{"title":"Dissipative Estimating for Nonlinear Markov Systems With Protocol-Based Deception Attacks and Measurement Quantization","authors":"Yuyan Wu;Huaicheng Yan;Meng Wang;Zhichen Li;Jun Cheng","doi":"10.1109/TCYB.2025.3532547","DOIUrl":null,"url":null,"abstract":"This article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception attack (DA) strategy is proposed, which utilizes the information of quantized output to assess the importance degree of transmission signals. Furthermore, in order to conserve the limited energy of the adversary, the independent attack strategies are designed for different sensors. Besides, the hidden Markov modelhidden Markov model (HMM) is applied to observe the system mode. Employing the Lyapunov stability theory and linear matrix inequality method, the sufficient conditions are acquired to guarantee the strictly-dissipative performance of the estimation error. Finally, two examples are illustrated to confirm the efficacy of the designed estimator and the advantage of the proposed attack tactics.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1731-1743"},"PeriodicalIF":9.4000,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10892336/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article investigates the asynchronous estimator design for the interval type-2interval type-2 (IT2) fuzzy Markov jump systems subject to dynamic quantization and deception attacks. From the perspective of the attacker, a novel protocol-based deception attackdeception attack (DA) strategy is proposed, which utilizes the information of quantized output to assess the importance degree of transmission signals. Furthermore, in order to conserve the limited energy of the adversary, the independent attack strategies are designed for different sensors. Besides, the hidden Markov modelhidden Markov model (HMM) is applied to observe the system mode. Employing the Lyapunov stability theory and linear matrix inequality method, the sufficient conditions are acquired to guarantee the strictly-dissipative performance of the estimation error. Finally, two examples are illustrated to confirm the efficacy of the designed estimator and the advantage of the proposed attack tactics.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.