Distributed interval state estimation with l∞-gain optimization for cyber–physical systems subject to bounded disturbance and random stealthy attacks

This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed in...

Full description

Saved in:
Bibliographic Details
Published inISA transactions Vol. 127; pp. 22 - 31
Main Authors Xie, Jiyang, Zhu, Shuqian, Zhang, Dawei
Format Journal Article
LanguageEnglish
Published United States Elsevier Ltd 01.08.2022
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results. •A new distributed interval observation method for general linear system is proposed.•The disturbance attenuation problem of stochastic interval error systems is solved.•The method can provide real-time changing ranges of CPS dynamics against attacks.
AbstractList This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results. •A new distributed interval observation method for general linear system is proposed.•The disturbance attenuation problem of stochastic interval error systems is solved.•The method can provide real-time changing ranges of CPS dynamics against attacks.
This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l -gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.
This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.
Author Zhang, Dawei
Xie, Jiyang
Zhu, Shuqian
Author_xml – sequence: 1
  givenname: Jiyang
  orcidid: 0000-0002-7393-2947
  surname: Xie
  fullname: Xie, Jiyang
– sequence: 2
  givenname: Shuqian
  surname: Zhu
  fullname: Zhu, Shuqian
– sequence: 3
  givenname: Dawei
  orcidid: 0000-0003-1573-1079
  surname: Zhang
  fullname: Zhang, Dawei
  email: dwzhang@sdu.edu.cn
BackLink https://www.ncbi.nlm.nih.gov/pubmed/35086672$$D View this record in MEDLINE/PubMed
BookMark eNqFUT2P1DAQtdAhbu_gHyDkkiaLvxI7FEjo-JROooHasp0J6yWJF9s5FCpKeioaftz9ErzkrqEAaeSRZt57I793hk6mMAFCDynZUkKbJ_utTyZHs2WEsS2hpcgdtKFKttVxdII2hNC2IrVUp-gspT0hhNWtuodOeU1U00i2QT9f-JSjt3OGDvspQ7wyA07ZZMCQsh9N9mHCX3ze4eH6-6_qo_ETDoey8V_XXR8idouFeP3tx2G3JO-OCkvKMCacZrsHl3EO2IZ56sqVrlycozWTA2ymDsfyhLHcBDPk3YJNzsZ9SvfR3d4MCR7c9HP04dXL9xdvqst3r99ePL-sHJMyV07Z0qVoBSeir2vFLHV9SwSTjeWE9kxZ63jDBTeyp0IJa2TDoBG0kcYafo4er7qHGD7P5c969MnBMJgJwpw0axhXLa05LdBHN9DZjtDpQyz-xEXf2lkAT1eAiyGlCL12Pv9xqQTlB02JPman93rNTh-D0oSWIoUs_iLf6v-H9mylQTHpykPUyXko5nY-Fud1F_y_BX4DuNK6mg
CitedBy_id crossref_primary_10_3390_math12213385
crossref_primary_10_1016_j_isatra_2022_09_020
crossref_primary_10_1088_1674_1056_acb9fc
crossref_primary_10_1109_TCSI_2024_3427379
crossref_primary_10_1016_j_isatra_2022_06_018
crossref_primary_10_1109_TCNS_2023_3295345
crossref_primary_10_1109_TASE_2024_3352071
crossref_primary_10_1016_j_isatra_2023_09_011
crossref_primary_10_1177_01423312231189107
Cites_doi 10.1109/TAC.2019.2910167
10.1109/TAC.2014.2303233
10.1109/CDC.2007.4434303
10.1016/0005-1098(96)00048-9
10.1049/iet-cds.2020.0004
10.1016/j.jfranklin.2020.06.021
10.1109/TIE.2016.2613929
10.1109/TAC.2011.2164820
10.1016/j.isatra.2019.02.036
10.1016/j.sysconle.2018.11.001
10.1016/j.automatica.2021.109517
10.1109/TCYB.2019.2900478
10.1016/j.automatica.2021.109869
10.1109/9.293203
10.1109/78.414787
10.1016/j.sysconle.2018.04.003
10.1016/j.automatica.2020.109390
10.1016/j.isatra.2021.01.036
10.1109/TSMC.2019.2960541
10.1109/TCSI.2020.3001402
10.1109/TCYB.2019.2945580
10.1109/SMARTGRID.2010.5622046
10.1109/TII.2019.2905295
10.1016/j.automatica.2019.108557
10.1109/TSMC.2020.3041121
10.1016/j.automatica.2012.07.004
10.1016/j.amc.2021.126638
10.1109/TAC.2020.2987307
10.1109/TSMC.2019.2918002
10.1016/j.automatica.2004.12.008
10.1109/TAC.2014.2359714
10.1109/TAC.2013.2263936
10.1016/j.automatica.2016.07.043
10.1109/TSMC.2017.2697450
10.1109/TCYB.2017.2789296
10.1016/j.isatra.2019.12.014
10.1109/TAC.2009.2037472
10.1109/TCYB.2019.2917179
10.1002/rnc.3030
10.1016/j.automatica.2010.10.019
10.1109/TCYB.2017.2769722
10.1109/TAC.2019.2902673
10.1109/TCYB.2020.2966083
ContentType Journal Article
Copyright 2022 ISA
Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
Copyright_xml – notice: 2022 ISA
– notice: Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
DBID AAYXX
CITATION
NPM
7X8
DOI 10.1016/j.isatra.2022.01.010
DatabaseName CrossRef
PubMed
MEDLINE - Academic
DatabaseTitle CrossRef
PubMed
MEDLINE - Academic
DatabaseTitleList
PubMed
MEDLINE - Academic
Database_xml – sequence: 1
  dbid: NPM
  name: PubMed
  url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed
  sourceTypes: Index Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 1879-2022
EndPage 31
ExternalDocumentID 35086672
10_1016_j_isatra_2022_01_010
S0019057822000167
Genre Journal Article
GroupedDBID ---
--K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29J
4.4
457
4G.
