2018
DOI: 10.1109/tsipn.2017.2760804
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Joint Attack Detection and Secure State Estimation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(41 citation statements)
references
References 39 publications
0
41
0
Order By: Relevance
“…Some recent related work on resilient distributed parameter estimation and resilient decentralized hypothesis testing are reported in [23] and [24], respectively. The authors in [25] consider the problem of joint attack detection and state estimation. However, the attack model, the system model, and the assumptions on the communication graph in [25] differ considerably from the ones considered in this paper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some recent related work on resilient distributed parameter estimation and resilient decentralized hypothesis testing are reported in [23] and [24], respectively. The authors in [25] consider the problem of joint attack detection and state estimation. However, the attack model, the system model, and the assumptions on the communication graph in [25] differ considerably from the ones considered in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…The authors in [25] consider the problem of joint attack detection and state estimation. However, the attack model, the system model, and the assumptions on the communication graph in [25] differ considerably from the ones considered in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…A study on attack detection and identification for CPSs was given in [1], where the design methods and analysis techniques for centralized and distributed monitors were discussed as well. In [2], the joint distributed attack detection and state estimation was investigated in a Bayesian framework. To obtain attack-resilient state estimates, in the centralized framework, some state estimators or observers were proposed based on optimization techniques [3]- [7], recursive implementation [8], and probabilistic approach [9].…”
Section: Introductionmentioning
confidence: 99%
“…We find the minimal conditions to guarantee observability/controllability of the composite network and provide sufficient conditions on the structure of the network G 1 and the observation/input matrix H C . First, similar to [35], we find 3 The constrained bipartite matching is defined over bipartite representation of the network. In the bipartite representation, define a t-matching as a set of t links such that no two of them share a node.…”
Section: Introductionmentioning
confidence: 99%