2022
DOI: 10.1016/j.automatica.2021.110151
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and defense strategy of distributed filtering under false data injection attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(5 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The state vector is defined as x k = [ζ k , ζk , η k , ηk ] T , which consists of position (ζ k , η k ) and velocity ( ζk , ηk ). The tracking system considered in this section is as described in (1) and (2), where the relevant parameters are defined as follows:…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The state vector is defined as x k = [ζ k , ζk , η k , ηk ] T , which consists of position (ζ k , η k ) and velocity ( ζk , ηk ). The tracking system considered in this section is as described in (1) and (2), where the relevant parameters are defined as follows:…”
Section: Simulation Resultsmentioning
confidence: 99%
“…With the advancement of communication technologies, networked multi-sensor systems have garnered significant interest in recent decades [1,2]. Networked multi-sensor systems contain components connected via a shared network, thus reducing unnecessary wired connections, lowering installation costs, and increasing system scalability [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…Such interference factors often cause greater damage to the intelligent connected vehicle system. Common network attacks are denial of service attacks, 18 deception attacks, 19 and replay attacks. 20 Deception attack is also called false data injection attack.…”
Section: Introductionmentioning
confidence: 99%
“…The former focuses on affecting the data integrity by modifying the transmitted data packets. [16][17][18][19] Aside from deception attacks, DoS attacks can expose the availability of the communication network. Since its easy implementability and large dangerousness, the DoS attack have drawn unprecedented attention nowadays.…”
Section: Introductionmentioning
confidence: 99%
“…According to different attack characteristics, the existing cyber attacks can be roughly divided into two categories, deception attacks and denial‐of‐service (DoS) attacks. The former focuses on affecting the data integrity by modifying the transmitted data packets 16‐19 . Aside from deception attacks, DoS attacks can expose the availability of the communication network.…”
Section: Introductionmentioning
confidence: 99%