“…Sensor redundancy has been proved to be crucial for estimation under attacks [27], [10], [28], [29], [14], [30]. Using redundant sensors/actuators for secure estimation and control is a commonly adopted technique, see, e.g., [27], [10], [28], [29], [11], [31], and references therein. Note that it might be costly to create redundancy, which indicates some of these estimation methods might have conservative applications; however, for security-critical systems, for instance, CAVs, this is the price to pay [6].…”