Protocol-Based Distributed Security Fusion Estimation for Networked Systems With Unknown Bounded Noise Under Quantization

被引:1
|
作者
Zha, Lijuan [1 ]
Guo, Yaping [2 ]
Liu, Jinliang [3 ]
Xie, Xiangpeng [4 ]
Tian, Engang [5 ]
Cao, Jinde [6 ,7 ]
机构
[1] Nanjing Forestry Univ, Sch Sci, Nanjing 210037, Peoples R China
[2] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Peoples R China
[3] Nanjing Univ Informat Sci & Technol, Sch Comp Sci, Nanjing 210044, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Peoples R China
[5] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
[6] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[7] Linyi Univ, Sch Automat & Elect Engn, Linyi 276005, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2024年 / 11卷 / 04期
基金
中国国家自然科学基金;
关键词
Estimation; Sensors; Quantization (signal); Sensor fusion; Bandwidth; Protocols; Denial-of-service attack; Denial-of-service (DoS) attacks; fusion estimation; networked systems; quantization; round-robin scheduling protocol (RRSP); CYBER-PHYSICAL SYSTEMS; STATE ESTIMATION; MULTIAGENT SYSTEMS; ATTACKS;
D O I
10.1109/TCNS.2024.3378450
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, a novel distributed fusion estimation approach is proposed for time-varying systems with unknown bounded noises subject to bandwidth-constrained networks and denial-of-service (DoS) attacks, where the round-robin scheduling protocol and the quantization scheme are, respectively, employed to ease the burden of networks. It is assumed that the network connecting sensors and local state estimators is vulnerable to DoS attacks. For resisting the impacts of DoS attacks, a compensation strategy is adopted. A new method has been developed to devise the local state estimators. The innovation signals from local estimators will be quantized first before entering the network. Gains of the local state estimators and the fusion weighting matrices are acquired by solving a linear matrix inequality. Finally, the effectiveness of the proposed methods is verified by a target tracking system.
引用
收藏
页码:2139 / 2150
页数:12
相关论文
共 50 条
  • [21] Distributed Dimensionality Reduction Fusion Estimation for Cyber-Physical Systems Under DoS Attacks
    Chen, Bo
    Ho, Daniel W. C.
    Zhang, Wen-An
    Yu, Li
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2019, 49 (02): : 455 - 468
  • [22] Intelligent Finite-Time Protocol-Based Stabilization for Networked UMV Systems With DoS Attacks
    Qi, Wenhai
    Yin, Huaichao
    Park, Ju H.
    Wu, Zheng-Guang
    Yan, Huaicheng
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) : 16734 - 16744
  • [23] Event-Triggered Sequential Fusion Filter for Nonlinear Multi-Sensor Systems With Correlated Noise Based on Observation Noise Estimation
    Cheng, Guo-Rui
    Ma, Meng-Chen
    Tan, Li-Guo
    Song, Shen-Min
    IEEE SENSORS JOURNAL, 2022, 22 (09) : 8818 - 8829
  • [24] Observer-Based Security Fuzzy Control for Nonlinear Networked Systems Under Weighted Try-Once-Discard Protocol
    Liu, Jinliang
    Gong, Enyu
    Zha, Lijuan
    Tian, Engang
    Xie, Xiangpeng
    IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2023, 31 (11) : 3853 - 3865
  • [25] Outlier-Resistant Recursive Security Filtering for Multirate Networked Systems Under Fading Measurements and Round-Robin Protocol
    Liu, Jinliang
    Gong, Enyu
    Zha, Lijuan
    Xie, Xiangpeng
    Tian, Engang
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2023, 10 (04): : 1962 - 1974
  • [26] H∞ Control for Networked Singular Systems Under Quantization and Unknown Periodic Denial-of-Service Attacks
    Lv, Wang
    Hu, Songlin
    Chen, Xiaoli
    Cheng, Zihao
    Ge, Hui
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 5368 - 5373
  • [27] ADP-Based Remote Secure Control for Networked Control Systems Under Unknown Nonlinear Attacks in Sensors and Actuators
    Zhang, Longjie
    Chen, Yong
    Li, Meng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6003 - 6014
  • [28] Distributed Round-Robin Protocol-Based Secondary Control for ESSs Under FDI Attacks
    Fan, Sha
    Yue, Dong
    Yan, Huaicheng
    Deng, Chao
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2024, 71 (12) : 16493 - 16502
  • [29] Moving Horizon Estimation for Networked Time-Delay Systems Under Round-Robin Protocol
    Zou, Lei
    Wang, Zidong
    Han, Qing-Long
    Zhou, Donghua
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (12) : 5191 - 5198
  • [30] Neural-network-based distributed security filtering for networked switched systems
    Shang, Hui
    Zong, Guangdeng
    Shi, Kaibo
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2022, 32 (05) : 2791 - 2804