Event-based distributed filtering against deception attacks for sensor networks with quantization effect

This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear ran...

Full description

Saved in:
Bibliographic Details
Published inISA transactions Vol. 126; pp. 338 - 351
Main Authors Yuan, Huanhuan, Guo, Yongzhen, Xia, Yuanqing
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.07.2022
Subjects
Online AccessGet full text
ISSN0019-0578
1879-2022
1879-2022
DOI10.1016/j.isatra.2021.08.009

Cover

Loading…
Abstract This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology. •A novel distributed filtering system in which two-stage deception attacks exist in the communication channels is established.•The quantization strategy and event-triggered protocol are exploited for bandwidth and energy saving filtering system.•For the established secure performance, filter gains are derived by obtaining the solution of matrix inequalities for online application.
AbstractList This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology. •A novel distributed filtering system in which two-stage deception attacks exist in the communication channels is established.•The quantization strategy and event-triggered protocol are exploited for bandwidth and energy saving filtering system.•For the established secure performance, filter gains are derived by obtaining the solution of matrix inequalities for online application.
This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology.This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology.
Author Yuan, Huanhuan
Xia, Yuanqing
Guo, Yongzhen
Author_xml – sequence: 1
  givenname: Huanhuan
  orcidid: 0000-0002-7310-1086
  surname: Yuan
  fullname: Yuan, Huanhuan
  email: yuanhh@nwpu.edu.cn
  organization: School of Astronautics, Northwestern Polytechnical University, Xi’an 710072, China
– sequence: 2
  givenname: Yongzhen
  surname: Guo
  fullname: Guo, Yongzhen
  email: yzguo@cstc.org.cn
  organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China
– sequence: 3
  givenname: Yuanqing
  surname: Xia
  fullname: Xia, Yuanqing
  email: xia_yuanqing@bit.edu.cn
  organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China
BookMark eNqFkEFP3DAQha1qkboL_Qc95NhLwjheJ3EPlSpEKdJKXOBsOfYYZhucXdsLKr--hu2ph3J6o6f3njTfii3CHJCxzxwaDrw73zaUTI6maaHlDQwNgPrAlnzoVV2sdsGWAFzVIPvhI1ultAWAVqphyR4unzDkejQJXeUo5UjjIZfb05QxUrivzL2hkHLl0OIu0xwqk7Oxv1Ll51glDKlIwPw8x-I9U36o9gcTMr2YtzR6jzafsRNvpoSf_uopu_txeXvxs97cXF1ffN_UVgiV606C6wG8MsKiMdLxEXCNkruBc9kLGEY7OgHSrR1vrfAGlZLS-aFruw46ccq-HHd3cd4fMGX9SMniNJmA8yHpVnZi3Qqp-hJdH6M2zilF9HoX6dHE35qDfgWrt_oIVr-C1TDoArbUvv5Ts5TfXi1Jmt4rfzuWsTB4Iow6WcJg0VEslLSb6f8DfwAjpZuL
CitedBy_id crossref_primary_10_1080_00207721_2025_2474144
crossref_primary_10_1007_s00034_022_02214_0
crossref_primary_10_1016_j_isatra_2023_11_042
crossref_primary_10_1177_01423312241239029
crossref_primary_10_1016_j_sigpro_2024_109724
crossref_primary_10_1080_21642583_2022_2048322
crossref_primary_10_1002_rnc_7851
crossref_primary_10_1007_s11432_022_3817_5
crossref_primary_10_53941_ijndi0201007
crossref_primary_10_1016_j_ins_2025_121902
crossref_primary_10_1109_TNSE_2024_3383280
Cites_doi 10.1016/j.neucom.2017.10.009
10.1109/TAC.2015.2409905
10.1109/TAC.2018.2798817
10.1109/TIE.2019.2944091
10.1109/TCNS.2015.2489338
10.1109/TSG.2018.2790704
10.1016/j.automatica.2018.12.027
10.1016/j.jfranklin.2017.05.016
10.1016/j.isatra.2020.03.010
10.1016/j.automatica.2016.03.003
10.1002/acs.2301
10.1109/TETC.2014.2386615
10.1002/rnc.4272
10.1109/TCNS.2016.2570003
10.1109/TCYB.2018.2863689
10.1109/TCYB.2018.2865238
10.1109/TSMC.2016.2629464
10.1109/TCYB.2017.2776976
10.1109/JIOT.2016.2584538
10.1007/s10957-011-9858-7
10.1016/j.automatica.2017.09.028
10.1109/TCYB.2019.2937951
10.1016/j.automatica.2016.12.026
10.1016/j.ins.2014.08.047
10.1080/03081079.2018.1462353
10.1109/TCNS.2017.2690399
10.1016/j.automatica.2018.03.005
10.1016/j.automatica.2010.06.041
10.1016/j.automatica.2016.12.020
10.1109/TCYB.2019.2903817
10.1109/TCYB.2017.2671032
10.1109/TSMC.2016.2531657
10.1016/j.automatica.2020.109117
10.1109/TSMC.2017.2697450
10.1080/00207170701684823
10.1016/j.automatica.2016.05.012
10.1109/TCYB.2016.2568281
ContentType Journal Article
Copyright 2021 ISA
Copyright © 2021 ISA. Published by Elsevier Ltd. All rights reserved.
