2022
DOI: 10.1109/tcst.2021.3063924
|View full text |Cite
|
Sign up to set email alerts
|

Spoof Resilient Coordination in Distributed and Robust Robotic Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The same author in [11], [12], and [13] developed a cyber-physical system to prevent Cyberattacks in vehicular and robotic systems as the initial thrust of this research. Renganathan et al in [14] proposed a class of resilient consensus strategies, namely, weighted mean-subsequencereduced (W-MSR) consensus by incorporating a physical layer authentication strategy. Despite their promising results, their algorithms are not suitable to monitor large-scale ROS network traffic data.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The same author in [11], [12], and [13] developed a cyber-physical system to prevent Cyberattacks in vehicular and robotic systems as the initial thrust of this research. Renganathan et al in [14] proposed a class of resilient consensus strategies, namely, weighted mean-subsequencereduced (W-MSR) consensus by incorporating a physical layer authentication strategy. Despite their promising results, their algorithms are not suitable to monitor large-scale ROS network traffic data.…”
Section: A Related Workmentioning
confidence: 99%
“…As can be seen, the performance of the system with the independent windowing (IW) technique outperforms the performance of the overlapping windowing technique (OW) (see Figs. [14][15][16][17]. Intuitively, the independent windowing technique can provide more information in each sampling time since it contains no repetitive information with the neighboring windows (segments).…”
Section: Statistical Performancementioning
confidence: 99%
See 1 more Smart Citation
“…We make the following assumption that at the beginning of the transmission, the estimator can receive the packet x0 successfully, that is, δ 0 = 1. Based on (10) and (11), it is easy to obtain the estimation error covariance at the remote estimator as P(k) = h τ k ( P).…”
Section: Remote Estimationmentioning
confidence: 99%
“…In terms of specific attack types, cyber attacks encountered on CPSs are mainly divided into DoS attacks [7,8], spoofing attacks [9,10] and injection attacks [11][12][13]. Among them, DoS attacks have been paid more attention as one of the most frequent and easy cyber attacks to implement.…”
Section: Introductionmentioning
confidence: 99%