384
Views
18
CrossRef citations to date
0
Altmetric
Articles

Recursive state estimation for discrete time-varying stochastic nonlinear systems with randomly occurring deception attacks

, , &
Pages 548-560 | Received 01 Mar 2015, Accepted 13 Jun 2015, Published online: 27 Apr 2016

References

  • Amin, S., X. Litrico, S. Sastry, and A. M. Bayen. 2013. “Cyber Security of Water SCADA Systems -- Part I: Analysis and Experimentation of Stealthy Deception Attacks.” IEEE Transactions on Control Systems Technology 21 (5): 1963–1970.
  • Amin, S., G. A. Schwartz, and S. S. Sastry. 2013. “Security of Interdependent and Identical Networked Control Systems.” Automatica 49 (1): 186–192.
  • Befekadu, G. K., V. Gupta, and P. J. Antsaklis. 2011. “Risk-sensitive Control under a Class of Denial-of-Service Attack Models.” In Proceedings of the 2011 American Control Conference, San Francisco, CA, June 29--July 1, 643–648. San Francisco, CA: IEEE.
  • Cárdenas, A. A., S. Amin, and S. S. Sastry. 2008. “Secure Control: Towards Survivable Cyber-physical Systems.” In Proceedings of the 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, June 17--20, 495–500. Beijing: IEEE.
  • Clark, A., L. Bushnell, and R. Poovendran. 2012. “A Passivity-based Framework for Composing Attacks on Networked Control Systems.” In Proceedings of the 50th Annual Allerton Conference, Monticello, IL, October 1--5, 1814–1821. Monticello, ML: IEEE.
  • Dong, H., Z. Wang, S. X. Ding, and H. Gao. 2014. “Finite-horizon Estimation of Randomly Occurring Faults for a Class of Nonlinear Time-varying Systems.” Automatica 50 (12): 3182–3189.
  • Foroush, H., and S. Martínez. 2012. “On Event-triggered Control of Linear Systems under Periodic Denial-of-Service Jamming Attacks.” In Proceedings of the 2012 IEEE 51st Annual Conference on Decision and Control, Maui, HI, December 10--13, 2551–2256. Maui, HI: IEEE.
  • Hu, J., Z. Wang, B. Shen, and H. Gao. 2013. “Quantised Recursive Filtering for a Class of Nonlinear Systems with Multiplicative Noises and Missing Measurements.” International Journal of Control 86 (4): 650–663.
  • Jacobson, D. 1974. “A General Result in Stochastic Optimal Control of Nonlinear Discrete-time Systems with Quadratic Performance Criteria.” Journal of Mathematical Analysis and Applications 47 (1): 153–161.
  • Kalman, R. E. 1960. “A New Approach to Linear Filtering and Prediction Problems.” Transactions of the ASME--Journal of Basic Engineering 82: 35–45.
  • Long, M., C.-H. Wu, and J. Y. Hung. 2005. “Denial of Service Attacks on Network-based Control Systems: Impact and Mitigation.” IEEE Transactions on Industrial Informatics 1 (2): 85–96.
  • Pang, Z.-H., and G.-P. Liu. 2012. “Design and Implementation of Secure Networked Predictive Control Systems under Deception Attacks.” IEEE Transactions on Control Systems Technology 20 (5): 1334–1342.
  • Shen, B., Z. Wang, H. Shu, and G. Wei. 2008. “On Nonlinear H∞ Filtering for Discrete-time Stochastic Systems with Missing Measurements.” IEEE Transactions on Automatic Control 53 (9): 2170–2180.
  • Teixeira, A., H. Sandberg, and K. H. Johansson. 2010. “Networked Control Systems under Cyber Attacks with Applications to Power Networks.” In Proceedings of the 2010 American Control Conference, Baltimore, MD, June 30--July 2, 3690–3696. Baltimore, MD: IEEE.
  • Theodor, Y., and U. Shaked. 1996. “Robust Discrete-time Minimum-variance Filtering.” IEEE Transactions on Singnal Processing 44 (2): 181–189.
  • Yaz, E., and Y. Yaz. 2001. “State Estimation of Uncertain Nonlinear Stochastic Systems with General Criteria.” Applied Mathematics Letters 14 (5): 605–610.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.