Show simple item record

Trust-Based Distributed State Estimation in the Presence of Cyber-Attacks Tested With Hardware-in-the-Loop

dc.contributor.authorRodríguez Del Nozal, Álvaro 
dc.contributor.authorOrihuela Espina, Diego Luis 
dc.contributor.authorRomaine, James Brian
dc.contributor.authorMillán Gata, Pablo 
dc.date.accessioned2026-03-06T08:35:51Z
dc.date.available2026-03-06T08:35:51Z
dc.date.issued2021
dc.identifier.citationA. R. del Nozal, L. Orihuela, J. B. Romaine and P. Millán, "Trust-Based Distributed State Estimation in the Presence of Cyber-Attacks Tested With Hardware-in-the-Loop," in IEEE Control Systems Letters, vol. 6, pp. 506-511, 2022, doi: 10.1109/LCSYS.2021.3082309es
dc.identifier.issn2475-1456
dc.identifier.urihttps://hdl.handle.net/20.500.12412/7144
dc.description.abstractThis letter tackles the problem of estimating the state of a plant when communications are corrupted by cyber-attacks or sensor faults occur. An observer structure based on multi-hop subspace decomposition is proposed, which allows each agent to identify its observable and unobservable subspaces and to reconstruct them based on its own measurements and on the information exchanged with the rest of agents. To deal with cyber-attacks, this letter proposes a method based on weighting the information provided by agents according to an assessment of its trustworthiness. An algorithm to dynamically adjust the weighting parameters is provided and the performance of the proposed technique is assessed using a hardware-in-the-loop platform.es
dc.description.abstractEs la versión preprint del artículo. Se puede consultar la versión final en 10.1109/LCSYS.2021.3082309es
dc.language.isoenges
dc.titleTrust-Based Distributed State Estimation in the Presence of Cyber-Attacks Tested With Hardware-in-the-Loopes
dc.typearticlees
dc.identifier.doi10.1109/LCSYS.2021.3082309
dc.journal.titleIEEE Control Systems Letterses
dc.page.initial506es
dc.page.final511es
dc.rights.accessRightsopenAccesses
dc.subject.keywordDistributed estimationes
dc.subject.keywordMulti-agent systemses
dc.subject.keywordTime-invariant systemses
dc.subject.keywordLinear systemses
dc.subject.keywordCyber-attackses
dc.subject.keywordFault detectiones
dc.subject.keywordFault isolationes
dc.volume.number6es


Files in this item

This item appears in the following Collection(s)

Show simple item record