53G
5GY
5VS
6P2
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABFNM
ABFRF
ABJNI
ABMAC
ABNEU
ABTAH
ABXDB
ABYKQ
ACDAQ
ACFVG
ACGFO
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFDAS
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AIEXJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
GBLVA
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
ROL
RPZ
SDF
SDG
SES
SET
SEW
SPC
SPCBC
SPD
SSQ
SST
SSZ
T5K
T9H
TAE
TN5
UHS
UNMZH
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
NPM
7X8
EFKBS
ID FETCH-LOGICAL-c277t-c8b2777494304f5582b1cf904276b301f28bbc36343a7f1484ba762e64167aba3
IEDL.DBID .~1
ISSN 0019-0578
1879-2022
IngestDate Sun Aug 24 04:03:03 EDT 2025
Wed Feb 19 02:27:00 EST 2025
Thu Apr 24 23:09:47 EDT 2025
Tue Jul 01 04:36:07 EDT 2025
Fri Feb 23 02:38:58 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Distributed observer
Linear programming
l∞-gain optimization
Random stealthy attack
Interval estimation
gain optimization
Language English
License Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c277t-c8b2777494304f5582b1cf904276b301f28bbc36343a7f1484ba762e64167aba3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0003-1573-1079
0000-0002-7393-2947
PMID 35086672
PQID 2623891531
PQPubID 23479
PageCount 10
ParticipantIDs proquest_miscellaneous_2623891531
pubmed_primary_35086672
crossref_citationtrail_10_1016_j_isatra_2022_01_010
crossref_primary_10_1016_j_isatra_2022_01_010
elsevier_sciencedirect_doi_10_1016_j_isatra_2022_01_010
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace United States
PublicationPlace_xml – name: United States
PublicationTitle ISA transactions
PublicationTitleAlternate ISA Trans
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Peng, Wu, Tian (b33) 2021
Wang, Wang, Su, Lam (b39) 2020; 50
Xiao, Han, Ge, Zhang (b24) 2020; 50
Mazenc, Dinh, Niculescu (b42) 2014; 24
Tang, Wang, Wang, Raissi, Shen (b45) 2019; 64
Ge, Han, Wang (b14) 2019; 49
Zhang, Sun, Lin (b20) 2021; 127
Zhao, Peng, Han, Zhang (b48) 2021; 51
Fawzi, Tabuada, Diggavi (b1) 2014; 59
Zhang, Wang, Feng, Shi, A.V. (b3) 2021; 116
Li, Wei, Ding (b28) 2020; 6
Li, Chang, Chen, Raissi (b44) 2021
Wang, Liu, Xu (b22) 2020; 104
Ge, Han, Wang (b8) 2019; 49
Mazenc, Bernard (b38) 2010; 55
Xie, Soh, de Souza (b6) 1994; 39
Huong, Huynh, Trinh (b27) 2020; 67
Raissi, Efimov, Zolghadri (b17) 2012; 57
Efimov, Perruquetti, Raissi, Zolghadri (b35) 2013; 58
Gu, Zhou, Zhang, Yang, Shen (b26) 2020; 104
Ben-Israel, Greville (b50) 2003
Ding, Han, Ge, Wang (b4) 2021; 51
Briat, Khammash (b47) 2016; 74
Zou, Wang, Han, Zhou (b19) 2019; 64
Wang, Lim, Shen (b40) 2018; 116
Cacace, Germani, Manes (b43) 2015; 60
Mazenc, Bernard (b16) 2011; 47
Sui, Sun (b29) 2021; 133
Simon (b9) 2006
Li, Raissi, Wang, Wang, Shen (b41) 2020; 357
Miller, Valasek (b31) 2015
Ge, Han, Zhong, Zhang (b30) 2019; 109
Zou, Wang, Han, Zhou (b18) 2021; 51
Shaked, Berman (b7) 1995; 43
Sui, Mo, Marelli, Sun, Fu (b34) 2021; 66
Ge, Han, Zhang, Ding, Yang (b11) 2020; 50
Olfati-Saber R. Distributed Kalman filtering for sensor networks. In: Proceedings of the 46th IEEE conference on decision and control, Vol. 1-14. New Orleans, LA, USA; 2007, p. 1814–20.
Ding, Han, Wang, Ge (b23) 2021; 51
Tang, Wang, Shen (b46) 2019; 123
Chen, Ho, Zhang, Yu (b21) 2019; 49
Zhang, Han, Ge (b10) 2021; 125
Ge, Han, Yang (b15) 2017; 64
Khan, Xie, Zhang, Liu (b37) 2020; 14
Xie, Zhu, Zhang (b25) 2022; 413
Xiao, Ge, Han, Zhang (b32) 2021
Efimov, Raissi, Chebotarevc, Zolghadri (b36) 2013; 49
Dan G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE international conference on smart grid communications. Gaithersburg, MD, USA; 2010, p. 214–9.
Alamo, Bravo, Camacho (b13) 2005; 41
Ding, Han, Wang, Ge (b2) 2019; 15
Chisci, Garulli, Zappa (b12) 1996; 32
Gu (10.1016/j.isatra.2022.01.010_b26) 2020; 104
Chisci (10.1016/j.isatra.2022.01.010_b12) 1996; 32
Shaked (10.1016/j.isatra.2022.01.010_b7) 1995; 43
Ge (10.1016/j.isatra.2022.01.010_b14) 2019; 49
Peng (10.1016/j.isatra.2022.01.010_b33) 2021
Ding (10.1016/j.isatra.2022.01.010_b2) 2019; 15
Ding (10.1016/j.isatra.2022.01.010_b4) 2021; 51
Ding (10.1016/j.isatra.2022.01.010_b23) 2021; 51
Zhang (10.1016/j.isatra.2022.01.010_b3) 2021; 116
Xiao (10.1016/j.isatra.2022.01.010_b24) 2020; 50
Mazenc (10.1016/j.isatra.2022.01.010_b16) 2011; 47
Cacace (10.1016/j.isatra.2022.01.010_b43) 2015; 60
Xie (10.1016/j.isatra.2022.01.010_b25) 2022; 413
Wang (10.1016/j.isatra.2022.01.010_b39) 2020; 50
Tang (10.1016/j.isatra.2022.01.010_b45) 2019; 64
Efimov (10.1016/j.isatra.2022.01.010_b36) 2013; 49
Li (10.1016/j.isatra.2022.01.010_b28) 2020; 6
Efimov (10.1016/j.isatra.2022.01.010_b35) 2013; 58
Zhao (10.1016/j.isatra.2022.01.010_b48) 2021; 51
Zou (10.1016/j.isatra.2022.01.010_b19) 2019; 64
Miller (10.1016/j.isatra.2022.01.010_b31) 2015
Sui (10.1016/j.isatra.2022.01.010_b34) 2021; 66
Raissi (10.1016/j.isatra.2022.01.010_b17) 2012; 57
Wang (10.1016/j.isatra.2022.01.010_b22) 2020; 104
Wang (10.1016/j.isatra.2022.01.010_b40) 2018; 116
Ge (10.1016/j.isatra.2022.01.010_b8) 2019; 49
Zou (10.1016/j.isatra.2022.01.010_b18) 2021; 51
Fawzi (10.1016/j.isatra.2022.01.010_b1) 2014; 59
Ge (10.1016/j.isatra.2022.01.010_b11) 2020; 50
Li (10.1016/j.isatra.2022.01.010_b41) 2020; 357
Alamo (10.1016/j.isatra.2022.01.010_b13) 2005; 41
Sui (10.1016/j.isatra.2022.01.010_b29) 2021; 133
Huong (10.1016/j.isatra.2022.01.010_b27) 2020; 67
Zhang (10.1016/j.isatra.2022.01.010_b10) 2021; 125
Mazenc (10.1016/j.isatra.2022.01.010_b38) 2010; 55
Chen (10.1016/j.isatra.2022.01.010_b21) 2019; 49
Mazenc (10.1016/j.isatra.2022.01.010_b42) 2014; 24
Tang (10.1016/j.isatra.2022.01.010_b46) 2019; 123
Simon (10.1016/j.isatra.2022.01.010_b9) 2006
10.1016/j.isatra.2022.01.010_b5
Briat (10.1016/j.isatra.2022.01.010_b47) 2016; 74
Ben-Israel (10.1016/j.isatra.2022.01.010_b50) 2003
Ge (10.1016/j.isatra.2022.01.010_b15) 2017; 64
Ge (10.1016/j.isatra.2022.01.010_b30) 2019; 109
Li (10.1016/j.isatra.2022.01.010_b44) 2021
Xie (10.1016/j.isatra.2022.01.010_b6) 1994; 39
10.1016/j.isatra.2022.01.010_b49
Zhang (10.1016/j.isatra.2022.01.010_b20) 2021; 127
Xiao (10.1016/j.isatra.2022.01.010_b32) 2021
Khan (10.1016/j.isatra.2022.01.010_b37) 2020; 14
References_xml – volume: 24
  start-page: 2867
  year: 2014
  end-page: 2890
  ident: b42
  article-title: Interval observers for discrete-time systems
  publication-title: Internat J Robust Nonlinear Control
– volume: 50
  start-page: 4008
  year: 2020
  end-page: 4019
  ident: b39
  article-title: Coordination control for uncertain networked systems using interval observers
  publication-title: IEEE Trans Cybern
– volume: 64
  start-page: 5045
  year: 2017
  end-page: 5054
  ident: b15
  article-title: Event-based set-membership leader-following consensus of networked multi-agent systems subject to limited communication resources and unknown-but-bounded noise
  publication-title: IEEE Trans Indust Electr
– volume: 133
  year: 2021
  ident: b29
  article-title: The vulnerability of distributed state estimator under stealthy attacks
  publication-title: Automatica
– volume: 59
  start-page: 1454
  year: 2014
  end-page: 1467
