403
Views
58
CrossRef citations to date
0
Altmetric
Articles

On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks

, , &
Pages 619-632 | Received 25 Feb 2015, Accepted 12 Jun 2015, Published online: 28 Dec 2015

References

  • Amin, S., A. A. Cárdenas, and S. S. Sastry. 2009. “Safe and Secure Networked Control Systems under Denial-of-service Attacks.” Hybrid Systems: Computation and Control 5469: 31–45.
  • Amin, S., X. Litrico, S. Sastry, and A. M. Bayen. 2013. “Cyber Security of Water SCADA Systems–Part I: Analysis and Experimentation of Sdeception Attacks.” IEEE Transactions on Control Systems Technology 21 (5): 1963–1970.
  • Amin, S., G. A. Schwartz, and S. S. Sastry. 2013. “Security of Interdependent and Identical Networked Control Systems.” Automatica 49 (1): 186–192.
  • Armbruster, B., J. C. Smith, and K. Park. 2007. “A Packet Filter Placement Problem with Application to Defense against Spoofed Denial of Service Attacks.” European Journal of Operational Research 176 (2): 1283–1292.
  • Basin, M. V., A. G. Loukianov, and M. Hernandez-Gonzalez. 2013. “Joint State and Parameter Estimation for Uncertain Stochastic Nonlinear Polynomial Systems.” International Journal of Systems Science 44 (7): 1200–1208.
  • Basin, M. V., and P. Rodriguez-Ramirez. 2014a. “Sliding Mode Filtering for Stochastic Systems with Polynomial State and Observation Equations.” Journal of the Franklin Institute 351 (4): 2203–2217.
  • Basin, M. V., and P. Rodriguez-Ramirez. 2014b. “Mean-square Filter Design for Stochastic Polynomial Systems with Gaussian and Poisson Noises.” International Journal of Systems Science 45 (7): 1473–1483.
  • Bedi, H., S. Shiva, and S. Roy. 2014. “A Game Inspired Defense Mechanism against Distributed Denial of Service Attacks.” Security and Communication Networks 7 (12): 2389–2404.
  • Caballero-Águila, R., A. Hermoso-Carazo, and J. Linares-Pérez. 2012. “Recursive Least-squares Quadratic Smoothing from Measurements with Packet Dropouts.” Signal Processing 92 (4): 931–938.
  • Caballero-Águila, R., A. Hermoso-Carazo, and J. Linares-Pérez. 2014. “Covariance-based Estimation Algorithms in Networked Systems with Mixed Uncertainties in the Observations.” Signal Processing 94: 163–173.
  • Ding, D., Z. Wang, B. Shen, and H. Dong. 2015. “Envelope-constrained H∞ Filtering with Fading Measurements and Randomly Occurring Nonlinearities: The Finite Horizon Case.” Automatica 55: 37–45.
  • Dong, H., Z. Wang, S. X. Ding, and H. Gao. 2014. “Finite-horizon Estimation of Randomly Occurring Faults for a Class of Nonlinear Time-varying Systems.” Automatica 50 (12): 3182–3189.
  • Fouchal, S., D. Mansouri, L. Mokdad, and M. Iouallalen. 2015. “Recursive-clustering-based Approach for Denial of Service (DoS) Attacks in Wireless Sensors Networks.” International Journal of Communication Systems 28 (2): 309–324.
  • Gao, H., Z. Fei, J. Lam, and B. Du. 2011. “Further Results on Exponential Estimates of Markovian Jump Systems with Mode-dependent Time-varying Delays.” IEEE Transactions on Automatic Control 56 (1): 223–229.
  • Gao, H., and X. Li. 2011. “H∞ Filtering for Discrete-time State-delayed Systems with Finite Frequency Specifications.” IEEE Transactions on Automatic Control 56 (12): 2932–2939.
  • Hu, J., D. Chen, and J. Du. 2014. “State Estimation for a Class of Discrete Nonlinear Systems with Randomly Occurring Uncertainties and Distributed Sensor Delays.” International Journal of General Systems 43 (3–4): 387–401.
  • Hu, J., J. Liang, D. Chen, D. Ji, and J. Du. 2015. “A Recursive Approach to Non-fragile Filtering for Networked Systems with Stochastic Uncertainties and Incomplete Measurements.” Journal of the Franklin Institute 352 (5): 1946–1962.
