2019
DOI: 10.1109/tsmc.2019.2905253
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
105
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 268 publications
(105 citation statements)
references
References 43 publications
0
105
0
Order By: Relevance
“…Finally, by simulation results we demonstrated the effectiveness of the obtained conditions. The techniques developed in this paper can be employed to investigate the synchronization problem [8,11,31] and the H ∞ control problem [19,32,33]. In addition, it is worth pointing out that there exists conservatism in our results.…”
Section: Discussionmentioning
confidence: 95%
“…Finally, by simulation results we demonstrated the effectiveness of the obtained conditions. The techniques developed in this paper can be employed to investigate the synchronization problem [8,11,31] and the H ∞ control problem [19,32,33]. In addition, it is worth pointing out that there exists conservatism in our results.…”
Section: Discussionmentioning
confidence: 95%
“…Design the attack strategy (12) for the system (1). The systems (14) and (15) satisfy the performances (A.1), (16) and (A.2), (17), if there exist block diagonal matrixP t , matricesP t ,Q 1 ,Q 2 , … ,Q N−1 ,Q 1 ,Q 2 , … ,Q N−1 , t = 1, 2, … , N, X > 0,X > 0 and 1 > 0, 2 > 0 such that the inequalities (48) to (57)…”
Section: Resultsmentioning
confidence: 99%
“…For instance, denial‐of‐service (DoS) attack, false data injection attack, and replay attack . In addition, the resilient filtering problem under DoS attack was investigated by Chen et al for the power system. A review of distributed security control for industrial CPSs has also been given by Ding et al From the point of view of the attacker, it is also of great value to study the attack strategy of the attacker and the influence of the attack on the systems.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, [31] considered a DoS attack on the sensor signal, for which both the frequency of the attack and the duration were time-varying. The recent work [32] has addressed the distributed resilient filtering problem for a class of power systems subject to DoS attacks. Furthermore, [33] has proposed an event-triggered estimator design for cyber-physical systems with limited communication resources, sensor saturation and DoS attacks.…”
Section: Introductionmentioning
confidence: 99%