共查询到20条相似文献,搜索用时 11 毫秒
1.
This paper is concerned with the local design of the distributed H∞‐consensus filtering problem for a class of discrete time‐varying systems subject to both multiplicative noises and deception attacks over sensor networks. The target plant and the measuring sensors are disturbed by multiplicative noises with known statistics. The malicious signal involved in deception attacks is constrained by a specific sector‐like bounded condition, which reflects certain tolerable bound on the difference between the attack signal and the true signal. Attention is paid to the design of filter gains for guaranteeing a desirable filtering performance that simultaneously characterizes the filtering accuracy and the consensus requirement. To handle the proposed filtering problem, the supply rate function is firstly chosen for each node and then the dissipation matrix is constructed as a column substochastic matrix based on the stochastic vector dissipation theory. Subsequently, sufficient conditions by means of recursive linear matrix inequalities are presented for each node such that the filtering error and the consensus error satisfy the desirable H∞‐consensus performance index over a finite horizon. Finally, an illustrative simulation is presented to demonstrate the effectiveness of the proposed filter strategy. 相似文献
2.
研究了无线传感器网络中的分布式鲁棒状态信息融合问题. 在局部状态估计层, 基于鲁棒统计学理论提出了适用于噪声相关情况的抗差(扩展)卡尔曼滤波器. 在融合中心层, 针对局部估计相关未知性和不完整性, 给出了不依赖于互协方差阵的稳健航迹融合方法—–内椭球逼近法. 仿真结果证实了算法的有效性: 所提出的抗差卡尔曼滤波器在野值存在情况下, 性能退化远低于传统卡尔曼滤波器(28.6%比428.6%); 所提出的内椭球逼近法获得比协方并交叉法更好的融合估计性能, 且不需要局部估计相关性的先验知识. 相似文献
3.
余群 《计算机工程与设计》2008,29(12)
无线传感器网络中的Sybil攻击会破坏无线传感器网络的路由算法、公平资源分配等机制,因此研究Sybil攻击的防范和检测方法存在一定的意义.分析了Sybil攻击的破坏性,阐述了目前已有的防范和检测Sybil攻击的方法,并针对目前已有方法的不足,提出了从节点的能量消耗、计算量等性能进行优化出发,设计出有效的Sybil攻击防范和检测机制. 相似文献
4.
We consider a network of sensors in which each node may collect noisy linear measurements of some unknown parameter. In this context, we study a distributed consensus diffusion scheme that relies only on bidirectional communication among neighbour nodes (nodes that can communicate and exchange data), and allows every node to compute an estimate of the unknown parameter that asymptotically converges to the true parameter. At each time iteration, a measurement update and a spatial diffusion phase are performed across the network, and a local least-squares estimate is computed at each node. The proposed scheme allows one to consider networks with dynamically changing communication topology, and it is robust to unreliable communication links and failures in measuring nodes. We show that under suitable hypotheses all the local estimates converge to the true parameter value. 相似文献
5.
This paper provides a reliable fusion scheme over sensor networks subject to abnormal measurements and energy constraints. Two kinds of channels are employed to implement the information transmission in order to extend the lifetime. Specifically, the one has the merit of high reliability by sacrificing energy cost and the other reduces the energy cost but could result in packet loss. For the addressed problem, a χ2 detection in local state estimator is first designed to remove abnormal measurements, which could come from outliers or a malicious modification by attackers. Then, a new strategy is developed to compensate the lost local estimation transmitted by low‐reliable channels. Furthermore, by view of matrix operation and probability theory, a set of recursive formulas are developed to calculate desired error covariance matrices of local state estimation, compensated state estimation as well as fusion estimation. The optimal fusion weights are obtained analytically and the advantage of fusion estimation is disclosed by resorting to these covariance matrices. Finally, a numerical example is used to illustrate the effectiveness of the proposed method. 相似文献
6.
