dc.contributor.author | Safi, Mostafa | |
dc.contributor.author | Dibaji, Seyed M. | |
dc.contributor.author | Ishii, Hideaki | |
dc.date.accessioned | 2023-09-27T20:24:42Z | |
dc.date.available | 2023-09-27T20:24:42Z | |
dc.date.issued | 2022-11-09 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/152289 | |
dc.description.abstract | Abstract
A network of observers is considered, where through asynchronous (with bounded delay) communications, they cooperatively estimate the states of a linear time-invariant (LTI) system. In such a setting, a new type of adversary might affect the observation process by impersonating the identity of the regular node, which is a violation of communication authenticity. These adversaries also inherit the capabilities of Byzantine nodes, making them more powerful threats called smart spoofers. We show how asynchronous networks are vulnerable to smart spoofing attack. In the estimation scheme considered in this paper, information flows from the sets of source nodes, which can detect a portion of the state variables each, to the other follower nodes. The regular nodes, to avoid being misguided by the threats, distributively filter the extreme values received from the nodes in their neighborhood. Topological conditions based on strong robustness are proposed to guarantee the convergence. Two simulation scenarios are provided to verify the results. | en_US |
dc.publisher | Springer Berlin Heidelberg | en_US |
dc.relation.isversionof | https://doi.org/10.1007/s11768-022-00118-7 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | Springer Berlin Heidelberg | en_US |
dc.title | Cooperative distributed state estimation: resilient topologies against smart spoofers | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Safi, Mostafa, Dibaji, Seyed M. and Ishii, Hideaki. 2022. "Cooperative distributed state estimation: resilient topologies against smart spoofers." | |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/PeerReviewed | en_US |
dc.date.updated | 2023-09-23T03:15:36Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | The Author(s), under exclusive licence to South China University of Technology and Academy of Mathematics and Systems Science, Chinese Academy of Sciences | |
dspace.embargo.terms | Y | |
dspace.date.submission | 2023-09-23T03:15:36Z | |
mit.license | OPEN_ACCESS_POLICY | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |