Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks

In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.


Introduction
Wireless sensor networks (WSNs) have grown rapidly in the past decades and found wide applications in the areas of industrial process, smart building, health care and battlefield surveillance, etc. [1,2]. In those applications, data-transmission usually communicates over a wireless channel. Replacing old batteries without energy of wireless sensors is always a costly operation or even impossible [3]. In addition, the capacity of a wireless channel normally varies with external environment. This time-varying property can impact the overall dynamic system performance. Consequently, less data-transmission between the sensor and the remote state estimator (or actuator) can significantly prolong the lifetime of the sensors. Event-triggered transmission schemes provide an inspiring opportunity to a trade-off between energy efficiency and system performance.
In parallel with the quiet evolution of WSNs technologies, the network security problem has recently become an emerging topic of research from the defenders' perspectives. Due to the unprotected and shared property of a wireless communication link, the exchanged information can be easily exploited by adversaries. It is worth mentioning that a deception attack is one of the most dangerous attack behaviors which can maliciously degrade network reliability through arbitrarily injecting the false data information. Using the techniques of variance-constrained and Lyapunov stability theories, some excellent results concerning security control and estimation problems have been reported in [4][5][6]. For instant, a security-guaranteed filter was designed in [4] for nonlinear stochastic time-delay systems with randomly occurring sensor saturations and deception attacks, where a new concept of mean-square security domain was introduced to quantify the security degree. In [5], a variance-constrained distributed filtering was presented for time-varying systems subject to multiplicative noises and deception attacks over sensor networks. Reference [6] addressed a problem of observer-based event-triggered consensus control for a class of discrete-time multi-agent systems with lossy sensors and cyber-attacks, where a dynamic output feedback controller was derived such that the prescribed security in probability was guaranteed while obtaining an upper bound of the quadratic cost criterion.
For the purpose of increasing the safety and reliability in modern dynamical system, model-based fault diagnosis has been promising research and application topics. In the model-based fault diagnosis, the observer-based strategy is often viewed as one of the most effective methods for fault diagnosis. So far, the issues of observer-based fault diagnosis for dynamic system have received a great deal of attentions from many researchers, and lots of outstanding results were made: [7][8][9][10][11][12][13][14][15][16][17]. Similar to event-triggered control and estimation problems [18][19][20], the event-triggered data transmission scheme could also be applied to fault diagnosis purposes. An event-triggered fault-detection filter was established in [21] for discrete-time systems with nonlinear perturbation subject to transmission delay, where the designed filter parameters were given through solving some linear matrix inequalities. Literature [22] studied fault detection and isolation using event-triggered sensor data transmission strategy. Its feature was that the proposed fault detection filter was presented based on l 1 , H − and H ∞ , and further applied to underwater robotic platforms. A polynomial fuzzy fault-detection filter was designed in [23] for nonlinear discrete-time systems under an event-triggered data transmission framework, where the asymptotically stable of the polynomial fault-detection residual system was guaranteed while satisfying the desired performance criteria.
The aforementioned studies have proposed some results to show the effectiveness of event-triggered scheme in fault diagnosis. However, an event-triggered fault detection and estimation problem have not been fully investigated yet especially when the system is subject to deception attacks in a possibly random way. On the other hand, the sensibility and real-time capacity of fault detection were neglected in the existing literature. Due to the considered event-triggered scheme adopting an aperiodic fashion to data-transmission, remote fault-detection filter can not detect in real time when a fault occurs. Furthermore, a fault-detection residual may further become insensitive, because unknown disturbances and faults are often coupled in practical systems, it is difficult to distinguish among them. Therefore, the purpose of the paper is to solve the problems we discussed. The main contributions of this paper are summarized as follows: (1) A synthesized design of fault-detection filter and fault estimator with an event-triggered sensor data transmission scheme in discrete-time stochastic systems is proposed, for the first time, to deal with the phenomena of both unknown disturbances and randomly occurring deception attacks, which reflects the reality closely. The design of the fault-detection filter and the fault estimator is simple due to the utilization of reduce-order subsystems.
(2) Using the coordinate transformation approach, the desired fault-detection residual is sensitive only to faults while insensitive to disturbances. An upper bound of the fault-detection filtering error covariance is minimized at each iteration with proper filtering parameters computed via a recursive algorithm. In particular, the proposed fault-alarming strategy cannot be influenced by the impact of event-triggered data transmission to ensure a real-time capacity of fault detection.
(3) System faults can be robustly estimated using the designed event-triggered remote fault estimator at the same time. Two upper bounds of the state and fault estimation error covariance matrices are obtained in form of Riccati-like difference equations by utilizing the mathematical induction approach. The explicit forms of the fault estimator gains are obtained to minimize such upper bounds through a recursive algorithm. Furthermore, the corresponding event-triggered scheme is given to trade the computation for communication.
(4) A simulation testbed where the terminal voltages of a three-cell battery string are estimated is implemented. Estimation accuracy, fault-alarming strategy and battery life are given for verifying the effectiveness of the proposed theoretical algorithms.
Nomenclature: Prob {x} means the occurrence probability of the event x. E(·), Var(·) and tr(·) denote the mathematical expectation, variance and the trace of a matrix, respectively. N and R denote the sets of natural and real numbers, respectively. R m×n denotes the sets of m by n real-valued matrices, whereas R n is short for R n×1 . R n×n + and R n×n ++ are the sets of n × n positive semi-definite and positive definite matrices, respectively. When X ∈ R n×n + , it is simply denoted as X ≥ 0 or X > 0 if X ∈ R n×n ++ . For X ∈ R m×n , X T denotes the transpose of X and X denotes the Euclidean norm of X. "I" denotes a identity matrix with appropriate dimensions. Furthermore, the terms state observer and state estimator are used synonymously in this paper.

System Model
Consider the following stochastic linear system defined on k ∈ [0, N − 1]: In above equations, the constant subscript "k" is a discrete-time index, system state x k is a n-dimensional vector. The variablesȳ k ∈ R p is the sensor's measurement signals. The additional terms, fault signals f k is a q-dimensional vector to be detected as well as estimated, and d k is bounded external disturbances with dimension of s. The process noises {w k } and the measurement noises {v k } are assumed white and zero-mean sequences with known variance: respectively. The adopted mathematical model of randomly occurring deception attacks is described by where the variablesȳ a,k ∈ R p and y k ∈ R p are the attack signals sent by adversaries and the received measurement signals by the remote estimator, respectively. The non-zero β k satisfying β k ≤ β is an arbitrary limited magnitude signal where the bound β is a known positive scalar that can be estimated through statistical tests or specified by security requirements. The random variable α k is a Bernoulli distributed white sequence with the following probabilities As can be seen from (2), it is clear that if a deception attack occurs, i.e., α k = 1, the remote estimator can only obtain the signals β k sent by attackers. If α k = 0, the actual measurement signalsȳ k are sent to the remote estimator. In other words, the actual measurement signals received by remote estimator can be rewritten as follows Throughout this paper, the noise signals {w k }, {v k } and the stochastic variable α k are assumed mutually independent. It is further supposed that the matrices A, C,F,F, W, D and V with appropriate dimensions are known. Furthermore, an event-triggered transmission decision variable γ k determines whether the current measurement information is sent to the remote estimator or not. When γ k = 1 indicates that y k is sent out and γ k = 0, otherwise. Therefore, only when γ k = 1, the remote estimator knows the exact value y k . Clearly, the corresponding event only happens at each time instant. Remark 1. In practice, attack detectors are usually viewed as a soft barrier, and there exists some network constraints that should be faced by the adversaries. Such constraints include network load, network congestion, and network transmission rate that are typically randomly fluctuated [5]. This kind of random characteristic from network constraints should be taken into consideration if a comprehensive yet realistic deception attack model is to be established. In addition, such a random nature brings a new challenge when designing our fault-detection filter and fault estimator. For the above system, two assumptions are first introduced as follows. Assumption 1. [24] rank (C × D) = rank (D)

