Event-based distributed filtering against deception attacks for sensor networks with quantization effect
This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear ran...
Saved in:
Published in | ISA transactions Vol. 126; pp. 338 - 351 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.07.2022
|
Subjects | |
Online Access | Get full text |
ISSN | 0019-0578 1879-2022 1879-2022 |
DOI | 10.1016/j.isatra.2021.08.009 |
Cover
Loading…
Abstract | This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology.
•A novel distributed filtering system in which two-stage deception attacks exist in the communication channels is established.•The quantization strategy and event-triggered protocol are exploited for bandwidth and energy saving filtering system.•For the established secure performance, filter gains are derived by obtaining the solution of matrix inequalities for online application. |
---|---|
AbstractList | This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology.
•A novel distributed filtering system in which two-stage deception attacks exist in the communication channels is established.•The quantization strategy and event-triggered protocol are exploited for bandwidth and energy saving filtering system.•For the established secure performance, filter gains are derived by obtaining the solution of matrix inequalities for online application. This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology.This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage deception attacks and bandwidth limitation. Both deception attacks between sensor and corresponding estimator and among estimators appear randomly. To alleviate communication burden, a quantization strategy is introduced before transmitting measurement and estimation signals. An event-triggered mechanism is employed for each estimator node thus only necessary data are transmitted to its neighbour sensors when a setting event occurs. The desired target of the problem to be handled is to devise a series of time-varying filters such that the H∞ secure performance is guaranteed against random deception attacks over a finite time horizon. Sufficient conditions ensuring the existence of time-varying filters under effect of complex factors are derived, where filter gains are obtained by finding the solution of a sequence of recursive matrix inequalities online. Simulation results in both numerical example and industrial continuous-stirred tank reactor system are given to show the validity of the presented methodology. |
Author | Yuan, Huanhuan Xia, Yuanqing Guo, Yongzhen |
Author_xml | – sequence: 1 givenname: Huanhuan orcidid: 0000-0002-7310-1086 surname: Yuan fullname: Yuan, Huanhuan email: yuanhh@nwpu.edu.cn organization: School of Astronautics, Northwestern Polytechnical University, Xi’an 710072, China – sequence: 2 givenname: Yongzhen surname: Guo fullname: Guo, Yongzhen email: yzguo@cstc.org.cn organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China – sequence: 3 givenname: Yuanqing surname: Xia fullname: Xia, Yuanqing email: xia_yuanqing@bit.edu.cn organization: School of Automation, Beijing Institute of Technology, Beijing 100081, China |
BookMark | eNqFkEFP3DAQha1qkboL_Qc95NhLwjheJ3EPlSpEKdJKXOBsOfYYZhucXdsLKr--hu2ph3J6o6f3njTfii3CHJCxzxwaDrw73zaUTI6maaHlDQwNgPrAlnzoVV2sdsGWAFzVIPvhI1ultAWAVqphyR4unzDkejQJXeUo5UjjIZfb05QxUrivzL2hkHLl0OIu0xwqk7Oxv1Ll51glDKlIwPw8x-I9U36o9gcTMr2YtzR6jzafsRNvpoSf_uopu_txeXvxs97cXF1ffN_UVgiV606C6wG8MsKiMdLxEXCNkruBc9kLGEY7OgHSrR1vrfAGlZLS-aFruw46ccq-HHd3cd4fMGX9SMniNJmA8yHpVnZi3Qqp-hJdH6M2zilF9HoX6dHE35qDfgWrt_oIVr-C1TDoArbUvv5Ts5TfXi1Jmt4rfzuWsTB4Iow6WcJg0VEslLSb6f8DfwAjpZuL |
CitedBy_id | crossref_primary_10_1080_00207721_2025_2474144 crossref_primary_10_1007_s00034_022_02214_0 crossref_primary_10_1016_j_isatra_2023_11_042 crossref_primary_10_1177_01423312241239029 crossref_primary_10_1016_j_sigpro_2024_109724 crossref_primary_10_1080_21642583_2022_2048322 crossref_primary_10_1002_rnc_7851 crossref_primary_10_1007_s11432_022_3817_5 crossref_primary_10_53941_ijndi0201007 crossref_primary_10_1016_j_ins_2025_121902 crossref_primary_10_1109_TNSE_2024_3383280 |
