In this paper, an unscented Kalman filtering problem is studied for a nonlinear system with sensor saturation and randomly occurring false data injection attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring false data injection attacks. The aim of this paper is to design a modified unscented Kalman filter by minimizing an upper bound of filtering error covariance. Furthermore, a sufficient condition is provided to ensure an exponentially bounded filtering error in the mean square sense. Numerical simulations are presented to illustrate the validity of the proposed filter.
In network coding, information transmission often encounters wiretapping
attacks. Secure network coding is introduced to prevent information from being
leaked to adversaries. For secure linear network codes (SLNCs), the required
field size is a very important index, because it largely determines the
computational and space complexities of a SLNC, and it is also very important
for the process of secure network coding from theoretical research to practical
application. In this letter, we further discuss the required field size of
SLNCs, and obtain a new lower bound. This bound shows that the field size of
SLNCs can be reduced further, and much smaller than the known results for
almost all cases.Comment: Accepted for publication in the IEEE Communications Letters. One
column,10 page
In this paper, we propose a class of threshold secret sharing schemes with repairing function between shares without the help of the dealer, that we called repairable threshold secret sharing schemes. Specifically, if a share fails, such as broken or lost, it will be repaired just by some other shares. A construction of such repairable threshold secret sharing schemes is designed by applying linearized polynomials and regenerating codes in distributed storage systems. In addition, a new repairing rate is introduced to characterize the performance and efficiency of the repairing function. Then an achievable upper bound on the repairing rate is derived, which implies the optimality of the repair and describes the security between different shares. Under this optimality of the repair, we further discuss traditional information rate and also indicate its optimality, that can describe the efficiency of secret sharing schemes in the aspect of storage. Finally, by applying the minimum bandwidth regenerating (MBR) codes, our construction designs repairable threshold secret sharing schemes achieving both optimal repairing and information rates simultaneously.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.