This paper deals with the problem of estimating the state of a discrete-time linear stochastic dynamical system on the basis of data collected from multiple sensors subject to a limitation on the communication rate from the remote sensor units. The optimal probabilistic measurement-independent strategy for deciding when to transmit estimates from each sensor is derived. Simulation results show that the derived strategy yields certain advantages in terms of worst-case time-averaged performance with respect to periodic strategies when coordination among sensors is not possible. 相似文献
7.
8.
The interval estimation fusion method based on sensor interval estimates and their confidence degrees is developed. When sensor estimates are independent of each other, a combination rule to merge sensor estimates and their confidence degrees is proposed. Moreover, two optimization criteria: minimizing interval length with an allowable minimum confidence degree, or maximizing confidence degree with an allowable maximum interval length are suggested. In terms of the two criteria, an optimal interval estimation fusion can be obtained based on the combined intervals and their confidence degrees. Then we can extend the results on the combined interval outputs and their confidence degrees to obtain a conditional combination rule and the corresponding optimal fault-tolerant interval estimation fusion in terms of the two criteria. It is easy to see that Marzullo's fault-tolerant interval estimation fusion [Marzullo, (1990). Tolerating failures of continuous-valued sensors. ACM Transactions on Computer System, 8(4), 284-304] is a special case of our method. 相似文献
9.
无线传感器网络中的虫洞攻击防护机制 总被引:2,自引:0,他引:2
虫洞攻击能够随意制造“热点”区域以加速消耗特定区域能量,对依赖连接的无线传感器网络来说影响最大:直接导致获得的数据混乱,结果远远偏离实际情况。现有的措施虽然有一定的抵御作用,但是它们仍然存在很多不足。针对这种情况,提出了基于信誉认证的虫洞攻击抵御机制,利用了自反馈的信誉认证机制,不需要任何额外硬件。仿真实验结果表明,基于信誉认证的虫洞抵御机制能够有效地抵御无线传感器网络中各种类型的虫洞攻击。 相似文献
10.
《Journal of Computer and System Sciences》2014,80(3):644-653
With the advances in technology, there has been an increasing interest in the use of wireless sensor networks (WSNs). WSNs are vulnerable to a wide class of attacks among which sinkhole attack puts severe threats to the security of such networks. This paper proposes two approaches to detect and mitigate such attack in WSNs. It provides a centralized approach to detect suspicious regions in the network using geostatistical hazard model. Furthermore, a distributed monitoring approach has been proposed to explore every neighborhood in the network to detect malicious behaviors. Our simulation experiments validate the correctness and efficiency of the proposed approaches. 相似文献
11.
This paper is concerned with the filtering problem for a class of nonlinear systems with stochastic sensor saturations and event-triggered measurement transmissions. An event-triggered transmission scheme is proposed with hope to ease the traffic burden and improve the energy efficiency. The measurements are subject to randomly occurring sensor saturations governed by Bernoulli-distributed sequences. Special effort is made to obtain an upper bound of the filtering error covariance in the presence of linearisation errors, stochastic sensor saturations as well as event-triggered transmissions. A filter is designed to minimise the obtained upper bound at each time step by solving two sets of Riccati-like matrix equations, and thus the recursive algorithm is suitable for online computation. Sufficient conditions are established under which the filtering error is exponentially bounded in mean square. The applicability of the presented method is demonstrated by dealing with the fault estimation problem. An illustrative example is exploited to show the effectiveness of the proposed algorithm. 相似文献
12.
13.
14.