Cites_doi | 10.1016/j.neucom.2017.10.009 10.1109/TAC.2015.2409905 10.1109/TAC.2018.2798817 10.1109/TIE.2019.2944091 10.1109/TCNS.2015.2489338 10.1109/TSG.2018.2790704 10.1016/j.automatica.2018.12.027 10.1016/j.jfranklin.2017.05.016 10.1016/j.isatra.2020.03.010 10.1016/j.automatica.2016.03.003 10.1002/acs.2301 10.1109/TETC.2014.2386615 10.1002/rnc.4272 10.1109/TCNS.2016.2570003 10.1109/TCYB.2018.2863689 10.1109/TCYB.2018.2865238 10.1109/TSMC.2016.2629464 10.1109/TCYB.2017.2776976 10.1109/JIOT.2016.2584538 10.1007/s10957-011-9858-7 10.1016/j.automatica.2017.09.028 10.1109/TCYB.2019.2937951 10.1016/j.automatica.2016.12.026 10.1016/j.ins.2014.08.047 10.1080/03081079.2018.1462353 10.1109/TCNS.2017.2690399 10.1016/j.automatica.2018.03.005 10.1016/j.automatica.2010.06.041 10.1016/j.automatica.2016.12.020 10.1109/TCYB.2019.2903817 10.1109/TCYB.2017.2671032 10.1109/TSMC.2016.2531657 10.1016/j.automatica.2020.109117 10.1109/TSMC.2017.2697450 10.1080/00207170701684823 10.1016/j.automatica.2016.05.012 10.1109/TCYB.2016.2568281 |
ContentType | Journal Article |
Copyright | 2021 ISA Copyright © 2021 ISA. Published by Elsevier Ltd. All rights reserved. |
Copyright_xml | – notice: 2021 ISA – notice: Copyright © 2021 ISA. Published by Elsevier Ltd. All rights reserved. |
DBID | AAYXX CITATION 7X8 |
DOI | 10.1016/j.isatra.2021.08.009 |
DatabaseName | CrossRef MEDLINE - Academic |
DatabaseTitle | CrossRef MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 1879-2022 |
EndPage | 351 |
ExternalDocumentID | 10_1016_j_isatra_2021_08_009 S0019057821004377 |
GroupedDBID | --- --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29J 4.4 457 4G. 53G 5GY 5VS 6P2 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO ABFNM ABFRF ABJNI ABMAC ABNEU ABTAH ABXDB ABYKQ ACDAQ ACFVG ACGFO ACNNM ACRLP ADBBV ADEZE ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFDAS AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AIEXJ AIKHN AITUG AIVDX AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 GBLVA HVGLF HZ~ IHE J1W JJJVA KOM LY7 M41 MO0 N9A O-L O9- OAUVE OGIMB OZT P-8 P-9 P2P PC. Q38 R2- ROL RPZ SDF SDG SES SET SEW SPC SPCBC SPD SSQ SST SSZ T5K T9H TAE TN5 UHS UNMZH WUQ XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH 7X8 |
ID | FETCH-LOGICAL-c339t-650d700f9a3ceaa5d1b0e4e51d81157308bcbd305d4d12c3fae9955df86266063 |
IEDL.DBID | .~1 |
ISSN | 0019-0578 1879-2022 |
IngestDate | Fri Jul 11 15:20:44 EDT 2025 Tue Jul 01 04:36:06 EDT 2025 Thu Apr 24 23:09:55 EDT 2025 Fri Feb 23 02:40:10 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Sensor networks Quantization Event-triggered mechanism Deception attack Distributed filtering |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c339t-650d700f9a3ceaa5d1b0e4e51d81157308bcbd305d4d12c3fae9955df86266063 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0002-7310-1086 |
PQID | 2563423597 |
PQPubID | 23479 |
PageCount | 14 |
ParticipantIDs | proquest_miscellaneous_2563423597 crossref_primary_10_1016_j_isatra_2021_08_009 crossref_citationtrail_10_1016_j_isatra_2021_08_009 elsevier_sciencedirect_doi_10_1016_j_isatra_2021_08_009 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | July 2022 2022-07-00 20220701 |
PublicationDateYYYYMMDD | 2022-07-01 |
PublicationDate_xml | – month: 07 year: 2022 text: July 2022 |
PublicationDecade | 2020 |
PublicationTitle | ISA transactions |