Copyright_xml – notice: 2021 ISA
– notice: Copyright © 2021 ISA. Published by Elsevier Ltd. All rights reserved.
DBID AAYXX
CITATION
7X8
DOI 10.1016/j.isatra.2021.08.009
DatabaseName CrossRef
MEDLINE - Academic
DatabaseTitle CrossRef
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 1879-2022
EndPage 351
ExternalDocumentID 10_1016_j_isatra_2021_08_009
S0019057821004377
GroupedDBID ---
--K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29J
4.4
457
4G.
53G
5GY
5VS
6P2
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
ABFNM
ABFRF
ABJNI
ABMAC
ABNEU
ABTAH
ABXDB
ABYKQ
ACDAQ
ACFVG
ACGFO
ACNNM
ACRLP
ADBBV
ADEZE
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFDAS
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AIEXJ
AIKHN
AITUG
AIVDX
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
GBLVA
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OGIMB
OZT
P-8
P-9
P2P
PC.
Q38
R2-
ROL
RPZ
SDF
SDG
SES
SET
SEW
SPC
SPCBC
SPD
SSQ
SST
SSZ
T5K
T9H
TAE
TN5
UHS
UNMZH
WUQ
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
7X8
ID FETCH-LOGICAL-c339t-650d700f9a3ceaa5d1b0e4e51d81157308bcbd305d4d12c3fae9955df86266063
IEDL.DBID .~1
ISSN 0019-0578
1879-2022
IngestDate Fri Jul 11 15:20:44 EDT 2025
Tue Jul 01 04:36:06 EDT 2025
Thu Apr 24 23:09:55 EDT 2025
Fri Feb 23 02:40:10 EST 2024
IsPeerReviewed true
IsScholarly true
Keywords Sensor networks
Quantization
Event-triggered mechanism
Deception attack
Distributed filtering
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c339t-650d700f9a3ceaa5d1b0e4e51d81157308bcbd305d4d12c3fae9955df86266063
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-7310-1086
PQID 2563423597
PQPubID 23479
PageCount 14
ParticipantIDs proquest_miscellaneous_2563423597
crossref_primary_10_1016_j_isatra_2021_08_009
crossref_citationtrail_10_1016_j_isatra_2021_08_009
elsevier_sciencedirect_doi_10_1016_j_isatra_2021_08_009
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate July 2022
2022-07-00
20220701
PublicationDateYYYYMMDD 2022-07-01
PublicationDate_xml – month: 07
  year: 2022
  text: July 2022
PublicationDecade 2020
PublicationTitle ISA transactions
PublicationYear 2022
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Chen, Ho, Zhang, Yu (b7) 2019; 49
Li, Yu, Xia, Yang (b8) 2018; 49
Chen, Yan, Lu, Wang, Yang (b1) 2015; 3
Zhang, Ye (b27) 2020; 120
Hu, Wang, Han, Liu (b31) 2018; 87
Ding, Li, Quevedo, Dey, Shi (b23) 2017; 78
Guo, Wang, Liao, Wang (b36) 2017; 4
Yang, Wei, Liu, Chen (b38) 2016; 69
Bu, Dong, Han, Li (b6) 2018; 47
Guo, Shi, Johansson, Shi (b29) 2016; 4
Abbaspour, Sargolzaei, Forouzannezhad, Yen, Sarwat (b33) 2019; 67
Yassaie, Hallajiyan, Sharifi, Talebi (b2) 2020
Dong, Wang, Shen, Ding (b12) 2016; 72
Yuan, Yuan, Ho, Guo (b24) 2020; 50
Battistelli, Chisci, Selvi (b5) 2018; 93
Ma, Wang, Lam (b37) 2016; 47
Wang, Wang, Han, Wei (b17) 2017; 48
Zhang, Cheng, Shi, Chen (b20) 2015; 60
Chiang, Zhang (b3) 2016; 3
Chen, Huang, Liu, Wang, Sun (b30) 2019; 10
Yang, Xu, Zhang (b18) 2017; 47
Li, Zhou, Li, Li, Lu (b39) 2019; 50
Gao, Chen, Wang (b42) 2008; 81
Geng, Yuan, Liu (b25) 2020; 102
Bequette (b41) 1998
Qi, Tang, Ke, Liu, Xu, Yuan (b15) 2020
Senthilkumar, Balasubramaniam (b14) 2014; 28
Xia (b4) 2016; 42
Ding, Han, Xiang, Ge, Zhang (b22) 2018; 275
Shen, Wang, Shu, Wei (b10) 2010; 46
Hu, Yue, Han, Xie, Chen, Dou (b26) 2020; 50
Ding, Wang, Ho, Wei (b11) 2017; 78
Senthilkumar, Balasubramaniam (b13) 2011; 151
Li, Shi, Chen (b21) 2018; 63
Wen, Wang, Liu, Alsaadi (b9) 2016; 48
Chen, Kar, Moura (b28) 2017; 5
Yuan, Zhang, Guo, Yang (b34) 2017; 354
Yang, Ju, Xia, Zhang (b16) 2019
Song, Shi, Zhang, Lim, Yu (b35) 2020; 50
Yuan, Xia, Yang, Yuan (b19) 2018; 28
Yang, Zhang, Chen, Yang, Shi (b32) 2019; 102
Ge, Han (b40) 2015; 291
Yuan (10.1016/j.isatra.2021.08.009_b24) 2020; 50
Yang (10.1016/j.isatra.2021.08.009_b18) 2017; 47
