2022
DOI: 10.1109/tifs.2022.3202119
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Distributed State Estimation Under Stealthy Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…As mentioned before, previous work focused more on centralised multi-sensor systems or single sensor systems, rather than on distributed systems. With the all-round development of computation and communication capabilities in sensor networks, distributed estimation is widely applied in networked multi-sensor systems due to its high robustness, scalability and flexibility [9,18]. However, since information sharing and data transmission are constrained by the inherent coupling relationship between different nodes, distributed sensor networks are more vulnerable to various cyber attacks [19,20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned before, previous work focused more on centralised multi-sensor systems or single sensor systems, rather than on distributed systems. With the all-round development of computation and communication capabilities in sensor networks, distributed estimation is widely applied in networked multi-sensor systems due to its high robustness, scalability and flexibility [9,18]. However, since information sharing and data transmission are constrained by the inherent coupling relationship between different nodes, distributed sensor networks are more vulnerable to various cyber attacks [19,20].…”
Section: Introductionmentioning
confidence: 99%
“…Governed by multi-random variables with Bernoulli distribution, a unified hybrid attack model considering the joint impact of random FDI and DoS attacks is proposed. Different from cyber attacks on the sensor-to-estimator communication chan-nel in [13,18], the proposed hybrid attack disrupts the data transmission between neighboring estimators in the distributed consensus estimation.…”
Section: Introductionmentioning
confidence: 99%
“…The insecure network environment of many real NCSs makes it necessary to consider the impacts of malicious attacks 16 . The attacks would threaten the security of real‐world systems unless the controller is properly designed 17,18 . DoS attack is a typical malicious attack launched by routers and jammers, 19 and it aims to cause instability by blocking communication between system components 20 .…”
Section: Introductionmentioning
confidence: 99%
“…16 The attacks would threaten the security of real-world systems unless the controller is properly designed. 17,18 DoS attack is a typical malicious attack launched by routers and jammers, 19 and it aims to cause instability by blocking communication between system components. 20 Different from stochastic packet loss, DoS attacks may not be launched based on probabilistic models.…”
Section: Introductionmentioning
confidence: 99%