Secure state estimation for complex networks with multi-channel oriented round robin protocol

被引:8
作者
Li, Yan [1 ]
Wei, Lishuang [1 ]
Liu, Jinliang [1 ,3 ]
Xie, Xiangpeng [2 ]
Tian, Engang [3 ]
机构
[1] Nanjing Univ Finance & Econ, Coll Informat Engn, Nanjing 210023, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Inst Adv Technol, Nanjing 210023, Jiangsu, Peoples R China
[3] Univ Shanghai Sci & Technol, Sch Opt Elect & Comp Engn, Shanghai 200093, Peoples R China
基金
中国国家自然科学基金;
关键词
State estimation; Complex networks (CNs); Deception attack; Multi-channel oriented round robin (RR)  protocol; Exponentially ultimately bounded; COMMUNICATION PROTOCOL; CONTROL-SYSTEMS; SYNCHRONIZATION;
D O I
10.1016/j.nahs.2023.101371
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper focuses on the secure state estimation problem for complex networks (CNs) which are compromised by deception attack and constrained with limited communica-tion resource. Firstly, a multi-channel oriented round robin (RR) protocol is proposed to schedule the data transferred over the communication network consisting of multiple transmission channels. The extended RR protocol can not only avoid the data collision caused by limited communication resource, but also fully utilize the sliced network bandwidth. Then, a state estimation error model is constructed by further considering the influence of deception attack. Following the model, efficient state estimators are designed based on analyzing the sufficient conditions that assuring the stability of the formulated state estimation error system. Finally, numerical results are presented to validate the theoretical outcomes.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 37 条
[1]   Sliding mode control of automotive electronic valve system under weighted try-once-discard protocol [J].
Cao, Zhiru ;
Niu, Yugang ;
Karimi, Hamid Reza .
INFORMATION SCIENCES, 2020, 515 :324-340
[2]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[3]   Partial Synchronization of Interconnected Boolean Networks [J].
Chen, Hongwei ;
Liang, Jinling ;
Lu, Jianquan .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (01) :258-266
[4]   Finite-Horizon H∞ Bipartite Consensus Control of Cooperation-Competition Multiagent Systems With Round-Robin Protocols [J].
Chen, Wei ;
Ding, Derui ;
Dong, Hongli ;
Wei, Guoliang ;
Ge, Xiaohua .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (07) :3699-3709
[5]   Event-triggered quantized H∞ control for networked control systems in the presence of denial-of-service jamming attacks [J].
Chen, Xiaoli ;
Wang, Youguo ;
Hu, Songlin .
NONLINEAR ANALYSIS-HYBRID SYSTEMS, 2019, 33 :265-281
[6]   Event-Triggered Recursive State Estimation for Stochastic Complex Dynamical Networks Under Hybrid Attacks [J].
Chen, Yun ;
Meng, Xueyang ;
Wang, Zidong ;
Dong, Hongli .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (03) :1465-1477
[7]   Finite-Horizon H∞ State Estimation for Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin Protocol [J].
Chen, Yun ;
Wang, Zidong ;
Wang, Licheng ;
Sheng, Weiguo .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (03) :1204-1215
[8]   Neural-network-based output-feedback control with stochastic communication protocols [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long .
AUTOMATICA, 2019, 106 :221-229
[9]   Secure synchronization of complex networks under deception attacks against vulnerable nodes [J].
Ding, Dong ;
Tang, Ze ;
Wang, Yan ;
Ji, Zhicheng .
APPLIED MATHEMATICS AND COMPUTATION, 2021, 399
[10]   Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks [J].
Fu, Weiming ;
Qin, Jiahu ;
Shi, Yang ;
Zheng, Wei Xing ;
Kang, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) :4868-4877