This paper is concerned with the distributed resilient estimation problem for a class of nonlinear time‐delayed systems subject to stochastic perturbations. The plant and the measurements are disturbed by two Gaussian white stochastic processes with known statistical information, respectively. In addition, a resilient estimator is designed for each node by means of the parameter uncertainties and Bernoulli‐distributed random variables. Then, a novel exponential‐bounded performance index is put forward to measure the disturbance rejection level of the distributed estimators against the external disturbances and the impact of the initial values. A new vector dissipation definition including multiple vectors of energy storage functions is established to deal with the time‐delay estimation error dynamics. Within the framework of local performance analysis inspired by this new definition of vector dissipation, sufficient conditions in terms of recursive linear matrix inequalities are constructed for each node to guarantee the desirable performance index. Next, a local optimization problem subject to a set of recursive linear matrix inequalities is presented for each node to minimize the upper bound in the performance index, where the calculations can be conducted on every node in a distributed manner and the estimator gains are also calculated. Finally, an illustrative simulation example is provided to verify the applicability of the proposed estimators. 相似文献
15.
Robust state estimation problem subject to a communication constraint is investigated in this paper for a class of wireless sensor networks constituted by multiple remote sensor nodes and a fusion node. An analytical robust fusion estimator using local event‐triggered transmission strategies is derived aiming to reduce energy consumption of the sensor nodes and refrain from network traffic congestion. Some conditions are presented guaranteeing the uniformly bounded estimation errors of the robust state estimator. Several numerical simulations are presented to show the validity of the proposed method. 相似文献
16.
An adaptive unscented Kalman filter approach to secure state estimation for wireless sensor networks
Wireless sensor networks are vulnerable to false data injection attacks, which may mislead the state estimation. To solve this problem, this paper presents a chi-square test-based adaptive secure state estimation (CTASSE) algorithm for state estimation and attack detection. Taking advantage of Kalman filters, attack signal together with process noise or measurement noise are described as total white Gaussian noise with uncertain covariance matrix. The chi-square test method is used in the adaptation of the total noise covariance and attack detection. Then, a standard adaptive unscented Kalman filter (UKF) is used for the state estimation. Finally, simulation results show that the proposed CTASSE algorithm performs better than other UKFs in state estimation and is also effective in real-time attack detection. 相似文献
17.
W.L. De Koning 《Automatica》1984,20(1):113-115
This paper considers optimal linear state estimation in the general case of linear discrete-time systems with stochastic parameters which are statistically independent with respect to time. The estimator is derived by transforming the system to one with deterministic parameters and state dependent additive system and observation noise. It is shown that mean square stability of the system is a sufficient and almost necessary condition for the existence, uniqueness and stability of the time invariant estimator. 相似文献
18.
为解决复杂电网大数据背景下单一算法难以满足状态估计要求的问题,提出一种电力系统状态估计多算法融合系统。基于数据融合思想,将加权最小二乘法、快速分解法、量测状态变换法与Sigmoid函数法相互融合实现电网状态估计,支持串行融合模式和并行融合模式。实验结果表明,融合算法使得估计结果保留了各自算法的优点,避免了单一算法的缺点,提高了状态估计的精度和效率。 相似文献
19.
Security‐guaranteed filtering for discrete‐time stochastic delayed systems with randomly occurring sensor saturations and deception attacks 下载免费PDF全文
In this paper, the security‐guaranteed filtering problem is studied for a class of nonlinear stochastic discrete time‐delay systems with randomly occurring sensor saturations (ROSSs) and randomly occurring deception attacks (RODAs). The nonlinearities in systems satisfy the sector‐bounded conditions, and the time‐varying delays are unknown with given lower and upper bounds. A novel measurement output model is proposed to reflect both the ROSSs and the RODAs. A new definition is put forward on the security level with respect to the noise intensity, the energy bound of the false signals, the energy of the initial system state, and the desired security degree. We aim at designing a filter such that, in the presence of ROSSs and RODAs, the filtering error dynamics achieves the prescribed level of security. By using the stochastic analysis techniques, a sufficient condition is first derived under which the filtering error system is guaranteed to have the desired security level, and then, the filter gain is designed by solving a linear matrix inequality with nonlinear constraints. Finally, a numerical example is provided to demonstrate the feasibility of the proposed filtering scheme. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献