Assumption 2. [11]
For every complex number ζ with nonnegative real part,

Transforming of the System into Two Subsystems
Inspired by [11,24,25], we will adopt the coordinate transformation approach to transform the system into two subsystems: the first subsystem will free from disturbances, but subject to system faults. For the first subsystem, a fault-detection residual based on the derived fault-detection filter will only sensitive to faults; inversely, the desired fault estimator of the second subsystem will include disturbances and system faults, which will robust to disturbances. The transformation results are briefly presented below.
According to [11], Assumption 1 is equivalent to the existence of two non-singular matrices T and S such that x 2 , and y = S −1 ỹ 1 y 2 respectively, so that the system can be accordingly transformed intõ where MatrixD d has full rank andC 22 is invertible. It was shown in [11] that the pair C 11 ,Ã 11 was detectable if and only if Assumption 2 was satisfied. Two subsystems given by (8) can be rewritten separately as The 1st subsystem: The 2nd subsystem: Remark 2. From the Formula (11) and (12), it can be easily seen that the 1st subsystem is not included disturbances, as well as the 2nd subsystem contains both. For the 1st subsystem, a fault-detection filter and fault-alarming strategy will be designed under an event-triggered data transmission framework; for the 2nd subsystem, an event-triggered fault estimator will be derived.
Before giving the main results, the following lemma, which will be useful in this paper, needs to be introduced. Lemma 1. (Lemma 1 [26]) For any two matrices X and Y with appropriate dimensions, the inequality XY T + YX T ≤ τXX T + τ −1 YY T holds where τ > 0 is a constant scalar.

Event-Triggered Fault-Detection Strategy Based on Reduce-Order Filter
In this section, a fault-detection system will be presented involving a residual generator, a residual evaluator and fault-alarming strategy under an event-triggered data transmission framework.

Residual Generator
For the residual generation, the following reduce-order filter is constructed as follows wherex i k andŷ i k indicate estimated state and output estimation values for each i = 1 and 2, respectively. The matrix K 1 k is the filtering gain to be determined. Denote state estimation errors for each i = 1 and 2 as Then, the corresponding error dynamics of the 1st subsystem without system faults are calculated by subtracting the filtering (13) from the 1st subsystem (11) Further, let us define error covariance P i k for each i = 1 and 2 as The purpose of this section is to design a form (13) of fault-detection filter for the 1st subsystem (11) subject to deception attacks. More specifically, we are interested in looking for the filtering parameter K 1 k such that the following requirements are met simultaneously: (1) A form (13) of fault-detection filter such that an upper bound of the filter error convariance P 1 k is derived, i.e., there exists a sequence of positive-definite matricesP 1 (2) The sequence of upper boundP 1 k is minimized by the desired filtering gain K 1 k through a recursive scheme. Now, an upper bound of the filtering error convariance is presented for our proposed fault-detection filter in the following theorem.

