Robust fusion filter for networked uncertain descriptor systems with colored noise and cyber-attacks

被引:0
|
作者
Zhang, Yexuan [1 ]
Ran, Chenjian [1 ]
Sun, Shuli [1 ]
机构
[1] Heilongjiang Univ, Sch Elect Engn, Harbin 150080, Peoples R China
关键词
Descriptor system; Cyber-attack; Uncertain noise variance; Robust fusion filter; Colored noise; OPTIMAL RECURSIVE ESTIMATION; STATE ESTIMATION; MULTIPLICATIVE NOISES; KALMAN ESTIMATORS; PHYSICAL SYSTEMS; DOS ATTACK; DELAYS;
D O I
10.1016/j.sigpro.2024.109724
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The robust fusion filtering problem of multi-sensor networked uncertain descriptor systems (NUDSs) with colored noise, uncertain noise variances and cyber-attacks is investigated. During data transmission in unreliable communication networks, the data can be maliciously attacked by attackers. In other words, the local filters (LFs) may receive false data or may not receive data because of the cyber-attacks. By adopting the singular value decomposition (SVD) method, the original NUDSs can be converted into two reduced- order subsystems with uncertain correlated fictitious white noises, and the cyber-attacks are transformed into the fictitious noises. Cross-covariance matrices between local filtering errors are derived. The robust LFs are obtained according to the minimax robust estimation principle. Under the linear unbiased minimum variance criterion, three weighted fusion algorithms are applied to fuse the LFs. For all allowable uncertainties of noise variances and cyber-attacks, the minimal upper bounds of covariance matrices of the local and distributed fusion filters are guaranteed. The proof of their robustness is established through the minimax estimation principle and Lyapunov equation method. Finally, the correctness and effectiveness of the proposed algorithms are verified by a circuit system example.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Robust Measurement Fusion Kalman Filter for Multisensor Systems with Multiplicative Noises and Uncertain Noise Variances
    Liu, Wenqiang
    Wang, Xuemei
    Deng, Zili
    PROCEEDINGS OF THE 2016 12TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION (WCICA), 2016, : 3180 - 3186
  • [32] Event-triggered adaptive control for networked control systems under two stochastic cyber-attacks
    Tang, Xiaoling
    Li, Tao
    Cong, Shen
    Qian, Wei
    PROCEEDINGS OF THE 2019 31ST CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2019), 2019, : 170 - 175
  • [33] Event-based security tracking control for networked control systems against stochastic cyber-attacks
    Liu, Jinliang
    Dong, Yanhui
    Zha, Lijuan
    Tian, Engang
    Xie, Xiangpeng
    INFORMATION SCIENCES, 2022, 612 : 306 - 321
  • [34] Hybrid-triggered reliable dissipative control for singular networked cascade control systems with cyber-attacks
    Sathishkumar, M.
    Liu, Yen-Chen
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (07): : 4008 - 4033
  • [35] Modeling Network Systems Under Simultaneous Cyber-Attacks
    Da, Gaofeng
    Xu, Maochao
    Zhao, Peng
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 971 - 984
  • [36] On Resilient Design of Cooperative Systems in Presence of Cyber-Attacks
    Sadabadi, Mahdieh S.
    Gusrialdi, Azwirman
    2021 EUROPEAN CONTROL CONFERENCE (ECC), 2021, : 946 - 951
  • [37] Reliability Analysis of Cyber-Physical Systems Considering Cyber-Attacks
    Fang, Z. H.
    Mo, H. D.
    Wang, Y.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 364 - 368
  • [38] A Novel Networked Control Scheme with Safety Guarantees for Detection and Mitigation of Cyber-Attacks
    Gheitasi, Kian
    Ghaderi, Mohsen
    Lucia, Walter
    2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), 2019, : 1449 - 1454
  • [39] A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems
    Leite Junior, Walmor Cristino
    de Moraes, Claudio Coreixas
    de Albuquerque, Carlos E. P.
    Machado, Raphael Carlos Santos
    de Sa, Alan Oliveira
    SENSORS, 2021, 21 (09)
  • [40] A model of deception during cyber-attacks on information systems
    Rowe, NC
    2004 IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY, 2004, : 21 - 30