A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 9 Issue 10
Oct.  2022

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 7.847, Top 10% (SCI Q1)
    CiteScore: 13.0, Top 5% (Q1)
    Google Scholar h5-index: 64, TOP 7
Turn off MathJax
Article Contents
Y. Wang, X. M. Chen, L. Shi, Y. H. Cheng, and H. J. Wang, “A trust assessment-based distributed localization algorithm for sensor networks under deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 10, pp. 1879–1882, Oct. 2022. doi: 10.1109/JAS.2022.105881
Citation: Y. Wang, X. M. Chen, L. Shi, Y. H. Cheng, and H. J. Wang, “A trust assessment-based distributed localization algorithm for sensor networks under deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 10, pp. 1879–1882, Oct. 2022. doi: 10.1109/JAS.2022.105881

A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks

doi: 10.1109/JAS.2022.105881
More Information
  • loading
  • [1]
    N. Saeed, H. Nam, T. Y. Al-Naffouri, and M. Alouini, “A state-of-the-art survey on multidimensional scaling-based localization techniques,” IEEE Commun. Surveys Tuts., vol. 21, no. 4, pp. 3565–3583, 2019.
    [2]
    M. Ye, D. Li, Q.-L. Han, and L. Ding, “Distributed nash equilibrium seeking for general networked games with bounded disturbances,” IEEE/CAA J. Autom. Sinica, 2021, DOI: 10.1109/JAS.2022.105428.
    [3]
    K. W. K. Lui, W. K. Ma, H. C. So, and F. K. W. Chan, “Semi-definite programming algorithms for sensor network node localization with uncertainties in anchor positions and/or propagation speed,” IEEE Trans. Signal Process., vol. 57, no. 2, pp. 752–763, Feb. 2009. doi: 10.1109/TSP.2008.2007916
    [4]
    P. Tseng, “Second-order cone programming relaxation of sensor network localization,” SIAM J. Optimiz., vol. 18, no. 1, pp. 156–185, Feb. 2007. doi: 10.1137/050640308
    [5]
    Q. Zhang, G. E. Sobelman, and T. He, “Gradient-based target localization in robotic sensor networks,” Pervasive and Mobile Computing, vol. 5, no. 1, pp. 37–48, Feb. 2009. doi: 10.1016/j.pmcj.2008.05.007
    [6]
    Y. Shu, Y. Huang, J. Zhang, P. Coué, P. Cheng, J. Chen, and K. G. Shin, “Gradient-based fingerprinting for indoor localization and tracking,” IEEE Trans. Ind. Electr., vol. 63, no. 4, pp. 2424–2433, Apr. 2016. doi: 10.1109/TIE.2015.2509917
    [7]
    U. A. Khan, S. Kar, and J. M. F. Moura, “Distributed sensor localization in random environments using minimal number of anchor nodes,” IEEE Trans. Signal Process., vol. 57, no. 5, pp. 2000–2016, May 2009. doi: 10.1109/TSP.2009.2014812
    [8]
    L. Shi, Q. Liu, J. Shao, and Y. Cheng, “Distributed localization in wireless sensor networks under denial-of-service attacks,” IEEE Contr. Syst. Lett., vol. 5, no. 2, pp. 493–498, Apr. 2021. doi: 10.1109/LCSYS.2020.3003789
    [9]
    D. Ding, Q.-L. Han, Y. Xiang, X. Ge, and X.-M. Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomput., vol. 275, pp. 1674–1683, 2018. doi: 10.1016/j.neucom.2017.10.009
    [10]
    W. He, W. Xu, X. Ge, Q.-L. Han, W. Du, and F. Qian, “Secure control of multiagent systems against malicious attacks: A brief survey,” IEEE Trans. Ind. Informat., vol. 18, no. 6, pp. 3595–3608, Jun. 2022. doi: 10.1109/TII.2021.3126644
    [11]
    W. He, Z. Mo, Q.-L. Han, and F. Qian, “Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1326–1334, Sep. 2020.
    [12]
    K. Tsang, M. Huang, K. Johansson, and L. Shi, “Sparse linear injection attack on multi-agent consensus control systems,” IEEE Control Syst. Lett., vol. 5, no. 2, p. 665670, Apr. 2021.
    [13]
    E. Mousavinejad, F. Yang, Q.-L. Han, X. Ge, and L. Vlacic, “Distributed cyber attacks detection and recovery mechanism for vehicle platooning,” IEEE Trans. Intell. Transp. Syst., vol. 21, no. 9, p. 38213834, Sep. 2020.
    [14]
    A. Sargolzaei, B. Allen, C. Crane, and W. Dixon, “Lyapunov-based control of a nonlinear multi-agent system with a time varying input delay under false-data-injection attacks,” IEEE Trans. Ind. Informat., vol. 18, no. 4, pp. 2693–2703, Apr. 2022. doi: 10.1109/TII.2021.3106009
    [15]
    W. Fu, J. Qin, Y. Shi, W. X. Zheng and Y. Kang, “Resilient consensus of discrete-time complex cyber-physical networks under deception attacks,” IEEE Trans. Ind. Informat., vol. 16, no. 7, pp. 4868–4877, Jul. 2020. doi: 10.1109/TII.2019.2933596
    [16]
    H. S. M. Coxeter, Introduction to Geometry, New York, USA: John Wiley & Sons, 1961.
    [17]
    M. Sippl and H. Scheraga, “Cayley-Menger coordinates,” Proc. National Academy of Sciences, vol. 83, no. 8, pp. 2283–2287, Apr. 1986. doi: 10.1073/pnas.83.8.2283

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)

    Article Metrics

    Article views (69) PDF downloads(23) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return