首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 47 毫秒
1.
《Journal of The Franklin Institute》2022,359(18):10726-10740
In this paper, the secure transmission issue of a remote estimation sensor network against eavesdropping is studied. A powerful eavesdropper overhears the measurement data sent through the communication channels between the sensors and the remote estimator, and estimates system state illegally, which threatens the system information security. Different from the existing anti-eavesdropping design approaches, a stealthy artificial noise (AN) strategy is proposed to prevent eavesdroppers from deciphering encryption policy by hiding the encryption process from eavesdroppers. It has the same dynamical process with each sensor’s measurement to guarantee that the estimation error of the eavesdropper is unbounded while its observation residual variance keeps in certain bound and converges to 0, and further ensure system security without alerting the eavesdropper. It is proved that the strategy is feasible whenever the eavesdropper starts to wiretap. The selection of sensors that needs to be encrypted is further given by solving an optimization problem. The effectiveness of the proposed algorithm is verified by two simulation examples.  相似文献   

2.
In cyber-physical systems (CPS), cyber threats emerge in many ways which can cause significant destruction to the system operation. In wireless CPS, adversaries can block the communications of useful information by channel jamming, incurring the so-called denial of service (DoS) attacks. In this paper, we investigate the problem of optimal jamming attack scheduling against remote state estimation wireless network. Specifically, we consider that two wireless sensors report data to a remote estimator through two wireless communication channels lying in two unoverlapping frequency bands, respectively. Meanwhile, an adversary can select one and only one channel at a time to execute jamming attack. We prove that the optimal attack schedule is continuously launching attack on one channel determined based on the system dynamics matrix. The theoretical results are validated by numerical simulations.  相似文献   

3.
Unpredictable packet loss that occurs in the channel connecting a local sensor and a remote estimator will deteriorate the performance of state estimation. To relieve this detrimental impact, an online linear temporal coding scheme is studied in this paper. If the packet of the last step is lost, a linear combination of the current and the last measurements with proper weights is transmitted; otherwise, only the current data is sent. By virtue of the innovation sequence approach, a linear minimum mean-squared error estimation algorithm is designed. To optimize performance, a novel estimator is also proposed which provides a recursive expression of the error covariances. The proposed two algorithms are proved to be equivalent via a set of transformations. With the aid of some optimization techniques, a recursive algorithm is presented to obtain the optimal coding weight in terms of minimizing the average estimation error covariance.  相似文献   

4.
5.
This paper investigates the multi-channel transmission scheduling problem for remote state estimation based on a hopping scheme in cyber-physical systems. The smart sensor sends multiple subpackets over different orthogonal channels to the remote end simultaneously. Owing to the randomness and vulnerability of transmission environments, the uncertain multi-channel states are considered in this paper, which relaxes the assumption of existing deterministic models. The objective is to find an appropriate hopping scheme that minimizes the remote estimation error covariance. First, the multi-channel selection problem is modeled as a multi-arm bandits (MAB) matrix via taking the packet receiving probability as the gain. From the perspective of strategy and channel, two exponential-weight online learning algorithms are designed with the assistance of transmission energy switching policy. Then, based on Bernstein’s inequality for martingales and mini-batching loop, the upper bounds of algorithms’ regret values are analyzed under stochastic and adversarial channel states, respectively. Further, the estimator expression in iterative form and a sufficient condition for the error covariance to be bounded are derived. Finally, an example of unmanned vehicle moving demonstrates all the theoretical results.  相似文献   

6.
In this paper, we consider a malicious attack issue against remote state estimation in cyber-physical systems. Due to the limited energy, the sensor adopts an acknowledgment-based (ACK-based) online power schedule to improve the remote state estimation. However, the feedback channel will also increase the risk of being attacked. The malicious attacker has the ability to intercept the ACK information and modify the ACK signals (ACKs) from the remote estimator. It could induce the sensor to make poor decisions while maintaining the observed data packet acceptance rate to keep the attacker undetected. To maximize the estimation error, the attacker will select appropriate attack times so that the sensor makes bad decisions. The optimal attack strategy based on the true ACKs and the corrosion ACKs is analytically proposed. The optimal attack time to modify the ACKs is the time when the sensor’s tolerance, i.e., the number of consecutive data packet losses allowed, is about to reach the maximum. In addition, such an optimal attack strategy is independent of the system parameters. Numerical simulations are provided to demonstrate the analytical results.  相似文献   