Theorem 1.
For the 1st subsystem (11) subject to deception attacks in the fault-free case and given τ j (j = 1, 2, and 3), the filtering error covariance satisfies the following form: Proof. Based on the error dynamics of the 1st subsystem (15) and the definition of the filtering error covariance (16), the expression for the error covariance matrix of the 1st subsystem can be expanded as where To obtain an upper bound of P 1 k+1 , the following parts of this theorem can be proved by mathematical induction. According to the initial condition, we haveP 1 0 ≥ P 1 0 . Assume thatP 1 k ≥ P 1 k , and thenP 1 k+1 ≥ P 1 k+1 need to be proved. With the help of Lemma 1, it follows from (21) that Combining inequality β k ≤ β into Formula (22) leads to which implies that inequality (18) is true.
So far, the upper bound of the filtering error covariance has been presented in the above results. We are now in a position to derive the desired filtering gain K 1 k through minimizing this upper bound at every time instant. Theorem 2. Consider the 1st subsystem (11) with deception attacks in the fault-free case. For given τ j (j = 1, 2, and 3), the filtering gain is given by The obtained upper boundP 1 k+1 of the filtering error covariance P 1 k+1 on the 1st subsystem is minimized at each time instant.
Proof. The filtering gain described by (13) is optimal in the sense that minimizes the upper bound of filtering error covariance. Notice that the first, second and third terms on the upper bound (19) are quadratic in K 1 k . The matrix differentiation formula can be applied to Formula (19), and differentiate tr P 1 k+1 with respect to K 1 k . The result is Now, set the derivative equal to zero and solve for the optimal gain. The following form can be derived: Remark 3. In the Theorems 1 and 2, the constructed fault-detection filter has been presented for stochastic systems against randomly occurring deception attacks. The available information of the deception attacks has been reflected in our proposed filtering design including α, α 1 , α 2 and β. In addition, three scalars τ 1 , τ 2 and τ 3 have been introduced to enhance the flexibility in our fault-detection filter.

Remark 4.
Theorem 2 provides the optimal gain K 1 k without system faults, which is similar to the discrete-time standard Kalman filter [27]. Consequently, when the 1st subsystem is healthy, the mean-square filtering error is minimized so as to ensure accurate estimation; otherwise, the filtering error will be bigger than the system without fault to achieve the purpose of fault alarming.

Fault-Alarming Strategy
Prior to presenting a novel fault-alarming strategy, a fault indicating signal (i.e., residual), can be generated using the output estimation of the 1st subsystem as follows Now, our event-triggered fault-alarming strategy is presented in Figure 1 and Algorithm 1. As shown in Figure 1, the remote estimation of a system is based on the measurements taken by a battery-powered sensor. The remote estimator receives the measurements through a wireless channel. A copy of remote estimator and event generator (which is also called event-triggered data transmission scheme) determines whether the current measurement information is sent to the remote estimator or not. When an event occurs i.e., γ k = 1, the remote estimator receives the measurement, otherwise γ k = 0. A local estimator runs the fault-detection residual of the above 1st subsystem that we defined. Clearly, if the system is free from faults ( f k ≡ 0), then lim t→∞ E (r k ) ≈ 0; conversely, if a fault occurs in the system (F 1 f k = 0 andF 1 f k = 0), then lim t→∞ E (r k ) 0 to achieve fault alarming. Furthermore, a copy of remote estimator, event generator and local estimator are supposed to be integrated in an embedded system which is presented in the experimental verification.
Step 1: Design a bank of fault-detection filter of the form (13).
Step 2: Compute the fault-detection residuals r k , and choose a threshold δ f which can be chosen as small as possible theoretically.
Step 3: If r k < δ f , there exists no fault and the corresponding fault-alarming is turned off.
Step 4: If γ k = 1, the current measurements can be sent to the remote estimator.
Step 5: else γ k = 0, the remote estimator cannot receive the measurements to achieve energy saving.
Step 6: end if Step 7: else r k ≥ δ f , a fault has occured and the corresponding fault alarming is turned on. For the purpose of detecting system fault in the remote estimator, the current sensor measurements is sent to the remote estimator without entering the event-triggered decision.
Step 8: end if Step 9: end As discussed in Algorithm 1, if r k < δ f , it implies that the system is free from fault; and then, the event-triggered data transmission scheme can be utilized to achieve energy conversation. On the other hand, if r k ≥ δ f , it is claimed that the system is faulty. The current sensor information is sent to the remote estimator manually without entering event-triggered decision. The delay issue of fault-alarming can be effectively solved, although such strategy may reduce working-life of battery slightly.

