scispace - formally typeset
Open AccessJournal ArticleDOI

Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks

Reads0
Chats0
TLDR
In this paper, a distributed recursive filtering problem for a class of discrete time-delayed stochastic systems subject to both uniform quantization and deception attack effects on the measurement outputs is considered.
About
This article is published in Automatica.The article was published on 2017-04-01 and is currently open access. It has received 340 citations till now. The article focuses on the topics: Recursive filter & Filtering problem.

read more

Citations
More filters
Journal ArticleDOI

A survey on security control and attack detection for industrial cyber-physical systems

TL;DR: An overview of recent advances on security control and attack detection of industrial CPSs is presented, and robustness, security and resilience as well as stability are discussed to govern the capability of weakening various attacks.
Journal ArticleDOI

Networked control systems: a survey of trends and techniques

TL;DR: A survey of trends and techniques in networked control systems from the perspective of ‘ control over networks ’ is presented, providing a snapshot of five control issues: sampled-data control, quantization control, networking control, event-triggered control, and security control.
Journal ArticleDOI

Facial expression recognition via learning deep sparse autoencoders

TL;DR: A novel framework for facial expression recognition to automatically distinguish the expressions with high accuracy is presented and a high recognition accuracy is achieved, which successfully demonstrates the feasibility and effectiveness of the approach.
Journal ArticleDOI

A Survey on Model-Based Distributed Control and Filtering for Industrial Cyber-Physical Systems

TL;DR: A review of the state-of-the-art of distributed filtering and control of industrial CPSs described by differential dynamics models is presented and some challenges are raised to guide the future research.
Journal ArticleDOI

Distributed Event-Triggered Estimation Over Sensor Networks: A Survey

TL;DR: A survey of recent advances in distributed event-triggered estimation for dynamical systems operating over resource-constrained sensor networks, including distributed grid-connected generation systems and target tracking systems is provided.
References
More filters
Journal ArticleDOI

Quantized feedback stabilization of linear systems

TL;DR: A new control design methodology is proposed, which relies on the possibility of changing the sensitivity of the quantizer while the system evolves, which yields global asymptotic stability.
Proceedings ArticleDOI

Distributed Kalman filtering for sensor networks

TL;DR: A continuous-time distributed Kalman filter that uses local aggregation of the sensor data but attempts to reach a consensus on estimates with other nodes in the network and gives rise to two iterative distributedKalman filtering algorithms with different consensus strategies on estimates.
Journal ArticleDOI

Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks

TL;DR: A new simple characterization of the maximum number of attacks that can be detected and corrected as a function of the pair (A,C) of the system is given and it is shown that it is impossible to accurately reconstruct the state of a system if more than half the sensors are attacked.
Journal ArticleDOI

Stochastic stability of the discrete-time extended Kalman filter

TL;DR: It is shown that the estimation error remains bounded if the system satisfies the nonlinear observability rank condition and the initial estimation error as well as the disturbing noise terms are small enough.
Journal ArticleDOI

Kalman filtering with state equality constraints

TL;DR: In this article, a rigorous analytic method of incorporating state equality constraints in the Kalman filter is developed, which significantly improves the prediction accuracy of the filter and is demonstrated on a simple nonlinear vehicle tracking problem.
Related Papers (5)
Frequently Asked Questions (13)
Q1. What are the contributions mentioned in the paper "Distributedrecursivefiltering for stochastic systemsunder uniformquantizations anddeceptionattacks through sensornetworks ⋆" ?

This paper is concerned with the distributed recursive filtering problem for a class of discrete time-delayed stochastic systems subject to both uniform quantization and deception attack effects on the measurement outputs. Furthermore, by utilizing the mathematical induction, a sufficient condition is established to ensure the asymptotic boundedness of the sequence of the error covariance. 

Further research topics would be to extend the main results of this paper to other more complex systems ( e. g. [ 5, 10, 14, 33–35 ] ). Along the trajectory of system ( 1 ), it can be derived that Xk+1 = BkB T k + r∑ s=0 { Πi, k+1|kC T 0, k+1 +K2i, k+1 ( ( ~iin ) 2 ( 1− ᾱ ) 2C0, k+1 ×Πi, k+1|kC T 0, k+1 +Ψ 23 i, k+1 ) = 0 which can be further simplified as follows: K1i, k+1S 1 i, k+1 + ( 1 − ᾱ ) ( ~ i in ) 2K2i, k+1S 0 i, k+1 − ~iinΠi, k+1|kC T 0, k+1 = 0, K2i, k+1S 2 i, k+1 + ( 1 − ᾱ ) ( ~ i in ) 2K1i, k+1S 0 i, k+1 − ( 1 − ᾱ ) ~iinΠi, k+1|kC Therefore, taking ( 20 ) - ( 22 ) into consideration, the authors can obtain the desired filter gain matrices. 

In this paper, the mathematical induction method combined with the properties of matrix analysis is utilized to overcome the difficulties and obtain the desired sufficient conditions that are related to both the quantization and the attack. 

There are positive real constants f̄i, f̄ d i , b, b̄, d, d̄ and c̄i (i = 0, 1, 2, · · · , r) such that the system parameter matrices are bounded: 

The main contribution of this paper is threefold: 1) a novel structure of distributed filters is designed to adequately utilize the available innovations from not only itself (credible measurements) but also its neighbouring sensors which could be subject to deception attacks; 2) the developed filter design algorithm is of a form suitable for distributed recursive computation in online applications via solving two Riccati-like difference equations; and 3) a sufficient condition is proposed to show the asymptotic boundedness of the filtering error covariance through intensive stochastic analysis. 

In the research area of cyber-security, the success ratio of the launched attacks has recently become an emerging topic of research from the defenders’ perspectives. 

In addition, by utilizing the mathematical induction method, a sufficient condition has been proposed under which the filtering error covariance is bounded as time trends to infinity. 

Summarizing the above discussions, the focus of this paper is on the parameter design and performance analysis of distributed recursive filtering with uniform quantization and intermittent deception attacks. 

In the general context of networked control systems, so far, much progress has been made on the security control/filtering problems by employing the techniques of dynamic programming or Lyapunov stability theory, see e.g. [1, 21] for denial-of-service (DoS) attacks and [6, 7, 11, 16, 26] for deception attacks. 

In this section, for obtained filter gains, the authors will propose a sufficient condition ensuring the boundedness of the sequence Πi,k|k with respect to the filtering error covariance. 

the upper bound for the filtering error covariance Πi,k+1|k+1 is recursively calculated by Riccati-like difference equation (11). 

For the addressed system (1) with measurements (3) suffering from attacks (4), the gain matrices of the recursive filter (5a) and (5b) are given as followsK1i,k+1 = ~ i in 

The launched attacks by the adversaries may not always be successful for mainly three reasons: 1) only a relatively small amount of attacks could pass through the detectors (with anti-attack countermeasures) for systems equipped with protection devices or software; 2) the attacks cannot be persistently (or arbitrarily) launched by the adversaries due to unavoidable limited resource(e.g. energy); and 3) the attacks sent through the networks with limited bandwidth are subject to randomly fluctuated condition changes (e.g. network load, network congestion and network transmission rate) and therefore cannot arrive at the desired end.