Encryption-decryption-based distributed state estimation against eavesdropping attacks over sensor networks with communication protocol
The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule...
Uloženo v:
| Vydáno v: | Neurocomputing (Amsterdam) Ročník 658; s. 131570 |
|---|---|
| Hlavní autoři: | , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Elsevier B.V
28.12.2025
|
| Témata: | |
| ISSN: | 0925-2312 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule the transmission order of the measurement data. To mitigate privacy leakage, an encryptor is designed to encrypt the measurement information of each sensor node, and then the encrypted measurements can be decrypted by the user. The primary objective of this paper is to present a distributed state estimation algorithm with recursive format for such time-varying systems, in which an upper bound on the estimation error covariance is derived, and appropriate estimator gains are determined to minimize this upper bound. In addition, a sufficient condition is provided to ensure that the estimation error of the user is exponentially bounded in the mean-square sense. Particularly, the properly designed encryption–decryption parameters guarantee that the state estimation error of the eavesdropper is unbounded. Finally, two simulation experiments are conducted to demonstrate the feasibility of the developed encryption–decryption-based distributed state estimation algorithm.
•A new distributed state estimation problem is developed by handling the EDM and the RR protocol.•A sufficient condition is established to guarantee exponential boundedness of estimation error at the user side.•The encryption-decryption parameters are designed to ensure unboundedness of state estimation error for eavesdropper. |
|---|---|
| AbstractList | The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule the transmission order of the measurement data. To mitigate privacy leakage, an encryptor is designed to encrypt the measurement information of each sensor node, and then the encrypted measurements can be decrypted by the user. The primary objective of this paper is to present a distributed state estimation algorithm with recursive format for such time-varying systems, in which an upper bound on the estimation error covariance is derived, and appropriate estimator gains are determined to minimize this upper bound. In addition, a sufficient condition is provided to ensure that the estimation error of the user is exponentially bounded in the mean-square sense. Particularly, the properly designed encryption–decryption parameters guarantee that the state estimation error of the eavesdropper is unbounded. Finally, two simulation experiments are conducted to demonstrate the feasibility of the developed encryption–decryption-based distributed state estimation algorithm.
•A new distributed state estimation problem is developed by handling the EDM and the RR protocol.•A sufficient condition is established to guarantee exponential boundedness of estimation error at the user side.•The encryption-decryption parameters are designed to ensure unboundedness of state estimation error for eavesdropper. |
| ArticleNumber | 131570 |
| Author | Yang, Xiaolong Guo, Yuxin Chen, Wen Zhang, Hongxu Zhang, Jiawen |
| Author_xml | – sequence: 1 givenname: Xiaolong surname: Yang fullname: Yang, Xiaolong organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China – sequence: 2 givenname: Wen surname: Chen fullname: Chen, Wen email: chenwen@hrbust.edu.cn organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China – sequence: 3 givenname: Hongxu surname: Zhang fullname: Zhang, Hongxu organization: Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China – sequence: 4 givenname: Jiawen surname: Zhang fullname: Zhang, Jiawen organization: Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China – sequence: 5 givenname: Yuxin surname: Guo fullname: Guo, Yuxin organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China |
| BookMark | eNp9kMtOwzAQRb0oEm3hD1j4BxL8yKPdIKGqPKRKbGBtOfakuLR25HFb9Qv4bRIFsWQ1V6O5V3fOjEx88EDIHWc5Z7y63-UejiYccsFEmXPJy5pNyJQtRZkJycU1mSHuGOM1F8sp-V57Ey9dcsFnFv5koxEstQ5TdM0x9RqTTkABkzvo4YTqrXYeEwV9ArQxdJ3zW6pT0uYLaThBpAgeQ6Qe0jnEfnl26ZP23Q5H78yY0sWQggn7G3LV6j3C7e-ck4-n9fvqJdu8Pb-uHjeZEWWdMqh1YUwBTAorltBqWy6qpqoLLpu6WFT9cgHatDCoqmpqXhnJgEsNYFlj5ZwUY66JATFCq7rYfxQvijM1AFQ7NQJUA0A1AuxtD6MN-m4nB1GhceANWBfBJGWD-z_gBwkEhao |
| Cites_doi | 10.1109/TSMC.2022.3218023 10.1109/TII.2024.3393501 10.1109/TCYB.2021.3067822 10.1016/j.automatica.2023.110904 10.1016/j.automatica.2019.108681 10.1109/TCNS.2022.3155109 10.1016/j.future.2020.07.047 10.1016/j.isatra.2025.04.005 10.1109/9.754809 10.1016/j.inffus.2024.102452 10.1109/TFUZZ.2023.3305088 10.1016/j.jfranklin.2022.05.009 10.1016/j.automatica.2024.111839 10.1109/TAC.2020.2996579 10.1016/j.automatica.2024.111932 10.1109/TII.2024.3431096 10.1109/TIFS.2023.3265343 10.1016/j.sysconle.2024.105959 10.1109/TSP.2013.2262276 10.1016/j.inffus.2022.06.009 10.1109/TITS.2022.3217152 10.1016/j.ins.2024.121706 10.1109/TCYB.2022.3209793 10.1080/00207721.2024.2423033 10.1109/TNSE.2022.3144484 10.1109/TWC.2020.3041750 10.1109/TII.2015.2436337 10.1109/TIFS.2024.3361177 10.1109/TCYB.2016.2635122 10.1109/TSMC.2021.3064653 10.1016/j.automatica.2021.109784 10.1109/TAC.2023.3288624 10.1109/TAC.2023.3250094 10.1080/00207721.2025.2476173 10.1109/TCYB.2019.2932460 10.1016/j.agwat.2024.109138 10.1109/TAC.2022.3161259 10.1007/s11432-024-4328-1 10.1109/TII.2016.2607999 |
| ContentType | Journal Article |
| Copyright | 2025 Elsevier B.V. |
| Copyright_xml | – notice: 2025 Elsevier B.V. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.neucom.2025.131570 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| ExternalDocumentID | 10_1016_j_neucom_2025_131570 S0925231225022428 |
| GroupedDBID | --- --K --M .DC .~1 0R~ 123 1B1 1~. 1~5 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JM 9JN AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXLA AAXUO AAYFN AAYWO ABBOA ABCQJ ABFNM ABJNI ABMAC ACDAQ ACGFS ACLOT ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE AEBSH AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGHFR AGUBO AGWIK AGYEJ AHHHB AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP AXJTR BKOJK BLXMC CS3 DU5 EBS EFJIC EFKBS EFLBG EO8 EO9 EP2 EP3 F5P FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W KOM LG9 M41 MO0 MOBAO N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ SDF SDG SDP SES SEW SPC SPCBC SSN SSV SSZ T5K ZMT ~G- ~HD 29N 9DU AAQXK AAYXX ABWVN ABXDB ACNNM ACRPL ADJOM ADMUD ADNMO AGQPQ ASPBG AVWKF AZFZN CITATION EJD FEDTE FGOYB HLZ HVGLF HZ~ R2- SBC WUQ XPP |
| ID | FETCH-LOGICAL-c257t-e7a4cc4e032d29efad586b67413b7486d298eacfe6d2966b716c30e13aeed0bd3 |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001592586600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0925-2312 |
| IngestDate | Sat Nov 29 06:50:44 EST 2025 Wed Dec 10 14:20:16 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Sensor networks Encryption-decryption mechanism Distributed state estimation Round-robin protocol Eavesdropping attacks |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c257t-e7a4cc4e032d29efad586b67413b7486d298eacfe6d2966b716c30e13aeed0bd3 |
| ParticipantIDs | crossref_primary_10_1016_j_neucom_2025_131570 elsevier_sciencedirect_doi_10_1016_j_neucom_2025_131570 |
| PublicationCentury | 2000 |
| PublicationDate | 2025-12-28 |
| PublicationDateYYYYMMDD | 2025-12-28 |
| PublicationDate_xml | – month: 12 year: 2025 text: 2025-12-28 day: 28 |
| PublicationDecade | 2020 |
| PublicationTitle | Neurocomputing (Amsterdam) |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Yang, Xia, Han (bib0035) 2017; 13 Lu, Yang (bib0145) 2022; 67 Ma, Wang, Liu, Alsaadi, Alsaadi (bib0020) 2022; 9 Ding, Tian, Yu (bib0025) 2016; 12 Zou, Wang, Han, Zhou (bib0110) 2019; 64 Sun, Gu, Yue, Xie (bib0160) 2023; 53 Shen, Wang, Wang, Liu (bib0125) 2020; 50 Dias, Bruno (bib0230) 2013; 61 Zhu, Ma, Li, Malekian, Sotelo (bib0090) 2023; 24 Liu, Gong, Zha, Tian, Xie (bib0100) 2024; 32 Li, Wei, Ding, Liu (bib0095) 2022; 52 Huang, Coskun, Karimi, Ding (bib0075) 2024; 110 Xu, Chen, Zhang, Yu (bib0140) 2023; 68 Ali, El-Sappagh, Islam, Ali, Attique, Imran, Kwak (bib0030) 2021; 114 Huang, Zhu, Ding, Mei, Yang, Shi (bib0240) 2025; 72 Reif, Günther, Yaz, Unbehauen (bib0220) 1999; 44 Shang, Chen (bib0200) 2023; 68 Crimson, Kennedy, Quevedo (bib0235) 2025; 171 Geng, Wang, Hu, Dong, Cheng (bib0105) 2023; 53 Yan, Jiao, Pu, Shi, Dai, Liu (bib0005) 2022; 86–87 Hamouda, Puig-Sirera, Bonzi, Remorini, Massai, Rallo (bib0040) 2024; 305 Wang, Kan, Ding, Liu, Gao (bib0070) 2025; 56 Fu, Wen, Niu, Zheng (bib0180) 2024; 19 Hasan, Kuncara, Widyotriatmo, Osen, Bye (bib0135) 2025; 13 Ding, Yang, Zhou, Shi, Chen (bib0185) 2022; 9 Liang, He, Xu (bib0055) 2025 Meng, Chen, Bai, Guo (bib0115) 2025; 161 Meng, Wang, Li, Shen (bib0120) 2025; 4 Zhou, Luo, Liu, Yang (bib0170) 2023; 18 Tao, Ye (bib0175) 2024; 20 Ding, Han, Ge, Zhang, Wang (bib0190) 2025; 68 Li, Wang, Hu, Sheng (bib0215) 2021; 131 Jia, Hu, Li, Liu, Wu (bib0130) 2022; 359 Zhang, Han, Xia, He, Yang (bib0165) 2025; 694 Shu, Zhou, Yang, Zhang (bib0205) 2023; 151 Tong, Ma, Chen, Wei, Shi (bib0085) 2023; 70 Liu, Wang (bib0210) 2021; 66 Liu, Wang, Liu, Coombes, Chen (bib0015) 2022; 8 Jin, Ye (bib0150) 2024; 20 Zheng, Battistelli, Chisci, Yang, Shi (bib0065) 2024; 169 Yang, Coombes, Liu (bib0080) 2023; 9 Zou, Wang, Shen, Dong (bib0195) 2023; 68 Caballero-Águila, Frías-Bustamante, Oya-Lechuga (bib0155) 2025; 4 Gao, Dong, Wang, Han (bib0225) 2022; 52 Liu, Tong, Wang, Bai, Dai (bib0045) 2021; 20 Li, Shen, Wang, Sheng (bib0010) 2020; 113 Xu, Lu, Shi, Li, Xie (bib0060) 2018; 48 Yan, Pan, Hu (bib0050) 2024; 194 Gao (10.1016/j.neucom.2025.131570_bib0225) 2022; 52 Ding (10.1016/j.neucom.2025.131570_bib0025) 2016; 12 Dias (10.1016/j.neucom.2025.131570_bib0230) 2013; 61 Tong (10.1016/j.neucom.2025.131570_bib0085) 2023; 70 Zhou (10.1016/j.neucom.2025.131570_bib0170) 2023; 18 Ding (10.1016/j.neucom.2025.131570_bib0185) 2022; 9 Jia (10.1016/j.neucom.2025.131570_bib0130) 2022; 359 Zhang (10.1016/j.neucom.2025.131570_bib0165) 2025; 694 Shen (10.1016/j.neucom.2025.131570_bib0125) 2020; 50 Shang (10.1016/j.neucom.2025.131570_bib0200) 2023; 68 Liu (10.1016/j.neucom.2025.131570_bib0100) 2024; 32 Liu (10.1016/j.neucom.2025.131570_bib0210) 2021; 66 Crimson (10.1016/j.neucom.2025.131570_bib0235) 2025; 171 Hasan (10.1016/j.neucom.2025.131570_bib0135) 2025; 13 Ding (10.1016/j.neucom.2025.131570_bib0190) 2025; 68 Zou (10.1016/j.neucom.2025.131570_bib0195) 2023; 68 Ma (10.1016/j.neucom.2025.131570_bib0020) 2022; 9 Caballero-Águila (10.1016/j.neucom.2025.131570_bib0155) 2025; 4 Liu (10.1016/j.neucom.2025.131570_bib0045) 2021; 20 Wang (10.1016/j.neucom.2025.131570_bib0070) 2025; 56 Shu (10.1016/j.neucom.2025.131570_bib0205) 2023; 151 Yang (10.1016/j.neucom.2025.131570_bib0035) 2017; 13 Tao (10.1016/j.neucom.2025.131570_bib0175) 2024; 20 Lu (10.1016/j.neucom.2025.131570_bib0145) 2022; 67 Ali (10.1016/j.neucom.2025.131570_bib0030) 2021; 114 Xu (10.1016/j.neucom.2025.131570_bib0140) 2023; 68 Li (10.1016/j.neucom.2025.131570_bib0010) 2020; 113 Huang (10.1016/j.neucom.2025.131570_bib0075) 2024; 110 Li (10.1016/j.neucom.2025.131570_bib0095) 2022; 52 Sun (10.1016/j.neucom.2025.131570_bib0160) 2023; 53 Li (10.1016/j.neucom.2025.131570_bib0215) 2021; 131 Reif (10.1016/j.neucom.2025.131570_bib0220) 1999; 44 Meng (10.1016/j.neucom.2025.131570_bib0115) 2025; 161 Xu (10.1016/j.neucom.2025.131570_bib0060) 2018; 48 Meng (10.1016/j.neucom.2025.131570_bib0120) 2025; 4 Yan (10.1016/j.neucom.2025.131570_bib0050) 2024; 194 Zou (10.1016/j.neucom.2025.131570_bib0110) 2019; 64 Fu (10.1016/j.neucom.2025.131570_bib0180) 2024; 19 Zheng (10.1016/j.neucom.2025.131570_bib0065) 2024; 169 Zhu (10.1016/j.neucom.2025.131570_bib0090) 2023; 24 Liang (10.1016/j.neucom.2025.131570_bib0055) 2025 Geng (10.1016/j.neucom.2025.131570_bib0105) 2023; 53 Huang (10.1016/j.neucom.2025.131570_bib0240) 2025; 72 Yang (10.1016/j.neucom.2025.131570_bib0080) 2023; 9 Jin (10.1016/j.neucom.2025.131570_bib0150) 2024; 20 Hamouda (10.1016/j.neucom.2025.131570_bib0040) 2024; 305 Yan (10.1016/j.neucom.2025.131570_bib0005) 2022; 86–87 Liu (10.1016/j.neucom.2025.131570_bib0015) 2022; 8 |
| References_xml | – volume: 305 year: 2024 ident: bib0040 article-title: Design and validation of a soil moisture-based wireless sensors network for the smart irrigation of a pear orchard publication-title: Agric. Water Manag. – volume: 20 start-page: 2368 year: 2021 end-page: 2382 ident: bib0045 article-title: UAV-aided data collection for information freshness in wireless sensor networks publication-title: IEEE Trans. Wireless Commun. – volume: 13 year: 2025 ident: bib0135 article-title: Secure state estimation and control for autonomous ships under cyberattacks publication-title: Syst. Sci. Control Eng. – volume: 68 start-page: 1 year: 2025 end-page: 17 ident: bib0190 article-title: Privacy-preserving filtering, control and optimization for industrial cyber-physical systems publication-title: Sci. China Inf. Sci. – volume: 72 start-page: 1043 year: 2025 end-page: 1047 ident: bib0240 article-title: An encoding-decoding-based state estimation scheme for state-saturated systems under buffer-aided mechanism publication-title: IEEE Trans. Circuits Syst. II Express Briefs – volume: 68 start-page: 8111 year: 2023 end-page: 8118 ident: bib0195 article-title: Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach publication-title: IEEE Trans. Autom. Control – volume: 66 start-page: 1763 year: 2021 end-page: 1770 ident: bib0210 article-title: Moving-horizon estimation for linear dynamic networks with binary encoding schemes publication-title: IEEE Trans. Autom. Control – volume: 19 start-page: 3483 year: 2024 end-page: 3494 ident: bib0180 article-title: Distributed secure filtering against eavesdropping attacks in SINR-based sensor networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 48 start-page: 336 year: 2018 end-page: 345 ident: bib0060 article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels publication-title: IEEE Trans. Cybern. – volume: 20 start-page: 13147 year: 2024 end-page: 13157 ident: bib0175 article-title: Optimal encryption scheduling policy against eavesdropping attacks in cyber-physical systems publication-title: IEEE Trans. Ind. Inf. – volume: 53 start-page: 2705 year: 2023 end-page: 2715 ident: bib0160 article-title: Event-triggered publication-title: IEEE Trans. Syst. Man Cybern. Syst. – volume: 32 start-page: 721 year: 2024 end-page: 732 ident: bib0100 article-title: Interval type-2 fuzzy-model-based filtering for nonlinear systems with event-triggering weighted try-once-discard protocol and cyberattacks publication-title: IEEE Trans. Fuzzy Syst. – volume: 131 year: 2021 ident: bib0215 article-title: Distributed state and fault estimation over sensor networks with probabilistic quantizations: the dynamic event-triggered case publication-title: Automatica – volume: 13 start-page: 322 year: 2017 end-page: 329 ident: bib0035 article-title: Event-based networked islanding detection for distributed solar PV generation systems publication-title: IEEE Trans. Ind. Inf. – volume: 194 year: 2024 ident: bib0050 article-title: Finite-time annular domain publication-title: Syst. Control Lett. – volume: 110 year: 2024 ident: bib0075 article-title: A distributed state and fault estimation scheme for state-saturated systems with quantized measurements over sensor networks publication-title: Inf. Fusion – volume: 9 start-page: 346 year: 2023 end-page: 356 ident: bib0080 article-title: Mesh-based consensus distributed particle filtering for sensor networks publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 24 start-page: 787 year: 2023 end-page: 800 ident: bib0090 article-title: Dynamic event-triggered adaptive neural output feedback control for MSVs using composite learning publication-title: IEEE Trans. Intell. Transp. Syst. – volume: 68 start-page: 4413 year: 2023 end-page: 4419 ident: bib0200 article-title: Linear encryption against eavesdropping on remote state estimation publication-title: IEEE Trans. Autom. Control – volume: 68 start-page: 7795 year: 2023 end-page: 7802 ident: bib0140 article-title: Distributed anti-eavesdropping fusion estimation under energy constraints publication-title: IEEE Trans. Autom. Control – volume: 20 start-page: 10344 year: 2024 end-page: 10353 ident: bib0150 article-title: False-data injection attacks against distributed filters with improved complete-stealthiness publication-title: IEEE Trans. Ind. Inf. – volume: 151 year: 2023 ident: bib0205 article-title: Distortion-based state security codes for distributed sensor networks publication-title: Automatica – volume: 113 year: 2020 ident: bib0010 article-title: Recursive distributed filtering over sensor networks on Gilbert-Elliott channels: a dynamic event-triggered approach publication-title: Automatica – volume: 64 start-page: 720 year: 2019 end-page: 727 ident: bib0110 article-title: Recursive filtering for time-varying systems with random access protocol publication-title: IEEE Trans. Autom. Control – volume: 4 year: 2025 ident: bib0155 article-title: Least-squares linear estimation for multirate uncertain systems subject to DoS attacks publication-title: Int. J. Netw. Dyn. Intell. – volume: 359 start-page: 5575 year: 2022 end-page: 5595 ident: bib0130 article-title: Recursive state estimation for nonlinear coupling complex networks with time-varying topology and round-robin protocol publication-title: J. Frankl. Inst. – volume: 9 start-page: 1481 year: 2022 end-page: 1492 ident: bib0185 article-title: Privacy preserving via secure summation in distributed Kalman filtering publication-title: IEEE Trans. Control Netw. Syst. – volume: 18 start-page: 2250 year: 2023 end-page: 2261 ident: bib0170 article-title: Eavesdropping strategies for remote state estimation under communication constraints publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 52 start-page: 11121 year: 2022 end-page: 11132 ident: bib0225 article-title: Recursive minimum-variance filter design for state-saturated complex networks with uncertain coupling strengths subject to deception attacks publication-title: IEEE Trans. Cybern. – volume: 61 start-page: 3632 year: 2013 end-page: 3646 ident: bib0230 article-title: Cooperative target tracking using decentralized particle filtering and RSS sensors publication-title: IEEE Trans. Signal Process. – volume: 86–87 start-page: 104 year: 2022 end-page: 115 ident: bib0005 article-title: Radar sensor network resource allocation for fused target tracking: a brief review publication-title: Inf. Fusion – year: 2025 ident: bib0055 article-title: Distributed publication-title: Int. J. Syst. Sci. – volume: 53 start-page: 7760 year: 2023 end-page: 7772 ident: bib0105 article-title: Distributed recursive filtering over sensor networks under random access protocol: when state saturation meets censored measurement publication-title: IEEE Trans. Cybern. – volume: 4 year: 2025 ident: bib0120 article-title: Unscented Kalman filtering for nonlinear systems with stochastic nonlinearities under FlexRay protocol publication-title: Int. J. Netw. Dyn. Intell. – volume: 44 start-page: 714 year: 1999 end-page: 728 ident: bib0220 article-title: Stochastic stability of the discrete-time extended Kalman filter publication-title: IEEE Trans. Autom. Control – volume: 52 start-page: 3704 year: 2022 end-page: 3713 ident: bib0095 article-title: Recursive filtering for time-varying discrete sequential systems subject to deception attacks: weighted try-once-discard protocol publication-title: IEEE Trans. Syst. Man Cybern. Syst. – volume: 50 start-page: 3605 year: 2020 end-page: 3615 ident: bib0125 article-title: Distributed state-saturated recursive filtering over sensor networks under round-robin protocol publication-title: IEEE Trans. Cybern. – volume: 67 start-page: 4529 year: 2022 end-page: 4540 ident: bib0145 article-title: False data injection attacks against state estimation without knowledge of estimators publication-title: IEEE Trans. Autom. Control – volume: 694 year: 2025 ident: bib0165 article-title: predictive control for 2-D Roesser model under multiple denial-of-service attacks publication-title: Inf. Sci. – volume: 114 start-page: 23 year: 2021 end-page: 43 ident: bib0030 article-title: An intelligent healthcare monitoring framework using wearable sensors and social networking data publication-title: Futur. Gener. Comput. Syst. – volume: 12 start-page: 1232 year: 2016 end-page: 1242 ident: bib0025 article-title: A real-time big data gathering algorithm based on indoor wireless sensor networks for risk analysis of industrial operations publication-title: IEEE Trans. Ind. Inf. – volume: 56 start-page: 1347 year: 2025 end-page: 1359 ident: bib0070 article-title: Distributed correntropy Kalman filtering over sensor networks with FlexRay-based protocols publication-title: Int. J. Syst. Sci. – volume: 161 start-page: 145 year: 2025 end-page: 154 ident: bib0115 article-title: Distributed filtering for nonlinear time-varying systems with Byzantine attacks and innovation constraints: a FlexRay scheduling mechanism publication-title: ISA Trans. – volume: 9 start-page: 1395 year: 2022 end-page: 1408 ident: bib0020 article-title: Neural-network-based filtering for a general class of nonlinear systems under dynamically bounded innovations over sensor networks publication-title: IEEE Trans. Netw. Sci. Eng. – volume: 70 start-page: 2176 year: 2023 end-page: 2180 ident: bib0085 article-title: Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks publication-title: IEEE Trans. Circuits Syst. II Express Briefs – volume: 8 start-page: 883 year: 2022 end-page: 893 ident: bib0015 article-title: Auxiliary particle filtering over sensor networks under protocols of amplify-and-forward and decode-and-forward relays publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 169 year: 2024 ident: bib0065 article-title: Distributed state estimation for heterogeneous sensor networks publication-title: Automatica – volume: 171 year: 2025 ident: bib0235 article-title: Remote state estimation with privacy against active eavesdroppers publication-title: Automatica – volume: 4 issue: 2 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0120 article-title: Unscented Kalman filtering for nonlinear systems with stochastic nonlinearities under FlexRay protocol publication-title: Int. J. Netw. Dyn. Intell. – volume: 53 start-page: 2705 issue: 5 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0160 article-title: Event-triggeredH∞filtering for cyber-physical systems against DoS attacks publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2022.3218023 – volume: 20 start-page: 10344 issue: 8 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0150 article-title: False-data injection attacks against distributed filters with improved complete-stealthiness publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2024.3393501 – volume: 52 start-page: 11121 issue: 10 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0225 article-title: Recursive minimum-variance filter design for state-saturated complex networks with uncertain coupling strengths subject to deception attacks publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2021.3067822 – volume: 151 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0205 article-title: Distortion-based state security codes for distributed sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2023.110904 – volume: 113 year: 2020 ident: 10.1016/j.neucom.2025.131570_bib0010 article-title: Recursive distributed filtering over sensor networks on Gilbert-Elliott channels: a dynamic event-triggered approach publication-title: Automatica doi: 10.1016/j.automatica.2019.108681 – volume: 64 start-page: 720 issue: 2 year: 2019 ident: 10.1016/j.neucom.2025.131570_bib0110 article-title: Recursive filtering for time-varying systems with random access protocol publication-title: IEEE Trans. Autom. Control – volume: 9 start-page: 1481 issue: 3 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0185 article-title: Privacy preserving via secure summation in distributed Kalman filtering publication-title: IEEE Trans. Control Netw. Syst. doi: 10.1109/TCNS.2022.3155109 – volume: 72 start-page: 1043 issue: 8 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0240 article-title: An encoding-decoding-based state estimation scheme for state-saturated systems under buffer-aided mechanism publication-title: IEEE Trans. Circuits Syst. II Express Briefs – volume: 114 start-page: 23 year: 2021 ident: 10.1016/j.neucom.2025.131570_bib0030 article-title: An intelligent healthcare monitoring framework using wearable sensors and social networking data publication-title: Futur. Gener. Comput. Syst. doi: 10.1016/j.future.2020.07.047 – volume: 161 start-page: 145 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0115 article-title: Distributed filtering for nonlinear time-varying systems with Byzantine attacks and innovation constraints: a FlexRay scheduling mechanism publication-title: ISA Trans. doi: 10.1016/j.isatra.2025.04.005 – volume: 44 start-page: 714 issue: 4 year: 1999 ident: 10.1016/j.neucom.2025.131570_bib0220 article-title: Stochastic stability of the discrete-time extended Kalman filter publication-title: IEEE Trans. Autom. Control doi: 10.1109/9.754809 – volume: 110 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0075 article-title: A distributed state and fault estimation scheme for state-saturated systems with quantized measurements over sensor networks publication-title: Inf. Fusion doi: 10.1016/j.inffus.2024.102452 – volume: 32 start-page: 721 issue: 3 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0100 article-title: Interval type-2 fuzzy-model-based filtering for nonlinear systems with event-triggering weighted try-once-discard protocol and cyberattacks publication-title: IEEE Trans. Fuzzy Syst. doi: 10.1109/TFUZZ.2023.3305088 – volume: 359 start-page: 5575 issue: 11 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0130 article-title: Recursive state estimation for nonlinear coupling complex networks with time-varying topology and round-robin protocol publication-title: J. Frankl. Inst. doi: 10.1016/j.jfranklin.2022.05.009 – volume: 169 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0065 article-title: Distributed state estimation for heterogeneous sensor networks publication-title: Automatica doi: 10.1016/j.automatica.2024.111839 – volume: 66 start-page: 1763 issue: 4 year: 2021 ident: 10.1016/j.neucom.2025.131570_bib0210 article-title: Moving-horizon estimation for linear dynamic networks with binary encoding schemes publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2020.2996579 – volume: 171 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0235 article-title: Remote state estimation with privacy against active eavesdroppers publication-title: Automatica doi: 10.1016/j.automatica.2024.111932 – volume: 20 start-page: 13147 issue: 11 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0175 article-title: Optimal encryption scheduling policy against eavesdropping attacks in cyber-physical systems publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2024.3431096 – volume: 18 start-page: 2250 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0170 article-title: Eavesdropping strategies for remote state estimation under communication constraints publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2023.3265343 – volume: 194 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0050 article-title: Finite-time annular domain H2/H∞ filtering for mean-field stochastic systems with Wiener and Poisson noises publication-title: Syst. Control Lett. doi: 10.1016/j.sysconle.2024.105959 – volume: 61 start-page: 3632 issue: 14 year: 2013 ident: 10.1016/j.neucom.2025.131570_bib0230 article-title: Cooperative target tracking using decentralized particle filtering and RSS sensors publication-title: IEEE Trans. Signal Process. doi: 10.1109/TSP.2013.2262276 – volume: 86–87 start-page: 104 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0005 article-title: Radar sensor network resource allocation for fused target tracking: a brief review publication-title: Inf. Fusion doi: 10.1016/j.inffus.2022.06.009 – volume: 9 start-page: 346 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0080 article-title: Mesh-based consensus distributed particle filtering for sensor networks publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 24 start-page: 787 issue: 1 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0090 article-title: Dynamic event-triggered adaptive neural output feedback control for MSVs using composite learning publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2022.3217152 – volume: 13 issue: 1 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0135 article-title: Secure state estimation and control for autonomous ships under cyberattacks publication-title: Syst. Sci. Control Eng. – volume: 694 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0165 article-title: H∞ predictive control for 2-D Roesser model under multiple denial-of-service attacks publication-title: Inf. Sci. doi: 10.1016/j.ins.2024.121706 – volume: 53 start-page: 7760 issue: 12 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0105 article-title: Distributed recursive filtering over sensor networks under random access protocol: when state saturation meets censored measurement publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2022.3209793 – volume: 4 issue: 2 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0155 article-title: Least-squares linear estimation for multirate uncertain systems subject to DoS attacks publication-title: Int. J. Netw. Dyn. Intell. – volume: 56 start-page: 1347 issue: 6 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0070 article-title: Distributed correntropy Kalman filtering over sensor networks with FlexRay-based protocols publication-title: Int. J. Syst. Sci. doi: 10.1080/00207721.2024.2423033 – volume: 9 start-page: 1395 issue: 3 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0020 article-title: Neural-network-based filtering for a general class of nonlinear systems under dynamically bounded innovations over sensor networks publication-title: IEEE Trans. Netw. Sci. Eng. doi: 10.1109/TNSE.2022.3144484 – volume: 20 start-page: 2368 issue: 4 year: 2021 ident: 10.1016/j.neucom.2025.131570_bib0045 article-title: UAV-aided data collection for information freshness in wireless sensor networks publication-title: IEEE Trans. Wireless Commun. doi: 10.1109/TWC.2020.3041750 – volume: 12 start-page: 1232 issue: 3 year: 2016 ident: 10.1016/j.neucom.2025.131570_bib0025 article-title: A real-time big data gathering algorithm based on indoor wireless sensor networks for risk analysis of industrial operations publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2015.2436337 – volume: 19 start-page: 3483 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0180 article-title: Distributed secure filtering against eavesdropping attacks in SINR-based sensor networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2024.3361177 – volume: 48 start-page: 336 issue: 1 year: 2018 ident: 10.1016/j.neucom.2025.131570_bib0060 article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2016.2635122 – volume: 8 start-page: 883 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0015 article-title: Auxiliary particle filtering over sensor networks under protocols of amplify-and-forward and decode-and-forward relays publication-title: IEEE Trans. Signal Inf. Process. Netw. – volume: 70 start-page: 2176 issue: 6 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0085 article-title: Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks publication-title: IEEE Trans. Circuits Syst. II Express Briefs – volume: 52 start-page: 3704 issue: 6 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0095 article-title: Recursive filtering for time-varying discrete sequential systems subject to deception attacks: weighted try-once-discard protocol publication-title: IEEE Trans. Syst. Man Cybern. Syst. doi: 10.1109/TSMC.2021.3064653 – volume: 131 year: 2021 ident: 10.1016/j.neucom.2025.131570_bib0215 article-title: Distributed state and fault estimation over sensor networks with probabilistic quantizations: the dynamic event-triggered case publication-title: Automatica doi: 10.1016/j.automatica.2021.109784 – volume: 68 start-page: 8111 issue: 12 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0195 article-title: Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2023.3288624 – volume: 68 start-page: 7795 issue: 12 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0140 article-title: Distributed anti-eavesdropping fusion estimation under energy constraints publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2023.3250094 – year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0055 article-title: DistributedH∞moving horizon estimation over energy harvesting sensor networks publication-title: Int. J. Syst. Sci. doi: 10.1080/00207721.2025.2476173 – volume: 50 start-page: 3605 issue: 8 year: 2020 ident: 10.1016/j.neucom.2025.131570_bib0125 article-title: Distributed state-saturated recursive filtering over sensor networks under round-robin protocol publication-title: IEEE Trans. Cybern. doi: 10.1109/TCYB.2019.2932460 – volume: 305 year: 2024 ident: 10.1016/j.neucom.2025.131570_bib0040 article-title: Design and validation of a soil moisture-based wireless sensors network for the smart irrigation of a pear orchard publication-title: Agric. Water Manag. doi: 10.1016/j.agwat.2024.109138 – volume: 67 start-page: 4529 issue: 9 year: 2022 ident: 10.1016/j.neucom.2025.131570_bib0145 article-title: False data injection attacks against state estimation without knowledge of estimators publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2022.3161259 – volume: 68 start-page: 4413 issue: 7 year: 2023 ident: 10.1016/j.neucom.2025.131570_bib0200 article-title: Linear encryption against eavesdropping on remote state estimation publication-title: IEEE Trans. Autom. Control – volume: 68 start-page: 1 issue: 4 year: 2025 ident: 10.1016/j.neucom.2025.131570_bib0190 article-title: Privacy-preserving filtering, control and optimization for industrial cyber-physical systems publication-title: Sci. China Inf. Sci. doi: 10.1007/s11432-024-4328-1 – volume: 13 start-page: 322 issue: 1 year: 2017 ident: 10.1016/j.neucom.2025.131570_bib0035 article-title: Event-based networked islanding detection for distributed solar PV generation systems publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2016.2607999 |
| SSID | ssj0017129 |
| Score | 2.4606354 |
| Snippet | The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 131570 |
| SubjectTerms | Distributed state estimation Eavesdropping attacks Encryption-decryption mechanism Round-robin protocol Sensor networks |
| Title | Encryption-decryption-based distributed state estimation against eavesdropping attacks over sensor networks with communication protocol |
| URI | https://dx.doi.org/10.1016/j.neucom.2025.131570 |
| Volume | 658 |
| WOSCitedRecordID | wos001592586600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect issn: 0925-2312 databaseCode: AIEXJ dateStart: 19950101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: false ssIdentifier: ssj0017129 providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKLgcuvBHLSz5wi7LK2_axQkXLCq2QWKCcIsd2UFe7SZWmpfwCLvxoxq-0pWgFSFwiy3KcKPNp_Hky3xihl4niGY0UDYWKKGxQBAurrGJhTpiE9Tln3ARzPr4lZ2d0OmXvRqMfXguzuiRNQ9drNv-vpoY-MLaWzv6FuYdJoQPaYHS4gtnh-keGnzSi-2YcQSjV0NSrldS_Y-wJV9A2UqJAF9mw6sWAf-EzIIuB4iu1kF07N1Iq3vdahh_oVM9gAZvetgsamzu-8InrWxoTnfDVt6K93Ga9pgKIMOdHuMjE-EoXaJAajUMk4rMLXU9nHDyyW1FN5oF1jZ82qrUhzH0C49bLve7TGf_qRruIRpLr7BCnEDdhtj2pjY1XwkAgozuuu7Bl3_eWARuRuDhu1FLnBOmHHMdpnNszSn4psP1eT61nBjYIhCahN9BhQnIGbv5w_GYyPR3-SpE4sbUb3at4KabJF9x_1u-pzhZ9Ob-Lbrt9Bx5bvNxDI9XcR3f8mR7YufgH6Ps18MFb8MEGPngDH-zgg3fggx18sIYPtvDBHj5YwwfvwAd7-DxEH15Pzl-dhO6wjlCA1-9DRXgmRKaiNJEJUzWXOS2qAghrWpGMFtBJYZGvlW4VRQX7dJFGKk45sLSokukjdNC0jXqMcEzAs_CUSVbXGWxpq1oIwhMaxzzlVSyOUOi_azm3NVlKn6x4UVo7lNoOpbXDESL-45eOV1q-WAJerr3zyT_f-RTd2kD7GTrou6V6jm6KVT9bdC8csH4Cf6Oqtw |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encryption-decryption-based+distributed+state+estimation+against+eavesdropping+attacks+over+sensor+networks+with+communication+protocol&rft.jtitle=Neurocomputing+%28Amsterdam%29&rft.au=Yang%2C+Xiaolong&rft.au=Chen%2C+Wen&rft.au=Zhang%2C+Hongxu&rft.au=Zhang%2C+Jiawen&rft.date=2025-12-28&rft.pub=Elsevier+B.V&rft.issn=0925-2312&rft.volume=658&rft_id=info:doi/10.1016%2Fj.neucom.2025.131570&rft.externalDocID=S0925231225022428 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0925-2312&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0925-2312&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0925-2312&client=summon |