Yang (10.1016/j.isatra.2021.08.009_b32) 2019; 102
Zhang (10.1016/j.isatra.2021.08.009_b27) 2020; 120
Hu (10.1016/j.isatra.2021.08.009_b31) 2018; 87
Zhang (10.1016/j.isatra.2021.08.009_b20) 2015; 60
Ma (10.1016/j.isatra.2021.08.009_b37) 2016; 47
Bu (10.1016/j.isatra.2021.08.009_b6) 2018; 47
Song (10.1016/j.isatra.2021.08.009_b35) 2020; 50
Li (10.1016/j.isatra.2021.08.009_b39) 2019; 50
Ding (10.1016/j.isatra.2021.08.009_b23) 2017; 78
Senthilkumar (10.1016/j.isatra.2021.08.009_b13) 2011; 151
Yuan (10.1016/j.isatra.2021.08.009_b19) 2018; 28
Ge (10.1016/j.isatra.2021.08.009_b40) 2015; 291
Dong (10.1016/j.isatra.2021.08.009_b12) 2016; 72
Geng (10.1016/j.isatra.2021.08.009_b25) 2020; 102
Hu (10.1016/j.isatra.2021.08.009_b26) 2020; 50
Bequette (10.1016/j.isatra.2021.08.009_b41) 1998
Yassaie (10.1016/j.isatra.2021.08.009_b2) 2020
Li (10.1016/j.isatra.2021.08.009_b21) 2018; 63
Gao (10.1016/j.isatra.2021.08.009_b42) 2008; 81
Chen (10.1016/j.isatra.2021.08.009_b7) 2019; 49
Shen (10.1016/j.isatra.2021.08.009_b10) 2010; 46
Chen (10.1016/j.isatra.2021.08.009_b28) 2017; 5
Xia (10.1016/j.isatra.2021.08.009_b4) 2016; 42
Abbaspour (10.1016/j.isatra.2021.08.009_b33) 2019; 67
Qi (10.1016/j.isatra.2021.08.009_b15) 2020
Yang (10.1016/j.isatra.2021.08.009_b38) 2016; 69
Chiang (10.1016/j.isatra.2021.08.009_b3) 2016; 3
Ding (10.1016/j.isatra.2021.08.009_b11) 2017; 78
Yang (10.1016/j.isatra.2021.08.009_b16) 2019
Battistelli (10.1016/j.isatra.2021.08.009_b5) 2018; 93
Chen (10.1016/j.isatra.2021.08.009_b30) 2019; 10
Guo (10.1016/j.isatra.2021.08.009_b29) 2016; 4
Li (10.1016/j.isatra.2021.08.009_b8) 2018; 49
Senthilkumar (10.1016/j.isatra.2021.08.009_b14) 2014; 28
Chen (10.1016/j.isatra.2021.08.009_b1) 2015; 3
Guo (10.1016/j.isatra.2021.08.009_b36) 2017; 4
Wang (10.1016/j.isatra.2021.08.009_b17) 2017; 48
Wen (10.1016/j.isatra.2021.08.009_b9) 2016; 48
Ding (10.1016/j.isatra.2021.08.009_b22) 2018; 275
Yuan (10.1016/j.isatra.2021.08.009_b34) 2017; 354
References_xml – volume: 48
  start-page: 930
  year: 2016
  end-page: 941
  ident: b9
  article-title: Recursive distributed filtering for a class of state-saturated systems with fading measurements and quantization effects
  publication-title: IEEE Trans Syst Man Cybern: Syst
– year: 1998
  ident: b41
  publication-title: Process Dynamics Modeling, Analysis, and Simulation
– volume: 81
  start-page: 804
  year: 2008
  end-page: 819
  ident: b42
  article-title: Robust fault detection with missing measurements
  publication-title: Internat J Control
– volume: 3
  start-page: 854
  year: 2016
  end-page: 864
  ident: b3
  article-title: Fog and IoT: An overview of research opportunities
  publication-title: IEEE Internet Things J
– volume: 28
  start-page: 464
  year: 2014
  end-page: 478
  ident: b14
  article-title: Non-fragile robust stabilization and
  publication-title: Internat J Adapt Control Signal Process
– volume: 275
  start-page: 1674
  year: 2018
  end-page: 1683
  ident: b22
  article-title: A survey on security control and attack detection for industrial cyber–physical systems
  publication-title: Neurocomputing
– year: 2020
  ident: b2
  article-title: Resilient control of multi-microgrids against false data injection attack
  publication-title: ISA Trans
– volume: 49
  start-page: 734
  year: 2018
  end-page: 745
  ident: b8
  article-title: Remote nonlinear state estimation with stochastic event-triggered sensor schedule
  publication-title: IEEE Trans Cybern
– volume: 354
  start-page: 4966
  year: 2017
  end-page: 4988
  ident: b34
  article-title: Towards quantifying the impact of randomly occurred attacks on a class of networked control systems
  publication-title: J Franklin Inst B
– volume: 47
  start-page: 1050
  year: 2016
  end-page: 1060
  ident: b37
  article-title: Mean-square
  publication-title: IEEE Trans Syst Man Cybern: Syst
