Vše

Co hledáte?

Vše
Projekty
Výsledky výzkumu
Subjekty

Rychlé hledání

  • Projekty podpořené TA ČR
  • Významné projekty
  • Projekty s nejvyšší státní podporou
  • Aktuálně běžící projekty

Chytré vyhledávání

  • Takto najdu konkrétní +slovo
  • Takto z výsledků -slovo zcela vynechám
  • “Takto můžu najít celou frázi”

Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks

Identifikátory výsledku

  • Kód výsledku v IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F49777513%3A23220%2F21%3A43962509" target="_blank" >RIV/49777513:23220/21:43962509 - isvavai.cz</a>

  • Výsledek na webu

    <a href="https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cth2.12173" target="_blank" >https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/cth2.12173</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1049/cth2.12173" target="_blank" >10.1049/cth2.12173</a>

Alternativní jazyky

  • Jazyk výsledku

    angličtina

  • Název v původním jazyce

    Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks

  • Popis výsledku v původním jazyce

    This paper is concerned with secure state estimation of non-linear systems under malicious cyber-attacks. The application of target tracking over a wireless sensor network is investigated. The existence of rotational manoeuvre in the target movement introduces non-linear behaviour in the dynamic model of the system. Moreover, in wireless sensor networks under cyber-attacks, erroneous information is spread in the whole network by imperilling some nodes and consequently their neighbours. Thus, they can deteriorate the performance of tracking. Despite the development of target tracking techniques in wireless sensor networks, the problem of rotational manoeuvring target tracking under cyberattacks is still challenging. To deal with the model non-linearity due to target rotational manoeuvres, an unscented Kalman filter is employed to estimate the target state variables consisting of the position and velocity. A diffusion-based distributed unscented Kalman filtering combined with a trust-based scheme is applied to ensure robustness against the cyber-attacks in manoeuvring target tracking applications over a wireless sensor network with secured nodes. Simulation results demonstrate the effectiveness of the proposed strategy in terms of tracking accuracy, while random attacks, false data injection attacks, and replay attacks are considered.

  • Název v anglickém jazyce

    Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks

  • Popis výsledku anglicky

    This paper is concerned with secure state estimation of non-linear systems under malicious cyber-attacks. The application of target tracking over a wireless sensor network is investigated. The existence of rotational manoeuvre in the target movement introduces non-linear behaviour in the dynamic model of the system. Moreover, in wireless sensor networks under cyber-attacks, erroneous information is spread in the whole network by imperilling some nodes and consequently their neighbours. Thus, they can deteriorate the performance of tracking. Despite the development of target tracking techniques in wireless sensor networks, the problem of rotational manoeuvring target tracking under cyberattacks is still challenging. To deal with the model non-linearity due to target rotational manoeuvres, an unscented Kalman filter is employed to estimate the target state variables consisting of the position and velocity. A diffusion-based distributed unscented Kalman filtering combined with a trust-based scheme is applied to ensure robustness against the cyber-attacks in manoeuvring target tracking applications over a wireless sensor network with secured nodes. Simulation results demonstrate the effectiveness of the proposed strategy in terms of tracking accuracy, while random attacks, false data injection attacks, and replay attacks are considered.

Klasifikace

  • Druh

    J<sub>imp</sub> - Článek v periodiku v databázi Web of Science

  • CEP obor

  • OECD FORD obor

    20201 - Electrical and electronic engineering

Návaznosti výsledku

  • Projekt

  • Návaznosti

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Ostatní

  • Rok uplatnění

    2021

  • Kód důvěrnosti údajů

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Údaje specifické pro druh výsledku

  • Název periodika

    IET Control Theory and Applications

  • ISSN

    1751-8644

  • e-ISSN

  • Svazek periodika

    15

  • Číslo periodika v rámci svazku

    15

  • Stát vydavatele periodika

    US - Spojené státy americké

  • Počet stran výsledku

    12

  • Strana od-do

    1987-1998

  • Kód UT WoS článku

    000680942300001

  • EID výsledku v databázi Scopus

    2-s2.0-85111769180