  ident: b1
  article-title: Secure estimation and control for cyber–physical systems under adversarial attacks
  publication-title: IEEE Trans Automat Control
– year: 2021
  ident: b33
  article-title: Stochastic event-triggered
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 32
  start-page: 1049
  year: 1996
  end-page: 1055
  ident: b12
  article-title: Recursive state bounding by parallelotopes
  publication-title: Automatica
– volume: 51
  start-page: 2937
  year: 2021
  end-page: 2948
  ident: b18
  article-title: Moving horizon estimation of networked nonlinear systems with random access protocol
  publication-title: IEEE Trans Syst Man Cybern Syst
– year: 2021
  ident: b32
  article-title: Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks
  publication-title: IEEE Trans Cybern
– volume: 49
  start-page: 455
  year: 2019
  end-page: 468
  ident: b21
  article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 60
  start-page: 1665
  year: 2015
  end-page: 1670
  ident: b43
  article-title: A new approach to design interval observers for linear systems
  publication-title: IEEE Trans Automat Control
– volume: 51
  start-page: 176
  year: 2021
  end-page: 190
  ident: b4
  article-title: Secure state estimation and control of cyber–physical systems: a survey
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 58
  start-page: 3218
  year: 2013
  end-page: 3224
  ident: b35
  article-title: Interval observers for time-varying discrete-time systems
  publication-title: IEEE Trans Automat Control
– volume: 14
  start-page: 721
  year: 2020
  end-page: 740
  ident: b37
  article-title: Design and applications of interval observers for uncertain dynamical systems
  publication-title: IET Circuits Devices Syst
– volume: 125
  year: 2021
  ident: b10
  article-title: Sufficient conditions for a class of matrix-valued polynomial inequalities on closed intervals and application to
  publication-title: Automatica
– volume: 39
  start-page: 1310
  year: 1994
  end-page: 1314
  ident: b6
  article-title: Robust Kalman filtering for uncertain discrete-time systems
  publication-title: IEEE Trans Automat Control
– volume: 57
  start-page: 260
  year: 2012
  end-page: 265
  ident: b17
  article-title: Interval state estimation for a class of nonlinear systems
  publication-title: IEEE Trans Automat Control
– volume: 127
  year: 2021
  ident: b20
  article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
  publication-title: Automatica
– volume: 109
  year: 2019
  ident: b30
  article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
– year: 2021
  ident: b44
  article-title: IPR-based distributed interval observers design for uncertain LTI systems
  publication-title: ISA Trans
– volume: 123
  start-page: 69
  year: 2019
  end-page: 74
  ident: b46
  article-title: Interval estimation for discrete-time linear systems: a two-step method
  publication-title: Syst Control Lett
– volume: 43
  start-page: 2205
  year: 1995
  end-page: 2209
  ident: b7
  article-title: Nonlinear filtering of discrete-time processes
  publication-title: IEEE Trans Signal Process
– volume: 50
  start-page: 1220
  year: 2020
  end-page: 1229
  ident: b24
  article-title: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks
  publication-title: IEEE Trans Cybern
– volume: 15
  start-page: 2483
  year: 2019
  end-page: 2499
  ident: b2
  article-title: A survey on model-based distributed control and filtering for industrial cyber–physical systems
  publication-title: IEEE Trans Indust Inform
– volume: 50
  start-page: 1306
  year: 2020
  end-page: 1320
  ident: b11
  article-title: Distributed event-triggered estimation over sensor networks: a survey
  publication-title: IEEE Trans Cybern
– reference: Dan G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE international conference on smart grid communications. Gaithersburg, MD, USA; 2010, p. 214–9.
