Distributed interval state estimation with l∞-gain optimization for cyber–physical systems subject to bounded disturbance and random stealthy attacks
This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed in...
Saved in:
Published in | ISA transactions Vol. 127; pp. 22 - 31 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
United States
Elsevier Ltd
01.08.2022
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.
•A new distributed interval observation method for general linear system is proposed.•The disturbance attenuation problem of stochastic interval error systems is solved.•The method can provide real-time changing ranges of CPS dynamics against attacks. |
---|---|
AbstractList | This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.
•A new distributed interval observation method for general linear system is proposed.•The disturbance attenuation problem of stochastic interval error systems is solved.•The method can provide real-time changing ranges of CPS dynamics against attacks. This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l -gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results. This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results.This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since conventional interval observers cannot complete the task of real-time monitoring system under random attacks, an attack-resistant distributed interval observer is designed by using attack frequency and interval attack estimation. Using the designed observer, upper- and lower-bounding estimation error systems are modeled by positive interconnected systems with hybrid deterministic and random bounded inputs. To explicitly attenuate the effect of disturbance and attacks, the resulting deterministic positive error system between upper- and lower-bounding estimates is formulated. By linear programming, the results of interval observer design and l∞-gain optimization are proposed. The remote monitoring of vehicle lateral dynamic is given for numerical verification of the results. |
Author | Zhang, Dawei Xie, Jiyang Zhu, Shuqian |
Author_xml | – sequence: 1 givenname: Jiyang orcidid: 0000-0002-7393-2947 surname: Xie fullname: Xie, Jiyang – sequence: 2 givenname: Shuqian surname: Zhu fullname: Zhu, Shuqian – sequence: 3 givenname: Dawei orcidid: 0000-0003-1573-1079 surname: Zhang fullname: Zhang, Dawei email: dwzhang@sdu.edu.cn |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/35086672$$D View this record in MEDLINE/PubMed |
BookMark | eNqFUT2P1DAQtdAhbu_gHyDkkiaLvxI7FEjo-JROooHasp0J6yWJF9s5FCpKeioaftz9ErzkrqEAaeSRZt57I793hk6mMAFCDynZUkKbJ_utTyZHs2WEsS2hpcgdtKFKttVxdII2hNC2IrVUp-gspT0hhNWtuodOeU1U00i2QT9f-JSjt3OGDvspQ7wyA07ZZMCQsh9N9mHCX3ze4eH6-6_qo_ETDoey8V_XXR8idouFeP3tx2G3JO-OCkvKMCacZrsHl3EO2IZ56sqVrlycozWTA2ymDsfyhLHcBDPk3YJNzsZ9SvfR3d4MCR7c9HP04dXL9xdvqst3r99ePL-sHJMyV07Z0qVoBSeir2vFLHV9SwSTjeWE9kxZ63jDBTeyp0IJa2TDoBG0kcYafo4er7qHGD7P5c969MnBMJgJwpw0axhXLa05LdBHN9DZjtDpQyz-xEXf2lkAT1eAiyGlCL12Pv9xqQTlB02JPman93rNTh-D0oSWIoUs_iLf6v-H9mylQTHpykPUyXko5nY-Fud1F_y_BX4DuNK6mg |
CitedBy_id | crossref_primary_10_3390_math12213385 crossref_primary_10_1016_j_isatra_2022_09_020 crossref_primary_10_1088_1674_1056_acb9fc crossref_primary_10_1109_TCSI_2024_3427379 crossref_primary_10_1016_j_isatra_2022_06_018 crossref_primary_10_1109_TCNS_2023_3295345 crossref_primary_10_1109_TASE_2024_3352071 crossref_primary_10_1016_j_isatra_2023_09_011 crossref_primary_10_1177_01423312231189107 |
Cites_doi | 10.1109/TAC.2019.2910167 10.1109/TAC.2014.2303233 10.1109/CDC.2007.4434303 10.1016/0005-1098(96)00048-9 10.1049/iet-cds.2020.0004 10.1016/j.jfranklin.2020.06.021 10.1109/TIE.2016.2613929 10.1109/TAC.2011.2164820 10.1016/j.isatra.2019.02.036 10.1016/j.sysconle.2018.11.001 10.1016/j.automatica.2021.109517 10.1109/TCYB.2019.2900478 10.1016/j.automatica.2021.109869 10.1109/9.293203 10.1109/78.414787 10.1016/j.sysconle.2018.04.003 10.1016/j.automatica.2020.109390 10.1016/j.isatra.2021.01.036 10.1109/TSMC.2019.2960541 10.1109/TCSI.2020.3001402 10.1109/TCYB.2019.2945580 10.1109/SMARTGRID.2010.5622046 10.1109/TII.2019.2905295 10.1016/j.automatica.2019.108557 10.1109/TSMC.2020.3041121 10.1016/j.automatica.2012.07.004 10.1016/j.amc.2021.126638 10.1109/TAC.2020.2987307 10.1109/TSMC.2019.2918002 10.1016/j.automatica.2004.12.008 10.1109/TAC.2014.2359714 10.1109/TAC.2013.2263936 10.1016/j.automatica.2016.07.043 10.1109/TSMC.2017.2697450 10.1109/TCYB.2017.2789296 10.1016/j.isatra.2019.12.014 10.1109/TAC.2009.2037472 10.1109/TCYB.2019.2917179 10.1002/rnc.3030 10.1016/j.automatica.2010.10.019 10.1109/TCYB.2017.2769722 10.1109/TAC.2019.2902673 10.1109/TCYB.2020.2966083 |
