2)=F(Cl0j=1αi,jxj)βixl0+11xl0+1xl0+2, i=1,2,,l. Then, the system of Eq (31) can be equivalently written as:

    Ω(X)=[ϖ1(x1,x2,,xl0+2)ϖ2(x1,x2,,xl0+2)ϖl(x1,x2,,xl0+2)]=0. (33)

    The Jacobian matrix of the above equations is given by:

    J(X)=[ϖ1x1ϖ1xl0+2ϖlx1ϖlxl0+2]=[α1,1f(Cl0j=1α1,jxj)1β1xl0+2(1xl0+1xl0+2)2β1+xl0+1(1xl0+1xl0+2)2αl,1f(Cl0j=1α1,jxj)1βlxl0+2(1xl0+1xl0+2)2βl+xl0+1(1xl0+1xl0+2)2]. (34)

    Given an initial value X0, let Xt=[x{t}1,x{t}2,,x{t}l0+2]T represent the zero of the system of equations for the solution of Eq (33) obtained at the t-th iteration. Then,

    Xt=Xt1J1(Xt1)Ω(Xt1). (35)

    Repeat the above process and iteratively calculate until XtXt1<ε is satisfied, where X(β)=Xt is the solution to the system of Eq (31), denotes the norm of a vector, and ε>0 is a given constant called the iteration stopping tolerance.

    Repeat the above process, letting β traverse Γl, and simultaneously obtaining the solution X=X(β) for Eq (31). This way, a set of data {β,X(β):βΓl} is obtained. Treat β as the input and X(β) as the output of a BPNN*, and train the neural network as g0(β1,β2,,βl). As a result, g(s1,s2,,sN) can be computed as follows:

    *Here we choose BPNN as the fitting algorithm, mainly to show our thinking and method. In specific use, one can also choose other regression algorithms, such as random forest and so on.

    g(s1,s2,,sN)=g0(Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1},,Nk=1skI{ϕTk=πl}Nk=1I{ϕTk=πl}). (36)

    The above process can be summarized into the following algorithm:

    Algorithm 1 Algorithm for computing function g()
    1. Initial values: sample step size Δ of (0,1); set D=; iteration tolerance ε>0 for stopping Newton-Raphson iteration.
    2. Set Γ based on (32), then obtain set Γl with m elements denoted as β1, β2,,βm
    3. Loop: i=1, 2, , m
      3.1. Substitute βi into system of Eq (31)
      3.2. Initialize X0, and use Newton-Raphson iteration to solve (31), obtain solution Xi=Xi(βi)
      3.3. Update data set D=D{(βi,Xi)}
    4. End loop
    5. Train the BPNN g0(β1,β2,,βl) based on data set D
    6. Calculate g() based on (36)

    Step 3: Obtain the estimated values of the unknown parameters ˆθN

    Express the ^π1θN,^π2θN,,^πl0θN obtained in Step 2 in vector form. Based on Eqs (26) and (28), we have:

    [π1πl0]ˆθN=[g1(s1,s2,,sN)gl0(s1,s2,,sN)].

    Letting [πT1,,πTl0]T=¯Φ, we can obtain the estimate of θ as:

    ˆθN=¯Φ+[g1(s1,s2,,sN)gl0(s1,s2,,sN)]. (37)

    In the above equation, the expressions of g1,,gl0 may contain the attack strategies (p0,p1) as parameters. In this case, replace them with their estimated values from (29) and (30).

    Theorem 2. Under the condition of Theorem 1, if the matrix ¯Φ generated by the system input is full rank, the function g() given by Algorithm 1 is the solution to the Eq (33), then the maximum likelihood-based parameter estimate ˆθN given by (37) converges strongly to the true value θ, i.e.,

    ˆθNθ,N,w.p.1.

    Proof. According to the conditions of the theorem and by (23) and (25), it is known that the solution to (31) is

    X=X([p0+(1p0p1)F(Cπ1θ),,p0+(1p0p1)F(Cπlθ)]T)=[π1θ,,πl0θ]T. (38)

    From (21), we have

    g0(Nk=1skI{ϕTk=π1}Nk=1I{ϕTk=π1},,Nk=1skI{ϕTk=πl}Nk=1I{ϕTk=πl})g0(p0+(1p0p1)F(Cπ1θ),,p0+(1p0p1)F(Cπlθ)),N,

    which together with (36) gives

    g(s1,,sN)g0(p0+(1p0p1)F(Cπ1θ),,p0+(1p0p1)F(Cπlθ))

    as N. Combining the above and (38), by (37), it can be seen that

    ˆθN=¯Φ+[g1(s1,s2,,sN)gl0(s1,s2,,sN)]¯Φ+[π1θπl0θ],N. (39)

    Considering that ¯Φ is full rank, the proof is completed.