– volume: 49
  start-page: 1148
  year: 2019
  end-page: 1159
  ident: b8
  article-title: A threshold-parameter-dependent approach to designing distributed event-triggered
  publication-title: IEEE Trans Cybern
– volume: 49
  start-page: 171
  year: 2019
  end-page: 183
  ident: b14
  article-title: A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks
  publication-title: IEEE Trans Cybern
– volume: 49
  start-page: 200
  year: 2013
  end-page: 205
  ident: b36
  article-title: Interval state observer for nonlinear time varying systems
  publication-title: Automatica
– year: 2006
  ident: b9
  article-title: Optimal state estimation: Kalman,
– volume: 116
  start-page: 1
  year: 2021
  end-page: 16
  ident: b3
  article-title: A survey on attack detection, estimation and control of industrial cyber–physical systems
  publication-title: ISA Trans
– volume: 51
  start-page: 5609
  year: 2021
  end-page: 5618
  ident: b48
  article-title: Cluster consensus of multiagent systems with weighted antagonistic interactions
  publication-title: IEEE Trans Cybern
– volume: 357
  start-page: 9045
  year: 2020
  end-page: 9062
  ident: b41
  article-title: Interval estimation of state and unknown input for linear discrete-time systems
  publication-title: J Franklin Inst
– volume: 104
  start-page: 130
  year: 2020
  end-page: 137
  ident: b26
  article-title: Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks
  publication-title: ISA Trans
– volume: 51
  start-page: 6466
  year: 2021
  end-page: 6476
  ident: b23
  article-title: Recursive filtering of distributed cyber–physical systems with attack detection
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 41
  start-page: 1035
  year: 2005
  end-page: 1043
  ident: b13
  article-title: Guaranteed state estimation by zonotopes
  publication-title: Automatica
– volume: 64
  start-page: 4717
  year: 2019
  end-page: 4724
  ident: b45
  article-title: Interval estimation methods for discrete-time linear time-invariant systems
  publication-title: IEEE Trans Automat Control
– volume: 74
  start-page: 206
  year: 2016
  end-page: 213
  ident: b47
  article-title: Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays
  publication-title: Automatica
– volume: 413
  year: 2022
  ident: b25
  article-title: A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks
  publication-title: Appl Math Comput
– volume: 116
  start-page: 41
  year: 2018
  end-page: 46
  ident: b40
  article-title: Interval observer design for uncertain discrete-time linear systems
  publication-title: Syst Control Lett
– volume: 55
  start-page: 523
  year: 2010
  end-page: 527
  ident: b38
  article-title: Asymptotically stable interval observers for planar systems with complex poles
  publication-title: IEEE Trans Automat Control
– year: 2003
  ident: b50
  article-title: Generalized inverses: Theory and applications
– volume: 67
  start-page: 5101
  year: 2020
  end-page: 5112
  ident: b27
  article-title: Interval functional observers design for time-delay systems under stealthy attacks
  publication-title: IEEE Trans Circuits Syst I Regul Pap
– volume: 64
  start-page: 5191
  year: 2019
  end-page: 5198
  ident: b19
  article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol
  publication-title: IEEE Trans Automat Control
– volume: 104
  start-page: 1
  year: 2020
  end-page: 14
  ident: b22
  article-title: Observer-based
  publication-title: ISA Trans
– reference: Olfati-Saber R. Distributed Kalman filtering for sensor networks. In: Proceedings of the 46th IEEE conference on decision and control, Vol. 1-14. New Orleans, LA, USA; 2007, p. 1814–20.
