Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/31471
Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang, Y-A-
dc.contributor.authorWang, Z-
dc.contributor.authorZou, L-
dc.contributor.authorWang, F-
dc.date.accessioned2025-06-16T08:42:22Z-
dc.date.available2025-05-09-
dc.date.available2025-06-16T08:42:22Z-
dc.date.issued2025-05-09-
dc.identifierORCiD: Zidong Wang ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401-
dc.identifierORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941-
dc.identifierORCiD: Fan Wang https://orcid.org/0000-0002-0772-9801-
dc.identifier.citationWang, Y.-A. et al. (2025) 'Recursive Resilient State Estimation for Nonlinear Stochastic Complex Networks With Energy Harvesting Sensors Under Deception Attacks', IEEE Transactions on Network Science and Engineering, 0 (early access), pp. 1 - 12. doi: 10.1109/TNSE.2025.3568698.en_US
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/31471-
dc.description.abstractThis paper deals with a resilient estimation problem for certain type of time-varying complex networks of energy harvesting sensors that are vulnerable to deception attacks. Measurement signals of the underlying complex network, as measured by energy harvesting sensors, are only given to a remote estimator when the energy level is adequate to offset the energy consumption, which is at risk of deception attacks during network transmission. The deception attacks under consideration, are depicted as events occurring randomly, governed by a Bernoulli sequence. To meet the desired estimation performance, a resilient scheme is developed that addresses the side effects of random perturbations of the estimator gain when it comes to the implementation. The primary objective is to devise a resilient algorithm that can simultaneously manage energy harvesting sensors, deception attacks, and gain perturbations of the state estimator. Initially, the upper bound of the obtained error covariance is determined by making use of induction and intensive stochastic techniques. The necessary estimator gains are then identified recursively to prudently minimize this acquired bound. An illustrative example is presented ultimately to demonstrate this scheme's efficacy.en_US
dc.description.sponsorshipThis work was supported in part by the National Natural Science Foundation of China under Grants 61933007 and 62273087, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany.en_US
dc.format.extent1 - 12-
dc.format.mediumElectronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/becomean-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.rights.urihttps://journals.ieeeauthorcenter.ieee.org/becomean-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.subjectcomplex networksen_US
dc.subjectenergy harvesting sensorsen_US
dc.subjectresilient estimationen_US
dc.subjectdeception attacksen_US
dc.subjectnonlinear systemsen_US
dc.titleRecursive Resilient State Estimation for Nonlinear Stochastic Complex Networks With Energy Harvesting Sensors Under Deception Attacksen_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1109/TNSE.2025.3568698-
dc.relation.isPartOfIEEE Transactions on Network Science and Engineering-
pubs.issue00-
pubs.publication-statusPublished-
pubs.volume0-
dc.identifier.eissn2327-4697-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/becomean-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/1.16 MBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.