Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks

Nan Hou, Zidong Wang, Daniel W. C. Ho, Hongli Dong*

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

Abstract

In this paper, the partial-nodes-based state estimators (PNBSEs) are designed for a class of uncertain complex networks subject to finite-distributed delays, stochastic disturbances, as well as randomly occurring deception attacks (RODAs). In consideration of the likely unavailability of the output signals in harsh environments from certain network nodes, only partial measurements are utilized to accomplish the state estimation task for the addressed complex network with norm-bounded uncertainties in both the network parameters and the inner couplings. The RODAs are taken into account to reflect the compromised data transmissions in cyber security. We aim to derive the gain parameters of the estimators such that the overall estimation error dynamics satisfies the specified security constraint in the simultaneous presence of stochastic disturbances and deception signals. Through intensive stochastic analysis, sufficient conditions are obtained to guarantee the desired security performance for the PNBSEs, based on which the estimator gains are acquired by solving certain matrix inequalities with nonlinear constraints. A simulation study is carried out to testify the security performance of the presented state estimation method.
Original languageEnglish
Article number8736951
Pages (from-to)2793-2802
JournalIEEE Transactions on Cybernetics
Volume50
Issue number6
Online published14 Jun 2019
DOIs
Publication statusPublished - Jun 2020

Research Keywords

  • Deception attacks
  • finite-distributed delays
  • partial-nodes-based estimation
  • state estimation
  • uncertain complex networks (CNs)
  • uncertain inner-coupling matrix

Fingerprint

Dive into the research topics of 'Robust Partial-Nodes-Based State Estimation for Complex Networks Under Deception Attacks'. Together they form a unique fingerprint.

Cite this