205
Views
8
CrossRef citations to date
0
Altmetric
Research Articles

Probability-guaranteed state estimation for nonlinear delayed systems under mixed attacks

, , & ORCID Icon
Pages 2059-2071 | Received 23 Feb 2023, Accepted 16 May 2023, Published online: 25 May 2023

References

  • Bao, G., Ma, L., & Yi, X. (2022). Recent advances on cooperative control of heterogeneous multi-agent systems subject to constraints: A survey. Systems Science and Control Engineering, 10(1), 539–551. https://doi.org/10.1080/21642583.2022.2074169
  • Ding, D., Wang, Z., Ho, D., & Wei, G. (2017). Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica, 78(4), 231–240. https://doi.org/10.1016/j.automatica.2016.12.026
  • Donkers, M., Heemels, W., Van de Wouw, N., & Hetel, L. (2011). Stability analysis of networked control systems using a switched linear systems approach. IEEE Transactions on Automatic Control, 56(9), 2101–2115. https://doi.org/10.1109/TAC.2011.2107631
  • Dutta, A., & Langbort, C. (2017). Confiscating flight control system by stealthy output injection attack. Journal of Aerospace Information Systems, 14(4), 203–213. https://doi.org/10.2514/1.I010494
  • Fang, J., Liu, W., Chen, L., Lauria, S., Miron, A., & Liu, X. (2023). A survey of algorithms, applications and trends for particle swarm optimization. International Journal of Network Dynamics and Intelligence, 2(1), 24–50. https://doi.org/10.53941/ijndi0201002
  • Fawzi, H., Tabuada, P., & Diggavi, S. (2014). Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Transactions on Automatic Control, 59(6), 1454–1467. https://doi.org/10.1109/TAC.2014.2303233
  • Ge, X., Han, Q.-L., & Wang, Z. (2019). A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks. IEEE Transactions on Cybernetics, 49(1), 171–183. https://doi.org/10.1109/TCYB.2017.2769722
  • Guo, X., Bi, Z., Wang, J., Qin, S., Liu, S., & Qi, L. (2023). Reinforcement learning for disassembly system optimization problems: A survey. International Journal of Network Dynamics and Intelligence, 2(1), 1–14. https://doi.org/10.53941/ijndi0201001
  • Guo, L., & Wang, H. (2006). Minimum entropy filtering for multivariate stochastic systems with non-Gaussian noises. IEEE Transactions on Automatic Control, 51(4), 695–700. https://doi.org/10.1109/TAC.2006.872771
  • Gupta, R., & Chow, M. (2010). Networked control system: Overview and research trends. IEEE Transactions on Industrial Electronics, 57(7), 2527–2535. https://doi.org/10.1109/TIE.2009.2035462
  • Hage, J., Najjar, M., & Pomorski, D. (2017). Multi-sensor fusion approach with fault detection and exclusion based on the Kullback-Leibler divergence: Application on collaborative multi-robot system. Information Fusion, 37, 61–76. https://doi.org/10.1016/j.inffus.2017.01.005
  • Han, Q. (2005). Absolute stability of time-delay systems with sector-bounded nonlinearity. Automatica, 41(12), 2171–2176. https://doi.org/10.1016/j.automatica.2005.08.005
  • Hu, L., Liu, Z., & Wang, X. (2018). State estimation under false data injection attacks: Security analysis and system protection. Automatica, 87(6), 176–183. https://doi.org/10.1016/j.automatica.2017.09.028
  • Hu, J., Wang, Z., Liu, G.-P., Jia, C., & Williams, J. (2020). Event-triggered recursive state estimation for dynamical networks under randomly switching topologies and multiple missing measurements. Automatica, 115(7), 1–13. https://doi.org/10.1016/j.automatica.2020.108908
  • Kalkan, K., & Alagoz, F. (2016). A distributed filtering mechanism against DDoS attacks: ScoreForCore. Computer Networks, 108, 199–209. https://doi.org/10.1016/j.comnet.2016.08.023
  • Karatson, J. (2008). On the Lipschitz continuity of derivatives for some scalar nonlinearities. Journal of Mathematical Analysis and Applications, 346(1), 170–176. https://doi.org/10.1016/j.jmaa.2008.05.053
  • Liu, S., Wei, G., Song, Y., & Liu, Y. (2016). Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks. Neurocomputing, 207, 708–716. https://doi.org/10.1016/j.neucom.2016.05.060
  • Liu, J., Xia, J., Tian, E., & Fei, S. (2018). Hybrid-driven-based H-infinity filter design for neural networks subject to deception attacks. Applied Mathematics and Computation, 320, 158–174. https://doi.org/10.1016/j.amc.2017.09.007
  • Long, M., Wu, C., & Hung, J. (2005). Denial of service attacks on network-based control systems: Impact and mitigation. IEEE Transactions on Industrial Informatics, 1(2), 85–96. https://doi.org/10.1109/TII.2005.844422
  • Lu, N., Su, S., Jing, M., & Han, J. (2014). A router based packet filtering scheme for defending against DoS attacks. China Communications, 11(10), 136–146. https://doi.org/10.1109/CC.2014.6969802
  • Ma, L., Wang, Z., Han, Q.-L., & Lam, H. K. (2017). Variance-constrained distributed filtering for time-varying systems with multiplicative noises and deception attacks over sensor networks. IEEE Sensors Journal, 17(7), 2279–2288. https://doi.org/10.1109/JSEN.2017.2654325
  • Manandhar, K., Cao, X., Hu, F., & Liu, Y. (2014). Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Transactions on Control of Network Systems, 1(4), 370–379. https://doi.org/10.1109/TCNS.2014.2357531
  • Mao, J., Sun, Y., Yi, X., Liu, H., & Ding, D. (2021). Recursive filtering of networked nonlinear systems: A survey. International Journal of Systems Science, 52(6), 1110–1128. https://doi.org/10.1080/00207721.2020.1868615