7.
This paper tackles the problem of a two-player differential game affected by matched uncertainties with only the output measurement available for each player. We suggest a state estimation based on the so-called algebraic hierarchical observer for each player in order to design the Nash equilibrium strategies based on such estimation. At the same time, the use of an output integral sliding mode term (also based on the estimation processes) for the Nash strategies robustification for both players ensures the compensation of the matched uncertainties. A simulation example shows the feasibility of this approach in a magnetic levitator problem.  相似文献   

8.
This paper discusses linear-quadratic infinite-time nonzero-sum closed-loop Nash games for systems with fast and slow modes. It is shown via example that the usual order reduction processes utilizing control ideas of singular perturbation analysis leads to an ill-posed reduced order problem. A modification of the performance indices is presented which leads to a well-posed problem, when the usual order reduction method is used. Finally, a hierarchical reduction procedure is proposed which leads to well-posed fast and slow game problems even when the performance indices are not modified.  相似文献   

9.
This paper investigates the frequency change problem of hydraulic turbine regulating system based on terminal sliding mode control method. By introducing a novel terminal sliding mode surface, a global fast terminal sliding mode controller is designed for the closed loop. This controller eliminates the slow convergence problem which arises in the terminal sliding mode control when the error signal is not near the equilibrium. Meanwhile, following consideration of the error caused by the actuator dead zone, an adaptive RBF estimator based on sliding mode surface is proposed. Through the dead zone error estimation for feed-forward compensation, the composite terminal sliding mode controller has been verified to possess an excellent performance without sacrificing disturbance rejection robustness and stability. Simulations have been carried out to validate the superiority of our proposed methods in comparison with other two other kinds of sliding mode control methods and the commonly used PID and FOPID controller. It is shown that the simulation results are in good agreement with the theoretical analysis.  相似文献   

10.
This paper investigates the state estimation problem for networked systems with colored noises and communication constraints. The colored noises are considered to be correlated to itself at other time steps, and communication constraints include two parts: (1) the information is quantized by a logarithmic quantizer before transmission, (2) only one node can access the network channel at each instant based on a specified media access protocol. A robust recursive estimator is designed under the condition of colored noises, quantization error and partially available measurements. The upper bound of the covariance of the estimation error is then derived and minimized by properly designing estimator gains. An illustrative example is finally given to demonstrate the effectiveness of the developed estimator.  相似文献   

11.
朱立龙  于涛  夏同水 《软科学》2013,27(1):47-49,68
通过对博弈模型中纯战略Nash均衡、占优战略Nash均衡和混合战略Nash均衡的分析,揭示了政府质量监管部门与生产企业建立质量管理体系监管博弈的内部运行机理。为实践中政府如何有效进行质量监管以及生产企业如何有效提高产品质量水平提出了建议,并为该监管博弈模型在实践中的具体应用指明了方向。  相似文献   

12.
A robust event-triggered distributed fusion algorithm is investigated in this paper for multi-sensor systems with unknown failure rates. A detection technique based on standard Gaussian distributed filtering innovation is designed and applied to judge whether the measurement is failed. This filtering innovation can also be used to construct the event-triggered condition. Specifically, the event condition is not triggered if the innovation is below the lower event-triggered threshold and the measurement is regarded as the failure measurement if the innovation exceeds the higher threshold. In the above two cases, the sensor measurement data is not transferred to the local estimator; otherwise, it will be transferred. Then, the sequential fast covariance intersection (SFCI) fusion algorithm is used for local estimation fusion. Besides, to analyze the estimation performance, sufficient conditions are given to demonstrate the boundness of the local estimation and fusion estimation covariance. Finally, a simulation example is given to show the usefulness of the presented algorithm.  相似文献   

13.
This paper focuses on the optimal tracking control problem (OTCP) for the unknown multi-input system by using a reinforcement learning (RL) scheme and nonzero-sum (NZS) game theory. First, a generic method for the OTCP of multi-input systems is formulated with steady-state controls and optimal feedback controls based on the NZS game theory. Then a three-layer neural network (NN) identifier is introduced to approximate the unknown system, and the input dynamics are obtained by using the derivative of the identifier. To transform the OTCP into a regulation optimal problem, an augmentation of the multi-input system is constructed by using the tracking error and the commanded trajectory. Moreover, we use an NN-based RL method to online learn the optimal value functions of all the inputs, which are then directly used to calculate the optimal tracking controls. All the NN weights are tuned synchronously online with a newly introduced adaptation based on the estimation error. The convergence of the NN weights and the stability of the closed-loop system are analyzed. Finally, a two-motor driven servo system and another nonlinear system are presented to illustrate the feasibility of the algorithm for both linear and nonlinear multi-input systems.  相似文献   

