Research Article
A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries
Algorithm 1
The GMM-based state estimation against dynamic attacks.
1 // Run Kalman filter to steady state. | 2: Initialize ; | 3: fordo | 4: // Local data reaches steady state. | 5: Fordo | 6: | 7: | 8: end for | 9: // The remote estimator reaches steady state. | 10: | 11: | 12: end for | 13: // GMM clustering by the EM algorithm. | 14: Set | 15: fordo | 16: fordo | 17: ; | 18: end for | 19: // the EM algorithm. | 20: Initialize | 21: while not achieve the maximum likelihood estimates do | 22: The expectation step: calculate and according to Equation (15)-(16). | 23: The maximization step: calculate by Equation (17)-(19). | 24: end while | 25: // the error compensator. | 26: | 27: fordo | 28: ifthen | 29: ; | 30: ; | 31: else | 32: ; | 33: ; | 34: end if | 35: end for | 36: // Remote state estimation. | 37: | 38: | 39: | 40: | 41: end for |
|