“…Remark 5. Similar to reference [16], the states of x 1 and x 4 and their estimates are related to the initial state of the system and the initial state of the observer. Because the designed observer in this paper is nite time, the estimates are irregular before 0.5 s. In addition, the initial state of the system and the initial state of the observer have no e ect on the nal results, and we can change the initial state to adjust the estimates.…”
Section: Simulationmentioning
confidence: 99%
“…However, based on this, the attack η(t) added to the model in this manuscript and the complexity is not increased. So the system is more conservative than the system in references [16] and [28].…”
Section: Simulationmentioning
confidence: 99%
“…is requires a specified finite-time estimate. Although Ao et al [16] introduced two concepts of elastic observability index and sparse index of the system and designed a finite-time state observer with state correction, the actuator attack is not taken into account. us, studying the finite-time state estimate under actuator attack is meaningful.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Inspired by Ao et al in [16], we have proposed a finite-time observer to estimate the state of the system with actuator attacks. Ao et al [16] studied the state estimation of systems against sensor attacks, while this article focuses on actuator attacks.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Inspired by Ao et al in [16], we have proposed a finite-time observer to estimate the state of the system with actuator attacks. Ao et al [16] studied the state estimation of systems against sensor attacks, while this article focuses on actuator attacks. (2) Inspired by the study of Zhang and Feng in reference [28], considering the resource constraints of the system, event-triggered control is introduced into the attacked cyber-physical system.…”
This paper is concerned with the security state estimation and event-triggered control of cyber-physical systems (CPSs) under malicious attack. Aiming at this problem, a finite-time observer is designed to estimate the state of the system successfully. Then, according to the state information, the event-triggered controller is designed through the event-triggered communication. It is proved that the system is uniformly and finally bounded. Finally, the effectiveness of the proposed method is verified by a simulation example.
“…Remark 5. Similar to reference [16], the states of x 1 and x 4 and their estimates are related to the initial state of the system and the initial state of the observer. Because the designed observer in this paper is nite time, the estimates are irregular before 0.5 s. In addition, the initial state of the system and the initial state of the observer have no e ect on the nal results, and we can change the initial state to adjust the estimates.…”
Section: Simulationmentioning
confidence: 99%
“…However, based on this, the attack η(t) added to the model in this manuscript and the complexity is not increased. So the system is more conservative than the system in references [16] and [28].…”
Section: Simulationmentioning
confidence: 99%
“…is requires a specified finite-time estimate. Although Ao et al [16] introduced two concepts of elastic observability index and sparse index of the system and designed a finite-time state observer with state correction, the actuator attack is not taken into account. us, studying the finite-time state estimate under actuator attack is meaningful.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Inspired by Ao et al in [16], we have proposed a finite-time observer to estimate the state of the system with actuator attacks. Ao et al [16] studied the state estimation of systems against sensor attacks, while this article focuses on actuator attacks.…”
Section: Introductionmentioning
confidence: 99%
“…(1) Inspired by Ao et al in [16], we have proposed a finite-time observer to estimate the state of the system with actuator attacks. Ao et al [16] studied the state estimation of systems against sensor attacks, while this article focuses on actuator attacks. (2) Inspired by the study of Zhang and Feng in reference [28], considering the resource constraints of the system, event-triggered control is introduced into the attacked cyber-physical system.…”
This paper is concerned with the security state estimation and event-triggered control of cyber-physical systems (CPSs) under malicious attack. Aiming at this problem, a finite-time observer is designed to estimate the state of the system successfully. Then, according to the state information, the event-triggered controller is designed through the event-triggered communication. It is proved that the system is uniformly and finally bounded. Finally, the effectiveness of the proposed method is verified by a simulation example.
This manuscript studies the problem of secure state estimation (SSE) for a class of linear discrete cyber-physical systems (CPSs) considered with output disturbances, actuator, and sensor attacks. The disturbances and attacks considered are unbounded. A finite time SSE (FTSSE) method is designed to realize SSE for CPSs in a predetermined finite time. First, a finite time observer is designed to implement the FTSSE for CPSs with actuator attacks and output disturbances. After that, the FTSSE method for CPSs with simultaneous sensor attacks is proposed by extending the designed finite time observer. The necessary conditions for the existence of the proposed FTSSE method are given, and its effectiveness is analyzed theoretically. In addition, the simultaneous estimation of disturbance and attack can be achieved by the designed estimator when the system satisfies some given conditions. Finally, the effectiveness of the designed method is verified by a simulation experiment.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.