2017
DOI: 10.1109/jsen.2017.2654325
|View full text |Cite
|
Sign up to set email alerts
|

Variance-Constrained Distributed Filtering for Time-Varying Systems With Multiplicative Noises and Deception Attacks Over Sensor Networks

Abstract: This paper is concerned with the varianceconstrained distributed filtering problem for a class of timevarying systems subject to multiplicative noises, unknown but bounded disturbances and deception attacks over sensor networks. The available measurements at each sensing node are collected not only from the individual sensor but also from its neighbors according to the given topology. A new deception attack model is proposed where the malicious signals are injected by the adversary into both control and measur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
75
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 144 publications
(75 citation statements)
references
References 38 publications
0
75
0
Order By: Relevance
“…It should be pointed out that the aforementioned literature has been mainly focused on the additive link noises, which is adequate for electromagnetic propagation through wires and cables . It is worth noting that, however, while the data are propagated in the wireless way, the multiplicative noises are the most frequently seen disturbances . Unfortunately, up to now, the relevant investigations concerning the distributed filtering subject to multiplicative noises are far from adequate.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It should be pointed out that the aforementioned literature has been mainly focused on the additive link noises, which is adequate for electromagnetic propagation through wires and cables . It is worth noting that, however, while the data are propagated in the wireless way, the multiplicative noises are the most frequently seen disturbances . Unfortunately, up to now, the relevant investigations concerning the distributed filtering subject to multiplicative noises are far from adequate.…”
Section: Introductionmentioning
confidence: 99%
“…26 It is worth noting that, however, while the data are propagated in the wireless way, the multiplicative noises are the most frequently seen disturbances. [27][28][29][30] Unfortunately, up to now, the relevant investigations concerning the distributed filtering subject to multiplicative noises are far from adequate.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, much research attention has been paid to time‐varying systems with multiplicative noises to better describe the reality. To date, many research results have been reported on the distributed filtering problem for discrete time‐varying systems with multiplicative noises . For example, the distributed l 2 ‐ l ∞ state estimation problem has been investigated in the work of Lu et al for periodic time‐varying systems subject to multiplicative noises, where the estimator has been designed to ascertain the globally asymptotically stable of the error system.…”
Section: Introductionmentioning
confidence: 99%
“…To date, many research results have been reported on the distributed filtering problem for discrete time-varying systems with multiplicative noises. 6,23,24 For example, the distributed l 2 -l ∞ state estimation problem has been investigated in the work of Lu et al 23 for periodic time-varying systems subject to multiplicative noises, where the estimator has been designed to ascertain the globally asymptotically stable of the error system. Very recently, the variance-constrained distributed filtering problem has been considered in the work of Ma et al 24 for networked systems with multiplicative noises over a finite horizon.…”
Section: Introductionmentioning
confidence: 99%
“…[40][41][42][43][44][45] Among them, deception attacks, as one of the utmost important cyber attacks, can wreck the integrity of the data by modifying its content. More recently, increasing attention has been devoted to the exploration of the deception attacks (see other works 39,[46][47][48][49][50].…”
mentioning
confidence: 99%