– volume: 69
  start-page: 242
  year: 2016
  end-page: 249
  ident: b38
  article-title: Decentralized event-triggered consensus for linear multi-agent systems under general directed graphs
  publication-title: Automatica
– volume: 47
  start-page: 522
  year: 2018
  end-page: 534
  ident: b6
  article-title: Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements
  publication-title: Int J Gen Syst
– volume: 3
  start-page: 352
  year: 2015
  end-page: 362
  ident: b1
  article-title: Ubiquitous monitoring for industrial cyber–physical systems over relay-assisted wireless sensor networks
  publication-title: IEEE Trans Emerg Top Comput
– year: 2019
  ident: b16
  article-title: Predictive cloud control for networked multiagent systems with quantized signals under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern: Syst
– volume: 102
  start-page: 34
  year: 2019
  end-page: 44
  ident: b32
  article-title: Distributed filtering under false data injection attacks
  publication-title: Automatica
– volume: 93
  start-page: 75
  year: 2018
  end-page: 82
  ident: b5
  article-title: A distributed Kalman filter with event-triggered communication and guaranteed stability
  publication-title: Automatica
– volume: 63
  start-page: 3503
  year: 2018
  end-page: 3509
  ident: b21
  article-title: False data injection attacks on networked control systems: A stackelberg-game analysis
  publication-title: IEEE Trans Automat Control
– year: 2020
  ident: b15
  article-title: Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization
  publication-title: ISA Trans
– volume: 5
  start-page: 1157
  year: 2017
  end-page: 1168
  ident: b28
  article-title: Optimal attack strategies subject to detection constraints against cyber–physical systems
  publication-title: IEEE Trans Control Netw Syst
– volume: 10
  start-page: 2158
  year: 2019
  end-page: 2169
  ident: b30
  article-title: Evaluation of reinforcement learning-based false data injection attack to automatic voltage control
  publication-title: IEEE Trans Smart Grid
– volume: 67
  start-page: 7951
  year: 2019
  end-page: 7962
  ident: b33
  article-title: Resilient control design for load frequency control system under false data injection attacks
  publication-title: IEEE Trans Ind Electron
– volume: 78
  start-page: 194
  year: 2017
  end-page: 201
  ident: b23
  article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks
  publication-title: Automatica
– volume: 50
  start-page: 1856
  year: 2019
  end-page: 1866
  ident: b39
  article-title: Event-triggered consensus control for multiagent systems against fasle data-injection attacks
  publication-title: IEEE Trans Cybern
– volume: 72
  start-page: 28
  year: 2016
  end-page: 36
  ident: b12
  article-title: Variance-constrained
  publication-title: Automatica
– volume: 28
  start-page: 4604
  year: 2018
  end-page: 4623
  ident: b19
  article-title: Resilient control for wireless networked control systems under DoS attack via a hierarchical game
  publication-title: Internat J Robust Nonlinear Control
– volume: 50
  start-page: 48
  year: 2020
  end-page: 60
  ident: b24
  article-title: Resilient control of wireless networked control system under denial-of-service attacks: A cross-layer design approach
  publication-title: IEEE Trans Cybern
– volume: 49
  start-page: 455
  year: 2019
  end-page: 468
  ident: b7
  article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern: Syst
– volume: 50
  start-page: 1952
  year: 2020
  end-page: 1964
  ident: b26
  article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks
  publication-title: IEEE Trans Cybern
– volume: 42
  start-page: 1
  year: 2016
  end-page: 12
  ident: b4
  article-title: Cloud control systems and their challenges
  publication-title: Acta Automat Sinica
– volume: 151
