TY - JOUR
T1 - Distributed filtering under false data injection attacks
AU - Yang, Wen
AU - Zhang, Yu
AU - Chen, Guanrong
AU - Yang, Chao
AU - Shi, Ling
PY - 2019/4
Y1 - 2019/4
N2 - We consider the problem of network security for distributed filtering under false data injection attacks over a wireless sensor network. To resist the hostile attacks from a malicious attacker who can inject false data into communication channels according to a certain probability, we design a protector for each sensor based on the online innovation information from its neighboring sensors to decide whether to use the received data at each time. To guarantee the Gaussianity of the innovations, we use a stochastic rule to transform the threshold detection. We also provide a sufficient condition for the stability of the estimator equipped with the proposed protector under hostile attacks. Moreover, we find a critical attack probability above which the steady-state estimation error covariance will exceed a pre-set value. Finally, we compare the estimation performances among several protection strategies, and explore the relationship between the system parameters and the protection effect.
AB - We consider the problem of network security for distributed filtering under false data injection attacks over a wireless sensor network. To resist the hostile attacks from a malicious attacker who can inject false data into communication channels according to a certain probability, we design a protector for each sensor based on the online innovation information from its neighboring sensors to decide whether to use the received data at each time. To guarantee the Gaussianity of the innovations, we use a stochastic rule to transform the threshold detection. We also provide a sufficient condition for the stability of the estimator equipped with the proposed protector under hostile attacks. Moreover, we find a critical attack probability above which the steady-state estimation error covariance will exceed a pre-set value. Finally, we compare the estimation performances among several protection strategies, and explore the relationship between the system parameters and the protection effect.
KW - Distributed estimation
KW - False data injection attack
KW - Modified algebraic Riccati equation
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=85060094549&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85060094549&origin=recordpage
U2 - 10.1016/j.automatica.2018.12.027
DO - 10.1016/j.automatica.2018.12.027
M3 - RGC 21 - Publication in refereed journal
SN - 0005-1098
VL - 102
SP - 34
EP - 44
JO - Automatica
JF - Automatica
ER -