2017
DOI: 10.1109/tac.2017.2714903
|View full text |Cite
|
Sign up to set email alerts
|

On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
51
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 116 publications
(52 citation statements)
references
References 15 publications
0
51
0
1
Order By: Relevance
“…Theorem 2. Considering the multisensor system (32) and (33) and the conditions A1 to A6 and the definitions (24) to (28), a centralized optimal filtering fusion algorithm is presented as follows.…”
Section: Centralized Optimal Filtering Fusion Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 2. Considering the multisensor system (32) and (33) and the conditions A1 to A6 and the definitions (24) to (28), a centralized optimal filtering fusion algorithm is presented as follows.…”
Section: Centralized Optimal Filtering Fusion Algorithmmentioning
confidence: 99%
“…The multiplicative disturbance has stronger influence over sensors even than the attacks on cyberphysical systems (CPS). 23,24 Thus, when systems are polluted by multiplicative noise, one has to redesign filtering algorithm to filter the noises, otherwise, the filter will lose effectiveness. Optimal filters are presented in the sense of linear minimum mean square error (LMMSE) to settle the problem.…”
Section: Introductionmentioning
confidence: 99%
“…To maximize the attack stealthiness, δ(k) is chosen as a zero-mean Gaussian sequence with covariance Σ [14]- [16]. The probability of attack-detection is proportional to the covariance of the attack sequence [14]- [16]. Therefore, Σ is limited to tr(Σ) ≤ η, where η captures the stealthiness of the attack.…”
Section: B Attack Modelmentioning
confidence: 99%
“…In contrast to (4) and (5), (13) and (14) capture the error dynamics in presence of a Byzantine attack.…”
Section: Joint Selection Of Byzantine Agents and Design Of Attacmentioning
confidence: 99%
See 1 more Smart Citation