PublicationYear | 2022 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Chen, Ho, Zhang, Yu (b7) 2019; 49 Li, Yu, Xia, Yang (b8) 2018; 49 Chen, Yan, Lu, Wang, Yang (b1) 2015; 3 Zhang, Ye (b27) 2020; 120 Hu, Wang, Han, Liu (b31) 2018; 87 Ding, Li, Quevedo, Dey, Shi (b23) 2017; 78 Guo, Wang, Liao, Wang (b36) 2017; 4 Yang, Wei, Liu, Chen (b38) 2016; 69 Bu, Dong, Han, Li (b6) 2018; 47 Guo, Shi, Johansson, Shi (b29) 2016; 4 Abbaspour, Sargolzaei, Forouzannezhad, Yen, Sarwat (b33) 2019; 67 Yassaie, Hallajiyan, Sharifi, Talebi (b2) 2020 Dong, Wang, Shen, Ding (b12) 2016; 72 Yuan, Yuan, Ho, Guo (b24) 2020; 50 Battistelli, Chisci, Selvi (b5) 2018; 93 Ma, Wang, Lam (b37) 2016; 47 Wang, Wang, Han, Wei (b17) 2017; 48 Zhang, Cheng, Shi, Chen (b20) 2015; 60 Chiang, Zhang (b3) 2016; 3 Chen, Huang, Liu, Wang, Sun (b30) 2019; 10 Yang, Xu, Zhang (b18) 2017; 47 Li, Zhou, Li, Li, Lu (b39) 2019; 50 Gao, Chen, Wang (b42) 2008; 81 Geng, Yuan, Liu (b25) 2020; 102 Bequette (b41) 1998 Qi, Tang, Ke, Liu, Xu, Yuan (b15) 2020 Senthilkumar, Balasubramaniam (b14) 2014; 28 Xia (b4) 2016; 42 Ding, Han, Xiang, Ge, Zhang (b22) 2018; 275 Shen, Wang, Shu, Wei (b10) 2010; 46 Hu, Yue, Han, Xie, Chen, Dou (b26) 2020; 50 Ding, Wang, Ho, Wei (b11) 2017; 78 Senthilkumar, Balasubramaniam (b13) 2011; 151 Li, Shi, Chen (b21) 2018; 63 Wen, Wang, Liu, Alsaadi (b9) 2016; 48 Chen, Kar, Moura (b28) 2017; 5 Yuan, Zhang, Guo, Yang (b34) 2017; 354 Yang, Ju, Xia, Zhang (b16) 2019 Song, Shi, Zhang, Lim, Yu (b35) 2020; 50 Yuan, Xia, Yang, Yuan (b19) 2018; 28 Yang, Zhang, Chen, Yang, Shi (b32) 2019; 102 Ge, Han (b40) 2015; 291 Yuan (10.1016/j.isatra.2021.08.009_b24) 2020; 50 Yang (10.1016/j.isatra.2021.08.009_b18) 2017; 47 Yang (10.1016/j.isatra.2021.08.009_b32) 2019; 102 Zhang (10.1016/j.isatra.2021.08.009_b27) 2020; 120 Hu (10.1016/j.isatra.2021.08.009_b31) 2018; 87 Zhang (10.1016/j.isatra.2021.08.009_b20) 2015; 60 Ma (10.1016/j.isatra.2021.08.009_b37) 2016; 47 Bu (10.1016/j.isatra.2021.08.009_b6) 2018; 47 Song (10.1016/j.isatra.2021.08.009_b35) 2020; 50 Li (10.1016/j.isatra.2021.08.009_b39) 2019; 50 Ding (10.1016/j.isatra.2021.08.009_b23) 2017; 78 Senthilkumar (10.1016/j.isatra.2021.08.009_b13) 2011; 151 Yuan (10.1016/j.isatra.2021.08.009_b19) 2018; 28 Ge (10.1016/j.isatra.2021.08.009_b40) 2015; 291 Dong (10.1016/j.isatra.2021.08.009_b12) 2016; 72 Geng (10.1016/j.isatra.2021.08.009_b25) 2020; 102 Hu (10.1016/j.isatra.2021.08.009_b26) 2020; 50 Bequette (10.1016/j.isatra.2021.08.009_b41) 1998 Yassaie (10.1016/j.isatra.2021.08.009_b2) 2020 Li (10.1016/j.isatra.2021.08.009_b21) 2018; 63 Gao (10.1016/j.isatra.2021.08.009_b42) 2008; 81 Chen (10.1016/j.isatra.2021.08.009_b7) 2019; 49 Shen (10.1016/j.isatra.2021.08.009_b10) 2010; 46 Chen (10.1016/j.isatra.2021.08.009_b28) 2017; 5 Xia (10.1016/j.isatra.2021.08.009_b4) 2016; 42 Abbaspour (10.1016/j.isatra.2021.08.009_b33) 2019; 67 Qi (10.1016/j.isatra.2021.08.009_b15) 2020 Yang (10.1016/j.isatra.2021.08.009_b38) 2016; 69 Chiang (10.1016/j.isatra.2021.08.009_b3) 2016; 3 Ding (10.1016/j.isatra.2021.08.009_b11) 2017; 78 Yang (10.1016/j.isatra.2021.08.009_b16) 2019 Battistelli (10.1016/j.isatra.2021.08.009_b5) 2018; 93 Chen (10.1016/j.isatra.2021.08.009_b30) 2019; 10 Guo (10.1016/j.isatra.2021.08.009_b29) 2016; 4 Li (10.1016/j.isatra.2021.08.009_b8) 2018; 49 Senthilkumar (10.1016/j.isatra.2021.08.009_b14) 2014; 28 Chen (10.1016/j.isatra.2021.08.009_b1) 2015; 3 Guo (10.1016/j.isatra.2021.08.009_b36) 2017; 4 Wang (10.1016/j.isatra.2021.08.009_b17) 2017; 48 Wen (10.1016/j.isatra.2021.08.009_b9) 2016; 48 Ding (10.1016/j.isatra.2021.08.009_b22) 2018; 275 Yuan (10.1016/j.isatra.2021.08.009_b34) 2017; 354 |
References_xml | – volume: 48 start-page: 930 year: 2016 end-page: 941 ident: b9 article-title: Recursive distributed filtering for a class of state-saturated systems with fading measurements and quantization effects publication-title: IEEE Trans Syst Man Cybern: Syst – year: 1998 ident: b41 publication-title: Process Dynamics Modeling, Analysis, and Simulation – volume: 81 start-page: 804 year: 2008 end-page: 819 ident: b42 article-title: Robust fault detection with missing measurements publication-title: Internat J Control – volume: 3 start-page: 854 year: 2016 end-page: 864 ident: b3 article-title: Fog and IoT: An overview of research opportunities publication-title: IEEE Internet Things J – volume: 28 start-page: 464 year: 2014 end-page: 478 ident: b14 article-title: Non-fragile