Zobrazit minimální záznam
| dc.rights.license |
CC BY |
eng |
| dc.contributor.author |
Nanda, S.K. |
cze |
| dc.contributor.author |
Kumar, G. |
cze |
| dc.contributor.author |
Naik, A.K. |
cze |
| dc.contributor.author |
Abdel-Hafez, M. |
cze |
| dc.contributor.author |
Bhatia, V. |
cze |
| dc.contributor.author |
Krejcar, Ondřej |
cze |
| dc.contributor.author |
Singh, A.K. |
cze |
| dc.date.accessioned |
2025-12-05T12:59:50Z |
|
| dc.date.available |
2025-12-05T12:59:50Z |
|
| dc.date.issued |
2023 |
eng |
| dc.identifier.issn |
2169-3536 |
eng |
| dc.identifier.uri |
http://hdl.handle.net/20.500.12603/1854 |
|
| dc.description.abstract |
State estimation in cyber-physical systems is a challenging task involving integrating physical models and measurements to estimate dynamic states accurately in practical machine-to-machine and IoT deployments. However, integrating advanced wireless communication and intelligent measurements has increased vulnerability of external intrusion through a centralized server. This study addresses the challenge of Gaussian filtering for a specific type of stochastic nonlinear system vulnerable to cyber attacks and delayed measurements. These attacks occur randomly when data is transmitted from sensor nodes to remote filter nodes. To address this issue, a new cyber attack model is proposed that combines false data injection attacks and delayed measurement into a unified framework. The study also analyzes the stochastic stability of the proposed filter and establishes sufficient conditions to ensure that the filtering error remains bounded even in the presence of randomly occurring cyber attacks and delayed measurements. The proposed methodology is demonstrated and compared with other widely used approaches using simulated data to highlight its effectiveness and usefulness. Author |
eng |
| dc.format |
p. 88637-88648 |
eng |
| dc.language.iso |
eng |
eng |
| dc.publisher |
IEEE |
eng |
| dc.relation.ispartof |
IEEE Access, volume 11, issue: Autumn |
eng |
| dc.subject |
Bayes methods |
eng |
| dc.subject |
Cyberattack |
eng |
| dc.subject |
Delay measurement |
eng |
| dc.subject |
Delays |
eng |
| dc.subject |
Electronic mail |
eng |
| dc.subject |
FDI |
eng |
| dc.subject |
Filtering |
eng |
| dc.subject |
Gaussian filtering |
eng |
| dc.subject |
Gaussian processes |
eng |
| dc.subject |
Mathematical models |
eng |
| dc.subject |
nonlinear Bayesian filtering |
eng |
| dc.subject |
Random variables |
eng |
| dc.subject |
Stochastic processes |
eng |
| dc.title |
Gaussian Filtering with False Data Injection and Randomly Delayed Measurements |
eng |
| dc.type |
article |
eng |
| dc.identifier.obd |
43880209 |
eng |
| dc.identifier.doi |
10.1109/ACCESS.2023.3305288 |
eng |
| dc.publicationstatus |
postprint |
eng |
| dc.peerreviewed |
yes |
eng |
| dc.source.url |
https://ieeexplore.ieee.org/document/10217812/ |
cze |
| dc.relation.publisherversion |
https://ieeexplore.ieee.org/document/10217812/ |
eng |
| dc.rights.access |
Open Access |
eng |
Soubory tohoto záznamu
Tento záznam se objevuje v následujících kolekcích
Zobrazit minimální záznam