– volume: 47
  start-page: 140
  year: 2011
  end-page: 147
  ident: b16
  article-title: Interval observers for linear time-invariant systems with disturbances
  publication-title: Automatica
– year: 2015
  ident: b31
  article-title: Remote exploitation of an unaltered passenger vehicle
– volume: 66
  start-page: 637
  year: 2021
  end-page: 650
  ident: b34
  article-title: The vulnerability of cyber–physical system under stealthy attacks
  publication-title: IEEE Trans Automat Control
– volume: 6
  start-page: 570
  year: 2020
  end-page: 579
  ident: b28
  article-title: Interval observer design under stealthy attacks and improved event-triggered protocols
  publication-title: IEEE Trans Signal Inform Process Netw
– volume: 64
  start-page: 5191
  issue: 12
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b19
  article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2019.2910167
– volume: 59
  start-page: 1454
  issue: 6
  year: 2014
  ident: 10.1016/j.isatra.2022.01.010_b1
  article-title: Secure estimation and control for cyber–physical systems under adversarial attacks
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2014.2303233
– ident: 10.1016/j.isatra.2022.01.010_b5
  doi: 10.1109/CDC.2007.4434303
– volume: 32
  start-page: 1049
  issue: 7
  year: 1996
  ident: 10.1016/j.isatra.2022.01.010_b12
  article-title: Recursive state bounding by parallelotopes
  publication-title: Automatica
  doi: 10.1016/0005-1098(96)00048-9
– volume: 14
  start-page: 721
  issue: 6
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b37
  article-title: Design and applications of interval observers for uncertain dynamical systems
  publication-title: IET Circuits Devices Syst
  doi: 10.1049/iet-cds.2020.0004
– volume: 357
  start-page: 9045
  issue: 13
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b41
  article-title: Interval estimation of state and unknown input for linear discrete-time systems
  publication-title: J Franklin Inst
  doi: 10.1016/j.jfranklin.2020.06.021
– volume: 64
  start-page: 5045
  issue: 6
  year: 2017
  ident: 10.1016/j.isatra.2022.01.010_b15
  article-title: Event-based set-membership leader-following consensus of networked multi-agent systems subject to limited communication resources and unknown-but-bounded noise
  publication-title: IEEE Trans Indust Electr
  doi: 10.1109/TIE.2016.2613929
– volume: 57
  start-page: 260
  issue: 1
  year: 2012
  ident: 10.1016/j.isatra.2022.01.010_b17
  article-title: Interval state estimation for a class of nonlinear systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2011.2164820
– volume: 104
  start-page: 130
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b26
  article-title: Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2019.02.036
– year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b33
  article-title: Stochastic event-triggered H∞ control for networked systems under denial of service attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
– volume: 123
  start-page: 69
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b46
  article-title: Interval estimation for discrete-time linear systems: a two-step method
  publication-title: Syst Control Lett
  doi: 10.1016/j.sysconle.2018.11.001
– volume: 127
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b20
  article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109517
– volume: 50
  start-page: 1220
  issue: 3
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b24
  article-title: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2900478
– year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b44
  article-title: IPR-based distributed interval observers design for uncertain LTI systems
  publication-title: ISA Trans
– volume: 133
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b29
  article-title: The vulnerability of distributed state estimator under stealthy attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109869
– volume: 39
  start-page: 1310
  issue: 6
  year: 1994
  ident: 10.1016/j.isatra.2022.01.010_b6
  article-title: Robust Kalman filtering for uncertain discrete-time systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/9.293203
– volume: 43
  start-page: 2205
  issue: 9
  year: 1995
  ident: 10.1016/j.isatra.2022.01.010_b7
  article-title: H∞ Nonlinear filtering of discrete-time processes
  publication-title: IEEE Trans Signal Process
  doi: 10.1109/78.414787
– volume: 116
  start-page: 41
  year: 2018
  ident: 10.1016/j.isatra.2022.01.010_b40
  article-title: Interval observer design for uncertain discrete-time linear systems
  publication-title: Syst Control Lett
  doi: 10.1016/j.sysconle.2018.04.003
– volume: 125
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b10
  article-title: Sufficient conditions for a class of matrix-valued polynomial inequalities on closed intervals and application to H∞ filtering for linear systems with time-varying delays
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109390
– volume: 116
  start-page: 1
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b3
  article-title: A survey on attack detection, estimation and control of industrial cyber–physical systems
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2021.01.036
– volume: 51
  start-page: 6466
  issue: 10
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b23
  article-title: Recursive filtering of distributed cyber–physical systems with attack detection
  publication-title: IEEE Trans Syst Man Cybern Syst
  doi: 10.1109/TSMC.2019.2960541
– volume: 67
  start-page: 5101
  issue: 12
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b27
  article-title: Interval functional observers design for time-delay systems under stealthy attacks
  publication-title: IEEE Trans Circuits Syst I Regul Pap
  doi: 10.1109/TCSI.2020.3001402
– volume: 50
  start-page: 4008
  issue: 9
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b39
