2021
DOI: 10.1002/rnc.5836
|View full text |Cite
|
Sign up to set email alerts
|

Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks

Abstract: This article considers the issue of finite‐time asynchronous state estimation for event‐triggered nonlinear Markovian jump systems subject to cyber‐attacks. An adaptive event‐triggered scheme is introduced to cope with the capacity constraint of the networked resources. It is assumed that the transmitted sensor measurements may experience randomly malicious cyber‐attacks. Considering the effect of the adaptive event‐triggered scheme and the occurrence of cyber‐attacks, we establish a new state estimation erro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…First, the definition is different. In this paper, we use the transition rates to describe the relationship between the system modes and controller modes (behaving in () and ()), while in [1, 25–31], conditional probability was used, that is, scriptPfalse{rfalse(tfalse)=ifalse|ψfalse(tfalse)=kfalse}=σik$$ \mathcal{P}\left\{r(t)=i|\psi (t)=k\right\}={\sigma}_{ik} $$. Second, we assume the transition rates of both the system and controller to be partly bounded known, while the detection probability σik$$ {\sigma}_{ik} $$ was usually assumed to be exactly known.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…First, the definition is different. In this paper, we use the transition rates to describe the relationship between the system modes and controller modes (behaving in () and ()), while in [1, 25–31], conditional probability was used, that is, scriptPfalse{rfalse(tfalse)=ifalse|ψfalse(tfalse)=kfalse}=σik$$ \mathcal{P}\left\{r(t)=i|\psi (t)=k\right\}={\sigma}_{ik} $$. Second, we assume the transition rates of both the system and controller to be partly bounded known, while the detection probability σik$$ {\sigma}_{ik} $$ was usually assumed to be exactly known.…”
Section: Resultsmentioning
confidence: 99%
“…Remark A hidden Markov model is used to govern the controller switching. Unlike the existing results proposed in [1, 25–31], a new relationship between the system modes and controller modes is established, behaving on the transition rates. Note that in [1, 25–31], the detection probabilities had to be exactly known; however, the transition rates can be partly bounded known.…”
Section: Resultsmentioning
confidence: 99%
“…At present, numerous solutions have been proposed to reduce the negative impact of malicious attacks and some important results have been reported. These existing works are mainly focused on denial-of-service (DoS) attacks and deception attacks [14][15][16][17][18]. DoS attacks try to block the interconnection of communication modules, which will cause data transmission failure or even let the system instability [19,20].…”
Section: Introductionmentioning
confidence: 99%
“…Besides of the constraint network-bandwidth in networked systems, the network security is another important issue worthy of attention. [20][21][22] The network openness and vulnerabilities make the networked system expose to malicious attacks, which interfere the integrity and authenticity of the transmitted data during transmission aiming to destroy the target system. With the hope of eliminating the negative impacts inducing by malicious attacks, several types of malicious attacks to networked systems have been studied in depth including denial-of-service (DoS) attacks [23][24][25] and deception attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Besides of the constraint network‐bandwidth in networked systems, the network security is another important issue worthy of attention 20‐22 . The network openness and vulnerabilities make the networked system expose to malicious attacks, which interfere the integrity and authenticity of the transmitted data during transmission aiming to destroy the target system.…”
Section: Introductionmentioning
confidence: 99%