Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F49777513%3A23220%2F21%3A43962509" target="_blank" >RIV/49777513:23220/21:43962509 - isvavai.cz</a>
Result on the web
<a href="https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cth2.12173" target="_blank" >https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cth2.12173</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1049/cth2.12173" target="_blank" >10.1049/cth2.12173</a>
Alternative languages
Result language
angličtina
Original language name
Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks
Original language description
This paper is concerned with secure state estimation of non-linear systems under malicious cyber-attacks. The application of target tracking over a wireless sensor network is investigated. The existence of rotational manoeuvre in the target movement introduces non-linear behaviour in the dynamic model of the system. Moreover, in wireless sensor networks under cyber-attacks, erroneous information is spread in the whole network by imperilling some nodes and consequently their neighbours. Thus, they can deteriorate the performance of tracking. Despite the development of target tracking techniques in wireless sensor networks, the problem of rotational manoeuvring target tracking under cyberattacks is still challenging. To deal with the model non-linearity due to target rotational manoeuvres, an unscented Kalman filter is employed to estimate the target state variables consisting of the position and velocity. A diffusion-based distributed unscented Kalman filtering combined with a trust-based scheme is applied to ensure robustness against the cyber-attacks in manoeuvring target tracking applications over a wireless sensor network with secured nodes. Simulation results demonstrate the effectiveness of the proposed strategy in terms of tracking accuracy, while random attacks, false data injection attacks, and replay attacks are considered.
Czech name
—
Czech description
—
Classification
Type
J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database
CEP classification
—
OECD FORD branch
20201 - Electrical and electronic engineering
Result continuities
Project
—
Continuities
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Others
Publication year
2021
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
IET Control Theory and Applications
ISSN
1751-8644
e-ISSN
—
Volume of the periodical
15
Issue of the periodical within the volume
15
Country of publishing house
US - UNITED STATES
Number of pages
12
Pages from-to
1987-1998
UT code for WoS article
000680942300001
EID of the result in the Scopus database
2-s2.0-85111769180