  article-title: Coordination control for uncertain networked systems using interval observers
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2945580
– year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b32
  article-title: Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks
  publication-title: IEEE Trans Cybern
– volume: 6
  start-page: 570
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b28
  article-title: Interval observer design under stealthy attacks and improved event-triggered protocols
  publication-title: IEEE Trans Signal Inform Process Netw
– ident: 10.1016/j.isatra.2022.01.010_b49
  doi: 10.1109/SMARTGRID.2010.5622046
– volume: 15
  start-page: 2483
  issue: 5
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b2
  article-title: A survey on model-based distributed control and filtering for industrial cyber–physical systems
  publication-title: IEEE Trans Indust Inform
  doi: 10.1109/TII.2019.2905295
– volume: 109
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b30
  article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108557
– volume: 51
  start-page: 176
  issue: 1
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b4
  article-title: Secure state estimation and control of cyber–physical systems: a survey
  publication-title: IEEE Trans Syst Man Cybern Syst
  doi: 10.1109/TSMC.2020.3041121
– volume: 49
  start-page: 200
  issue: 1
  year: 2013
  ident: 10.1016/j.isatra.2022.01.010_b36
  article-title: Interval state observer for nonlinear time varying systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2012.07.004
– volume: 413
  year: 2022
  ident: 10.1016/j.isatra.2022.01.010_b25
  article-title: A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks
  publication-title: Appl Math Comput
  doi: 10.1016/j.amc.2021.126638
– volume: 66
  start-page: 637
  issue: 2
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b34
  article-title: The vulnerability of cyber–physical system under stealthy attacks
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2020.2987307
– year: 2006
  ident: 10.1016/j.isatra.2022.01.010_b9
– volume: 51
  start-page: 2937
  issue: 5
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b18
  article-title: Moving horizon estimation of networked nonlinear systems with random access protocol
  publication-title: IEEE Trans Syst Man Cybern Syst
  doi: 10.1109/TSMC.2019.2918002
– volume: 41
  start-page: 1035
  issue: 6
  year: 2005
  ident: 10.1016/j.isatra.2022.01.010_b13
  article-title: Guaranteed state estimation by zonotopes
  publication-title: Automatica
  doi: 10.1016/j.automatica.2004.12.008
– volume: 60
  start-page: 1665
  issue: 6
  year: 2015
  ident: 10.1016/j.isatra.2022.01.010_b43
  article-title: A new approach to design interval observers for linear systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2014.2359714
– year: 2003
  ident: 10.1016/j.isatra.2022.01.010_b50
– volume: 58
  start-page: 3218
  issue: 12
  year: 2013
  ident: 10.1016/j.isatra.2022.01.010_b35
  article-title: Interval observers for time-varying discrete-time systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2013.2263936
– volume: 74
  start-page: 206
  year: 2016
  ident: 10.1016/j.isatra.2022.01.010_b47
  article-title: Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.07.043
– volume: 49
  start-page: 455
  issue: 2
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b21
  article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern Syst
  doi: 10.1109/TSMC.2017.2697450
– volume: 49
  start-page: 1148
  issue: 4
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b8
  article-title: A threshold-parameter-dependent approach to designing distributed event-triggered H∞ consensus filters over sensor networks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2789296
– volume: 104
  start-page: 1
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b22
  article-title: Observer-based H∞ control for cyber–physical systems encountering DoS jamming attacks: an attack-tolerant approach
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2019.12.014
– volume: 55
  start-page: 523
  issue: 2
  year: 2010
  ident: 10.1016/j.isatra.2022.01.010_b38
  article-title: Asymptotically stable interval observers for planar systems with complex poles
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2009.2037472
– volume: 50
  start-page: 1306
  issue: 3
  year: 2020
  ident: 10.1016/j.isatra.2022.01.010_b11
  article-title: Distributed event-triggered estimation over sensor networks: a survey
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2917179
– volume: 24
  start-page: 2867
  year: 2014
  ident: 10.1016/j.isatra.2022.01.010_b42
  article-title: Interval observers for discrete-time systems
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.3030
– volume: 47
  start-page: 140
  issue: 1
  year: 2011
  ident: 10.1016/j.isatra.2022.01.010_b16
  article-title: Interval observers for linear time-invariant systems with disturbances
  publication-title: Automatica
  doi: 10.1016/j.automatica.2010.10.019
– volume: 49
  start-page: 171
  issue: 1
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b14
  article-title: A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2769722
– volume: 64
  start-page: 4717
  issue: 11
  year: 2019
  ident: 10.1016/j.isatra.2022.01.010_b45
  article-title: Interval estimation methods for discrete-time linear time-invariant systems
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2019.2902673
– year: 2015
  ident: 10.1016/j.isatra.2022.01.010_b31
– volume: 51
  start-page: 5609
  issue: 11
  year: 2021
  ident: 10.1016/j.isatra.2022.01.010_b48
  article-title: Cluster consensus of multiagent systems with weighted antagonistic interactions
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2020.2966083
SSID ssj0002598
Score 2.3852606
Snippet This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since...