  start-page: 100
  year: 2011
  end-page: 120
  ident: b13
  article-title: Delay-dependent robust stabilization and
  publication-title: J Optim Theory Appl
– volume: 102
  start-page: 33
  year: 2020
  end-page: 42
  ident: b25
  article-title: Output regulation for decentralized networked control systems under jamming attacks and actuator saturation
  publication-title: ISA Trans
– volume: 87
  start-page: 176
  year: 2018
  end-page: 183
  ident: b31
  article-title: State estimation under false data injection attacks: Security analysis and system protection
  publication-title: Automatica
– volume: 78
  start-page: 231
  year: 2017
  end-page: 240
  ident: b11
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
– volume: 48
  start-page: 1007
  year: 2017
  end-page: 1017
  ident: b17
  article-title: Event-based variance-constrained
  publication-title: IEEE Trans Cybern
– volume: 47
  start-page: 2235
  year: 2017
  end-page: 2243
  ident: b18
  article-title: Event-driven control for networked control systems with quantization and Markov packet losses
  publication-title: IEEE Trans Cybern
– volume: 60
  start-page: 3023
  year: 2015
  end-page: 3028
  ident: b20
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Trans Automat Control
– volume: 4
  start-page: 4
  year: 2016
  end-page: 13
  ident: b29
  article-title: Optimal linear cyber-attack on remote state estimation
  publication-title: IEEE Trans Control Netw Syst
– volume: 120
  year: 2020
  ident: b27
  article-title: False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach
  publication-title: Automatica
– volume: 4
  start-page: 202
  year: 2017
  end-page: 212
  ident: b36
  article-title: Quantized
  publication-title: IEEE Trans Control Netw Syst
– volume: 50
  start-page: 465
  year: 2020
  end-page: 475
  ident: b35
  article-title: Distributed
  publication-title: IEEE Trans Cybern
– volume: 46
  start-page: 1743
  year: 2010
  end-page: 1751
  ident: b10
  article-title: Robust
  publication-title: Automatica
– volume: 291
  start-page: 128
  year: 2015
  end-page: 142
  ident: b40
  article-title: Distributed event-triggered
  publication-title: Inform Sci
– volume: 275
  start-page: 1674
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b22
  article-title: A survey on security control and attack detection for industrial cyber–physical systems
  publication-title: Neurocomputing
  doi: 10.1016/j.neucom.2017.10.009
– volume: 60
  start-page: 3023
  issue: 11
  year: 2015
  ident: 10.1016/j.isatra.2021.08.009_b20
  article-title: Optimal denial-of-service attack scheduling with energy constraint
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2015.2409905
– volume: 63
  start-page: 3503
  issue: 10
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b21
  article-title: False data injection attacks on networked control systems: A stackelberg-game analysis
  publication-title: IEEE Trans Automat Control
  doi: 10.1109/TAC.2018.2798817
– volume: 67
  start-page: 7951
  issue: 9
  year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b33
  article-title: Resilient control design for load frequency control system under false data injection attacks
  publication-title: IEEE Trans Ind Electron
  doi: 10.1109/TIE.2019.2944091
– volume: 4
  start-page: 202
  issue: 2
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b36
  article-title: Quantized H∞ consensus of multiagent systems with quantization mismatch under switching weighted topologies
  publication-title: IEEE Trans Control Netw Syst
  doi: 10.1109/TCNS.2015.2489338
– volume: 10
  start-page: 2158
  issue: 2
  year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b30
  article-title: Evaluation of reinforcement learning-based false data injection attack to automatic voltage control
  publication-title: IEEE Trans Smart Grid
