Outlier-Resistant Recursive Security Filtering for Multirate Networked Systems Under Fading Measurements and Round-Robin Protocol

This paper investigates the recursive filtering problem with fading measurements and cyber attacks for multisensor multirate networked systems (MRNSs) under Round-Robin protocol (RRP). By exploiting the lifting technique, the sampling periods for both sensors and the state of the system are uniforme...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on control of network systems Vol. 10; no. 4; pp. 1 - 12
Main Authors Liu, Jinliang, Gong, Enyu, Zha, Lijuan, Xie, Xiangpeng, Tian, Engang
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 01.12.2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This paper investigates the recursive filtering problem with fading measurements and cyber attacks for multisensor multirate networked systems (MRNSs) under Round-Robin protocol (RRP). By exploiting the lifting technique, the sampling periods for both sensors and the state of the system are uniformed. It is assumed that the phenomenon of fading measurements which better describes practical engineering arises stochastically, and the attenuation coefficients of which are described by a set of random variables with known statistical properties. In order to fully utilize the limited communication resources, RRP is introduced in the sensor-to-filter channel. Considering the measurement outliers, a saturation function is adopted in the filter structure to suppress the anomalous innovations, so as to reduce the negative impact of the outliers. By means of matrix difference equation, an upper bound is first obtained on the filtering error covariance, and the filter gain is designed to minimize the obtained upper bound by partial derivation. Moreover, the exponential boundedness of the filtering error dynamics is analyzed in the mean square sense. Finally, a numerical simulation example is given to demonstrate the validity of the proposed recursive security filtering scheme.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2325-5870
2372-2533
DOI:10.1109/TCNS.2023.3256299