Reach Set-Based Secure State Estimation against Sensor Attacks with Interval Hull Approximation

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Convex Optimization Based State Estimation against Sparse Integrity Attacks

We consider the problem of robust estimation in the presence of integrity attacks. There are m sensors monitoring the state and p of them are under attack. The malicious measurements collected by the compromised sensors can be manipulated arbitrarily by the attacker. The classical estimators such as the least squares estimator may not provide a reliable estimate under the so-called (p,m)-sparse...

متن کامل

Robust State Estimation against Sparse Integrity Attacks

We consider the problem of robust state estimation in the presence of integrity attacks. There are m sensors monitoring a dynamical process. Subject to the integrity attacks, p out of m measurements can be arbitrarily manipulated. The classical approach such as the MMSE estimation in the literature may not provide a reliable estimate under this so-called (p,m)-sparse attack. In this work, we pr...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Cyber Attacks

In the coming years, usage of Unmanned Aerial Vehicles (UAVs) is expected to grow tremendously. Maintaining security of UAVs under cyber attacks is an important yet challenging task, as these attacks are often erratic and difficult to predict. Secure estimation problems study how to estimate the states of a dynamical system from a set of noisy and maliciously corrupted sensor measurements. The ...

متن کامل

Secure Estimation for Unmanned Aerial Vehicles against Adversarial Attacks

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SICE Journal of Control, Measurement, and System Integration

سال: 2018

ISSN: 1882-4889,1884-9970

DOI: 10.9746/jcmsi.11.399