检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Lei Zou Zidong Wang Bo Shen Hongli Dong Guoping Lu
机构地区:[1]College of Information Science and Technology,Donghua University,Shanghai 201620 [2]Engineering Research Center of Digitalized Textile and Fashion Technology,Ministry of Education,Shanghai 201620,China [3]College of Electrical Engineering and Automation,Shandong University of Science and Technology,Qingdao 266590,China [4]Department of Computer Science,Brunel University London,Uxbridge,Middlesex UB83PH,UK [5]Intelligence Energy Research Institute,Northeast Petroleum University,Daqing 163318 [6]Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control,Northeast Petroleum University,Daqing 163318 [7]Sanya Offshore Oil&Gas Research Institute,Northeast Petroleum University,Sanya 572024,China [8]School of Electrical Engineering,Nantong University,Nantong 226019,China
出 处:《IEEE/CAA Journal of Automatica Sinica》2023年第4期985-996,共12页自动化学报(英文版)
基 金:This work was supported in part by the National Natural Science Foundation of China(62273087,61933007,62273088,U21A2019,62073180);the Shanghai Pujiang Program of China(22PJ1400400);the Program of Shanghai Academic/Technology Research Leader of China(20XD1420100);the European Union’s Horizon 2020 Research and Innovation Programme(820776)(INTEGRADDE);the Royal Society of UK;the Alexander von Humboldt Foundation of Germany.
摘 要:This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.
关 键 词:Artificial-noise-assisted technique EAVESDROPPING encryption-decryption scheme energy-to-peak state estimation finitehorizon state estimation
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7