Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks
by
García-Ligero, María Jesús
, Hermoso-Carazo, Aurora
, Linares-Pérez, Josefa
in
Algorithms
/ Communication
/ correlated noises
/ Deception
/ deception attacks
/ Denial of service attacks
/ distributed fusion estimation
/ Filtration
/ Food science
/ Linear prediction
/ Noise
/ random delays
/ Random variables
/ sensor networks
/ Sensors
/ Signal processing
/ Wireless networks
/ Wireless sensor networks
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks
by
García-Ligero, María Jesús
, Hermoso-Carazo, Aurora
, Linares-Pérez, Josefa
in
Algorithms
/ Communication
/ correlated noises
/ Deception
/ deception attacks
/ Denial of service attacks
/ distributed fusion estimation
/ Filtration
/ Food science
/ Linear prediction
/ Noise
/ random delays
/ Random variables
/ sensor networks
/ Sensors
/ Signal processing
/ Wireless networks
/ Wireless sensor networks
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks
by
García-Ligero, María Jesús
, Hermoso-Carazo, Aurora
, Linares-Pérez, Josefa
in
Algorithms
/ Communication
/ correlated noises
/ Deception
/ deception attacks
/ Denial of service attacks
/ distributed fusion estimation
/ Filtration
/ Food science
/ Linear prediction
/ Noise
/ random delays
/ Random variables
/ sensor networks
/ Sensors
/ Signal processing
/ Wireless networks
/ Wireless sensor networks
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks
Journal Article
Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks
2022
Request Book From Autostore
and Choose the Collection Method
Overview
This paper focuses on the distributed fusion estimation problem in which a signal transmitted over wireless sensor networks is subject to deception attacks and random delays. We assume that each sensor can suffer attacks that may corrupt and/or modify the output measurements. In addition, communication failures between sensors and their local processors can delay the receipt of processed measurements. The randomness of attacks and transmission delays is modelled by different Bernoulli random variables with known probabilities of success. According to these characteristics of the sensor networks and assuming that the measurement noises are cross-correlated at the same time step between sensors and are also correlated with the signal at the same and subsequent time steps, we derive a fusion estimation algorithm, including prediction and filtering, using the distributed fusion method. First, for each sensor, the local least-squares linear prediction and filtering algorithm are derived, using a covariance-based approach. Then, the distributed fusion predictor and the corresponding filter are obtained as the matrix-weighted linear combination of corresponding local estimators, checking that the mean squared error is minimised. A simulation example is then given to illustrate the effectiveness of the proposed algorithms.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.