Encryption-decryption-based distributed state estimation against eavesdropping attacks over sensor networks with communication protocol

The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Neurocomputing (Amsterdam) Ročník 658; s. 131570
Hlavní autoři: Yang, Xiaolong, Chen, Wen, Zhang, Hongxu, Zhang, Jiawen, Guo, Yuxin
Médium: Journal Article
Jazyk:angličtina
Vydáno: Elsevier B.V 28.12.2025
Témata:
ISSN:0925-2312
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule the transmission order of the measurement data. To mitigate privacy leakage, an encryptor is designed to encrypt the measurement information of each sensor node, and then the encrypted measurements can be decrypted by the user. The primary objective of this paper is to present a distributed state estimation algorithm with recursive format for such time-varying systems, in which an upper bound on the estimation error covariance is derived, and appropriate estimator gains are determined to minimize this upper bound. In addition, a sufficient condition is provided to ensure that the estimation error of the user is exponentially bounded in the mean-square sense. Particularly, the properly designed encryption–decryption parameters guarantee that the state estimation error of the eavesdropper is unbounded. Finally, two simulation experiments are conducted to demonstrate the feasibility of the developed encryption–decryption-based distributed state estimation algorithm. •A new distributed state estimation problem is developed by handling the EDM and the RR protocol.•A sufficient condition is established to guarantee exponential boundedness of estimation error at the user side.•The encryption-decryption parameters are designed to ensure unboundedness of state estimation error for eavesdropper.
AbstractList The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by encryption–decryption mechanism and round-robin protocol. To save energy and alleviate network congestion, the round-robin protocol is introduced to schedule the transmission order of the measurement data. To mitigate privacy leakage, an encryptor is designed to encrypt the measurement information of each sensor node, and then the encrypted measurements can be decrypted by the user. The primary objective of this paper is to present a distributed state estimation algorithm with recursive format for such time-varying systems, in which an upper bound on the estimation error covariance is derived, and appropriate estimator gains are determined to minimize this upper bound. In addition, a sufficient condition is provided to ensure that the estimation error of the user is exponentially bounded in the mean-square sense. Particularly, the properly designed encryption–decryption parameters guarantee that the state estimation error of the eavesdropper is unbounded. Finally, two simulation experiments are conducted to demonstrate the feasibility of the developed encryption–decryption-based distributed state estimation algorithm. •A new distributed state estimation problem is developed by handling the EDM and the RR protocol.•A sufficient condition is established to guarantee exponential boundedness of estimation error at the user side.•The encryption-decryption parameters are designed to ensure unboundedness of state estimation error for eavesdropper.
ArticleNumber 131570
Author Yang, Xiaolong
Guo, Yuxin
Chen, Wen
Zhang, Hongxu
Zhang, Jiawen
Author_xml – sequence: 1
  givenname: Xiaolong
  surname: Yang
  fullname: Yang, Xiaolong
  organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China
– sequence: 2
  givenname: Wen
  surname: Chen
  fullname: Chen, Wen
  email: chenwen@hrbust.edu.cn
  organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China
– sequence: 3
  givenname: Hongxu
  surname: Zhang
  fullname: Zhang, Hongxu
  organization: Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China
– sequence: 4
  givenname: Jiawen
  surname: Zhang
  fullname: Zhang, Jiawen
  organization: Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China
– sequence: 5
  givenname: Yuxin
  surname: Guo
  fullname: Guo, Yuxin
  organization: School of Automation, Harbin University of Science and Technology, Harbin 150080, China
BookMark eNp9kMtOwzAQRb0oEm3hD1j4BxL8yKPdIKGqPKRKbGBtOfakuLR25HFb9Qv4bRIFsWQ1V6O5V3fOjEx88EDIHWc5Z7y63-UejiYccsFEmXPJy5pNyJQtRZkJycU1mSHuGOM1F8sp-V57Ey9dcsFnFv5koxEstQ5TdM0x9RqTTkABkzvo4YTqrXYeEwV9ArQxdJ3zW6pT0uYLaThBpAgeQ6Qe0jnEfnl26ZP23Q5H78yY0sWQggn7G3LV6j3C7e-ck4-n9fvqJdu8Pb-uHjeZEWWdMqh1YUwBTAorltBqWy6qpqoLLpu6WFT9cgHatDCoqmpqXhnJgEsNYFlj5ZwUY66JATFCq7rYfxQvijM1AFQ7NQJUA0A1AuxtD6MN-m4nB1GhceANWBfBJGWD-z_gBwkEhao
Cites_doi 10.1109/TSMC.2022.3218023
10.1109/TII.2024.3393501
10.1109/TCYB.2021.3067822
10.1016/j.automatica.2023.110904
10.1016/j.automatica.2019.108681
10.1109/TCNS.2022.3155109
10.1016/j.future.2020.07.047
10.1016/j.isatra.2025.04.005
10.1109/9.754809
10.1016/j.inffus.2024.102452
10.1109/TFUZZ.2023.3305088
10.1016/j.jfranklin.2022.05.009
10.1016/j.automatica.2024.111839
10.1109/TAC.2020.2996579
10.1016/j.automatica.2024.111932
10.1109/TII.2024.3431096
10.1109/TIFS.2023.3265343
10.1016/j.sysconle.2024.105959
10.1109/TSP.2013.2262276
10.1016/j.inffus.2022.06.009
10.1109/TITS.2022.3217152
10.1016/j.ins.2024.121706
10.1109/TCYB.2022.3209793
10.1080/00207721.2024.2423033
10.1109/TNSE.2022.3144484
10.1109/TWC.2020.3041750
10.1109/TII.2015.2436337
10.1109/TIFS.2024.3361177
10.1109/TCYB.2016.2635122
10.1109/TSMC.2021.3064653
10.1016/j.automatica.2021.109784
10.1109/TAC.2023.3288624
10.1109/TAC.2023.3250094
10.1080/00207721.2025.2476173
10.1109/TCYB.2019.2932460
10.1016/j.agwat.2024.109138
10.1109/TAC.2022.3161259
10.1007/s11432-024-4328-1
10.1109/TII.2016.2607999
ContentType Journal Article
Copyright 2025 Elsevier B.V.
Copyright_xml – notice: 2025 Elsevier B.V.
DBID AAYXX
CITATION
DOI 10.1016/j.neucom.2025.131570
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
ExternalDocumentID 10_1016_j_neucom_2025_131570
S0925231225022428
GroupedDBID ---
--K
--M
.DC
.~1
0R~
123
1B1
1~.
1~5
4.4
457
4G.
53G
5VS
7-5
71M
8P~
9JM
9JN
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXLA
AAXUO
AAYFN
AAYWO
ABBOA
ABCQJ
ABFNM
ABJNI
ABMAC
ACDAQ
ACGFS
ACLOT
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
AEBSH
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AFXIZ
AGHFR
AGUBO
AGWIK
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFKBS
EFLBG
EO8
EO9
EP2
EP3
F5P
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
KOM
LG9
M41
MO0
MOBAO
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSN
SSV
SSZ
T5K
ZMT
~G-
~HD
29N
9DU
AAQXK
AAYXX
ABWVN
ABXDB
ACNNM
ACRPL
ADJOM
ADMUD
ADNMO
AGQPQ
ASPBG
AVWKF
AZFZN
CITATION
EJD
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
SBC
WUQ
XPP
ID FETCH-LOGICAL-c257t-e7a4cc4e032d29efad586b67413b7486d298eacfe6d2966b716c30e13aeed0bd3
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001592586600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0925-2312
IngestDate Sat Nov 29 06:50:44 EST 2025
Wed Dec 10 14:20:16 EST 2025
IsPeerReviewed true
IsScholarly true
Keywords Sensor networks
Encryption-decryption mechanism
Distributed state estimation
Round-robin protocol
Eavesdropping attacks
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c257t-e7a4cc4e032d29efad586b67413b7486d298eacfe6d2966b716c30e13aeed0bd3
ParticipantIDs crossref_primary_10_1016_j_neucom_2025_131570
elsevier_sciencedirect_doi_10_1016_j_neucom_2025_131570
PublicationCentury 2000
PublicationDate 2025-12-28
PublicationDateYYYYMMDD 2025-12-28
PublicationDate_xml – month: 12
  year: 2025
  text: 2025-12-28
  day: 28
PublicationDecade 2020
PublicationTitle Neurocomputing (Amsterdam)
PublicationYear 2025
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Yang, Xia, Han (bib0035) 2017; 13
Lu, Yang (bib0145) 2022; 67
Ma, Wang, Liu, Alsaadi, Alsaadi (bib0020) 2022; 9
Ding, Tian, Yu (bib0025) 2016; 12
Zou, Wang, Han, Zhou (bib0110) 2019; 64
Sun, Gu, Yue, Xie (bib0160) 2023; 53
Shen, Wang, Wang, Liu (bib0125) 2020; 50
Dias, Bruno (bib0230) 2013; 61
Zhu, Ma, Li, Malekian, Sotelo (bib0090) 2023; 24
Liu, Gong, Zha, Tian, Xie (bib0100) 2024; 32
Li, Wei, Ding, Liu (bib0095) 2022; 52
Huang, Coskun, Karimi, Ding (bib0075) 2024; 110
Xu, Chen, Zhang, Yu (bib0140) 2023; 68
Ali, El-Sappagh, Islam, Ali, Attique, Imran, Kwak (bib0030) 2021; 114
Huang, Zhu, Ding, Mei, Yang, Shi (bib0240) 2025; 72
Reif, Günther, Yaz, Unbehauen (bib0220) 1999; 44
Shang, Chen (bib0200) 2023; 68
Crimson, Kennedy, Quevedo (bib0235) 2025; 171
Geng, Wang, Hu, Dong, Cheng (bib0105) 2023; 53
Yan, Jiao, Pu, Shi, Dai, Liu (bib0005) 2022; 86–87
Hamouda, Puig-Sirera, Bonzi, Remorini, Massai, Rallo (bib0040) 2024; 305
Wang, Kan, Ding, Liu, Gao (bib0070) 2025; 56
Fu, Wen, Niu, Zheng (bib0180) 2024; 19
Hasan, Kuncara, Widyotriatmo, Osen, Bye (bib0135) 2025; 13
Ding, Yang, Zhou, Shi, Chen (bib0185) 2022; 9
Liang, He, Xu (bib0055) 2025
Meng, Chen, Bai, Guo (bib0115) 2025; 161
Meng, Wang, Li, Shen (bib0120) 2025; 4
Zhou, Luo, Liu, Yang (bib0170) 2023; 18
Tao, Ye (bib0175) 2024; 20
Ding, Han, Ge, Zhang, Wang (bib0190) 2025; 68
Li, Wang, Hu, Sheng (bib0215) 2021; 131
Jia, Hu, Li, Liu, Wu (bib0130) 2022; 359
Zhang, Han, Xia, He, Yang (bib0165) 2025; 694
Shu, Zhou, Yang, Zhang (bib0205) 2023; 151
Tong, Ma, Chen, Wei, Shi (bib0085) 2023; 70
Liu, Wang (bib0210) 2021; 66
Liu, Wang, Liu, Coombes, Chen (bib0015) 2022; 8
Jin, Ye (bib0150) 2024; 20
Zheng, Battistelli, Chisci, Yang, Shi (bib0065) 2024; 169
Yang, Coombes, Liu (bib0080) 2023; 9
Zou, Wang, Shen, Dong (bib0195) 2023; 68
Caballero-Águila, Frías-Bustamante, Oya-Lechuga (bib0155) 2025; 4
Gao, Dong, Wang, Han (bib0225) 2022; 52
Liu, Tong, Wang, Bai, Dai (bib0045) 2021; 20
Li, Shen, Wang, Sheng (bib0010) 2020; 113
Xu, Lu, Shi, Li, Xie (bib0060) 2018; 48
Yan, Pan, Hu (bib0050) 2024; 194
Gao (10.1016/j.neucom.2025.131570_bib0225) 2022; 52
Ding (10.1016/j.neucom.2025.131570_bib0025) 2016; 12
Dias (10.1016/j.neucom.2025.131570_bib0230) 2013; 61
Tong (10.1016/j.neucom.2025.131570_bib0085) 2023; 70
Zhou (10.1016/j.neucom.2025.131570_bib0170) 2023; 18
Ding (10.1016/j.neucom.2025.131570_bib0185) 2022; 9
Jia (10.1016/j.neucom.2025.131570_bib0130) 2022; 359
Zhang (10.1016/j.neucom.2025.131570_bib0165) 2025; 694
Shen (10.1016/j.neucom.2025.131570_bib0125) 2020; 50
Shang (10.1016/j.neucom.2025.131570_bib0200) 2023; 68
Liu (10.1016/j.neucom.2025.131570_bib0100) 2024; 32
Liu (10.1016/j.neucom.2025.131570_bib0210) 2021; 66
Crimson (10.1016/j.neucom.2025.131570_bib0235) 2025; 171
Hasan (10.1016/j.neucom.2025.131570_bib0135) 2025; 13
Ding (10.1016/j.neucom.2025.131570_bib0190) 2025; 68
Zou (10.1016/j.neucom.2025.131570_bib0195) 2023; 68
Ma (10.1016/j.neucom.2025.131570_bib0020) 2022; 9
Caballero-Águila (10.1016/j.neucom.2025.131570_bib0155) 2025; 4
Liu (10.1016/j.neucom.2025.131570_bib0045) 2021; 20
Wang (10.1016/j.neucom.2025.131570_bib0070) 2025; 56
Shu (10.1016/j.neucom.2025.131570_bib0205) 2023; 151
Yang (10.1016/j.neucom.2025.131570_bib0035) 2017; 13
Tao (10.1016/j.neucom.2025.131570_bib0175) 2024; 20
Lu (10.1016/j.neucom.2025.131570_bib0145) 2022; 67
Ali (10.1016/j.neucom.2025.131570_bib0030) 2021; 114
Xu (10.1016/j.neucom.2025.131570_bib0140) 2023; 68
Li (10.1016/j.neucom.2025.131570_bib0010) 2020; 113
Huang (10.1016/j.neucom.2025.131570_bib0075) 2024; 110
Li (10.1016/j.neucom.2025.131570_bib0095) 2022; 52
Sun (10.1016/j.neucom.2025.131570_bib0160) 2023; 53
Li (10.1016/j.neucom.2025.131570_bib0215) 2021; 131
Reif (10.1016/j.neucom.2025.131570_bib0220) 1999; 44
Meng (10.1016/j.neucom.2025.131570_bib0115) 2025; 161
Xu (10.1016/j.neucom.2025.131570_bib0060) 2018; 48
Meng (10.1016/j.neucom.2025.131570_bib0120) 2025; 4
Yan (10.1016/j.neucom.2025.131570_bib0050) 2024; 194
Zou (10.1016/j.neucom.2025.131570_bib0110) 2019; 64
Fu (10.1016/j.neucom.2025.131570_bib0180) 2024; 19
Zheng (10.1016/j.neucom.2025.131570_bib0065) 2024; 169
Zhu (10.1016/j.neucom.2025.131570_bib0090) 2023; 24
Liang (10.1016/j.neucom.2025.131570_bib0055) 2025
Geng (10.1016/j.neucom.2025.131570_bib0105) 2023; 53
Huang (10.1016/j.neucom.2025.131570_bib0240) 2025; 72
Yang (10.1016/j.neucom.2025.131570_bib0080) 2023; 9
Jin (10.1016/j.neucom.2025.131570_bib0150) 2024; 20
Hamouda (10.1016/j.neucom.2025.131570_bib0040) 2024; 305
Yan (10.1016/j.neucom.2025.131570_bib0005) 2022; 86–87
Liu (10.1016/j.neucom.2025.131570_bib0015) 2022; 8
References_xml – volume: 305
  year: 2024
  ident: bib0040
  article-title: Design and validation of a soil moisture-based wireless sensors network for the smart irrigation of a pear orchard
  publication-title: Agric. Water Manag.
– volume: 20
  start-page: 2368
  year: 2021
  end-page: 2382
  ident: bib0045
  article-title: UAV-aided data collection for information freshness in wireless sensor networks
  publication-title: IEEE Trans. Wireless Commun.
– volume: 13
  year: 2025
  ident: bib0135
  article-title: Secure state estimation and control for autonomous ships under cyberattacks
  publication-title: Syst. Sci. Control Eng.
– volume: 68
  start-page: 1
  year: 2025
  end-page: 17
  ident: bib0190
  article-title: Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
  publication-title: Sci. China Inf. Sci.
– volume: 72
  start-page: 1043
  year: 2025
  end-page: 1047
  ident: bib0240
  article-title: An encoding-decoding-based state estimation scheme for state-saturated systems under buffer-aided mechanism
  publication-title: IEEE Trans. Circuits Syst. II Express Briefs
– volume: 68
  start-page: 8111
  year: 2023
  end-page: 8118
  ident: bib0195
  article-title: Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach
  publication-title: IEEE Trans. Autom. Control
– volume: 66
  start-page: 1763
  year: 2021
  end-page: 1770
  ident: bib0210
  article-title: Moving-horizon estimation for linear dynamic networks with binary encoding schemes
  publication-title: IEEE Trans. Autom. Control
– volume: 19
  start-page: 3483
  year: 2024
  end-page: 3494
  ident: bib0180
  article-title: Distributed secure filtering against eavesdropping attacks in SINR-based sensor networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 48
  start-page: 336
  year: 2018
  end-page: 345
  ident: bib0060
  article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels
  publication-title: IEEE Trans. Cybern.
– volume: 20
  start-page: 13147
  year: 2024
  end-page: 13157
  ident: bib0175
  article-title: Optimal encryption scheduling policy against eavesdropping attacks in cyber-physical systems
  publication-title: IEEE Trans. Ind. Inf.
– volume: 53
  start-page: 2705
  year: 2023
  end-page: 2715
  ident: bib0160
  article-title: Event-triggered
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
– volume: 32
  start-page: 721
  year: 2024
  end-page: 732
  ident: bib0100
  article-title: Interval type-2 fuzzy-model-based filtering for nonlinear systems with event-triggering weighted try-once-discard protocol and cyberattacks
  publication-title: IEEE Trans. Fuzzy Syst.
– volume: 131
  year: 2021
  ident: bib0215
  article-title: Distributed state and fault estimation over sensor networks with probabilistic quantizations: the dynamic event-triggered case
  publication-title: Automatica
– volume: 13
  start-page: 322
  year: 2017
  end-page: 329
  ident: bib0035
  article-title: Event-based networked islanding detection for distributed solar PV generation systems
  publication-title: IEEE Trans. Ind. Inf.
– volume: 194
  year: 2024
  ident: bib0050
  article-title: Finite-time annular domain
  publication-title: Syst. Control Lett.
– volume: 110
  year: 2024
  ident: bib0075
  article-title: A distributed state and fault estimation scheme for state-saturated systems with quantized measurements over sensor networks
  publication-title: Inf. Fusion
– volume: 9
  start-page: 346
  year: 2023
  end-page: 356
  ident: bib0080
  article-title: Mesh-based consensus distributed particle filtering for sensor networks
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 24
  start-page: 787
  year: 2023
  end-page: 800
  ident: bib0090
  article-title: Dynamic event-triggered adaptive neural output feedback control for MSVs using composite learning
  publication-title: IEEE Trans. Intell. Transp. Syst.
– volume: 68
  start-page: 4413
  year: 2023
  end-page: 4419
  ident: bib0200
  article-title: Linear encryption against eavesdropping on remote state estimation
  publication-title: IEEE Trans. Autom. Control
– volume: 68
  start-page: 7795
  year: 2023
  end-page: 7802
  ident: bib0140
  article-title: Distributed anti-eavesdropping fusion estimation under energy constraints
  publication-title: IEEE Trans. Autom. Control
– volume: 20
  start-page: 10344
  year: 2024
  end-page: 10353
  ident: bib0150
  article-title: False-data injection attacks against distributed filters with improved complete-stealthiness
  publication-title: IEEE Trans. Ind. Inf.
– volume: 151
  year: 2023
  ident: bib0205
  article-title: Distortion-based state security codes for distributed sensor networks
  publication-title: Automatica
– volume: 113
  year: 2020
  ident: bib0010
  article-title: Recursive distributed filtering over sensor networks on Gilbert-Elliott channels: a dynamic event-triggered approach
  publication-title: Automatica
– volume: 64
  start-page: 720
  year: 2019
  end-page: 727
  ident: bib0110
  article-title: Recursive filtering for time-varying systems with random access protocol
  publication-title: IEEE Trans. Autom. Control
– volume: 4
  year: 2025
  ident: bib0155
  article-title: Least-squares linear estimation for multirate uncertain systems subject to DoS attacks
  publication-title: Int. J. Netw. Dyn. Intell.
– volume: 359
  start-page: 5575
  year: 2022
  end-page: 5595
  ident: bib0130
  article-title: Recursive state estimation for nonlinear coupling complex networks with time-varying topology and round-robin protocol
  publication-title: J. Frankl. Inst.
– volume: 9
  start-page: 1481
  year: 2022
  end-page: 1492
  ident: bib0185
  article-title: Privacy preserving via secure summation in distributed Kalman filtering
  publication-title: IEEE Trans. Control Netw. Syst.
– volume: 18
  start-page: 2250
  year: 2023
  end-page: 2261
  ident: bib0170
  article-title: Eavesdropping strategies for remote state estimation under communication constraints
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 52
  start-page: 11121
  year: 2022
  end-page: 11132
  ident: bib0225
  article-title: Recursive minimum-variance filter design for state-saturated complex networks with uncertain coupling strengths subject to deception attacks
  publication-title: IEEE Trans. Cybern.
– volume: 61
  start-page: 3632
  year: 2013
  end-page: 3646
  ident: bib0230
  article-title: Cooperative target tracking using decentralized particle filtering and RSS sensors
  publication-title: IEEE Trans. Signal Process.
– volume: 86–87
  start-page: 104
  year: 2022
  end-page: 115
  ident: bib0005
  article-title: Radar sensor network resource allocation for fused target tracking: a brief review
  publication-title: Inf. Fusion
– year: 2025
  ident: bib0055
  article-title: Distributed
  publication-title: Int. J. Syst. Sci.
– volume: 53
  start-page: 7760
  year: 2023
  end-page: 7772
  ident: bib0105
  article-title: Distributed recursive filtering over sensor networks under random access protocol: when state saturation meets censored measurement
  publication-title: IEEE Trans. Cybern.
– volume: 4
  year: 2025
  ident: bib0120
  article-title: Unscented Kalman filtering for nonlinear systems with stochastic nonlinearities under FlexRay protocol
  publication-title: Int. J. Netw. Dyn. Intell.
– volume: 44
  start-page: 714
  year: 1999
  end-page: 728
  ident: bib0220
  article-title: Stochastic stability of the discrete-time extended Kalman filter
  publication-title: IEEE Trans. Autom. Control
– volume: 52
  start-page: 3704
  year: 2022
  end-page: 3713
  ident: bib0095
  article-title: Recursive filtering for time-varying discrete sequential systems subject to deception attacks: weighted try-once-discard protocol
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
– volume: 50
  start-page: 3605
  year: 2020
  end-page: 3615
  ident: bib0125
  article-title: Distributed state-saturated recursive filtering over sensor networks under round-robin protocol
  publication-title: IEEE Trans. Cybern.
– volume: 67
  start-page: 4529
  year: 2022
  end-page: 4540
  ident: bib0145
  article-title: False data injection attacks against state estimation without knowledge of estimators
  publication-title: IEEE Trans. Autom. Control
– volume: 694
  year: 2025
  ident: bib0165
  article-title: predictive control for 2-D Roesser model under multiple denial-of-service attacks
  publication-title: Inf. Sci.
– volume: 114
  start-page: 23
  year: 2021
  end-page: 43
  ident: bib0030
  article-title: An intelligent healthcare monitoring framework using wearable sensors and social networking data
  publication-title: Futur. Gener. Comput. Syst.
– volume: 12
  start-page: 1232
  year: 2016
  end-page: 1242
  ident: bib0025
  article-title: A real-time big data gathering algorithm based on indoor wireless sensor networks for risk analysis of industrial operations
  publication-title: IEEE Trans. Ind. Inf.
– volume: 56
  start-page: 1347
  year: 2025
  end-page: 1359
  ident: bib0070
  article-title: Distributed correntropy Kalman filtering over sensor networks with FlexRay-based protocols
  publication-title: Int. J. Syst. Sci.
– volume: 161
  start-page: 145
  year: 2025
  end-page: 154
  ident: bib0115
  article-title: Distributed filtering for nonlinear time-varying systems with Byzantine attacks and innovation constraints: a FlexRay scheduling mechanism
  publication-title: ISA Trans.
– volume: 9
  start-page: 1395
  year: 2022
  end-page: 1408
  ident: bib0020
  article-title: Neural-network-based filtering for a general class of nonlinear systems under dynamically bounded innovations over sensor networks
  publication-title: IEEE Trans. Netw. Sci. Eng.
– volume: 70
  start-page: 2176
  year: 2023
  end-page: 2180
  ident: bib0085
  article-title: Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks
  publication-title: IEEE Trans. Circuits Syst. II Express Briefs
– volume: 8
  start-page: 883
  year: 2022
  end-page: 893
  ident: bib0015
  article-title: Auxiliary particle filtering over sensor networks under protocols of amplify-and-forward and decode-and-forward relays
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 169
  year: 2024
  ident: bib0065
  article-title: Distributed state estimation for heterogeneous sensor networks
  publication-title: Automatica
– volume: 171
  year: 2025
  ident: bib0235
  article-title: Remote state estimation with privacy against active eavesdroppers
  publication-title: Automatica
– volume: 4
  issue: 2
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0120
  article-title: Unscented Kalman filtering for nonlinear systems with stochastic nonlinearities under FlexRay protocol
  publication-title: Int. J. Netw. Dyn. Intell.
– volume: 53
  start-page: 2705
  issue: 5
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0160
  article-title: Event-triggeredH∞filtering for cyber-physical systems against DoS attacks
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
  doi: 10.1109/TSMC.2022.3218023
– volume: 20
  start-page: 10344
  issue: 8
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0150
  article-title: False-data injection attacks against distributed filters with improved complete-stealthiness
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2024.3393501
– volume: 52
  start-page: 11121
  issue: 10
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0225
  article-title: Recursive minimum-variance filter design for state-saturated complex networks with uncertain coupling strengths subject to deception attacks
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2021.3067822
– volume: 151
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0205
  article-title: Distortion-based state security codes for distributed sensor networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2023.110904
– volume: 113
  year: 2020
  ident: 10.1016/j.neucom.2025.131570_bib0010
  article-title: Recursive distributed filtering over sensor networks on Gilbert-Elliott channels: a dynamic event-triggered approach
  publication-title: Automatica
  doi: 10.1016/j.automatica.2019.108681
– volume: 64
  start-page: 720
  issue: 2
  year: 2019
  ident: 10.1016/j.neucom.2025.131570_bib0110
  article-title: Recursive filtering for time-varying systems with random access protocol
  publication-title: IEEE Trans. Autom. Control
– volume: 9
  start-page: 1481
  issue: 3
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0185
  article-title: Privacy preserving via secure summation in distributed Kalman filtering
  publication-title: IEEE Trans. Control Netw. Syst.
  doi: 10.1109/TCNS.2022.3155109
– volume: 72
  start-page: 1043
  issue: 8
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0240
  article-title: An encoding-decoding-based state estimation scheme for state-saturated systems under buffer-aided mechanism
  publication-title: IEEE Trans. Circuits Syst. II Express Briefs
– volume: 114
  start-page: 23
  year: 2021
  ident: 10.1016/j.neucom.2025.131570_bib0030
  article-title: An intelligent healthcare monitoring framework using wearable sensors and social networking data
  publication-title: Futur. Gener. Comput. Syst.
  doi: 10.1016/j.future.2020.07.047
– volume: 161
  start-page: 145
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0115
  article-title: Distributed filtering for nonlinear time-varying systems with Byzantine attacks and innovation constraints: a FlexRay scheduling mechanism
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2025.04.005
– volume: 44
  start-page: 714
  issue: 4
  year: 1999
  ident: 10.1016/j.neucom.2025.131570_bib0220
  article-title: Stochastic stability of the discrete-time extended Kalman filter
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/9.754809
– volume: 110
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0075
  article-title: A distributed state and fault estimation scheme for state-saturated systems with quantized measurements over sensor networks
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2024.102452
– volume: 32
  start-page: 721
  issue: 3
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0100
  article-title: Interval type-2 fuzzy-model-based filtering for nonlinear systems with event-triggering weighted try-once-discard protocol and cyberattacks
  publication-title: IEEE Trans. Fuzzy Syst.
  doi: 10.1109/TFUZZ.2023.3305088
– volume: 359
  start-page: 5575
  issue: 11
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0130
  article-title: Recursive state estimation for nonlinear coupling complex networks with time-varying topology and round-robin protocol
  publication-title: J. Frankl. Inst.
  doi: 10.1016/j.jfranklin.2022.05.009
– volume: 169
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0065
  article-title: Distributed state estimation for heterogeneous sensor networks
  publication-title: Automatica
  doi: 10.1016/j.automatica.2024.111839
– volume: 66
  start-page: 1763
  issue: 4
  year: 2021
  ident: 10.1016/j.neucom.2025.131570_bib0210
  article-title: Moving-horizon estimation for linear dynamic networks with binary encoding schemes
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2020.2996579
– volume: 171
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0235
  article-title: Remote state estimation with privacy against active eavesdroppers
  publication-title: Automatica
  doi: 10.1016/j.automatica.2024.111932
– volume: 20
  start-page: 13147
  issue: 11
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0175
  article-title: Optimal encryption scheduling policy against eavesdropping attacks in cyber-physical systems
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2024.3431096
– volume: 18
  start-page: 2250
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0170
  article-title: Eavesdropping strategies for remote state estimation under communication constraints
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2023.3265343
– volume: 194
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0050
  article-title: Finite-time annular domain H2/H∞ filtering for mean-field stochastic systems with Wiener and Poisson noises
  publication-title: Syst. Control Lett.
  doi: 10.1016/j.sysconle.2024.105959
– volume: 61
  start-page: 3632
  issue: 14
  year: 2013
  ident: 10.1016/j.neucom.2025.131570_bib0230
  article-title: Cooperative target tracking using decentralized particle filtering and RSS sensors
  publication-title: IEEE Trans. Signal Process.
  doi: 10.1109/TSP.2013.2262276
– volume: 86–87
  start-page: 104
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0005
  article-title: Radar sensor network resource allocation for fused target tracking: a brief review
  publication-title: Inf. Fusion
  doi: 10.1016/j.inffus.2022.06.009
– volume: 9
  start-page: 346
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0080
  article-title: Mesh-based consensus distributed particle filtering for sensor networks
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 24
  start-page: 787
  issue: 1
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0090
  article-title: Dynamic event-triggered adaptive neural output feedback control for MSVs using composite learning
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2022.3217152
– volume: 13
  issue: 1
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0135
  article-title: Secure state estimation and control for autonomous ships under cyberattacks
  publication-title: Syst. Sci. Control Eng.
– volume: 694
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0165
  article-title: H∞ predictive control for 2-D Roesser model under multiple denial-of-service attacks
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2024.121706
– volume: 53
  start-page: 7760
  issue: 12
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0105
  article-title: Distributed recursive filtering over sensor networks under random access protocol: when state saturation meets censored measurement
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2022.3209793
– volume: 4
  issue: 2
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0155
  article-title: Least-squares linear estimation for multirate uncertain systems subject to DoS attacks
  publication-title: Int. J. Netw. Dyn. Intell.
– volume: 56
  start-page: 1347
  issue: 6
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0070
  article-title: Distributed correntropy Kalman filtering over sensor networks with FlexRay-based protocols
  publication-title: Int. J. Syst. Sci.
  doi: 10.1080/00207721.2024.2423033
– volume: 9
  start-page: 1395
  issue: 3
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0020
  article-title: Neural-network-based filtering for a general class of nonlinear systems under dynamically bounded innovations over sensor networks
  publication-title: IEEE Trans. Netw. Sci. Eng.
  doi: 10.1109/TNSE.2022.3144484
– volume: 20
  start-page: 2368
  issue: 4
  year: 2021
  ident: 10.1016/j.neucom.2025.131570_bib0045
  article-title: UAV-aided data collection for information freshness in wireless sensor networks
  publication-title: IEEE Trans. Wireless Commun.
  doi: 10.1109/TWC.2020.3041750
– volume: 12
  start-page: 1232
  issue: 3
  year: 2016
  ident: 10.1016/j.neucom.2025.131570_bib0025
  article-title: A real-time big data gathering algorithm based on indoor wireless sensor networks for risk analysis of industrial operations
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2015.2436337
– volume: 19
  start-page: 3483
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0180
  article-title: Distributed secure filtering against eavesdropping attacks in SINR-based sensor networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2024.3361177
– volume: 48
  start-page: 336
  issue: 1
  year: 2018
  ident: 10.1016/j.neucom.2025.131570_bib0060
  article-title: Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2016.2635122
– volume: 8
  start-page: 883
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0015
  article-title: Auxiliary particle filtering over sensor networks under protocols of amplify-and-forward and decode-and-forward relays
  publication-title: IEEE Trans. Signal Inf. Process. Netw.
– volume: 70
  start-page: 2176
  issue: 6
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0085
  article-title: Finite-time synchronization and energy consumption prediction for multilayer fractional-order networks
  publication-title: IEEE Trans. Circuits Syst. II Express Briefs
– volume: 52
  start-page: 3704
  issue: 6
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0095
  article-title: Recursive filtering for time-varying discrete sequential systems subject to deception attacks: weighted try-once-discard protocol
  publication-title: IEEE Trans. Syst. Man Cybern. Syst.
  doi: 10.1109/TSMC.2021.3064653
– volume: 131
  year: 2021
  ident: 10.1016/j.neucom.2025.131570_bib0215
  article-title: Distributed state and fault estimation over sensor networks with probabilistic quantizations: the dynamic event-triggered case
  publication-title: Automatica
  doi: 10.1016/j.automatica.2021.109784
– volume: 68
  start-page: 8111
  issue: 12
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0195
  article-title: Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: a recursive minimum-variance approach
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2023.3288624
– volume: 68
  start-page: 7795
  issue: 12
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0140
  article-title: Distributed anti-eavesdropping fusion estimation under energy constraints
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2023.3250094
– year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0055
  article-title: DistributedH∞moving horizon estimation over energy harvesting sensor networks
  publication-title: Int. J. Syst. Sci.
  doi: 10.1080/00207721.2025.2476173
– volume: 50
  start-page: 3605
  issue: 8
  year: 2020
  ident: 10.1016/j.neucom.2025.131570_bib0125
  article-title: Distributed state-saturated recursive filtering over sensor networks under round-robin protocol
  publication-title: IEEE Trans. Cybern.
  doi: 10.1109/TCYB.2019.2932460
– volume: 305
  year: 2024
  ident: 10.1016/j.neucom.2025.131570_bib0040
  article-title: Design and validation of a soil moisture-based wireless sensors network for the smart irrigation of a pear orchard
  publication-title: Agric. Water Manag.
  doi: 10.1016/j.agwat.2024.109138
– volume: 67
  start-page: 4529
  issue: 9
  year: 2022
  ident: 10.1016/j.neucom.2025.131570_bib0145
  article-title: False data injection attacks against state estimation without knowledge of estimators
  publication-title: IEEE Trans. Autom. Control
  doi: 10.1109/TAC.2022.3161259
– volume: 68
  start-page: 4413
  issue: 7
  year: 2023
  ident: 10.1016/j.neucom.2025.131570_bib0200
  article-title: Linear encryption against eavesdropping on remote state estimation
  publication-title: IEEE Trans. Autom. Control
– volume: 68
  start-page: 1
  issue: 4
  year: 2025
  ident: 10.1016/j.neucom.2025.131570_bib0190
  article-title: Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
  publication-title: Sci. China Inf. Sci.
  doi: 10.1007/s11432-024-4328-1
– volume: 13
  start-page: 322
  issue: 1
  year: 2017
  ident: 10.1016/j.neucom.2025.131570_bib0035
  article-title: Event-based networked islanding detection for distributed solar PV generation systems
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2016.2607999
SSID ssj0017129
Score 2.4606354
Snippet The secure distributed state estimation problem is investigated for a class of discrete time-varying systems over sensor networks regulated by...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 131570
SubjectTerms Distributed state estimation
Eavesdropping attacks
Encryption-decryption mechanism
Round-robin protocol
Sensor networks
Title Encryption-decryption-based distributed state estimation against eavesdropping attacks over sensor networks with communication protocol
URI https://dx.doi.org/10.1016/j.neucom.2025.131570
Volume 658
WOSCitedRecordID wos001592586600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect
  issn: 0925-2312
  databaseCode: AIEXJ
  dateStart: 19950101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: false
  ssIdentifier: ssj0017129
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKLgcuvBHLSz5wi7LK2_axQkXLCq2QWKCcIsd2UFe7SZWmpfwCLvxoxq-0pWgFSFwiy3KcKPNp_Hky3xihl4niGY0UDYWKKGxQBAurrGJhTpiE9Tln3ARzPr4lZ2d0OmXvRqMfXguzuiRNQ9drNv-vpoY-MLaWzv6FuYdJoQPaYHS4gtnh-keGnzSi-2YcQSjV0NSrldS_Y-wJV9A2UqJAF9mw6sWAf-EzIIuB4iu1kF07N1Iq3vdahh_oVM9gAZvetgsamzu-8InrWxoTnfDVt6K93Ga9pgKIMOdHuMjE-EoXaJAajUMk4rMLXU9nHDyyW1FN5oF1jZ82qrUhzH0C49bLve7TGf_qRruIRpLr7BCnEDdhtj2pjY1XwkAgozuuu7Bl3_eWARuRuDhu1FLnBOmHHMdpnNszSn4psP1eT61nBjYIhCahN9BhQnIGbv5w_GYyPR3-SpE4sbUb3at4KabJF9x_1u-pzhZ9Ob-Lbrt9Bx5bvNxDI9XcR3f8mR7YufgH6Ps18MFb8MEGPngDH-zgg3fggx18sIYPtvDBHj5YwwfvwAd7-DxEH15Pzl-dhO6wjlCA1-9DRXgmRKaiNJEJUzWXOS2qAghrWpGMFtBJYZGvlW4VRQX7dJFGKk45sLSokukjdNC0jXqMcEzAs_CUSVbXGWxpq1oIwhMaxzzlVSyOUOi_azm3NVlKn6x4UVo7lNoOpbXDESL-45eOV1q-WAJerr3zyT_f-RTd2kD7GTrou6V6jm6KVT9bdC8csH4Cf6Oqtw
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Encryption-decryption-based+distributed+state+estimation+against+eavesdropping+attacks+over+sensor+networks+with+communication+protocol&rft.jtitle=Neurocomputing+%28Amsterdam%29&rft.au=Yang%2C+Xiaolong&rft.au=Chen%2C+Wen&rft.au=Zhang%2C+Hongxu&rft.au=Zhang%2C+Jiawen&rft.date=2025-12-28&rft.pub=Elsevier+B.V&rft.issn=0925-2312&rft.volume=658&rft_id=info:doi/10.1016%2Fj.neucom.2025.131570&rft.externalDocID=S0925231225022428
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0925-2312&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0925-2312&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0925-2312&client=summon