ContentType | Journal Article |
Copyright | 2022 ISA Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved. |
Copyright_xml | – notice: 2022 ISA – notice: Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved. |
DBID | AAYXX CITATION NPM 7X8 |
DOI | 10.1016/j.isatra.2022.01.010 |
DatabaseName | CrossRef PubMed MEDLINE - Academic |
DatabaseTitle | CrossRef PubMed MEDLINE - Academic |
DatabaseTitleList | PubMed MEDLINE - Academic |
Database_xml | – sequence: 1 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 1879-2022 |
EndPage | 31 |
ExternalDocumentID | 35086672 10_1016_j_isatra_2022_01_010 S0019057822000167 |
Genre | Journal Article |
GroupedDBID | --- --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29J 4.4 457 4G. 53G 5GY 5VS 6P2 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABFNM ABFRF ABJNI ABMAC ABNEU ABTAH ABXDB ABYKQ ACDAQ ACFVG ACGFO ACNNM ACRLP ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFDAS AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 GBLVA HVGLF HZ~ IHE J1W JJJVA KOM LY7 M41 MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- ROL RPZ SDF SDG SES SET SEW SPC SPCBC SPD SSQ SST SSZ T5K T9H TAE TN5 UHS UNMZH WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH NPM 7X8 EFKBS |
ID | FETCH-LOGICAL-c277t-c8b2777494304f5582b1cf904276b301f28bbc36343a7f1484ba762e64167aba3 |
IEDL.DBID | .~1 |
ISSN | 0019-0578 1879-2022 |
IngestDate | Sun Aug 24 04:03:03 EDT 2025 Wed Feb 19 02:27:00 EST 2025 Thu Apr 24 23:09:47 EDT 2025 Tue Jul 01 04:36:07 EDT 2025 Fri Feb 23 02:38:58 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Distributed observer Linear programming l∞-gain optimization Random stealthy attack Interval estimation gain optimization |
Language | English |
License | Copyright © 2022 ISA. Published by Elsevier Ltd. All rights reserved. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c277t-c8b2777494304f5582b1cf904276b301f28bbc36343a7f1484ba762e64167aba3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0003-1573-1079 0000-0002-7393-2947 |
PMID | 35086672 |
PQID | 2623891531 |
PQPubID | 23479 |
PageCount | 10 |
ParticipantIDs | proquest_miscellaneous_2623891531 pubmed_primary_35086672 crossref_citationtrail_10_1016_j_isatra_2022_01_010 crossref_primary_10_1016_j_isatra_2022_01_010 elsevier_sciencedirect_doi_10_1016_j_isatra_2022_01_010 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-08-01 |
PublicationDateYYYYMMDD | 2022-08-01 |
PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | United States |
PublicationPlace_xml | – name: United States |
PublicationTitle | ISA transactions |
PublicationTitleAlternate | ISA Trans |
PublicationYear | 2022 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Peng, Wu, Tian (b33) 2021 Wang, Wang, Su, Lam (b39) 2020; 50 Xiao, Han, Ge, Zhang (b24) 2020; 50 Mazenc, Dinh, Niculescu (b42) 2014; 24 Tang, Wang, Wang, Raissi, Shen (b45) 2019; 64 Ge, Han, Wang (b14) 2019; 49 Zhang, Sun, Lin (b20) 2021; 127 Zhao, Peng, Han, Zhang (b48) 2021; 51 Fawzi, Tabuada, Diggavi (b1) 2014; 59 Zhang, Wang, Feng, Shi, A.V. (b3) 2021; 116 Li, Wei, Ding (b28) 2020; 6 Li, Chang, Chen, Raissi (b44) 2021 Wang, Liu, Xu (b22) 2020; 104 Ge, Han, Wang (b8) 2019; 49 Mazenc, Bernard (b38) 2010; 55 Xie, Soh, de Souza (b6) 1994; 39 Huong, Huynh, Trinh (b27) 2020; 67 Raissi, Efimov, Zolghadri (b17) 2012; 57 Efimov, Perruquetti, Raissi, Zolghadri (b35) 2013; 58 Gu, Zhou, Zhang, Yang, Shen (b26) 2020; 104 Ben-Israel, Greville (b50) 2003 Ding, Han, Ge, Wang (b4) 2021; 51 Briat, Khammash (b47) 2016; 74 Zou, Wang, Han, Zhou (b19) 2019; 64 Wang, Lim, Shen (b40) 2018; 116 Cacace, Germani, Manes (b43) 2015; 60 Mazenc, Bernard (b16) 2011; 47 Sui, Sun (b29) 2021; 133 Simon (b9) 2006 Li, Raissi, Wang, Wang, Shen (b41) 2020; 357 Miller, Valasek (b31) 2015 Ge, Han, Zhong, Zhang (b30) 2019; 109 Zou, Wang, Han, Zhou (b18) 2021; 51 Shaked, Berman (b7) 1995; 43 Sui, Mo, Marelli, Sun, Fu (b34) 2021; 66 Ge, Han, Zhang, Ding, Yang (b11) 2020; 50 Olfati-Saber R. Distributed Kalman filtering for sensor networks. In: Proceedings of the 46th IEEE conference on decision and