  • Meng, C., & Li, W. (2018). Recursive filtering for complex networks against random deception attacks. In 2018 IEEE International Conference on Big Data and Smart Computing (pp. 565–568).
  • Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In 49th IEEE Conference on Decision and Control (pp. 5967–5972).
  • Pang, Z., Liu, G., Zhou, D., Hou, F., & Sun, D. (2016). Two-channel false data injection attacks against output tracking control of networked systems. IEEE Transactions on Industrial Electronics, 63(5), 3242–3251. https://doi.org/10.1109/TIE.2016.2535119
  • Pfeffer, A., & Ng, B. (2009). Factored reasoning for monitoring dynamic team and goal formation. Information Fusion, 10(1), 99–106. https://doi.org/10.1016/j.inffus.2008.05.005
  • Sauter, D., & Keller, J.(2013). Intermittent bias and state filtering for linear systems subject to deception attacks in communication networks. In IEEE International Conference on Control Applications (pp. 685–690).
  • Su, Y., Cai, H., & Huang, J. (2022). The cooperative output regulation by the distributed observer approach. International Journal of Network Dynamics and Intelligence, 1(1), 20–35. https://doi.org/10.53941/ijndi0101003
  • Tao, H., Tan, H., Chen, Q., Liu, H., & Hu, J. (2022). H∞ state estimation for memristive neural networks with randomly occurring DoS attacks. Systems Science and Control Engineering, 10(1), 154–165. https://doi.org/10.1080/21642583.2022.2048322
  • Tian, E., Wang, Z., Zou, L., & Yue, D. (2019). Probabilistic-constrained filtering for a class of nonlinear systems with improved static event-triggered communication. International Journal of Robust and Nonlinear Control, 29(5), 1484–1498. https://doi.org/10.1002/rnc.v29.5
  • Viinikka, J., Debar, H., Me, L., Lehikoinen, A., & Tarvainen, M. (2009). Processing intrusion detection alert aggregates with time series modeling. Information Fusion, 10(4), 312–324. https://doi.org/10.1016/j.inffus.2009.01.003
  • Wang, W., Liu, X., Li, Y., & Liu, Y. (2015). Set-membership filtering for genetic regulatory networks with missing values. Neurocomputing, 175(PartA), 466–472. https://doi.org/10.1016/j.neucom.2015.10.083
  • Wang, X., Sun, Y., & Ding, D. (2022). Adaptive dynamic programming for networked control systems under communication constraints: A survey of trends and techniques. International Journal of Network Dynamics and Intelligence, 1(1), 85–98. https://doi.org/10.53941/ijndi0101008
  • Wang, D., Wang, Z., Shen, B., & Alsaadi, F. (2017). Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks. International Journal of Robust and Nonlinear Control, 27(7), 1194–1208. https://doi.org/10.1002/rnc.v27.7
  • Wei, G., & Liu, Y. (2015). Probability-guaranteed set-membership filtering for systems with incomplete measurements. Automatica, 60(6), 12–16. https://doi.org/10.1016/j.automatica.2015.06.037
  • Wen, P., Li, X., Hou, N., & Mu, S. (2022). Distributed recursive fault estimation with binary encoding schemes over sensor networks. Systems Science and Control Engineering, 10(1), 417–427. https://doi.org/10.1080/21642583.2022.2063203
  • Yaesha, I., Boyarskia, S., & Shaked, U. (2003). Probability-guaranteed robust H∞ performance analysis and state-feedback design. Systems and Control Letters, 48(5), 351–364. https://doi.org/10.1016/S0167-6911(02)00289-X
  • Yang, J., Ma, L., Chen, Y., & Yi, X. (2022). l2– l∞ state estimation for continuous stochastic delayed neural networks via memory event-triggering strategy. International Journal of Systems Science, 53(13), 2742–2757. https://doi.org/10.1080/00207721.2022.2055192
  • Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015). Optimal denial-of-service attack scheduling with energy constraint. IEEE Transactions on Automatic Control, 60(11), 3023–3028. https://doi.org/10.1109/TAC.9
  • Zhang, H., Cheng, P., Shi, L., & Chen, J. (2016). Optimal DoS attack scheduling in wireless networked control system. IEEE Transactions on Control Systems Technology, 24(3), 843–852. https://doi.org/10.1109/TCST.2015.2462741
  • Zhang, X., Han, Q., & Yu, X. (2016). Survey on recent advances in networked control systems. IEEE Transactions on Industrial Informatics, 12(5), 1740–1752. https://doi.org/10.1109/TII.2015.2506545
  • Zhang, Q., & Zhou, Y. (2022). Recent advances in non-Gaussian stochastic systems control theory and its applications. International Journal of Network Dynamics and Intelligence, 1(1), 111–119. https://doi.org/10.53941/ijndi0101010
  • Zhao, Y., Tao, J., & Shi, N. (2010). A note on observer design for one-sided Lipschitz nonlinear systems. Systems and Control Letters, 59(1), 66–71. https://doi.org/10.1016/j.sysconle.2009.11.009
  • Zou, L., Wang, Z., Han, Q.-L., & Yue, D. (2023). Tracking control under Round-Robin scheduling: Handling impulsive transmission outliers. IEEE Transactions on Cybernetics, 53(4), 2288–2300. https://doi.org/10.1109/TCYB.2021.3115459
  • Zou, L., Wang, Z., Han, Q.-L., & Zhou, D. H. (2021). Moving horizon estimation of networked nonlinear systems with random access protocol. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(5), 2937–2948. https://doi.org/10.1109/TSMC.2019.2918002

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.