  doi: 10.1109/TSG.2018.2790704
– volume: 102
  start-page: 34
  year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b32
  article-title: Distributed filtering under false data injection attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2018.12.027
– volume: 354
  start-page: 4966
  issue: 12
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b34
  article-title: Towards quantifying the impact of randomly occurred attacks on a class of networked control systems
  publication-title: J Franklin Inst B
  doi: 10.1016/j.jfranklin.2017.05.016
– volume: 102
  start-page: 33
  year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b25
  article-title: Output regulation for decentralized networked control systems under jamming attacks and actuator saturation
  publication-title: ISA Trans
  doi: 10.1016/j.isatra.2020.03.010
– volume: 69
  start-page: 242
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b38
  article-title: Decentralized event-triggered consensus for linear multi-agent systems under general directed graphs
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.03.003
– year: 1998
  ident: 10.1016/j.isatra.2021.08.009_b41
– volume: 28
  start-page: 464
  issue: 3–5
  year: 2014
  ident: 10.1016/j.isatra.2021.08.009_b14
  article-title: Non-fragile robust stabilization and H∞ control for uncertain stochastic time delay systems with Markovian jump parameters and nonlinear disturbances
  publication-title: Internat J Adapt Control Signal Process
  doi: 10.1002/acs.2301
– volume: 3
  start-page: 352
  issue: 3
  year: 2015
  ident: 10.1016/j.isatra.2021.08.009_b1
  article-title: Ubiquitous monitoring for industrial cyber–physical systems over relay-assisted wireless sensor networks
  publication-title: IEEE Trans Emerg Top Comput
  doi: 10.1109/TETC.2014.2386615
– volume: 42
  start-page: 1
  issue: 1
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b4
  article-title: Cloud control systems and their challenges
  publication-title: Acta Automat Sinica
– volume: 28
  start-page: 4604
  issue: 15
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b19
  article-title: Resilient control for wireless networked control systems under DoS attack via a hierarchical game
  publication-title: Internat J Robust Nonlinear Control
  doi: 10.1002/rnc.4272
– volume: 4
  start-page: 4
  issue: 1
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b29
  article-title: Optimal linear cyber-attack on remote state estimation
  publication-title: IEEE Trans Control Netw Syst
  doi: 10.1109/TCNS.2016.2570003
– volume: 50
  start-page: 48
  issue: 1
  year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b24
  article-title: Resilient control of wireless networked control system under denial-of-service attacks: A cross-layer design approach
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2018.2863689
– volume: 50
  start-page: 465
  issue: 2
  year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b35
  article-title: Distributed H∞ estimation in sensor networks with two-channel stochastic attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2018.2865238
– volume: 48
  start-page: 930
  issue: 6
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b9
  article-title: Recursive distributed filtering for a class of state-saturated systems with fading measurements and quantization effects
  publication-title: IEEE Trans Syst Man Cybern: Syst
  doi: 10.1109/TSMC.2016.2629464
– volume: 49
  start-page: 734
  issue: 3
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b8
  article-title: Remote nonlinear state estimation with stochastic event-triggered sensor schedule
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2776976
– volume: 3
  start-page: 854
  issue: 6
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b3