control, Vol. 1-14. New Orleans, LA, USA; 2007, p. 1814–20. Ding, Han, Wang, Ge (b23) 2021; 51 Tang, Wang, Shen (b46) 2019; 123 Chen, Ho, Zhang, Yu (b21) 2019; 49 Zhang, Han, Ge (b10) 2021; 125 Ge, Han, Yang (b15) 2017; 64 Khan, Xie, Zhang, Liu (b37) 2020; 14 Xie, Zhu, Zhang (b25) 2022; 413 Xiao, Ge, Han, Zhang (b32) 2021 Efimov, Raissi, Chebotarevc, Zolghadri (b36) 2013; 49 Dan G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE international conference on smart grid communications. Gaithersburg, MD, USA; 2010, p. 214–9. Alamo, Bravo, Camacho (b13) 2005; 41 Ding, Han, Wang, Ge (b2) 2019; 15 Chisci, Garulli, Zappa (b12) 1996; 32 Gu (10.1016/j.isatra.2022.01.010_b26) 2020; 104 Chisci (10.1016/j.isatra.2022.01.010_b12) 1996; 32 Shaked (10.1016/j.isatra.2022.01.010_b7) 1995; 43 Ge (10.1016/j.isatra.2022.01.010_b14) 2019; 49 Peng (10.1016/j.isatra.2022.01.010_b33) 2021 Ding (10.1016/j.isatra.2022.01.010_b2) 2019; 15 Ding (10.1016/j.isatra.2022.01.010_b4) 2021; 51 Ding (10.1016/j.isatra.2022.01.010_b23) 2021; 51 Zhang (10.1016/j.isatra.2022.01.010_b3) 2021; 116 Xiao (10.1016/j.isatra.2022.01.010_b24) 2020; 50 Mazenc (10.1016/j.isatra.2022.01.010_b16) 2011; 47 Cacace (10.1016/j.isatra.2022.01.010_b43) 2015; 60 Xie (10.1016/j.isatra.2022.01.010_b25) 2022; 413 Wang (10.1016/j.isatra.2022.01.010_b39) 2020; 50 Tang (10.1016/j.isatra.2022.01.010_b45) 2019; 64 Efimov (10.1016/j.isatra.2022.01.010_b36) 2013; 49 Li (10.1016/j.isatra.2022.01.010_b28) 2020; 6 Efimov (10.1016/j.isatra.2022.01.010_b35) 2013; 58 Zhao (10.1016/j.isatra.2022.01.010_b48) 2021; 51 Zou (10.1016/j.isatra.2022.01.010_b19) 2019; 64 Miller (10.1016/j.isatra.2022.01.010_b31) 2015 Sui (10.1016/j.isatra.2022.01.010_b34) 2021; 66 Raissi (10.1016/j.isatra.2022.01.010_b17) 2012; 57 Wang (10.1016/j.isatra.2022.01.010_b22) 2020; 104 Wang (10.1016/j.isatra.2022.01.010_b40) 2018; 116 Ge (10.1016/j.isatra.2022.01.010_b8) 2019; 49 Zou (10.1016/j.isatra.2022.01.010_b18) 2021; 51 Fawzi (10.1016/j.isatra.2022.01.010_b1) 2014; 59 Ge (10.1016/j.isatra.2022.01.010_b11) 2020; 50 Li (10.1016/j.isatra.2022.01.010_b41) 2020; 357 Alamo (10.1016/j.isatra.2022.01.010_b13) 2005; 41 Sui (10.1016/j.isatra.2022.01.010_b29) 2021; 133 Huong (10.1016/j.isatra.2022.01.010_b27) 2020; 67 Zhang (10.1016/j.isatra.2022.01.010_b10) 2021; 125 Mazenc (10.1016/j.isatra.2022.01.010_b38) 2010; 55 Chen (10.1016/j.isatra.2022.01.010_b21) 2019; 49 Mazenc (10.1016/j.isatra.2022.01.010_b42) 2014; 24 Tang (10.1016/j.isatra.2022.01.010_b46) 2019; 123 Simon (10.1016/j.isatra.2022.01.010_b9) 2006 10.1016/j.isatra.2022.01.010_b5 Briat (10.1016/j.isatra.2022.01.010_b47) 2016; 74 Ben-Israel (10.1016/j.isatra.2022.01.010_b50) 2003 Ge (10.1016/j.isatra.2022.01.010_b15) 2017; 64 Ge (10.1016/j.isatra.2022.01.010_b30) 2019; 109 Li (10.1016/j.isatra.2022.01.010_b44) 2021 Xie (10.1016/j.isatra.2022.01.010_b6) 1994; 39 10.1016/j.isatra.2022.01.010_b49 Zhang (10.1016/j.isatra.2022.01.010_b20) 2021; 127 Xiao (10.1016/j.isatra.2022.01.010_b32) 2021 Khan (10.1016/j.isatra.2022.01.010_b37) 2020; 14 |
References_xml | – volume: 24 start-page: 2867 year: 2014 end-page: 2890 ident: b42 article-title: Interval observers for discrete-time systems publication-title: Internat J Robust Nonlinear Control – volume: 50 start-page: 4008 year: 2020 end-page: 4019 ident: b39 article-title: Coordination control for uncertain networked systems using interval observers publication-title: IEEE Trans Cybern – volume: 64 start-page: 5045 year: 2017 end-page: 5054 ident: b15 article-title: Event-based set-membership leader-following consensus of networked multi-agent systems subject to limited communication resources and unknown-but-bounded noise publication-title: IEEE Trans Indust Electr – volume: 133 year: 2021 ident: b29 article-title: The vulnerability of distributed state estimator under stealthy attacks publication-title: Automatica – volume: 59 start-page: 1454 year: 2014 end-page: 1467 ident: b1 article-title: Secure estimation and control for cyber–physical systems under adversarial attacks publication-title: IEEE Trans Automat Control – year: 2021 ident: b33 article-title: Stochastic event-triggered publication-title: IEEE Trans Syst Man Cybern Syst – volume: 32 start-page: 1049 year: 1996 end-page: 1055 ident: b12 article-title: Recursive state bounding by parallelotopes publication-title: Automatica – volume: 51 