robust stabilization and publication-title: Internat J Adapt Control Signal Process – volume: 275 start-page: 1674 year: 2018 end-page: 1683 ident: b22 article-title: A survey on security control and attack detection for industrial cyber–physical systems publication-title: Neurocomputing – year: 2020 ident: b2 article-title: Resilient control of multi-microgrids against false data injection attack publication-title: ISA Trans – volume: 49 start-page: 734 year: 2018 end-page: 745 ident: b8 article-title: Remote nonlinear state estimation with stochastic event-triggered sensor schedule publication-title: IEEE Trans Cybern – volume: 354 start-page: 4966 year: 2017 end-page: 4988 ident: b34 article-title: Towards quantifying the impact of randomly occurred attacks on a class of networked control systems publication-title: J Franklin Inst B – volume: 47 start-page: 1050 year: 2016 end-page: 1060 ident: b37 article-title: Mean-square publication-title: IEEE Trans Syst Man Cybern: Syst – volume: 69 start-page: 242 year: 2016 end-page: 249 ident: b38 article-title: Decentralized event-triggered consensus for linear multi-agent systems under general directed graphs publication-title: Automatica – volume: 47 start-page: 522 year: 2018 end-page: 534 ident: b6 article-title: Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements publication-title: Int J Gen Syst – volume: 3 start-page: 352 year: 2015 end-page: 362 ident: b1 article-title: Ubiquitous monitoring for industrial cyber–physical systems over relay-assisted wireless sensor networks publication-title: IEEE Trans Emerg Top Comput – year: 2019 ident: b16 article-title: Predictive cloud control for networked multiagent systems with quantized signals under DoS attacks publication-title: IEEE Trans Syst Man Cybern: Syst – volume: 102 start-page: 34 year: 2019 end-page: 44 ident: b32 article-title: Distributed filtering under false data injection attacks publication-title: Automatica – volume: 93 start-page: 75 year: 2018 end-page: 82 ident: b5 article-title: A distributed Kalman filter with event-triggered communication and guaranteed stability publication-title: Automatica – volume: 63 start-page: 3503 year: 2018 end-page: 3509 ident: b21 article-title: False data injection attacks on networked control systems: A stackelberg-game analysis publication-title: IEEE Trans Automat Control – year: 2020 ident: b15 article-title: Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization publication-title: ISA Trans – volume: 5 start-page: 1157 year: 2017 end-page: 1168 ident: b28 article-title: Optimal attack strategies subject to detection constraints against cyber–physical systems publication-title: IEEE Trans Control Netw Syst – volume: 10 start-page: 2158 year: 2019 end-page: 2169 ident: b30 article-title: Evaluation of reinforcement learning-based false data injection attack to automatic voltage control publication-title: IEEE Trans Smart Grid – volume: 67 start-page: 7951 year: 2019 end-page: 7962 ident: b33 article-title: Resilient control design for load frequency control system under false data injection attacks publication-title: IEEE Trans Ind Electron – volume: 78 start-page: 194 year: 2017 end-page: 201 ident: b23 article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks publication-title: Automatica – volume: 50 start-page: 1856 year: 2019 end-page: 1866 ident: b39 article-title: Event-triggered consensus control for multiagent systems against fasle data-injection attacks publication-title: IEEE Trans Cybern – volume: 72 start-page: 28 year: 2016 end-page: 36 ident: b12 article-title: Variance-constrained publication-title: Automatica – volume: 28 start-page: 4604 year: 2018 end-page: 4623 ident: b19 article-title: Resilient control for wireless networked control systems under DoS attack via a hierarchical game publication-title: Internat J Robust Nonlinear Control – volume: 50 start-page: 48 year: 2020 end-page: 60 ident: b24 article-title: Resilient