[HTML][HTML] Resilient set-based state estimation for linear time-invariant systems using zonotopes

MUB Niazi, A Alanwar, MS Chong… - European Journal of …, 2023 - Elsevier
This paper considers the problem of set-based state estimation for linear time-invariant (LTI)
systems under time-varying sensor attacks. Provided that the LTI system is stable and …

Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors

MUB Niazi, MS Chong, A Alanwar… - arXiv preprint arXiv …, 2023 - arxiv.org
When a strategic adversary can attack multiple sensors of a system and freely choose a
different set of sensors at different times, how can we ensure that the state estimate remains …

Resilient set-based state estimation for linear time-invariant systems using zonotopes

MUB Niazi, A Alanwar, MS Chong… - arXiv preprint arXiv …, 2022 - arxiv.org
This paper considers the problem of set-based state estimation for linear time-invariant (LTI)
systems under time-varying sensor attacks. Provided that the LTI system is stable and …

Secure state estimation against sparse attacks on a time-varying set of sensors

Z Li, MUB Niazi, C Liu, Y Mo, KH Johansson - IFAC-PapersOnLine, 2023 - Elsevier
This paper studies the problem of secure state estimation of a linear time-invariant (LTI)
system with bounded noise in the presence of sparse attacks on an unknown, time-varying …

Secure State Estimation under Actuator and Sensor Attacks using Sliding Mode Observers

T Keijzer, RMG Ferrari… - IEEE Control Systems …, 2023 - ieeexplore.ieee.org
Interconnections in modern systems make them vulnerable to adversarial attackers both by
corrupting communication channels and compromising entire subsystems. The field of …

Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach

X Lei, G Wen, S Wang - 2023 62nd Annual Conference of the …, 2023 - ieeexplore.ieee.org
This paper investigates the problem of sparse attack isolation and distributed secure state
estimation (SSE) for remote sensor network in an attack-prone environment. The attack …

Resilient Consensus-Based Distributed Signal Reconstruction Against Byzantine Attacks

X Lei, G Wen - Chinese Conference on Swarm Intelligence and …, 2023 - Springer
In this paper, we propose a distributed signal reconstruction protocol based on resilient
consensus framework under a Byzantine adversary model. Specifically, a compromised …

Design of an Efficient Hybrid-Attack Classification and Mitigation Model for Heterogeneous Wireless Networks

YS Pethe - 2023 IEEE World Conference on Applied …, 2023 - ieeexplore.ieee.org
Wireless networks have become an integral part of modern communication systems.
However, they are vulnerable to security threats due to the inherent nature of wireless …

Distributed Learning and Estimation with Enhanced Privacy and Security

A Moradi - 2023 - ntnuopen.ntnu.no
This thesis focuses on threat analysis and management in distributed learning scenarios
intending to develop algorithms to mitigate the impact of adversaries in the network. The …

[图书][B] Towards Resilience in Cyber-Physical Systems

Y Mao - 2022 - search.proquest.com
In this dissertation, we consider the problem of collaborating a network of nodes to
accomplish an objective, which could be monitoring the state of a dynamical system or …