start-page: 2937 year: 2021 end-page: 2948 ident: b18 article-title: Moving horizon estimation of networked nonlinear systems with random access protocol publication-title: IEEE Trans Syst Man Cybern Syst – year: 2021 ident: b32 article-title: Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks publication-title: IEEE Trans Cybern – volume: 49 start-page: 455 year: 2019 end-page: 468 ident: b21 article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 60 start-page: 1665 year: 2015 end-page: 1670 ident: b43 article-title: A new approach to design interval observers for linear systems publication-title: IEEE Trans Automat Control – volume: 51 start-page: 176 year: 2021 end-page: 190 ident: b4 article-title: Secure state estimation and control of cyber–physical systems: a survey publication-title: IEEE Trans Syst Man Cybern Syst – volume: 58 start-page: 3218 year: 2013 end-page: 3224 ident: b35 article-title: Interval observers for time-varying discrete-time systems publication-title: IEEE Trans Automat Control – volume: 14 start-page: 721 year: 2020 end-page: 740 ident: b37 article-title: Design and applications of interval observers for uncertain dynamical systems publication-title: IET Circuits Devices Syst – volume: 125 year: 2021 ident: b10 article-title: Sufficient conditions for a class of matrix-valued polynomial inequalities on closed intervals and application to publication-title: Automatica – volume: 39 start-page: 1310 year: 1994 end-page: 1314 ident: b6 article-title: Robust Kalman filtering for uncertain discrete-time systems publication-title: IEEE Trans Automat Control – volume: 57 start-page: 260 year: 2012 end-page: 265 ident: b17 article-title: Interval state estimation for a class of nonlinear systems publication-title: IEEE Trans Automat Control – volume: 127 year: 2021 ident: b20 article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol publication-title: Automatica – volume: 109 year: 2019 ident: b30 article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica – year: 2021 ident: b44 article-title: IPR-based distributed interval observers design for uncertain LTI systems publication-title: ISA Trans – volume: 123 start-page: 69 year: 2019 end-page: 74 ident: b46 article-title: Interval estimation for discrete-time linear systems: a two-step method publication-title: Syst Control Lett – volume: 43 start-page: 2205 year: 1995 end-page: 2209 ident: b7 article-title: Nonlinear filtering of discrete-time processes publication-title: IEEE Trans Signal Process – volume: 50 start-page: 1220 year: 2020 end-page: 1229 ident: b24 article-title: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks publication-title: IEEE Trans Cybern – volume: 15 start-page: 2483 year: 2019 end-page: 2499 ident: b2 article-title: A survey on model-based distributed control and filtering for industrial cyber–physical systems publication-title: IEEE Trans Indust Inform – volume: 50 start-page: 1306 year: 2020 end-page: 1320 ident: b11 article-title: Distributed event-triggered estimation over sensor networks: a survey publication-title: IEEE Trans Cybern – reference: Dan G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE international conference on smart grid communications. Gaithersburg, MD, USA; 2010, p. 214–9. – volume: 49 start-page: 1148 year: 2019 end-page: 1159 ident: b8 article-title: A threshold-parameter-dependent approach to designing distributed event-triggered publication-title: IEEE Trans Cybern – volume: 49 start-page: 171 year: 2019 end-page: 183 ident: b14 article-title: A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks publication-title: IEEE Trans Cybern – volume: 49 start-page: 200 year: 2013 end-page: 205 ident: b36 article-title: Interval state observer for nonlinear time varying systems publication-title: Automatica – year: 2006 ident: b9 article-title: Optimal state estimation: Kalman, – volume: 116 start-page: 1 year: 2021 end-page: 16 ident: b3 article-title: A survey on attack detection, estimation and control of industrial cyber–physical systems publication-title: ISA Trans – volume: 51 start-page: 5609 year: 2021 end-page: 5618 ident: b48 article-title: Cluster consensus of multiagent systems with weighted antagonistic interactions publication-title: IEEE Trans Cybern – volume: 357 start-page: 9045 year: 2020 end-page: 9062 ident: b41 article-title: Interval estimation of state and unknown input for linear discrete-time systems publication-title: J Franklin Inst – volume: 104 start-page: 130 year: 2020 end-page: 137 ident: b26 article-title: Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks publication-title: ISA Trans – volume: 51 start-page: 6466 year: 2021 end-page: 6476 ident: b23 article-title: Recursive filtering of distributed cyber–physical systems with attack detection publication-title: IEEE Trans Syst Man Cybern Syst – volume: 41 start-page: 1035 year: 2005 end-page: 1043 ident: b13 article-title: Guaranteed state estimation by zonotopes publication-title: Automatica – volume: 64 start-page: 4717 year: 2019 end-page: 4724 ident: b45 article-title: Interval estimation methods for discrete-time linear time-invariant systems publication-title: IEEE Trans Automat Control – volume: 74 start-page: 206 year: 2016 end-page: 213 ident: b47 article-title: Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays publication-title: Automatica – volume: 413 year: 2022 ident: b25 article-title: A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks publication-title: Appl Math Comput – volume: 116 start-page: 41 year: 2018 end-page: 46 ident: b40 article-title: Interval observer design for uncertain discrete-time linear systems publication-title: Syst Control Lett – volume: 55 start-page: 523 year: 2010 end-page: 527 ident: b38 article-title: Asymptotically stable interval observers for planar systems with complex poles publication-title: IEEE Trans Automat Control – year: 2003 ident: b50 article-title: Generalized inverses: Theory and applications – volume: 67 start-page: 5101 year: 2020 end-page: 5112 ident: b27 article-title: Interval functional observers design for time-delay systems under stealthy attacks publication-title: IEEE Trans Circuits Syst I Regul Pap – volume: 64 start-page: 5191 year: 2019 end-page: 5198 ident: b19 article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol publication-title: IEEE Trans Automat Control – volume: 104 start-page: 1 year: 2020 end-page: 14 ident: b22 article-title: Observer-based publication-title: ISA Trans – reference: Olfati-Saber R. Distributed Kalman filtering for sensor networks. In: Proceedings of the 46th IEEE conference on decision and control, Vol. 1-14. New Orleans, LA, USA; 2007, p. 1814–20. – volume: 47 start-page: 140 year: 2011 end-page: 147 ident: b16 article-title: Interval observers for linear time-invariant systems with disturbances publication-title: Automatica – year: 2015 ident: b31 article-title: Remote exploitation of an unaltered passenger vehicle – volume: 66 start-page: 637 year: 2021 end-page: 650 ident: b34 article-title: The vulnerability of cyber–physical system under stealthy attacks publication-title: IEEE Trans Automat Control – volume: 6 start-page: 570 year: 2020 end-page: 579 ident: b28 article-title: Interval observer design under stealthy attacks and improved event-triggered protocols publication-title: IEEE Trans Signal Inform Process Netw – volume: 64 start-page: 5191 issue: 12 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b19 article-title: Moving horizon estimation for networked time-delay systems under round-robin protocol publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2019.2910167 – volume: 59 start-page: 1454 issue: 6 year: 2014 ident: 10.1016/j.isatra.2022.01.010_b1 article-title: Secure estimation and control for cyber–physical systems under adversarial attacks publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2014.2303233 – ident: 10.1016/j.isatra.2022.01.010_b5 doi: 10.1109/CDC.2007.4434303 – volume: 32 start-page: 1049 issue: 7 year: 1996 ident: 10.1016/j.isatra.2022.01.010_b12 article-title: Recursive state bounding by parallelotopes publication-title: Automatica doi: 10.1016/0005-1098(96)00048-9 – volume: 14 start-page: 721 issue: 6 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b37 article-title: Design and applications of interval observers for uncertain dynamical systems publication-title: IET Circuits Devices Syst doi: 10.1049/iet-cds.2020.0004 – volume: 357 start-page: 9045 issue: 13 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b41 article-title: Interval estimation of state and unknown input for linear discrete-time systems publication-title: J Franklin Inst doi: 10.1016/j.jfranklin.2020.06.021 – volume: 64 start-page: 5045 issue: 6 year: 2017 ident: 10.1016/j.isatra.2022.01.010_b15 article-title: Event-based set-membership leader-following consensus of networked multi-agent systems subject to limited communication resources and unknown-but-bounded noise publication-title: IEEE Trans Indust Electr doi: 10.1109/TIE.2016.2613929 – volume: 57 start-page: 260 issue: 1 year: 2012 ident: 10.1016/j.isatra.2022.01.010_b17 article-title: Interval state estimation for a class of nonlinear systems publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2011.2164820 – volume: 104 start-page: 130 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b26 article-title: Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks publication-title: ISA Trans doi: 10.1016/j.isatra.2019.02.036 – year: 2021 ident: 10.1016/j.isatra.2022.01.010_b33 article-title: Stochastic event-triggered H∞ control for networked systems under denial of service attacks publication-title: IEEE Trans Syst Man Cybern Syst – volume: 123 start-page: 69 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b46 article-title: Interval estimation for discrete-time linear systems: a two-step method publication-title: Syst Control Lett doi: 10.1016/j.sysconle.2018.11.001 – volume: 127 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b20 article-title: Optimal DoS attack schedules on remote state estimation under multi-sensor round-robin protocol publication-title: Automatica doi: 10.1016/j.automatica.2021.109517 – volume: 50 start-page: 1220 issue: 3 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b24 article-title: Secure distributed finite-time filtering for positive systems over sensor networks under deception attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2900478 – year: 2021 ident: 10.1016/j.isatra.2022.01.010_b44 article-title: IPR-based distributed interval observers design for uncertain LTI systems publication-title: ISA Trans – volume: 133 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b29 article-title: The vulnerability of distributed state estimator under stealthy attacks publication-title: Automatica doi: 10.1016/j.automatica.2021.109869 – volume: 39 start-page: 1310 issue: 6 year: 1994 ident: 10.1016/j.isatra.2022.01.010_b6 article-title: Robust Kalman filtering for uncertain discrete-time systems publication-title: IEEE Trans Automat Control doi: 10.1109/9.293203 – volume: 43 start-page: 2205 issue: 9 year: 1995 ident: 10.1016/j.isatra.2022.01.010_b7 article-title: H∞ Nonlinear filtering of discrete-time processes publication-title: IEEE Trans Signal Process doi: 10.1109/78.414787 – volume: 116 start-page: 41 year: 2018 ident: 10.1016/j.isatra.2022.01.010_b40 article-title: Interval observer design for uncertain discrete-time linear systems publication-title: Syst Control Lett doi: 10.1016/j.sysconle.2018.04.003 – volume: 125 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b10 article-title: Sufficient conditions for a class of matrix-valued polynomial inequalities on closed intervals and application to H∞ filtering for linear systems with time-varying delays publication-title: Automatica doi: 10.1016/j.automatica.2020.109390 – volume: 116 start-page: 1 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b3 article-title: A survey on attack detection, estimation and control of industrial cyber–physical systems publication-title: ISA Trans doi: 10.1016/j.isatra.2021.01.036 – volume: 51 start-page: 6466 issue: 10 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b23 article-title: Recursive filtering of distributed cyber–physical systems with attack detection publication-title: IEEE Trans Syst Man Cybern Syst doi: 10.1109/TSMC.2019.2960541 – volume: 67 start-page: 5101 issue: 12 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b27 article-title: Interval functional observers design for time-delay systems under stealthy attacks publication-title: IEEE Trans Circuits Syst I Regul Pap doi: 10.1109/TCSI.2020.3001402 – volume: 50 start-page: 4008 issue: 9 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b39 article-title: Coordination control for uncertain networked systems using interval observers publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2945580 – year: 2021 ident: 10.1016/j.isatra.2022.01.010_b32 article-title: Secure distributed adaptive platooning control of automated