{"id":"https://openalex.org/W4412404270","doi":"https://doi.org/10.1109/tifs.2025.3588670","title":"Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism","display_name":"Secure and Privacy-Preserving Distributed Kalman Filtering for Sensor Networks With Event-Triggered Mechanism","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412404270","doi":"https://doi.org/10.1109/tifs.2025.3588670"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2025.3588670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3588670","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049753726","display_name":"Kang Si","orcid":"https://orcid.org/0000-0002-7423-9589"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kang Si","raw_affiliation_strings":["School of Automation and Intelligence, Beijing Jiaotong University, Beijing, China","Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-7423-9589","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligence, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100432752","display_name":"Peng Li","orcid":"https://orcid.org/0000-0002-9428-6374"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Li","raw_affiliation_strings":["School of Automation and Intelligence, Beijing Jiaotong University, Beijing, China","Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-9428-6374","affiliations":[{"raw_affiliation_string":"School of Automation and Intelligence, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]},{"raw_affiliation_string":"Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025436383","display_name":"Zhi-Peng Yuan","orcid":"https://orcid.org/0000-0002-3935-1129"},"institutions":[{"id":"https://openalex.org/I181877577","display_name":"Shanxi University","ror":"https://ror.org/03y3e3s17","country_code":"CN","type":"education","lineage":["https://openalex.org/I181877577"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi-Peng Yuan","raw_affiliation_strings":["School of Automation and Software Engineering, Shanxi University, Taiyuan, China","Shanxi University, Taiyuan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Automation and Software Engineering, Shanxi University, Taiyuan, China","institution_ids":["https://openalex.org/I181877577"]},{"raw_affiliation_string":"Shanxi University, Taiyuan, China","institution_ids":["https://openalex.org/I181877577"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5049753726"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":null,"apc_paid":null,"fwci":1.3517,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83635177,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"20","issue":null,"first_page":"7438","last_page":"7453"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9872999787330627,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9797999858856201,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8463659286499023},{"id":"https://openalex.org/keywords/kalman-filter","display_name":"Kalman filter","score":0.6797423958778381},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6050964593887329},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5647842884063721},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.4916275143623352},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41473960876464844},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3978689908981323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3508318066596985},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19449269771575928}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8463659286499023},{"id":"https://openalex.org/C157286648","wikidata":"https://www.wikidata.org/wiki/Q846780","display_name":"Kalman filter","level":2,"score":0.6797423958778381},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6050964593887329},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5647842884063721},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.4916275143623352},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41473960876464844},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3978689908981323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3508318066596985},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19449269771575928},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3588670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3588670","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1724478057","display_name":null,"funder_award_id":"62473038","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3278419361","display_name":null,"funder_award_id":"U2468203","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1998345701","https://openalex.org/W2050361638","https://openalex.org/W2169329579","https://openalex.org/W2551758879","https://openalex.org/W2767068654","https://openalex.org/W2888525032","https://openalex.org/W2903204749","https://openalex.org/W2916583047","https://openalex.org/W2917903122","https://openalex.org/W2918758052","https://openalex.org/W2942154814","https://openalex.org/W2960426479","https://openalex.org/W2962963276","https://openalex.org/W2963112534","https://openalex.org/W2963134661","https://openalex.org/W2964008526","https://openalex.org/W2974008242","https://openalex.org/W3085881561","https://openalex.org/W3087878582","https://openalex.org/W3121251412","https://openalex.org/W3127275112","https://openalex.org/W3214010774","https://openalex.org/W4206324394","https://openalex.org/W4214746925","https://openalex.org/W4236076921","https://openalex.org/W4285132886","https://openalex.org/W4288627862","https://openalex.org/W4293811421","https://openalex.org/W4300349690","https://openalex.org/W4309482395","https://openalex.org/W4313014667","https://openalex.org/W4317038485","https://openalex.org/W4317892540","https://openalex.org/W4380450972","https://openalex.org/W4383753517","https://openalex.org/W4387568945","https://openalex.org/W4387587606","https://openalex.org/W4389332358","https://openalex.org/W4390691528","https://openalex.org/W4391454327","https://openalex.org/W4391454552","https://openalex.org/W4392158582","https://openalex.org/W4393930864","https://openalex.org/W4394897082","https://openalex.org/W4396782823","https://openalex.org/W4403826514","https://openalex.org/W4405907544","https://openalex.org/W4407212638","https://openalex.org/W4408971077"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W2370906336"],"abstract_inverted_index":{"Distributed":[0],"Kalman":[1,59,83],"filtering":[2],"is":[3,38,62,74,107,132],"a":[4,54],"widely":[5],"used":[6],"technique":[7],"for":[8],"state":[9,33,114],"estimation":[10,143,183],"in":[11],"sensor":[12],"networks":[13],"system.":[14],"Typically,":[15],"each":[16],"node":[17],"utilizes":[18],"the":[19,23,27,31,67,71,78,81,87,92,122,141,146,150,154,161,167,178,187,192],"measurement":[20,37],"residuals":[21],"and":[22,42,48,56,129,145,163,189],"information":[24],"exchanged":[25,193],"with":[26],"neighbors":[28],"to":[29,40,46,64,76,90,109,119,134],"obtain":[30],"fused":[32],"estimation.":[34],"However,":[35],"local":[36,113],"susceptible":[39],"outliers,":[41],"data":[43,137],"sharing":[44],"leads":[45],"privacy":[47,111,162,188],"security":[49,164,190],"issues.":[50,69],"In":[51,159],"this":[52],"paper,":[53],"secure":[55],"privacy-preserving":[57,101],"distributed":[58,82],"filter":[60],"(SPP-DKF)":[61],"developed":[63],"simultaneously":[65],"address":[66],"aforementioned":[68],"Specifically,":[70],"outlier-resistant":[72],"mechanism":[73],"embedded":[75],"improve":[77],"resilience":[79],"of":[80,94,112,149,153,166,191],"filter,":[84],"which":[85],"employs":[86],"saturation":[88],"function":[89,131],"suppress":[91],"mutation":[93],"innovation":[95],"caused":[96],"by":[97],"outliers.":[98],"An":[99],"event-triggered":[100],"scheme":[102],"based":[103,125],"on":[104,126],"dynamic":[105],"mask":[106],"designed":[108],"protect":[110],"against":[115],"different":[116],"adversaries.":[117],"Meanwhile,":[118],"ensure":[120],"security,":[121],"digital":[123],"signature":[124],"homomorphic":[127],"encryption":[128],"hash":[130],"adopted":[133],"detect":[135],"false":[136],"injection":[138],"attacks.":[139],"Furthermore,":[140],"mean-square":[142],"performance":[144,165,184],"upper":[147],"bound":[148],"error":[151],"covariance":[152],"proposed":[155,168,179],"SPP-DKF":[156,180],"are":[157,170],"analyzed.":[158],"addition,":[160],"algorithm":[169],"also":[171],"ensured.":[172],"Finally,":[173],"simulation":[174],"results":[175],"indicate":[176],"that":[177],"provides":[181],"reliable":[182],"while":[185],"ensuring":[186],"data.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