    Consider the system

    {yk=ϕTkθ+dk;s0k=I{ykC};

    with the system parameters θ=[a1,,an]T=[2,4,8]T and the system input uk{1,3,5}; the threshold for the binary sensor output is C=30; and the system noise follows an independent and identically distributed normal random variable sequence dk(0,402). The system output is transmitted to the data center through a communication network and is subjected to data tampering attacks with attack strategy (p0,p1)=(0.4,0.2).

    The data center receives the tampered data sk after the original data s0k has been attacked. The relationship between the data is shown in Figure 3. The original data s0k has been randomly altered.

    Figure 3.  Comparison between original data and data after random attacks.

    Experiments are conducted on algorithms (10)–(22) to compute the estimated system parameter values ˆθN, where the length of the data sample is N=80,000. The results are shown in Figure 4, which indicate that: when the data sample size N is small, the estimated parameter values ˆθN have large convergence biases; When the data sample size N exceeds a critical value, the estimated parameter values ˆθN are close to the true values θ; as the data sample size N further increases, the deviation between the estimated parameter values ˆθN and the true values decreases.

    Figure 4.  Estimation of system parameters when the attack strategy is known.

    Experiments are conducted on algorithms (23)–(39) for T=150 times, and the average results of each experiment are computed to obtain ˆθN, p0, and p1, where the length of the data sample is N=60,000. The results are shown in Figures 5 and 6, which indicate that: As the data sample size N increases, the estimated system parameter values ˆθN approach the true values, and the estimated attack strategy values ˆp0 and ˆp1 also approach the true values. Moreover, due to the large number of experiments T, the convergence of each parameter improves as the data sample size N increases.

    Figure 5.  Estimation of system parameters when the attack strategy is unknown.
    Figure 6.  Estimation of the attack strategy when the attack strategy is unknown.

    In the framework of system identification, this paper carried out the research of security issue based on the maximum likelihood estimation method. For FIR systems with binary observations and data tampering attacks, the parameter estimation algorithms are proposed in the two cases of known and unknown attack strategy, and the convergence condition and convergence proof of these algorithms are given.

    The maximum likelihood estimation is a very classical and effective method. This paper explores its application in CPS security identification. In the future, this method can be extended to nonlinear systems, multi-threshold observations, colored noise, and other more general cases.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This research was supported in part by the National Natural Science Foundation of China (62173030) and in part by the Beijing Natural Science Foundation (4222050).

    The authors declare there is no conflict of interest.



    [1] Y. Ju, M. Yang, C. Chakraborty, L. Liu, Q. Pei, M. Xiao, et al., Reliability–security tradeoff analysis in mmWave Ad Hoc–based CPS, ACM Trans. Sens. Netw., 20 (2024), 1–23. https://doi.org/10.1145/3582556 doi: 10.1145/3582556
    [2] S. K. Mazumder, A. Kulkarni, S. Sahoo, F. Blaabjerg, H. A. Mantooth, J. C. Balda, et al., A review of current research trends in power-electronic innovations in cyber–physical systems, IEEE J. Emerging Sel. Top. Power Electron., 9 (2021), 5146–5163. https://doi.org/10.1109/jestpe.2021.3051876 doi: 10.1109/jestpe.2021.3051876
    [3] J. Guo, J. D. Diao, Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations, Sci. China Inf. Sci., 63 (2020), 112201. https://doi.org/10.1007/s11432-018-9845-6 doi: 10.1007/s11432-018-9845-6
    [4] S. M. Nagarajan, G. G. Deverajan, A. K. Bashir, R. P. Mahapatra, M. S. Al-Numay, IADF-CPS: Intelligent anomaly detection framework towards cyber physical systems, Comput. Commun., 188 (2022), 81–89. https://doi.org/10.1016/j.comcom.2022.02.022 doi: 10.1016/j.comcom.2022.02.022
    [5] R. V. Yohanandhan, R. M. Elavarasan, R. Pugazhendhi, M. Premkumar, L. Mihet-Popa, V. Terzija, A holistic review on cyber-physical power system (CPPS) testbeds for secure and sustainable electric power grid – Part – I: Background on CPPS and necessity of CPPS testbeds, Int. J. Electr. Power Energy Syst., 136 (2022), 107718. https://doi.org/10.1016/j.ijepes.2021.107718 doi: 10.1016/j.ijepes.2021.107718
    [6] S. Kim, K. J. Park, C. Lu, A survey on network security for cyber–physical systems: From threats to resilient design, IEEE Commun. Surv. Tutorials, 24 (2022), 1534–1573. https://doi.org/10.1109/COMST.2022.3187531 doi: 10.1109/COMST.2022.3187531
    [7] J. Ye, A. Giani, A. Elasser, S. K. Mazumder, C. Farnell, H. A. Mantooth, et al., A review of cyber–physical security for photovoltaic systems, IEEE J. Emerging Sel. Top. Power Electron., 10 (2022), 4879–4901. https://doi.org/10.1109/jestpe.2021.3111728 doi: 10.1109/jestpe.2021.3111728
    [8] R. Langner, Stuxnet: Dissecting a cyberwarfare weapon, IEEE Secur. Privacy, 9 (2011), 49–51. https://doi.org/10.1109/MSP.2011.67 doi: 10.1109/MSP.2011.67
    [9] Y. Cherdantseva, P. Burnap, A. Blyth, P. Eden, K. Jones, H. Soulsby, et al., A review of cyber security risk assessment methods for scada systems, Comput. Secur., 56 (2016), 1–27. https://doi.org/10.1016/j.cose.2015.09.009 doi: 10.1016/j.cose.2015.09.009
    [10] A. V. Jha, B. Appasani, A. N. Ghazali, P. Pattanayak, D. S. Gurjar, E. Kabalci, et al., Smart grid cyber-physical systems: Communication technologies, standards and challenges, Wireless Netw., 27 (2021), 2595–2613. https://doi.org/10.1007/s11276-021-02579-1 doi: 10.1007/s11276-021-02579-1
    [11] S. Tan, J. M. Guerrero, P. Xie, R. Han, J. C. Vasquez, Brief survey on attack detection methods for cyber-physical systems, IEEE Syst. J., 14 (2020), 5329–5339. https://doi.org/10.1109/jsyst.2020.2991258 doi: 10.1109/jsyst.2020.2991258
    [12] W. Duo, M. Zhou, A. Abusorrah, A survey of cyber attacks on cyber physical systems: Recent advances and challenges, IEEE/CAA J. Autom. Sin., 9 (2022), 784–800. https://doi.org/10.1109/jas.2022.105548 doi: 10.1109/jas.2022.105548
    [13] D. Ding, Q. L. Han, X. Ge, J. Wang, Secure state estimation and control of cyber-physical systems: A survey, IEEE Trans. Syst. Man Cybern.: Syst., 51 (2021), 176–190. https://doi.org/10.1109/tsmc.2020.3041121 doi: 10.1109/tsmc.2020.3041121
    [14] S. I. Popoola, R. Ande, B. Adebisi, G. Gui, M. Hammoudeh, O. Jogunola, Federated deep learning for zero-day botnet attack detection in IoT-edge devices, IEEE Internet Things J., 9 (2021), 3930–3944. https://doi.org/10.1109/JIOT.2021.3100755 doi: 10.1109/JIOT.2021.3100755
    [15] J. Liu, W. Zhang, T. Ma, Z. Tang, Y. Xie, W. Gui, et al., Toward security monitoring of industrial Cyber-Physical systems via hierarchically distributed intrusion detection, Expert Syst. Appl., 158 (2020), 113578. https://doi.org/10.1016/j.eswa.2020.113578 doi: 10.1016/j.eswa.2020.113578
    [16] B. Li, Y. Wu, J. Song, R. Lu, T. Li, L. Zhao, DeepFed: Federated deep learning for intrusion detection in industrial cyber–physical systems, IEEE Trans. Ind. Inf., 17 (2021), 5615–5624. https://doi.org/10.1109/tii.2020.3023430 doi: 10.1109/tii.2020.3023430
    [17] J. Guo, X. Wang, W. Xue, Y. Zhao, System identification with binary-valued observations under data tampering attacks, IEEE Trans. Autom. Control, 66 (2021), 3825–3832. https://doi.org/10.1109/tac.2020.3029325 doi: 10.1109/tac.2020.3029325
    [18] H. Liang, L. Zhu, F. R. Yu, X. Wang, A cross-layer defense method for blockchain empowered CBTC systems against data tampering attacks, IEEE Trans. Intell. Transp. Syst., 24 (2022), 501–515. https://doi.org/10.1109/tits.2022.3211020 doi: 10.1109/tits.2022.3211020
    [19] D. W. Huang, W. Liu, J. Bi, Data tampering attacks diagnosis in dynamic wireless sensor networks, Comput. Commun., 172 (2021), 84–92. https://doi.org/10.1016/j.comcom.2021.03.007 doi: 10.1016/j.comcom.2021.03.007
    [20] M. M. N. Aboelwafa, K. G. Seddik, M. H. Eldefrawy, Y. Gadallah, M. Gidlund, A machine-learning-based technique for false data injection attacks detection in industrial IoT, IEEE Internet Things J., 7 (2020), 8462–8471. https://doi.org/10.1109/jiot.2020.2991693 doi: 10.1109/jiot.2020.2991693
    [21] K. Yang, H. Wang, H. Wang, L. Sun, An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks, Comput. Ind., 138 (2022), 103613. https://doi.org/10.1016/j.compind.2022.103613 doi: 10.1016/j.compind.2022.103613
    [22] M. Elsisi, M. Altius, S. F. Su, C. L. Su, Robust kalman filter for position estimation of automated guided vehicles under cyberattacks, IEEE Trans. Instrum. Meas., 72 (2023), 1–12. https://doi.org/10.1109/tim.2023.3250285 doi: 10.1109/tim.2023.3250285
    [23] X. Y. Kong, G. H. Yang, An intrusion detection method based on self-generated coding technology for stealthy false data injection attacks in train-ground communication systems, IEEE Trans. Ind. Electron., 70 (2023), 8468–8476. https://doi.org/10.1109/tie.2022.3213899 doi: 10.1109/tie.2022.3213899
    [24] J. Zhang, C. Dong, Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators, J. King Saud Univ. Comput. Inf. Sci., 35 (2023), 100–111. https://doi.org/10.1016/j.jksuci.2023.03.002 doi: 10.1016/j.jksuci.2023.03.002
    [25] Y. Zhang, Y. Li, Z. Li, Aye: A trusted forensic method for firmware tampering attacks, Symmetry, 15 (2023), 145. https://doi.org/10.3390/sym15010145 doi: 10.3390/sym15010145
    [26] D. Ye, T. Y. Zhang, Summation detector for false data-injection attack in cyber-physical systems, IEEE Trans. Cybern., 50 (2019), 2338–2345. https://doi.org/10.1109/TCYB.2019.2915124 doi: 10.1109/TCYB.2019.2915124
    [27] J. Guo, R. Jia, R. Su, Y. Zhao. Identification of FIR systems with binary-valued observations against data tampering attacks, IEEE Trans. Syst. Man Cybern.: Syst., 53 (2023), 5861–5873. https://doi.org/10.1109/TSMC.2023.3276352 doi: 10.1109/TSMC.2023.3276352
    [28] J. Sun, H. Xiong, S. Zhang, X. Liu, J. Yuan, R. H. Deng, A secure flexible and tampering-resistant data sharing system for vehicular social networks, IEEE Trans. Veh. Technol., 69 (2020), 12938–12950. https://doi.org/10.1109/tvt.2020.3015916 doi: 10.1109/tvt.2020.3015916
    [29] J. Guo, L. Y. Wang, G. Yin, Y. Zhao, J. F. Zhang, Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs, Automatica, 57 (2015), 113–122. https://doi.org/10.1016/j.automatica.2015.04.009 doi: 10.1016/j.automatica.2015.04.009
    [30] H. T. Sun, C. Peng, T. C. Yang, H. Zhang, W. L. He, Resilient control of networked control systems with stochastic denial of service attacks, Neurocomputing, 270 (2017), 170–177. https://doi.org/10.1016/j.neucom.2017.02.093 doi: 10.1016/j.neucom.2017.02.093
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(943) PDF downloads(51) Cited by(0)

Figures and Tables

Figures(6)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog