2023
DOI: 10.1109/tsmc.2022.3195121
|View full text |Cite
|
Sign up to set email alerts
|

Secure Event-Triggered Distributed Kalman Filters for State Estimation Over Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Remark 8: On the basis of the induction, recursive method, and stochastic matrix theory, certain UBs have been established in Theorem 1 to suppress the actual EVs. Furthermore, the gain parameter has been devised in Theorem 2, under which the solutions to the coupled difference equations ( 12) and (24) provide the locally minimal bounds on the EVs. It is observed that the expressions of the minimal UBs developed in the main results embrace all the information about the system parameters, the noise constraints, the scheduling of the data transmission, and the variation range of the gain perturbation.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Remark 8: On the basis of the induction, recursive method, and stochastic matrix theory, certain UBs have been established in Theorem 1 to suppress the actual EVs. Furthermore, the gain parameter has been devised in Theorem 2, under which the solutions to the coupled difference equations ( 12) and (24) provide the locally minimal bounds on the EVs. It is observed that the expressions of the minimal UBs developed in the main results embrace all the information about the system parameters, the noise constraints, the scheduling of the data transmission, and the variation range of the gain perturbation.…”
Section: Resultsmentioning
confidence: 99%
“…Finally, an illustrated example has been presented to show usefulness of the robust filtering strategy. Further research directions would include some potential extensions of the main results to more complicated systems under communication constraints, such as 2-D nonlinear systems under codingdecoding mechanisms and eavesdropping attacks [24], [28].…”
Section: Discussionmentioning
confidence: 99%
“…In [10], A distributed attack detection mechanism is devised for deception attacks on communication links in sensor networks. In [23], meta-Bayes combined with an attack detection mechanism are used to reduce the impact of attacks. A protection scheme is proposed in [24] to keep the information communication channel of the system from FDI attacks.…”
Section: Introductionmentioning
confidence: 99%