Název: Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks
Autoři: Adeli, Mahdieh
Hajatipour, Majid
Yazdanpanah, Mohammad Javad
Shafieirad, Mohsen
Hashemi Dezaki, Hamed
Citace zdrojového dokumentu: ADELI, M. HAJATIPOUR, M. YAZDANPANAH, MJ. SHAFIEIRAD, M. HASHEMI DEZAKI, H. Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks. IET Control Theory and Applications, 2021, roč. 15, č. 15, s. 1987-1998. ISSN: 1751-8644
Datum vydání: 2021
Nakladatel: Wiley
Typ dokumentu: článek
article
URI: 2-s2.0-85111769180
http://hdl.handle.net/11025/45535
ISSN: 1751-8644
Klíčová slova v dalším jazyce: clutter (information theory);computer crime;crime;kalman filters;linear systems;network security;sensor nodes;state estimation
Abstrakt v dalším jazyce: This paper is concerned with secure state estimation of non-linear systems under malicious cyber-attacks. The application of target tracking over a wireless sensor network is investigated. The existence of rotational manoeuvre in the target movement introduces non-linear behaviour in the dynamic model of the system. Moreover, in wireless sensor networks under cyber-attacks, erroneous information is spread in the whole network by imperilling some nodes and consequently their neighbours. Thus, they can deteriorate the performance of tracking. Despite the development of target tracking techniques in wireless sensor networks, the problem of rotational manoeuvring target tracking under cyberattacks is still challenging. To deal with the model non-linearity due to target rotational manoeuvres, an unscented Kalman filter is employed to estimate the target state variables consisting of the position and velocity. A diffusion-based distributed unscented Kalman filtering combined with a trust-based scheme is applied to ensure robustness against the cyber-attacks in manoeuvring target tracking applications over a wireless sensor network with secured nodes. Simulation results demonstrate the effectiveness of the proposed strategy in terms of tracking accuracy, while random attacks, false data injection attacks, and replay attacks are considered.
Práva: © 2021 The Authors.
Vyskytuje se v kolekcích:Články / Articles (RICE)
OBD

Soubory připojené k záznamu:
Soubor VelikostFormát 
Dezaki_cth2.12173.pdf996,88 kBAdobe PDFZobrazit/otevřít


Použijte tento identifikátor k citaci nebo jako odkaz na tento záznam: http://hdl.handle.net/11025/45535

Všechny záznamy v DSpace jsou chráněny autorskými právy, všechna práva vyhrazena.

hledání
navigace
  1. DSpace at University of West Bohemia
  2. Publikační činnost / Publications
  3. OBD