{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:49:10Z","timestamp":1773658150375,"version":"3.50.1"},"reference-count":53,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T00:00:00Z","timestamp":1763596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering"],"published-print":{"date-parts":[[2026,3]]},"abstract":"<jats:p>This study proposes a new theoretical framework focused on enhancing multi-sensor fusion estimation within cyber-physical systems, particularly in scenarios where sensor data may be disrupted by hybrid attacks, which involve both denial-of-service (DoS) and false data injection (FDI) attacks. The framework is built on the assumption that hybrid attacks occurrence follows a Bernoulli distribution, which informs the design of a robust secure fusion estimator aimed at minimizing estimation error variance. The framework begins by designing local robust estimators that maintain an upper bound on local estimation error covariance, even when hybrid attacks introduce parameter uncertainties. To further optimize the local estimation, parameters within these estimators are adjusted at each time step to minimize this upper bound on error covariance. To improve the accuracy of the overall system state estimation, a covariance intersection fusion strategy is applied to combine all local robust estimates into a single, more reliable fusion estimate. This fusion approach mitigates the effects of compromised sensor data and enhances resilience against hybrid attacks. The efficacy of this robust fusion estimation scheme is demonstrated through a simulation, highlighting its potential to provide secure, accurate state estimation in environments vulnerable to data manipulation.<\/jats:p>","DOI":"10.1177\/09596518251383250","type":"journal-article","created":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T11:39:22Z","timestamp":1763638762000},"page":"536-551","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Robust secure fusion estimation for cyber-physical systems under hybrid attacks"],"prefix":"10.1177","volume":"240","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4683-6393","authenticated-orcid":false,"given":"Zhouqiang","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Computer Science, Hangzhou Dianzi University, P.R. China"},{"name":"Economic and Management Experimental Center, Zhejiang University of Finance and Economics, Hangzhou, P.R. China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4772-2855","authenticated-orcid":false,"given":"Haiyu","family":"Song","sequence":"additional","affiliation":[{"name":"School of Information Technology and Artificial Intelligence, Zhejiang University of Finance and Economics, Hangzhou, P.R. China"},{"name":"Binjiang Institute of Artificial Intelligence, Zhejiang University of Technology, Hangzhou, P.R. China"},{"name":"School of Information Science and Technology, University of Science and Technology of China, Hefei, P.R. China"}]},{"given":"Jinglong","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Hangzhou Dianzi University, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2025,11,20]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3199481"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3263909"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2956474"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103796"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.10.009"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3032598"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2023.110926"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2020.3004326"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1177\/09596518221127763"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2023.3321049"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2023.112565"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119172"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2900045"},{"key":"e_1_3_2_15_2","first-page":"1049","article-title":"Distributed secure state estimation of multi-sensor systems subject to two-channel hybrid attacks","volume":"8","author":"Song H","year":"2022","unstructured":"Song H, Yao H, Shi P, et al. Distributed secure state estimation of multi-sensor systems subject to two-channel hybrid attacks. IEEE Trans Signal Inf Process Netw 2022; 8: 1049\u20131058.","journal-title":"IEEE Trans Signal Inf Process Netw"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2697450"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.110091"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2906462"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2019.2927191"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1080\/00207721.2022.2049918"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1177\/09596518211031112"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1177\/0959651818766220"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1177\/09596518231199207"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2206694"},{"key":"e_1_3_2_25_2","first-page":"1008","article-title":"Distributed control microgrids: cyber-attack models, impacts and remedial strategies","volume":"8","author":"Tadepalli PS","year":"2022","unstructured":"Tadepalli PS, Pullaguram D. Distributed control microgrids: cyber-attack models, impacts and remedial strategies. IEEE Trans Signal Inf Process Netw 2022; 8: 1008\u20131023.","journal-title":"IEEE Trans Signal Inf Process Netw"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1177\/09596518231174074"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2023.3235441"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108638"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2023.3341073"},{"key":"e_1_3_2_30_2","first-page":"102518","article-title":"Survey of false data injection in smart power grid: attacks, countermeasures and challenges","volume":"54","author":"Aoufi S","year":"2020","unstructured":"Aoufi S, Derhab A, Guerroumi M. Survey of false data injection in smart power grid: attacks, countermeasures and challenges. J Inf Secur Appl 2020; 54: 102518.","journal-title":"J Inf Secur Appl"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2023.3292988"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2936750"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2022.110759"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2952067"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2023.3332079"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2871951"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2024.3477009"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.017"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2021.109782"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2020.10.038"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2023.3250285"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2015.11.008"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2023.3288624"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3105409"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.918009"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.06.001"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.12.003"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.11.038"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2016.06.008"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2014.883715"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2022.3222182"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2024.3424190"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2025.3558663"},{"key":"e_1_3_2_54_2","first-page":"401","article-title":"Multi-rate sampled-data secure fusion estimation against malicious hybrid attacks","volume":"11","author":"Song H","year":"2025","unstructured":"Song H, Ye S, Shi P, et al. Multi-rate sampled-data secure fusion estimation against malicious hybrid attacks. IEEE Trans Signal Inf Process Netw 2025; 11: 401\u2013412.","journal-title":"IEEE Trans Signal Inf Process Netw"}],"container-title":["Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09596518251383250","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/09596518251383250","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/09596518251383250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:50:07Z","timestamp":1773654607000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/09596518251383250"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,20]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["10.1177\/09596518251383250"],"URL":"https:\/\/doi.org\/10.1177\/09596518251383250","relation":{},"ISSN":["0959-6518","2041-3041"],"issn-type":[{"value":"0959-6518","type":"print"},{"value":"2041-3041","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,20]]}}}