  article-title: Fog and IoT: An overview of research opportunities
  publication-title: IEEE Internet Things J
  doi: 10.1109/JIOT.2016.2584538
– volume: 151
  start-page: 100
  issue: 1
  year: 2011
  ident: 10.1016/j.isatra.2021.08.009_b13
  article-title: Delay-dependent robust stabilization and H∞ control for nonlinear stochastic systems with Markovian jump parameters and interval time-varying delays
  publication-title: J Optim Theory Appl
  doi: 10.1007/s10957-011-9858-7
– year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b16
  article-title: Predictive cloud control for networked multiagent systems with quantized signals under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern: Syst
– volume: 87
  start-page: 176
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b31
  article-title: State estimation under false data injection attacks: Security analysis and system protection
  publication-title: Automatica
  doi: 10.1016/j.automatica.2017.09.028
– volume: 50
  start-page: 1856
  issue: 5
  year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b39
  article-title: Event-triggered consensus control for multiagent systems against fasle data-injection attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2937951
– year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b2
  article-title: Resilient control of multi-microgrids against false data injection attack
  publication-title: ISA Trans
– volume: 78
  start-page: 231
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b11
  article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.026
– volume: 291
  start-page: 128
  year: 2015
  ident: 10.1016/j.isatra.2021.08.009_b40
  article-title: Distributed event-triggered H∞ filtering over sensor networks with communication delays
  publication-title: Inform Sci
  doi: 10.1016/j.ins.2014.08.047
– volume: 47
  start-page: 522
  issue: 5
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b6
  article-title: Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements
  publication-title: Int J Gen Syst
  doi: 10.1080/03081079.2018.1462353
– volume: 5
  start-page: 1157
  issue: 3
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b28
  article-title: Optimal attack strategies subject to detection constraints against cyber–physical systems
  publication-title: IEEE Trans Control Netw Syst
  doi: 10.1109/TCNS.2017.2690399
– volume: 93
  start-page: 75
  year: 2018
  ident: 10.1016/j.isatra.2021.08.009_b5
  article-title: A distributed Kalman filter with event-triggered communication and guaranteed stability
  publication-title: Automatica
  doi: 10.1016/j.automatica.2018.03.005
– volume: 46
  start-page: 1743
  issue: 11
  year: 2010
  ident: 10.1016/j.isatra.2021.08.009_b10
  article-title: Robust H∞ finite-horizon filtering with randomly occurred nonlinearities and quantization effects
  publication-title: Automatica
  doi: 10.1016/j.automatica.2010.06.041
– volume: 78
  start-page: 194
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b23
  article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.12.020
– volume: 50
  start-page: 1952
  issue: 5
  year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b26
  article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2019.2903817
– volume: 48
  start-page: 1007
  issue: 3
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b17
  article-title: Event-based variance-constrained H∞ filtering for stochastic parameter systems over sensor networks with successive missing measurements
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2017.2671032
– volume: 47
  start-page: 1050
  issue: 7
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b37
  article-title: Mean-square H∞ consensus control for a class of nonlinear time-varying stochastic multiagent systems: The finite-horizon case
  publication-title: IEEE Trans Syst Man Cybern: Syst
  doi: 10.1109/TSMC.2016.2531657
– year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b15
  article-title: Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization
  publication-title: ISA Trans
– volume: 120
  year: 2020
  ident: 10.1016/j.isatra.2021.08.009_b27
  article-title: False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach
  publication-title: Automatica
  doi: 10.1016/j.automatica.2020.109117
– volume: 49
  start-page: 455
  issue: 2
  year: 2019
  ident: 10.1016/j.isatra.2021.08.009_b7
  article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks
  publication-title: IEEE Trans Syst Man Cybern: Syst
  doi: 10.1109/TSMC.2017.2697450
– volume: 81
  start-page: 804
  issue: 5
  year: 2008
  ident: 10.1016/j.isatra.2021.08.009_b42
  article-title: Robust fault detection with missing measurements
  publication-title: Internat J Control
  doi: 10.1080/00207170701684823
– volume: 72
  start-page: 28
  year: 2016
  ident: 10.1016/j.isatra.2021.08.009_b12
  article-title: Variance-constrained H∞ control for a class of nonlinear stochastic discrete time-varying systems: The event-triggered design
  publication-title: Automatica
  doi: 10.1016/j.automatica.2016.05.012
– volume: 47
  start-page: 2235
  issue: 8
  year: 2017
  ident: 10.1016/j.isatra.2021.08.009_b18
  article-title: Event-driven control for networked control systems with quantization and Markov packet losses
  publication-title: IEEE Trans Cybern
  doi: 10.1109/TCYB.2016.2568281
SSID ssj0002598
Score 2.3914452
Snippet This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 338
SubjectTerms Deception attack
Distributed filtering
Event-triggered mechanism
Quantization
Sensor networks
Title Event-based distributed filtering against deception attacks for sensor networks with quantization effect
URI https://dx.doi.org/10.1016/j.isatra.2021.08.009
https://www.proquest.com/docview/2563423597
Volume 126
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFz2IrorPJYIHPUTbpo_tURZlfSKi4C3kMdUV6arbvfrbnWlTXwiCp5SSlJJJ5pF88w1jO2DTAqwMBBiDAYpNpDCQaEHEIFkcZ2gj6Rzy4jId3Mand8ndFOu3uTAEq_S6v9Hptbb2bw78bB48D4eU44vGjNjYw5qghzLKib0O1_T-2yfMA917r41zQb3b9Lka40WImVdiH4oaIk-CJf5unn4o6tr6HC-wee828sPmzxbZFJQdNveFTLDDFv02HfNdzyW9t8QejgjPKMhWOe6IJJfqW-FzMaRrchzI9b0eoo_IHXiEC9dVRZn3HP1ZPsYwF5uyQYuPOZ3b8pcJysMncPIGEbLMbo-PbvoD4YsrCCtlXgn0zFwWBEWupQWtExeaAGJIQtcj_h0Z9Iw1DrWBi10YWVloyPMkcQWFQBj1yBU2XY5KWGU8sLonIS9SA1mc6shE2qS9KAtCQGcC7BqT7Zwq65nHqQDGk2ohZo-qkYQiSSiqixnka0x8jHpumDf-6J-14lLfVpBC4_DHyO1Wugo3F92Y6BJGk7FCf5AYEjHoWv_31zfYbEQpEzXEd5NNV68T2EJHpjLdeqV22cxh__r8itqTs8HlO6As9rY
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS-VAEC6c58GZg7iiMy4teNBDY5LO8nIUUZ7bOyl4a3qp6BuGuLy8_z9VSUdUBMFTQkiF0NVdS_dXXwHso8srdCqSaC0lKC5T0mJmJBODFGlakI_kfcjrcT66TS_usrs5OOlrYRhWGWx_Z9Nbax2eHIXRPHqaTLjGl5wZs7HHLUFP8QPmmZ0qHcD88fnlaPxqkCnCDwa5lCzQV9C1MC8GzbwwAVHScXkyMvFzD_XBVrcO6GwJFkPkKI67n1uGOaxX4NcbPsEVWA4rdSoOAp304So8nDKkUbK78sIzTy63uKL7asIn5SQozL2ZUJgoPAaQizBNw8X3gkJaMaVMly51BxifCt66Fc8zUkmo4RQdKGQNbs9Ob05GMvRXkE6pspEUnPkiiqrSKIfGZD62EaaYxX7IFDwqGlpnPRkEn_o4caoyWJZZ5ivOgijxUeswqB9r3AAROTNUWFa5xSLNTWITY_NhUkQxUjyBbhNUP6baBfJx7oHxT_cos7-604RmTWhujRmVmyBfpZ468o0v3i96del3k0iTf_hCcq_Xrqb1xYcmpsbH2VRTSMgkiZR3_f7213dhYXRzfaWvzseXf-BnwhUULeJ3CwbNywy3Ka5p7E6Yt_8BUXz30g
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Event-based+distributed+filtering+against+deception+attacks+for+sensor+networks+with+quantization+effect&rft.jtitle=ISA+transactions&rft.au=Yuan%2C+Huanhuan&rft.au=Guo%2C+Yongzhen&rft.au=Xia%2C+Yuanqing&rft.date=2022-07-01&rft.issn=0019-0578&rft.volume=126&rft.spage=338&rft.epage=351&rft_id=info:doi/10.1016%2Fj.isatra.2021.08.009&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_isatra_2021_08_009
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon