2019 IEEE 58th Conference on Decision and Control (CDC) 2019
DOI: 10.1109/cdc40024.2019.9029929
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Secure State Estimation Using Diffusion Kalman Filters and Reachability Analysis

Abstract: The tight coupling of information technology with physical sensing and actuation in cyber-physical systems (CPS) has given rise to new security vulnerabilities and attacks with potentially life-threatening consequences. These attacks are designed to transfer the physical system into unstable and insecure states by providing corrupted sensor readings. In this work, we present an approach for distributed secure linear state estimation in the presence of modeling and measurement noise between a network of nodes w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…x 2 = 1. By induction, x n = x for odd n, x n = 1 for even n, that is 2) which shows the inclusion neutrality of (11). Similarly, let x be a possible value of any boolean symbol: x ∈ {0, 1} ⊂ R. Thus, (x − 0)(x − 1) = 0 i.e.…”
Section: Polynomial S-functions and Polynotopesmentioning
confidence: 91%
See 1 more Smart Citation
“…x 2 = 1. By induction, x n = x for odd n, x n = 1 for even n, that is 2) which shows the inclusion neutrality of (11). Similarly, let x be a possible value of any boolean symbol: x ∈ {0, 1} ⊂ R. Thus, (x − 0)(x − 1) = 0 i.e.…”
Section: Polynomial S-functions and Polynotopesmentioning
confidence: 91%
“…Within the set-membership literature, intervals [51,29], ellipsoids [66,43,36] and polytopes [74,26] have initiated a growing body of research works addressing the core problem of reachability [52,23,39,42,61,15,68,3,5,41,6,25], but also possibly distributed [54,53,17] state estimation [57,1,9,10,11,37,71,13,14,44,59,64,2,60,19,18], identification [47,8], computation of invariant sets [20,46,72], fault diagnosis [16,73,12,69,58,55], among others. Intervals (resp.…”
Section: Problem Setting and Antecedentsmentioning
confidence: 99%
“…(1a)-(1c), note that L depends on both G and G. Additionally, note that unlike a PDF, the area enclosed by a p-Zonotope does not equal to one. More details regarding the characteristics of zonotopes and p-Zonotopes can be found in the prior literature [26,31].…”
Section: Preliminaries Of Sr and P-zonotopesmentioning
confidence: 99%
“…Multi-robot systems typically depend on inter-robot communication which enables them to execute complex missions efficiently. Interrobot communication also adds resilience to malicious attacks [9] and single robot failures [10]. Thus, maintaining connectivity between robots is often a requirement for multi-robot systems.…”
Section: Introductionmentioning
confidence: 99%