Distributed Secure Estimation Against Sparse False Data Injection Attacks

R Ma, Z Hu, L Xu, L Wu - IEEE Transactions on Systems, Man …, 2024 - ieeexplore.ieee.org
Distributed cyber–physical systems (CPSs) are with complex and interconnected framework
to receive, process, and transmit data. However, they may suffer from adversarial false data …

Sensor fault detection and isolation via networked estimation: Full-rank dynamical systems

M Doostmohammadian… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article considers the problem of simultaneous sensor fault detection, isolation, and
networked estimation of linear full-rank dynamical systems. The proposed networked …

Distributed resilient state estimation for nonlinear systems against sensor attacks

Y Liu, T Li, BC Zheng, M Shen - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
In this article, a distributed resilient state estimation scheme is developed for nonlinear
systems under sensor attacks. The scheme is implemented over a multiagent network where …

A secure decentralized event-triggered cooperative localization in multi-robot systems under cyber attack

TK Tasooji, HJ Marquez - IEEE Access, 2022 - ieeexplore.ieee.org
We study the problem of secure decentralized event-triggered cooperative localization
(SDECL) for a team of mobile robots in an adversarial environment, where the objective is to …

Enhanced distributed state estimation with resilience to multiple disturbances and false data injection attacks

X Guo, S Cao, Z Ding - … Journal of Robust and Nonlinear Control, 2022 - Wiley Online Library
Disturbances and attacks co‐exist widely in networked systems. Distributed state estimation
of networked systems in the simultaneous presence of disturbances and attacks has been …

[HTML][HTML] Inverse kalman filtering problems for discrete-time systems

Y Li, B Wahlberg, X Hu, L Xie - Automatica, 2024 - Elsevier
In this paper, several inverse Kalman filtering problems are addressed, where unknown
parameters and/or inputs in a filtering model are reconstructed from observations of the …

Distributed secure state estimation of multi-agent systems under homologous sensor attacks

Y Shi, Y Wang, J Tuo - IEEE/CAA Journal of Automatica Sinica, 2022 - ieeexplore.ieee.org
This paper addresses the problem of distributed secure state estimation for multi-agent
systems under homologous sensor attacks. Two types of secure Luenberger-like distributed …

Optimal Stealthy Linear Man-in-the-Middle Attacks With Resource Constraints on Remote State Estimation

Y Zhang, Z Peng, G Wen, J Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article studies the impact of constrained optimal stealthy attacks on the state estimator,
where man-in-the-middle attacks with a linear form can compromise innovations transmitted …

A survey of graph-theoretic approaches for analyzing the resilience of networked control systems

M Pirani, A Mitra, S Sundaram - arXiv preprint arXiv:2205.12498, 2022 - arxiv.org
As the scale of networked control systems increases and interactions between different
subsystems become more sophisticated, questions of the resilience of such networks …

[HTML][HTML] Defense-in-depth against insider attacks in cyber-physical systems

X Ning, J Jiang - Internet of Things and Cyber-Physical Systems, 2022 - Elsevier
In a cyber-physical system (CPS) built on Internet-of-things (IoT) technologies, whenever
measurement and control signals are transferred over communication networks across …