vehicles over vehicular ad-hoc networks under denial-of-service attacks publication-title: IEEE Trans Cybern – volume: 6 start-page: 570 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b28 article-title: Interval observer design under stealthy attacks and improved event-triggered protocols publication-title: IEEE Trans Signal Inform Process Netw – ident: 10.1016/j.isatra.2022.01.010_b49 doi: 10.1109/SMARTGRID.2010.5622046 – volume: 15 start-page: 2483 issue: 5 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b2 article-title: A survey on model-based distributed control and filtering for industrial cyber–physical systems publication-title: IEEE Trans Indust Inform doi: 10.1109/TII.2019.2905295 – volume: 109 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b30 article-title: Distributed Krein space-based attack detection over sensor networks under deception attacks publication-title: Automatica doi: 10.1016/j.automatica.2019.108557 – volume: 51 start-page: 176 issue: 1 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b4 article-title: Secure state estimation and control of cyber–physical systems: a survey publication-title: IEEE Trans Syst Man Cybern Syst doi: 10.1109/TSMC.2020.3041121 – volume: 49 start-page: 200 issue: 1 year: 2013 ident: 10.1016/j.isatra.2022.01.010_b36 article-title: Interval state observer for nonlinear time varying systems publication-title: Automatica doi: 10.1016/j.automatica.2012.07.004 – volume: 413 year: 2022 ident: 10.1016/j.isatra.2022.01.010_b25 article-title: A robust distributed secure interval observation approach for uncertain discrete-time positive systems under deception attacks publication-title: Appl Math Comput doi: 10.1016/j.amc.2021.126638 – volume: 66 start-page: 637 issue: 2 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b34 article-title: The vulnerability of cyber–physical system under stealthy attacks publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2020.2987307 – year: 2006 ident: 10.1016/j.isatra.2022.01.010_b9 – volume: 51 start-page: 2937 issue: 5 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b18 article-title: Moving horizon estimation of networked nonlinear systems with random access protocol publication-title: IEEE Trans Syst Man Cybern Syst doi: 10.1109/TSMC.2019.2918002 – volume: 41 start-page: 1035 issue: 6 year: 2005 ident: 10.1016/j.isatra.2022.01.010_b13 article-title: Guaranteed state estimation by zonotopes publication-title: Automatica doi: 10.1016/j.automatica.2004.12.008 – volume: 60 start-page: 1665 issue: 6 year: 2015 ident: 10.1016/j.isatra.2022.01.010_b43 article-title: A new approach to design interval observers for linear systems publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2014.2359714 – year: 2003 ident: 10.1016/j.isatra.2022.01.010_b50 – volume: 58 start-page: 3218 issue: 12 year: 2013 ident: 10.1016/j.isatra.2022.01.010_b35 article-title: Interval observers for time-varying discrete-time systems publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2013.2263936 – volume: 74 start-page: 206 year: 2016 ident: 10.1016/j.isatra.2022.01.010_b47 article-title: Interval peak-to-peak observers for continuous- and discrete-time systems with persistent inputs and delays publication-title: Automatica doi: 10.1016/j.automatica.2016.07.043 – volume: 49 start-page: 455 issue: 2 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b21 article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks publication-title: IEEE Trans Syst Man Cybern Syst doi: 10.1109/TSMC.2017.2697450 – volume: 49 start-page: 1148 issue: 4 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b8 article-title: A threshold-parameter-dependent approach to designing distributed event-triggered H∞ consensus filters over sensor networks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2789296 – volume: 104 start-page: 1 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b22 article-title: Observer-based H∞ control for cyber–physical systems encountering DoS jamming attacks: an attack-tolerant approach publication-title: ISA Trans doi: 10.1016/j.isatra.2019.12.014 – volume: 55 start-page: 523 issue: 2 year: 2010 ident: 10.1016/j.isatra.2022.01.010_b38 article-title: Asymptotically stable interval observers for planar systems with complex poles publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2009.2037472 – volume: 50 start-page: 1306 issue: 3 year: 2020 ident: 10.1016/j.isatra.2022.01.010_b11 article-title: Distributed event-triggered estimation over sensor networks: a survey publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2917179 – volume: 24 start-page: 2867 year: 2014 ident: 10.1016/j.isatra.2022.01.010_b42 article-title: Interval observers for discrete-time systems publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.3030 – volume: 47 start-page: 140 issue: 1 year: 2011 ident: 10.1016/j.isatra.2022.01.010_b16 article-title: Interval observers for linear time-invariant systems with disturbances publication-title: Automatica doi: 10.1016/j.automatica.2010.10.019 – volume: 49 start-page: 171 issue: 1 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b14 article-title: A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2769722 – volume: 64 start-page: 4717 issue: 11 year: 2019 ident: 10.1016/j.isatra.2022.01.010_b45 article-title: Interval estimation methods for discrete-time linear time-invariant systems publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2019.2902673 – year: 2015 ident: 10.1016/j.isatra.2022.01.010_b31 – volume: 51 start-page: 5609 issue: 11 year: 2021 ident: 10.1016/j.isatra.2022.01.010_b48 article-title: Cluster consensus of multiagent systems with weighted antagonistic interactions publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2020.2966083 |
SSID | ssj0002598 |
Score | 2.3852606 |
Snippet | This paper studies the distributed interval state estimation problem for cyber–physical systems with bounded disturbance and random stealthy attacks. Since... This paper studies the distributed interval state estimation problem for cyber-physical systems with bounded disturbance and random stealthy attacks. Since... |
SourceID | proquest pubmed crossref elsevier |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 22 |
SubjectTerms | [formula omitted]-gain optimization Distributed observer Interval estimation Linear programming Random stealthy attack |
Title | Distributed interval state estimation with l∞-gain optimization for cyber–physical systems subject to bounded disturbance and random stealthy attacks |
URI | https://dx.doi.org/10.1016/j.isatra.2022.01.010 https://www.ncbi.nlm.nih.gov/pubmed/35086672 https://www.proquest.com/docview/2623891531 |
Volume | 127 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nb9QwELWqcikHRFs-Fmg1lTjAwbRre-3ssVqolhYqhKjUm2U7TrVom6x2s4deKo7cOXHpj-svYSZxCkhFlZAiRVklcZSZzDx7571h7GVucqE9zk5MlJorIfrcO6V5zDB3GJcNc0cL-h-P9fhEHZ4OTlfYqOPCUFlliv1tTG-idfplN73N3dlkQhxfTGakxi4a4EKMcqUMefmby99lHgjvUzQecjq7o881NV5UMTMn9SEhGvFO4tHenp7-BT-bNHTwkD1I-BH220dcZyux3GD3_1AV3GDr6XtdwKskKv16k_18Swq51Nwq5jBpCh3xNg2dCEhoo2UwAi3LwvT6-xU_c5MSKgwo54mpCQhvIVz4OL_-9mOWzAutEvQCFktPKzpQV-CpUxOOkuOIy7kntwJX5oBZMa_Ogdxqiu4Brq6J4P-InRy8-zIa89SWgQdhTM1D5nFvFAm3q2IwyITvh2JITTu0x3hRiMz7ILVU0pkCp1vKOwy5USP2M847-ZitllUZnzIQwQSdSW8KZVQolAsYexFT0awsl9L3mOysYUPSLKfWGVPbFad9ta0NLdnQ7vVx2-sxfnPVrNXsuON80xna_uV7FtPKHVfudH5h8bOk_1pcGavlwgqEldkQ00m_x560DnPzLBJBsdZGPPvvcZ-zNTpqCxFfsNV6voxbCI5qv914_za7tz_6_OET7d8fjY9_Acn3E_I |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwEB6VcgAOiJbX8hwkDnAw7dpeO3tEhWqBtqdW6s2ynaRatE1Wu9lDLxVH7py48OP6S5hJnAISqBJSpEiJE1uZ8cxnZ-YbgJe5zaUJtDqxhTJCSzkUwWsjiox8h_XZOPe8ob9_YCZH-uPx6HgNdvpcGA6rTLa_s-mttU5XttLX3JpPp5zjS86M2dhlC1zsNbiuafpyGYM357_iPAjfJ3M8Fty8z59rg7w4ZGbB9ENStuydnEj7d__0L_zZ-qHdO3A7AUh8241xA9aKahNu_UYruAkbacIu8VVilX59F76_Y4pcrm5V5DhtIx3pNW0-ETLTRpfCiLwvi7OLrz_EiZ9WWJNFOU2pmkj4FuNZKBYXX77Nk3yxo4Je4nIVeEsHmxoDl2qiXnLqcbUIrFfoqxzJLeb1KbJezUg_0DcNZ_jfg6Pd94c7E5HqMogorW1EzAKdrWbmdl2ORpkMw1iOuWqHCWQwSpmFEJVRWnlb0npLB082tzAE_qwPXt2H9aquioeAMtpoMhVsqa2OpfaRjC-BKl6W5UqFAaheGi4m0nKunTFzfXTaZ9fJ0LEM3faQju0BiMun5h1pxxXtbS9o94fyOfIrVzz5otcLR_OSf7b4qqhXSycJV2Zj8ifDATzoFOZyLIpQsTFWPvrvfp_Djcnh_p7b-3Dw6THc5DtdVOITWG8Wq-IpIaUmPGtnwk9NdBPr |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+interval+state+estimation+with+l+%E2%88%9E+-gain+optimization+for+cyber-physical+systems+subject+to+bounded+disturbance+and+random+stealthy+attacks&rft.jtitle=ISA+transactions&rft.au=Xie%2C+Jiyang&rft.au=Zhu%2C+Shuqian&rft.au=Zhang%2C+Dawei&rft.date=2022-08-01&rft.eissn=1879-2022&rft_id=info:doi/10.1016%2Fj.isatra.2022.01.010&rft_id=info%3Apmid%2F35086672&rft.externalDocID=35086672 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon |