2019
DOI: 10.1002/rnc.4706
|View full text |Cite
|
Sign up to set email alerts
|

Reliable fusion estimation over sensor networks with outliers and energy constraints

Abstract: Summary This paper provides a reliable fusion scheme over sensor networks subject to abnormal measurements and energy constraints. Two kinds of channels are employed to implement the information transmission in order to extend the lifetime. Specifically, the one has the merit of high reliability by sacrificing energy cost and the other reduces the energy cost but could result in packet loss. For the addressed problem, a χ2 detection in local state estimator is first designed to remove abnormal measurements, wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…As such, to reduce the energy consumption and improve the communication burden, two kinds of channels are exploited to properly facilitate data transmission. These two kinds of channels are, respectively, named as reliable channels owning the merit of high reliability and general channels subject to packet loss, see [27] for more details. For the convenience of mathematical analysis, a set of Bernoullidistributed white sequences β i (t) are employed to describe the phenomenon of packet loss and their statistical characteristics are assumed to be satisfied as follows…”
Section: Problem Formulation and Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, to reduce the energy consumption and improve the communication burden, two kinds of channels are exploited to properly facilitate data transmission. These two kinds of channels are, respectively, named as reliable channels owning the merit of high reliability and general channels subject to packet loss, see [27] for more details. For the convenience of mathematical analysis, a set of Bernoullidistributed white sequences β i (t) are employed to describe the phenomenon of packet loss and their statistical characteristics are assumed to be satisfied as follows…”
Section: Problem Formulation and Preliminariesmentioning
confidence: 99%
“…That is to say, the adopted methods in the above literature are unapplicable for complex dynamical systems including nonlinear terms, time-delays, or timevarying parameters. It is worth noting that, besides communication scheduling [9,26], another typical strategy of energy management is the utilization of low-energy channels for information transmission while adopting suitable information compensation techniques to alleviate the negative effect from missing data [27], which constitutes one of the motivations for this investigation. Time-delayed phenomena are ubiquitous in various actual engineering systems and usually aroused by material transmission and signal transmission.…”
Section: Introductionmentioning
confidence: 99%
“…Meantime, a novel bounded recursive optimization estimator was developed from a fusion perspective in the work of Chen for bounded noises, where the bounds of noises are unknown. As for Gaussian noises, Talebi et al developed a distributed Kalman filtering algorithm by distributing the operations of embedded average consensus information fusion filters, while Xie et al proposed a reliable distributed Kalman fusion scheme over sensor networks subject to abnormal measurements and energy constraints. The work of Chen was concerned with distributed fusion Kalman filtering problem for systems with missing sensor measurements, random transmission delays and packet dropouts, and the globally optimal distributed Kalman filtering fusion with singular covariances of filtering errors and measurement noises was designed by Song et al Notice that Kalman filtering is one of the most popular recursive Least Mean Square Error (LMSE) algorithm, and it is also reasonable to approximate the noises or disturbances in practical applications as Gaussian noises.…”
Section: Introductionmentioning
confidence: 99%
“…3,4 Therefore, how to curb cyber attacks has become an urgent issue. [5][6][7][8][9] As we all know, cyber attacks can be mainly classified into three categories: denial of service (DoS) attacks, 10,11 deception attacks, 12,13 and replay attacks. 14 For instance, a resilient dynamic event-triggered controller was designed to cope with the DoS attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Some accidents of huge economic losses incurred by cyber attacks have been reported successively 3,4 . Therefore, how to curb cyber attacks has become an urgent issue 5‐9 …”
Section: Introductionmentioning
confidence: 99%