2020
DOI: 10.1109/tcyb.2019.2897366
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Secure Filtering for Discrete-Time Systems Under Round-Robin Protocol and Deception Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(14 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…At last, a numerical simulation has been given to verify the feasibility and usefulness of our designed fault estimation approach. The future research topics would be the extension of the main results obtained in this paper to (1) the system with communication protocols and (2) the time‐varying complex systems …”
Section: Resultsmentioning
confidence: 99%
“…At last, a numerical simulation has been given to verify the feasibility and usefulness of our designed fault estimation approach. The future research topics would be the extension of the main results obtained in this paper to (1) the system with communication protocols and (2) the time‐varying complex systems …”
Section: Resultsmentioning
confidence: 99%
“…Comparative simulation results have been reported to show that the averaged root mean square errors (RMSE) of estimation gets decreased by our method compared to a rival one in literature. The main results of this paper can be developed to the following issues in order to improve the proposed method in the future works: (1) consideration of the roundrobin protocol for reducing the data exchange between nodes [19], [33], (2) attachment of the gain variations that usually occur in the practical system because of computational or implementation uncertainties in the hardware [34], [35], (3) consideration of the issue that when data is exchanged among the sensors, due to the vulnerability of communication networks, the information can be overheard and modified by the adversary [36], [37], (4) consideration of the Fault Estimation [38] . Thus, based on the view of the author, considering the above topics can improve the performance of the proposed method in practical applications.…”
Section: Discussionmentioning
confidence: 99%
“…The RR protocol is another commonly used protocol, which allows only one node to communicate with its neighbors during scheduled time slots and therefore leads to bandwidth savings. Preliminary research on H ∞ consensus filtering can be found in [73] and, subsequently, has gained increasing attention by making use of the time-delay approach [44] as well as the periodic system analysis method [47,76,84]. For example, distributed set-membership filtering is addressed in [47] for multi-rate systems which are transformed into a traditional discrete-time system by means of lifting techniques.…”
Section: Basic Analysis Schemes and Research Developmentsmentioning
confidence: 99%