This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since...
SourceID proquest
pubmed
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 22
SubjectTerms [formula omitted]-gain optimization
Distributed observer
Interval estimation
Linear programming
Random stealthy attack
Title Distributed interval state estimation with l∞-gain optimization for cyber–physical systems subject to bounded disturbance and random stealthy attacks
URI https://dx.doi.org/10.1016/j.isatra.2022.01.010
https://www.ncbi.nlm.nih.gov/pubmed/35086672
https://www.proquest.com/docview/2623891531
Volume 127
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9QwELWqcikHRFs-Fmg1lTjAwbRre-3ssVqolhYqhKjUm2U7TrVom6x2s4deKo7cOXHpj-svYSZxCkhFlZAiRVklcZSZzDx7571h7GVucqE9zk5MlJorIfrcO6V5zDB3GJcNc0cL-h-P9fhEHZ4OTlfYqOPCUFlliv1tTG-idfplN73N3dlkQhxfTGakxi4a4EKMcqUMefmby99lHgjvUzQecjq7o881NV5UMTMn9SEhGvFO4tHenp7-BT-bNHTwkD1I-BH220dcZyux3GD3_1AV3GDr6XtdwKskKv16k_18Swq51Nwq5jBpCh3xNg2dCEhoo2UwAi3LwvT6-xU_c5MSKgwo54mpCQhvIVz4OL_-9mOWzAutEvQCFktPKzpQV-CpUxOOkuOIy7kntwJX5oBZMa_Ogdxqiu4Brq6J4P-InRy8-zIa89SWgQdhTM1D5nFvFAm3q2IwyITvh2JITTu0x3hRiMz7ILVU0pkCp1vKOwy5USP2M847-ZitllUZnzIQwQSdSW8KZVQolAsYexFT0awsl9L3mOysYUPSLKfWGVPbFad9ta0NLdnQ7vVx2-sxfnPVrNXsuON80xna_uV7FtPKHVfudH5h8bOk_1pcGavlwgqEldkQ00m_x560DnPzLBJBsdZGPPvvcZ-zNTpqCxFfsNV6voxbCI5qv914_za7tz_6_OET7d8fjY9_Acn3E_I
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VcgAOiJbX8hwkDnAw7dpeO3tEhWqBtqdW6s2ynaRatE1Wu9lDLxVH7py48OP6S5hJnAISqBJSpEiJE1uZ8cxnZ-YbgJe5zaUJtDqxhTJCSzkUwWsjiox8h_XZOPe8ob9_YCZH-uPx6HgNdvpcGA6rTLa_s-mttU5XttLX3JpPp5zjS86M2dhlC1zsNbiuafpyGYM357_iPAjfJ3M8Fty8z59rg7w4ZGbB9ENStuydnEj7d__0L_zZ-qHdO3A7AUh8241xA9aKahNu_UYruAkbacIu8VVilX59F76_Y4pcrm5V5DhtIx3pNW0-ETLTRpfCiLwvi7OLrz_EiZ9WWJNFOU2pmkj4FuNZKBYXX77Nk3yxo4Je4nIVeEsHmxoDl2qiXnLqcbUIrFfoqxzJLeb1KbJezUg_0DcNZ_jfg6Pd94c7E5HqMogorW1EzAKdrWbmdl2ORpkMw1iOuWqHCWQwSpmFEJVRWnlb0npLB082tzAE_qwPXt2H9aquioeAMtpoMhVsqa2OpfaRjC-BKl6W5UqFAaheGi4m0nKunTFzfXTaZ9fJ0LEM3faQju0BiMun5h1pxxXtbS9o94fyOfIrVzz5otcLR_OSf7b4qqhXSycJV2Zj8ifDATzoFOZyLIpQsTFWPvrvfp_Djcnh_p7b-3Dw6THc5DtdVOITWG8Wq-IpIaUmPGtnwk9NdBPr
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+interval+state+estimation+with+l+%E2%88%9E+-gain+optimization+for+cyber-physical+systems+subject+to+bounded+disturbance+and+random+stealthy+attacks&rft.jtitle=ISA+transactions&rft.au=Xie%2C+Jiyang&rft.au=Zhu%2C+Shuqian&rft.au=Zhang%2C+Dawei&rft.date=2022-08-01&rft.eissn=1879-2022&rft_id=info:doi/10.1016%2Fj.isatra.2022.01.010&rft_id=info%3Apmid%2F35086672&rft.externalDocID=35086672
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon