4.7 Article

Detection against randomly occurring complex attacks on distributed state estimation

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Detection of Data Integrity Attacks in Distributed State Estimation

Yuanyuan Xia et al.

Summary: This study investigates the security issue of distributed state estimation under data integrity attacks in wireless sensor networks. A detector based on statistical learning is designed to detect compromised estimates from neighboring sensors. Optimal estimator and stability condition for estimation error covariances are found for sensors equipped with the malicious data detector. The relationship between steady-state EEC and detector parameters is explored, and the performances of various detectors are verified through numerical simulations.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2021)

Article Automation & Control Systems

Distributed Resilient Estimator Design for Positive Systems Under Topological Attacks

Shunyuan Xiao et al.

Summary: This article discusses the distributed resilient estimation of a positive system over a sensor network, proposing a heterogeneous sensor interaction framework to adapt to different communication capacities, constructing two sets of distributed resilient estimators to address issues with information exchange caused by topological attacks, and designing the desired distributed estimators through a linear programming approach. The effectiveness of the proposed method is verified through a vehicle formation monitoring system.

IEEE TRANSACTIONS ON CYBERNETICS (2021)

Article Automation & Control Systems

Secure Distributed Finite-Time Filtering for Positive Systems Over Sensor Networks Under Deception Attacks

Shunyuan Xiao et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Engineering, Electrical & Electronic

Security Analysis of a Distributed Networked System Under Eavesdropping Attacks

Wen Yang et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2020)

Article Mathematics, Applied

Completely model-free RL-based consensus of continuous-time multi-agent systems

Xiaoling Wang et al.

APPLIED MATHEMATICS AND COMPUTATION (2020)

Article Automation & Control Systems

An encoding mechanism for secrecy of remote state estimation

Wen Yang et al.

AUTOMATICA (2020)

Article Automation & Control Systems

Coordination Control for Uncertain Networked Systems Using Interval Observers

Xiaoling Wang et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Automation & Control Systems

Distributed filtering under false data injection attacks

Wen Yang et al.

AUTOMATICA (2019)

Article Automation & Control Systems

Fusion State Estimation for Power Systems Under DoS Attacks: A Switched System Approach

Ji Chen et al.

IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS (2019)

Article Automation & Control Systems

Distributed Krein space-based attack detection over sensor networks under deception attacks

Xiaohua Ge et al.

AUTOMATICA (2019)

Article Engineering, Electrical & Electronic

Secure State Estimation Against Integrity Attacks: A Gaussian Mixture Model Approach

Ziyang Guo et al.

IEEE TRANSACTIONS ON SIGNAL PROCESSING (2019)

Article Automation & Control Systems

Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation

Ziyang Guo et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2019)

Article Automation & Control Systems

DoS Attack Energy Management Against Remote State Estimation

Heng Zhang et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2018)

Article Automation & Control Systems

TESTING AND DEFENDING METHODS AGAINST DOS ATTACK IN STATE ESTIMATION

Heng Zhang et al.

ASIAN JOURNAL OF CONTROL (2017)

Article Computer Science, Information Systems

Distributed networked control systems: A brief overview

Xiaohua Ge et al.

INFORMATION SCIENCES (2017)

Article Automation & Control Systems

Stochastic link activation for distributed filtering under sensor power constraint

Wen Yang et al.

AUTOMATICA (2017)

Article Automation & Control Systems

A multi-channel transmission schedule for remote state estimation under DoS attacks

Kemi Ding et al.

AUTOMATICA (2017)

Article Automation & Control Systems

Optimal Linear Cyber-Attack on Remote State Estimation

Ziyang Guo et al.

IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS (2017)

Article Automation & Control Systems

On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks

Yilin Mo et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2016)

Article Automation & Control Systems

Optimal DoS Attack Scheduling in Wireless Networked Control System

Heng Zhang et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2016)

Editorial Material Computer Science, Information Systems

Special issue on Recent Developments in Distributed Networked Control Systems

Qing-Long Han et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

An integrated detection system against false data injection attacks in the Smart Grid

Wei Yu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Automation & Control Systems

Defect detection in aluminum foil by measurement-residual-based chi-square detector

Ming Zhai et al.

INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY (2011)

Article Computer Science, Information Systems

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Peng Ning et al.

ACM TRANSACTIONS ON SENSOR NETWORKS (2008)