Zihao Cai , Zehui Xiao , Ming Lin , Zheqing Zhou , Jie Tao
{"title":"Event-triggered set-membership fusion estimation of multi-rate multi-sensor systems under multiple cyber attacks","authors":"Zihao Cai , Zehui Xiao , Ming Lin , Zheqing Zhou , Jie Tao","doi":"10.1016/j.inffus.2025.103040","DOIUrl":null,"url":null,"abstract":"<div><div>The article concerns the multi-rate multi-sensor systems set-membership fusion estimation problem under multiple cyber attacks. In order to save limited communication resources, a novel adaptive event-triggered strategy is developed to control the frequency of information transmission. In contrast to conventional adaptive strategies, a transformation law is introduced to establish the triggering condition, thereby effectively avoiding triggering behaviors caused by small fluctuations after the error has converged. In addition, a hybrid approach is proposed to address the issue of rate inconsistency among various components, significantly improving both the efficiency and accuracy of the estimation algorithm. Then, a cryptography-based privacy protection scheme is presented to defend against deception attacks and replay attacks. By incorporating the concept of set-membership estimation, an optimization problem for secure fusion estimation is formulated. In light of this, an online recursive algorithm is proposed to continuously obtain the weighting coefficients and the optimal ellipsoid set, ensuring that the error remains confined within the desired ellipsoid. Finally, the superiority and feasibility of the proposed scheme are validated through a simulation example and a practical experiment.</div></div>","PeriodicalId":50367,"journal":{"name":"Information Fusion","volume":"120 ","pages":"Article 103040"},"PeriodicalIF":14.7000,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Fusion","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1566253525001137","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The article concerns the multi-rate multi-sensor systems set-membership fusion estimation problem under multiple cyber attacks. In order to save limited communication resources, a novel adaptive event-triggered strategy is developed to control the frequency of information transmission. In contrast to conventional adaptive strategies, a transformation law is introduced to establish the triggering condition, thereby effectively avoiding triggering behaviors caused by small fluctuations after the error has converged. In addition, a hybrid approach is proposed to address the issue of rate inconsistency among various components, significantly improving both the efficiency and accuracy of the estimation algorithm. Then, a cryptography-based privacy protection scheme is presented to defend against deception attacks and replay attacks. By incorporating the concept of set-membership estimation, an optimization problem for secure fusion estimation is formulated. In light of this, an online recursive algorithm is proposed to continuously obtain the weighting coefficients and the optimal ellipsoid set, ensuring that the error remains confined within the desired ellipsoid. Finally, the superiority and feasibility of the proposed scheme are validated through a simulation example and a practical experiment.
期刊介绍:
Information Fusion serves as a central platform for showcasing advancements in multi-sensor, multi-source, multi-process information fusion, fostering collaboration among diverse disciplines driving its progress. It is the leading outlet for sharing research and development in this field, focusing on architectures, algorithms, and applications. Papers dealing with fundamental theoretical analyses as well as those demonstrating their application to real-world problems will be welcome.