  • Hu, J., Z. Wang, H. Gao, and L. K. Stergioulas. 2012. “Probability-guaranteed H∞ Finite-horizon Filtering for a Class of Nonlinear Time-varying Systems with Sensor Saturations.” Systems and Control Letters 61 (4): 477–484.
  • Hu, J., Z. Wang, B. Shen, and H. Gao. 2013a. “Quantised Recursive Filtering for a Class of Nonlinear Systems with Multiplicative Noises and Missing Measurements.” International Journal of Control 86 (4): 650–663.
  • Hu, J., Z. Wang, B. Shen, and H. Gao. 2013b. “Gain-constrained Recursive Filtering with Stochastic Nonlinearities and Probabilistic Sensor Delays.” IEEE Transactions on Signal Processing 61 (5): 1230–1238.
  • Karimipour, H., and V. Dinavahi. 2015. “Extended Kalman Filter-based Parallel Dynamic State Estimation.” IEEE Transactions on Smart Grid 6 (3): 1539–1549.
  • Leong, A. S., S. Dey, G. N. Nair, and P. Sharma. 2011. “Power Allocation for Outage Minimization in State Estimation over Fading Channels.” IEEE Transactions on Signal Processing 59 (7): 3382–3397.
  • Li, H., H. Gao, P. Shi, and X. Zhao. 2014. “Fault-tolerant Control of Markovian Jump Stochastic Systems via the Augmented Sliding Mode Observer Approach.” Automatica 50 (7): 1825–1834.
  • Liang, J., B. Shen, H. Dong, and J. Lam. 2011. “Robust Distributed State Estimation for Sensor Networks with Multiple Stochastic Communication Delays.” International Journal of Systems Science 42 (9): 1459–1471.
  • Linares-Pérez, J., R. Caballero-Águila, and I. García-Garrido. 2014. “Optimal Linear Filter Design for Systems with Correlation in the Measurement Matrices and Noises: Recursive Algorithm and Applications.” International Journal of Systems Science 45 (7): 1548–1562.
  • Long, M., C. H. Wu, and J. Y. Hung. 2005. “Denial of Service Attacks on Network-based Control Systems: Impact and Mitigation.” IEEE Transactions on Industrial Informatics 1 (2): 85–96.
  • Luo, Y., G. Wei, X. Ding, and Y. Liu. 2014. “Controller Design for 2-D Stochastic Nonlinear Roesser Model: A Probability-dependent Gain-scheduling Approach.” Journal of the Franklin Institute 351 (11): 5182–5203.
  • Menon, P. P., and C. Edwards. 2014. “Robust Fault Estimation using Relative Information in Linear Multi-agent Networks.” IEEE Transactions on Automatic Control 59 (2): 477–482.
  • Pang, Z., and G. Liu. 2012. “Design and Implementation of Secure Networked Predictive Control Systems under Deception Attacks.” IEEE Transactions on Control Systems Technology 20 (5): 1334–1342.
  • Peng, D., C. Gao, and Z. Gao. 2013. “Generalized Hesitant Fuzzy Synergetic Weighted Distance Measures and their Application to Multiple Criteria Decision-making.” Applied Mathematical Modelling 37 (8): 5837–5850.
  • Shi, D., T. Chen, and L. Shi. 2015. “On Set-valued Kalman Filtering and its Application to Event-based State Estimation.” IEEE Transactions on Automatic Control 60 (5): 1275–1290.
  • Wang, Y., S. X. Ding, D. Xu, and B. Shen. 2014. “An H∞ Fault Estimation Scheme of Wireless Networked Control Systems for Industrial Real-time Applications.” IEEE Transactions on Control Systems Technology 22 (6): 2073–2086.
  • Wang, Z., Y. Wang, and Y. Liu. 2010. “Global Synchronization for Discrete-time Stochastic Complex Networks with Randomly Occurred Nonlinearities and Mixed Time-delays.” IEEE Transactions on Neural Networks 21 (1): 11–25.
  • Wang, L., G. Wei, and H. Shu. 2013. “State Estimation for Complex Networks with Randomly Occurring Coupling Delays.” Neurocomputing 122: 513–520.
  • Yan, X., and C. Edwards. 2007. “Nonlinear Robust Fault Reconstruction and Estimation using a Sliding Mode Observer.” Automatica 43 (9): 1605–1614.
  • Zhu, M., and S. Martinez. 2014. “On the Performance Analysis of Resilient Networked Control Systems under Replay Attacks.” IEEE Transactions on Automatic Control 59 (3): 804–808.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.