IEEE/CAA Journal of Automatica Sinica
Citation: | Y. Wang, X. M. Chen, L. Shi, Y. H. Cheng, and H. J. Wang, “A trust assessment-based distributed localization algorithm for sensor networks under deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 10, pp. 1879–1882, Oct. 2022. doi: 10.1109/JAS.2022.105881 |
[1] |
N. Saeed, H. Nam, T. Y. Al-Naffouri, and M. Alouini, “A state-of-the-art survey on multidimensional scaling-based localization techniques,” IEEE Commun. Surveys Tuts., vol. 21, no. 4, pp. 3565–3583, 2019.
|
[2] |
M. Ye, D. Li, Q.-L. Han, and L. Ding, “Distributed nash equilibrium seeking for general networked games with bounded disturbances,” IEEE/CAA J. Autom. Sinica, 2021, DOI: 10.1109/JAS.2022.105428.
|
[3] |
K. W. K. Lui, W. K. Ma, H. C. So, and F. K. W. Chan, “Semi-definite programming algorithms for sensor network node localization with uncertainties in anchor positions and/or propagation speed,” IEEE Trans. Signal Process., vol. 57, no. 2, pp. 752–763, Feb. 2009. doi: 10.1109/TSP.2008.2007916
|
[4] |
P. Tseng, “Second-order cone programming relaxation of sensor network localization,” SIAM J. Optimiz., vol. 18, no. 1, pp. 156–185, Feb. 2007. doi: 10.1137/050640308
|
[5] |
Q. Zhang, G. E. Sobelman, and T. He, “Gradient-based target localization in robotic sensor networks,” Pervasive and Mobile Computing, vol. 5, no. 1, pp. 37–48, Feb. 2009. doi: 10.1016/j.pmcj.2008.05.007
|
[6] |
Y. Shu, Y. Huang, J. Zhang, P. Coué, P. Cheng, J. Chen, and K. G. Shin, “Gradient-based fingerprinting for indoor localization and tracking,” IEEE Trans. Ind. Electr., vol. 63, no. 4, pp. 2424–2433, Apr. 2016. doi: 10.1109/TIE.2015.2509917
|
[7] |
U. A. Khan, S. Kar, and J. M. F. Moura, “Distributed sensor localization in random environments using minimal number of anchor nodes,” IEEE Trans. Signal Process., vol. 57, no. 5, pp. 2000–2016, May 2009. doi: 10.1109/TSP.2009.2014812
|
[8] |
L. Shi, Q. Liu, J. Shao, and Y. Cheng, “Distributed localization in wireless sensor networks under denial-of-service attacks,” IEEE Contr. Syst. Lett., vol. 5, no. 2, pp. 493–498, Apr. 2021. doi: 10.1109/LCSYS.2020.3003789
|
[9] |
D. Ding, Q.-L. Han, Y. Xiang, X. Ge, and X.-M. Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomput., vol. 275, pp. 1674–1683, 2018. doi: 10.1016/j.neucom.2017.10.009
|
[10] |
W. He, W. Xu, X. Ge, Q.-L. Han, W. Du, and F. Qian, “Secure control of multiagent systems against malicious attacks: A brief survey,” IEEE Trans. Ind. Informat., vol. 18, no. 6, pp. 3595–3608, Jun. 2022. doi: 10.1109/TII.2021.3126644
|
[11] |
W. He, Z. Mo, Q.-L. Han, and F. Qian, “Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1326–1334, Sep. 2020.
|
[12] |
K. Tsang, M. Huang, K. Johansson, and L. Shi, “Sparse linear injection attack on multi-agent consensus control systems,” IEEE Control Syst. Lett., vol. 5, no. 2, p. 665670, Apr. 2021.
|
[13] |
E. Mousavinejad, F. Yang, Q.-L. Han, X. Ge, and L. Vlacic, “Distributed cyber attacks detection and recovery mechanism for vehicle platooning,” IEEE Trans. Intell. Transp. Syst., vol. 21, no. 9, p. 38213834, Sep. 2020.
|
[14] |
A. Sargolzaei, B. Allen, C. Crane, and W. Dixon, “Lyapunov-based control of a nonlinear multi-agent system with a time varying input delay under false-data-injection attacks,” IEEE Trans. Ind. Informat., vol. 18, no. 4, pp. 2693–2703, Apr. 2022. doi: 10.1109/TII.2021.3106009
|
[15] |
W. Fu, J. Qin, Y. Shi, W. X. Zheng and Y. Kang, “Resilient consensus of discrete-time complex cyber-physical networks under deception attacks,” IEEE Trans. Ind. Informat., vol. 16, no. 7, pp. 4868–4877, Jul. 2020. doi: 10.1109/TII.2019.2933596
|
[16] |
H. S. M. Coxeter, Introduction to Geometry, New York, USA: John Wiley & Sons, 1961.
|
[17] |
M. Sippl and H. Scheraga, “Cayley-Menger coordinates,” Proc. National Academy of Sciences, vol. 83, no. 8, pp. 2283–2287, Apr. 1986. doi: 10.1073/pnas.83.8.2283
|