14.
This paper deals with the distributed estimation problem for networked sensing system with event-triggered communication schedules on both sensor-to-estimator channel and estimator-to-estimator channel. Firstly, an optimal event-triggered Kalman consensus filter (KCF) is derived by minimizing the mean squared error of each estimator based on the send-on-delta triggered protocol. Then, the suboptimal event-triggered KCF is proposed in order to reduce the computational complexity in covariance propagation. Moreover, the formal stability analysis of the estimation error is provided by using the Lyapunov-based approach. Finally, simulation results are presented to demonstrate the effectiveness of the proposed filter.  相似文献   

15.
A finite-time non-fragile state estimation algorithm is discussed in this article for discrete delayed neural networks with sensor failures and randomly occurring sensor nonlinearity. First, by using augmented technology, such system is modeled as a kind of nonlinear stochastic singular delayed system. Then, a finite-time state estimator algorithm is provided to ensure that the singular error dynamic is regular, causal and stochastic finite-time stable. Moreover, the states and sensor failures can be estimated simultaneously. Next, in order to avoid the affection of estimator’s parameter perturbation, a finite-time non-fragile state estimation algorithm is given, and a simulation result demonstrates the usefulness of the proposed approach.  相似文献   

16.
电力工业改革在发电领域引入竞争,目的在于提高电力生产效率,促进电力工业的发展.发电企业竞价是一个不完全信息下的静态博弈问题,在深入分析不完全信息市场环境下发电企业竞价过程的基础上,运用博弈论中的暗标拍卖原理构建发电企业竞价的暗标拍卖贝叶斯博弈模型,并通过求解贝叶斯纳什均衡得出发电企业的最优竞价模型,从而为发电企业建立有效的竞价策略提供决策参考.  相似文献   

17.
In this paper, we study a distributed state estimation problem for Markov jump systems (MJS) over sensor networks, in which each sensor node connects with each other through wireless networks with communication delays. We assume that each sensor node maintains a buffer to store delayed data transmitted from neighbor nodes. A distributed multiple model filter is designed by using the interacting multiple model methods (IMM) and a recursive delays compensation method. In order to ensure the stability, two stability conditions are derived for boundedness of estimation errors and boundedness of error covariance. Finally, the effectiveness of the proposed methods is illustrated by simulations and experiments of maneuvering target tracking.  相似文献   

18.
This paper is concerned with a security problem about malicious integrity attacks in state estimation system, in which multiple smart sensors locally measure information and transmit it to a remote fusion estimator though wireless channels. A joint constraint is considered for the attacker behaviour in each channel to keep stealthiness under a residual-based detector on the remote side. In order to degrade the estimator performance, the attacker will maximize the trace of the remote state estimation error covariance which is derived based on Kalman filter theory. It is proved that the optimal linear attack strategy design problem is convex and finally turned into a semi-definite programming problem. In addition, the tendency of attack behaviour on recursive and fixed Kalman filter system is analyzed. Several examples are given to illustrate the theoretical results.  相似文献   

19.
In this paper, the state estimation problem for discrete-time networked systems with communication constraints and random packet dropouts is considered. The communication constraint is that, at each sampling instant, there is at most one of the various transmission nodes in the networked systems is allowed to access a shared communication channel, and then the received data are transmitted to a remote estimator to perform the estimation task. The channel accessing process of those transmission nodes is determined by a finite-state discrete-time Markov chain, and random packet dropouts in remote data transmission are modeled by a Bernoulli distributed white sequence. Using Bayes’ rule and some results developed in this study, two state estimation algorithms are proposed in the sense of minimum mean-square error. The first algorithm is optimal, which can exactly compute the minimum mean-square error estimate of system state. The second algorithm is a suboptimal algorithm obtained under a lot of Gaussian hypotheses. The proposed suboptimal algorithm is recursive and has time-independent complexity. Computer simulations are carried out to illustrate the performance of the proposed algorithms.  相似文献   

20.
In this paper, we investigate the optimal denial-of-service attack scheduling problems in a multi-sensor case over interference channels. Multiple attackers aim to degrade the performance of remote state estimation under attackers’ energy constraints. The attack decision of one attacker may be affected by the others while all attackers find their own optimal strategies to degrade estimation performance. Consequently, the Markov decision process and Markov cooperative game in two different information scenarios are formulated to study the optimal attack strategies for multiple attackers. Because of the complex computations of the high-dimensional Markov decision process (Markov cooperative game) as well as the limited information for attackers, we propose a value iteration adaptive dynamic programming method to approximate the optimal solution. Moreover, the structural properties of the optimal solution are analyzed. In the Markov cooperative game, the optimal joint attack strategy which admits a Nash equilibrium is studied. Several numerical simulations are provided to illustrate the feasibility and effectiveness of the main results.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号