control of wireless networked control system under denial-of-service attacks: A cross-layer design approach publication-title: IEEE Trans Cybern – volume: 49 start-page: 455 year: 2019 end-page: 468 ident: b7 article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks publication-title: IEEE Trans Syst Man Cybern: Syst – volume: 50 start-page: 1952 year: 2020 end-page: 1964 ident: b26 article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks publication-title: IEEE Trans Cybern – volume: 42 start-page: 1 year: 2016 end-page: 12 ident: b4 article-title: Cloud control systems and their challenges publication-title: Acta Automat Sinica – volume: 151 start-page: 100 year: 2011 end-page: 120 ident: b13 article-title: Delay-dependent robust stabilization and publication-title: J Optim Theory Appl – volume: 102 start-page: 33 year: 2020 end-page: 42 ident: b25 article-title: Output regulation for decentralized networked control systems under jamming attacks and actuator saturation publication-title: ISA Trans – volume: 87 start-page: 176 year: 2018 end-page: 183 ident: b31 article-title: State estimation under false data injection attacks: Security analysis and system protection publication-title: Automatica – volume: 78 start-page: 231 year: 2017 end-page: 240 ident: b11 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica – volume: 48 start-page: 1007 year: 2017 end-page: 1017 ident: b17 article-title: Event-based variance-constrained publication-title: IEEE Trans Cybern – volume: 47 start-page: 2235 year: 2017 end-page: 2243 ident: b18 article-title: Event-driven control for networked control systems with quantization and Markov packet losses publication-title: IEEE Trans Cybern – volume: 60 start-page: 3023 year: 2015 end-page: 3028 ident: b20 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Trans Automat Control – volume: 4 start-page: 4 year: 2016 end-page: 13 ident: b29 article-title: Optimal linear cyber-attack on remote state estimation publication-title: IEEE Trans Control Netw Syst – volume: 120 year: 2020 ident: b27 article-title: False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach publication-title: Automatica – volume: 4 start-page: 202 year: 2017 end-page: 212 ident: b36 article-title: Quantized publication-title: IEEE Trans Control Netw Syst – volume: 50 start-page: 465 year: 2020 end-page: 475 ident: b35 article-title: Distributed publication-title: IEEE Trans Cybern – volume: 46 start-page: 1743 year: 2010 end-page: 1751 ident: b10 article-title: Robust publication-title: Automatica – volume: 291 start-page: 128 year: 2015 end-page: 142 ident: b40 article-title: Distributed event-triggered publication-title: Inform Sci – volume: 275 start-page: 1674 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b22 article-title: A survey on security control and attack detection for industrial cyber–physical systems publication-title: Neurocomputing doi: 10.1016/j.neucom.2017.10.009 – volume: 60 start-page: 3023 issue: 11 year: 2015 ident: 10.1016/j.isatra.2021.08.009_b20 article-title: Optimal denial-of-service attack scheduling with energy constraint publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2015.2409905 – volume: 63 start-page: 3503 issue: 10 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b21 article-title: False data injection attacks on networked control systems: A stackelberg-game analysis publication-title: IEEE Trans Automat Control doi: 10.1109/TAC.2018.2798817 – volume: 67 start-page: 7951 issue: 9 year: 2019 ident: 10.1016/j.isatra.2021.08.009_b33 article-title: Resilient control design for load frequency control system under false data injection attacks publication-title: IEEE Trans Ind Electron doi: 10.1109/TIE.2019.2944091 – volume: 4 start-page: 202 issue: 2 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b36 article-title: Quantized H∞ consensus of multiagent systems with quantization mismatch under switching weighted topologies publication-title: IEEE Trans Control Netw Syst doi: 10.1109/TCNS.2015.2489338 – volume: 10 start-page: 2158 issue: 2 year: 2019 ident: 10.1016/j.isatra.2021.08.009_b30 article-title: Evaluation of reinforcement learning-based false data injection attack to automatic voltage control publication-title: IEEE Trans Smart Grid doi: 10.1109/TSG.2018.2790704 – volume: 102 start-page: 34 year: 2019 ident: 10.1016/j.isatra.2021.08.009_b32 article-title: Distributed filtering under false data injection attacks publication-title: Automatica doi: 10.1016/j.automatica.2018.12.027 – volume: 354 start-page: 4966 issue: 12 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b34 article-title: Towards quantifying the impact of randomly occurred attacks on a class of networked control systems publication-title: J Franklin Inst B doi: 10.1016/j.jfranklin.2017.05.016 – volume: 102 start-page: 33 year: 2020 ident: 10.1016/j.isatra.2021.08.009_b25 article-title: Output regulation for decentralized networked control systems under jamming attacks and actuator saturation publication-title: ISA Trans doi: 10.1016/j.isatra.2020.03.010 – volume: 69 start-page: 242 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b38 article-title: Decentralized event-triggered consensus for linear multi-agent systems under general directed graphs publication-title: Automatica doi: 10.1016/j.automatica.2016.03.003 – year: 1998 ident: 10.1016/j.isatra.2021.08.009_b41 – volume: 28 start-page: 464 issue: 3–5 year: 2014 ident: 10.1016/j.isatra.2021.08.009_b14 article-title: Non-fragile robust stabilization and H∞ control for uncertain stochastic time delay systems with Markovian jump parameters and nonlinear disturbances publication-title: Internat J Adapt Control Signal Process doi: 10.1002/acs.2301 – volume: 3 start-page: 352 issue: 3 year: 2015 ident: 10.1016/j.isatra.2021.08.009_b1 article-title: Ubiquitous monitoring for industrial cyber–physical systems over relay-assisted wireless sensor networks publication-title: IEEE Trans Emerg Top Comput doi: 10.1109/TETC.2014.2386615 – volume: 42 start-page: 1 issue: 1 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b4 article-title: Cloud control systems and their challenges publication-title: Acta Automat Sinica – volume: 28 start-page: 4604 issue: 15 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b19 article-title: Resilient control for wireless networked control systems under DoS attack via a hierarchical game publication-title: Internat J Robust Nonlinear Control doi: 10.1002/rnc.4272 – volume: 4 start-page: 4 issue: 1 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b29 article-title: Optimal linear cyber-attack on remote state estimation publication-title: IEEE Trans Control Netw Syst doi: 10.1109/TCNS.2016.2570003 – volume: 50 start-page: 48 issue: 1 year: 2020 ident: 10.1016/j.isatra.2021.08.009_b24 article-title: Resilient control of wireless networked control system under denial-of-service attacks: A cross-layer design approach publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2018.2863689 – volume: 50 start-page: 465 issue: 2 year: 2020 ident: 10.1016/j.isatra.2021.08.009_b35 article-title: Distributed H∞ estimation in sensor networks with two-channel stochastic attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2018.2865238 – volume: 48 start-page: 930 issue: 6 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b9 article-title: Recursive distributed filtering for a class of state-saturated systems with fading measurements and quantization effects publication-title: IEEE Trans Syst Man Cybern: Syst doi: 10.1109/TSMC.2016.2629464 – volume: 49 start-page: 734 issue: 3 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b8 article-title: Remote nonlinear state estimation with stochastic event-triggered sensor schedule publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2776976 – volume: 3 start-page: 854 issue: 6 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b3 article-title: Fog and IoT: An overview of research opportunities publication-title: IEEE Internet Things J doi: 10.1109/JIOT.2016.2584538 – volume: 151 start-page: 100 issue: 1 year: 2011 ident: 10.1016/j.isatra.2021.08.009_b13 article-title: Delay-dependent robust stabilization and H∞ control for nonlinear stochastic systems with Markovian jump parameters and interval time-varying delays publication-title: J Optim Theory Appl doi: 10.1007/s10957-011-9858-7 – year: 2019 ident: 10.1016/j.isatra.2021.08.009_b16 article-title: Predictive cloud control for networked multiagent systems with quantized signals under DoS attacks publication-title: IEEE Trans Syst Man Cybern: Syst – volume: 87 start-page: 176 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b31 article-title: State estimation under false data injection attacks: Security analysis and system protection publication-title: Automatica doi: 10.1016/j.automatica.2017.09.028 – volume: 50 start-page: 1856 issue: 5 year: 2019 ident: 10.1016/j.isatra.2021.08.009_b39 article-title: Event-triggered consensus control for multiagent systems against fasle data-injection attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2937951 – year: 2020 ident: 10.1016/j.isatra.2021.08.009_b2 article-title: Resilient control of multi-microgrids against false data injection attack publication-title: ISA Trans – volume: 78 start-page: 231 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b11 article-title: Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.026 – volume: 291 start-page: 128 year: 2015 ident: 10.1016/j.isatra.2021.08.009_b40 article-title: Distributed event-triggered H∞ filtering over sensor networks with communication delays publication-title: Inform Sci doi: 10.1016/j.ins.2014.08.047 – volume: 47 start-page: 522 issue: 5 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b6 article-title: Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements publication-title: Int J Gen Syst doi: 10.1080/03081079.2018.1462353 – volume: 5 start-page: 1157 issue: 3 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b28 article-title: Optimal attack strategies subject to detection constraints against cyber–physical systems publication-title: IEEE Trans Control Netw Syst doi: 10.1109/TCNS.2017.2690399 – volume: 93 start-page: 75 year: 2018 ident: 10.1016/j.isatra.2021.08.009_b5 article-title: A distributed Kalman filter with event-triggered communication and guaranteed stability publication-title: Automatica doi: 10.1016/j.automatica.2018.03.005 – volume: 46 start-page: 1743 issue: 11 year: 2010 ident: 10.1016/j.isatra.2021.08.009_b10 article-title: Robust H∞ finite-horizon filtering with randomly occurred nonlinearities and quantization effects publication-title: Automatica doi: 10.1016/j.automatica.2010.06.041 – volume: 78 start-page: 194 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b23 article-title: A multi-channel transmission schedule for remote state estimation under DoS attacks publication-title: Automatica doi: 10.1016/j.automatica.2016.12.020 – volume: 50 start-page: 1952 issue: 5 year: 2020 ident: 10.1016/j.isatra.2021.08.009_b26 article-title: Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2019.2903817 – volume: 48 start-page: 1007 issue: 3 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b17 article-title: Event-based variance-constrained H∞ filtering for stochastic parameter systems over sensor networks with successive missing measurements publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2017.2671032 – volume: 47 start-page: 1050 issue: 7 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b37 article-title: Mean-square H∞ consensus control for a class of nonlinear time-varying stochastic multiagent systems: The finite-horizon case publication-title: IEEE Trans Syst Man Cybern: Syst doi: 10.1109/TSMC.2016.2531657 – year: 2020 ident: 10.1016/j.isatra.2021.08.009_b15 article-title: Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization publication-title: ISA Trans – volume: 120 year: 2020 ident: 10.1016/j.isatra.2021.08.009_b27 article-title: False data injection attacks with complete stealthiness in cyber–physical systems: A self-generated approach publication-title: Automatica doi: 10.1016/j.automatica.2020.109117 – volume: 49 start-page: 455 issue: 2 year: 2019 ident: 10.1016/j.isatra.2021.08.009_b7 article-title: Distributed dimensionality reduction fusion estimation for cyber–physical systems under DoS attacks publication-title: IEEE Trans Syst Man Cybern: Syst doi: 10.1109/TSMC.2017.2697450 – volume: 81 start-page: 804 issue: 5 year: 2008 ident: 10.1016/j.isatra.2021.08.009_b42 article-title: Robust fault detection with missing measurements publication-title: Internat J Control doi: 10.1080/00207170701684823 – volume: 72 start-page: 28 year: 2016 ident: 10.1016/j.isatra.2021.08.009_b12 article-title: Variance-constrained H∞ control for a class of nonlinear stochastic discrete time-varying systems: The event-triggered design publication-title: Automatica doi: 10.1016/j.automatica.2016.05.012 – volume: 47 start-page: 2235 issue: 8 year: 2017 ident: 10.1016/j.isatra.2021.08.009_b18 article-title: Event-driven control for networked control systems with quantization and Markov packet losses publication-title: IEEE Trans Cybern doi: 10.1109/TCYB.2016.2568281 |
SSID | ssj0002598 |
Score | 2.3914452 |
Snippet | This paper considers a distributed secure filtering problem for a category of time-varying system subject to uncertainty and model-reality mismatch, two-stage... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 338 |
SubjectTerms | Deception attack Distributed filtering Event-triggered mechanism Quantization Sensor networks |
Title | Event-based distributed filtering against deception attacks for sensor networks with quantization effect |
URI | https://dx.doi.org/10.1016/j.isatra.2021.08.009 https://www.proquest.com/docview/2563423597 |
Volume | 126 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6iFz2IrorPJYIHPUTbpo_tURZlfSKi4C3kMdUV6arbvfrbnWlTXwiCp5SSlJJJ5pF88w1jO2DTAqwMBBiDAYpNpDCQaEHEIFkcZ2gj6Rzy4jId3Mand8ndFOu3uTAEq_S6v9Hptbb2bw78bB48D4eU44vGjNjYw5qghzLKib0O1_T-2yfMA917r41zQb3b9Lka40WImVdiH4oaIk-CJf5unn4o6tr6HC-wee828sPmzxbZFJQdNveFTLDDFv02HfNdzyW9t8QejgjPKMhWOe6IJJfqW-FzMaRrchzI9b0eoo_IHXiEC9dVRZn3HP1ZPsYwF5uyQYuPOZ3b8pcJysMncPIGEbLMbo-PbvoD4YsrCCtlXgn0zFwWBEWupQWtExeaAGJIQtcj_h0Z9Iw1DrWBi10YWVloyPMkcQWFQBj1yBU2XY5KWGU8sLonIS9SA1mc6shE2qS9KAtCQGcC7BqT7Zwq65nHqQDGk2ohZo-qkYQiSSiqixnka0x8jHpumDf-6J-14lLfVpBC4_DHyO1Wugo3F92Y6BJGk7FCf5AYEjHoWv_31zfYbEQpEzXEd5NNV68T2EJHpjLdeqV22cxh__r8itqTs8HlO6As9rY |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS-VAEC6c58GZg7iiMy4teNBDY5LO8nIUUZ7bOyl4a3qp6BuGuLy8_z9VSUdUBMFTQkiF0NVdS_dXXwHso8srdCqSaC0lKC5T0mJmJBODFGlakI_kfcjrcT66TS_usrs5OOlrYRhWGWx_Z9Nbax2eHIXRPHqaTLjGl5wZs7HHLUFP8QPmmZ0qHcD88fnlaPxqkCnCDwa5lCzQV9C1MC8GzbwwAVHScXkyMvFzD_XBVrcO6GwJFkPkKI67n1uGOaxX4NcbPsEVWA4rdSoOAp304So8nDKkUbK78sIzTy63uKL7asIn5SQozL2ZUJgoPAaQizBNw8X3gkJaMaVMly51BxifCt66Fc8zUkmo4RQdKGQNbs9Ob05GMvRXkE6pspEUnPkiiqrSKIfGZD62EaaYxX7IFDwqGlpnPRkEn_o4caoyWJZZ5ivOgijxUeswqB9r3AAROTNUWFa5xSLNTWITY_NhUkQxUjyBbhNUP6baBfJx7oHxT_cos7-604RmTWhujRmVmyBfpZ468o0v3i96del3k0iTf_hCcq_Xrqb1xYcmpsbH2VRTSMgkiZR3_f7213dhYXRzfaWvzseXf-BnwhUULeJ3CwbNywy3Ka5p7E6Yt_8BUXz30g |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Event-based+distributed+filtering+against+deception+attacks+for+sensor+networks+with+quantization+effect&rft.jtitle=ISA+transactions&rft.au=Yuan%2C+Huanhuan&rft.au=Guo%2C+Yongzhen&rft.au=Xia%2C+Yuanqing&rft.date=2022-07-01&rft.issn=0019-0578&rft.volume=126&rft.spage=338&rft.epage=351&rft_id=info:doi/10.1016%2Fj.isatra.2021.08.009&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_isatra_2021_08_009 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0019-0578&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0019-0578&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0019-0578&client=summon |