Co-Design Scheme of Fault Estimator and Event-Triggered Generator
After a fault occurs, a fault estimator for subsystem (12) is constructed as follows: wherex 2 k is an estimated state and the matrices K i k (i = 2 and 3) are estimator's gains with appropriate dimensions to be designed. Fault estimation signalf k+1 is updated by the estimated informationf k as well as output estimation errorˆy 2 k . The previous measurement informationỹ 2 p,k is transmitted from sensor to remote fault estimator module when no new measurement information is transmitted. In the event generator module described in Figure 1, sensor information is not transmitted at each time instant, rather this is done only at the transmission times that are denoted by k s and s ∈ N. As a result, measurements sent to the remote fault estimator module can be expressed asỹ i p,k =ỹ i k s (i = 1 and 2), k ∈ [k s , k s+1 ) and k ∈ N where k s+1 > k s .

Remark 5.
It is worth mentioning that our fault estimator utilizes the previous received measurement informationỹ 2 p,k because of implementation of event generator. As discussed in Algorithm 1, the current measurement information is sent to the remote estimator without entering the event-triggered decision when a fault occurs. However, such a remote fault estimator can ensure that the undetected faults are also estimated if the event condition is triggered.
Denote fault estimation error and the corresponding error covariance as Then, the error dynamics of the 2nd subsystem can be formulated as which can be rewritten as Remark 6. Literature [28,29] assumed that the fault difference item was too small to be neglected, because the sampling interval were supposed to be sufficiently small. However, in many practical cases, faults might generate a great amplitude change of at a certain time, especially when time-varying faults occur. Hence, the paper considers the effect on the estimation performance, which reduces the conservatism of our fault estimator.
Similar to the design of fault-detection filter gain, the gains K 2 k , K 3 k and the corresponding event-triggered data transmission scheme can be derived such that upper bounds of state and fault estimation error covariance are minimized at each time step. Before proceeding further, the following assumption is made.

Assumption 3. [11] For a small positive constant b d , the inequality
where · is the Euclidean norm.
Now, it is ready to give the upper bounds of both the covariance matrix P 2 k of estimation error and the fault estimation error covariance P f ,k in the following theorem. Theorem 3. For given positive scalars δ e , τ j (j = 4, ..., 15) and ρ j (j = 1, ..., 12), the state estimation error covariance P 2 k and fault estimation error covariance P f ,k have the following upper boundsP 2 k andP f ,k with initial conditionsP 2 0 = P 2 0 andP f ,0 = P f ,0 , respectively, wherē Furthermore, the event condition satisfies that Proof. First, recall from the definition of state estimation error covariance (16), P 2 k can be calculated as follows By using the result of Lemma 1, the above equation can be simplified as and β k ≤ β, (39) can be further reduced as If the event condition is satisfied, i.e., ỹ 2 k −ỹ 2 p,k ≤ δ e , we have Next, let us calculate the error covariance of fault estimation as follows Similar to the derivations of (39), (40) and (41), the upper bound of P f ,k+1 can be given by Subsequently, by employing the mathematical induction approach, it is not difficult to verify that P f ,k+1 ≤P f ,k+1 and P 2 k+1 ≤P 2 In what follows, the explicit forms of the fault estimator gains will be given via minimizing the obtained upper boundsP f ,k+1 andP 2 k+1 at each time step.

Theorem 4.
For the addressed subsystem (12) suffering from deception attacks, the gains of the proposed fault estimator (29) are given by With the aid of estimator gains (45) and (46), the obtained upper boundsP 2 k+1 andP f ,k+1 of the state and fault estimation error-covariance matrices in (38) and (42) can separately be minimized at each time step.
Proof. According to Theorem 3, the design of gains K 2 k and K 3 k needs to be minimized by tr P 2 k+1 and tr P f ,k+1 , respectively. For this purpose, taking the derivatives of tr P 2 k+1 and tr P f ,k+1 with respect to K 2 k and K 3 k , respectively; and then, getting the derivatives be zero, we obtain ∂ tr P f ,k+1 which can be further calculated as follows Hence, the desired filter gain matrices can be obtained via (51)  CalculateP 1 k ,P 2 k andP f ,k sequentially according to (19), (35) and (36); 3: Calculate K 1 k , K 2 k and K 3 k in terms of (24), (45) and (46); 4: if ỹ 2 k −ỹ 2 p,k ≤ δ e then 5: γ k = 0, the remote fault estimator cannot receive the current measurement information to achieve energy conversation; 6: State estimation step: 10: Fault estimation step: 13: else 14: γ k = 1, the current measurement information can be allowed to send out to ensure robust estimation; 15: State estimation step: 18: Fault estimation step:  (35) and (36), represent the available items of randomly occurring deception attacks, event condition and fault difference, respectively. it is easily shown that the state and fault estimation error-covariance bounds are dependent on these scalars which means that bigger scalars β, δ e and b d could lead to bigger upper bounds. It can be noted that the derivations of event-triggered state estimator for the 1st subsystem is not included in the proof of Theorems 3 and 4. They are omitted because their derivations are similar to the derivations of fault estimator for the 2nd subsystem, which have little influence on our main results. Furthermore, the performance of the proposed fault estimator coincides with that of the time-driven estimator for δ e = 0. Hence, the derivation of event-triggered fault estimator is omitted, when γ k = 1.

Remark 8.
From the event condition in (37), it is clear that the proposed event-triggered sensor data-transmission scheme is based on a send-on-delta regulation [30,31], namely, only when the measurement values change more than a predetermined threshold, the sensors transmit their sampling data to remote data centers for processing. Neither the approximated probability density functions of states conditional on measurements nor the assumption on the distribution of δ k is required in the presented fault estimator. In addition, the implementation of event-triggered scheme cannot bring too much computational burden, which is proved in the next section. The design of fault-detection filter and fault estimator are simple because they are based on reduced-order subsystems. In other words, the applicability and feasibility of the event-triggered fault estimator are enhanced.

Experimental Setup
To evaluate the performance of the designed fault-detection strategy and event-triggered fault estimator, a simulation platform, representing a scaled version of an industrial system, is implemented, where the terminal voltages of a three-cell battery string are observed over a wireless channel. As shown in Figure 2, the dynamic system which worked in a local personal computer which collocated with a sensor node communicates wirelessly with a remote estimator. We now describe the details of the components of our system.  Figure 3 shows that hardwares of wireless sensor node that consist of an STM8S micro-controller, USR-C322 transceiver and a rechargeable polymer lithium-ion battery. The reason why we choose the wireless transceiver is that it can use a low power consumption pattern. Indeed, most wireless modules belong to the characteristic of high performance in the mainstream market. Despite the fact that event-triggered transmission mechanism can make the wireless modules sleep, it still consumes the energy similarly as it works. Luckily, this problem has been successfully solved through choosing USR-C322. Then, it makes the module enter a "status of deep sleep" and stop working completely. Moreover, STM8S microcontroller has embedded 32 Kbyte Flash, 2 Kbyte RAM, 16-bit advanced control timer and abundant communication interfaces that allow us to use them as a sensor node. The selection of STM8S microcontroller implies that the implementation of event-triggered scheme cannot bring too much computational burden. More information about the hardwares of the node can be found in [32,33]. Now, the proposed theoretical results is applied to a linear continuous-time system of the three-cell battery string presented in [11]. After discretisation with sampling period T = 1s, the discrete-time system can be described as the system (1) where and V i k are the terminal voltage of each cell of the ith cell. Control input of this batter system u k = Z 1 C u in which Z is state of charge and the current C u = 3A.
Considering the main technical specifications of voltage sensors, the following parameters are chosen as Q w = 0.2915 and R v = 0.3606. For k = 0, 1, . . . N − 1 and N = 100, the unknown disturbances d k are supposed to be a random noise uniformly distributed in [−0.32, 0.32].
In order to transform the original system, the following transform matrices S and T are used as Then, we have The probability of deception attacks, the upper bound of fault difference item and the event-triggered transmission threshold are selected respectively as: α = 2%, b d = 0.45 and δ e = 0.017. Furthermore, τ j (j = 1, ..., 15) are chosen as 1, β and ρ j (j = 1, ..., 12) are determined as 0.15.

Experimental Results
The experiment consisting of four parts are designed to verify the effectiveness of the obtained theoretical results: (A) the performance on the remote state estimation without faults and fault-detection strategy; (B) the accuracy on the remote fault estimation and comparsion between a learning observer [11,34] and our proposed algorithm; (C) the analysis on the energy-saving trend of a 50 mAh polymer lithium-ion battery and (D) the effect on remote event-triggered fault estimator with the increased probabilities of deception attacks. Experiment 1. In the first experiment, the information sent by attacker is β k = 0.1e −0.5k 0.13 sin k 0 T , which is also applied to the subsequent experiments. The performance on remote state estimation with fault-free condition and fault-alarming strategy are verified in Figures 4-7. As shown in Figures 4-6, the estimated voltages by an event-triggered state estimator (ETSE) approximately closes to the measured trajectories and the estimated voltages by a time-driven state estimator (TDSE), leading to a accurate state estimation result. Next, assume that a unknown fault is created as follows: In Figure 7, the red line at 0.5 V is the threshold δ f that we selected for fault alarming. When a fault occurs at 20 s, fault-detection residual r k is quickly diverging. Comparatively, the residual r k with no fault still remains a convergence status. It is clear that fault can be detected immediately via the proposed fault-alarming strategy.     Figure 10. The corresponding communication behaviors of event-triggered sensor transmission scheme are also presented in Figure 10. It is indicated that the square error using the proposed estimation algorithm is slightly larger than the learning observer. From these figures, it can be concluded that the estimation performance is not decreased obviously although the obtained event-triggered strategy reduces the transmission times relatively.

Experiment 3.
In order to investigate the proposed event-triggered transmission scheme which influences the battery life, we use a 50 mAh Polymer Lithium-Ion battery to complete our third experiment. As shown in Figure 11, the batteries have been fully charged when we get ready to run the procedure, while the wireless sensor nodes have not worked in Figure 12 since the batteries were run out. The relationship between time and 50 mAh battery voltages is given in Figure 13, which is shown to compare with periodic data transmission mechanism, the proposed event-triggered sensor data transmission scheme can prolong about 11.8% battery life.     Figure 14. It can be found that a bigger attack probability results in a bigger error bound, which implies that estimation performance degrades slightly as the attack probability increases.

Conclusions and Future Work
This paper presented a synthesized design of two types of estimators to simultaneously event-triggered fault detection and fault estimation for a class of discrete-time stochastic systems subject to subject to unknown disturbances and randomly occurring deception attacks. The unknown disturbances were removed from the 1st subsystem using a coordinate transformation approach so as to ensure the sensitivity of fault detection. An upper bound of fault-detection filtering error covariance matrix was recursively calculated by a Riccati-type difference equation. The explicit form of the fault-detection filtering gain was obtained to minimize such upper bound through a recursive algorithm. In order to achieve real-time capacity of fault-detection, a novel fault-alarming framework was considered which could effectively solve a time-delay issue of fault alarming when an event condition was triggered. Similar to the design of fault-detection filter, fault estimator was designed so as to derive the upper bounds of state and fault estimation error covariance matrices and minimize them at each time step. At the end of paper, a simulation platform, where the terminal voltages of a three-cell battery string was estimated over a wireless channel, was verified to the feasibility and effectiveness of the proposed theoretical results. In the future, the proposed results will be extended to some more practical cases including more general time-varying nonlinear systems and multi-sensor scheduling problems.