Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks

Published: 01 July 2018 Publication History

Abstract

We consider distributed Kalman filtering for dynamic state estimation over wireless sensor networks. It is promising but challenging when network is under cyber attacks. The compromised nodes are likely to influence system security by broadcasting malicious false measurements or estimates to their neighbors, and result in performance deterioration. To increase network resilience to cyber attacks, in this paper, trust-based dynamic combination strategy is developed. The proposed distributed Kalman filtering scheme is resilient to random, false data injection and replay attacks. Furthermore, it is efficient in terms of communication load, only instantaneous estimates are exchanged between the neighboring nodes and compromised nodes localization is a byproduct.

References

[1]
R.E. Kalman, A new approach to linear filtering and prediction problems, J. Basic Eng. 82 (1) (1960) 35–45.
[2]
E.F. Nakamura, A.A.F. Loureiro, A.C. Frery, Information fusion for wireless sensor networks: methods, models, and classifications, ACM Comput. Surv. 39 (3) (2007) 1–55.
[3]
R. Faragher, Understanding the basis of the Kalman filter via a simple and intuitive derivation, IEEE Signal Process. Mag. 29 (5) (2012) 128–132.
[4]
M.S. Mahmoud, H.M. Khalid, Distributed Kalman filtering: a bibliographic review, IET Control Theory Appl. 7 (4) (2013) 483–501.
[5]
R. Olfati-Saber, Distributed Kalman filter with embedded consensus filters, in: Proc. of the 44th IEEE Conference on Decision and Control, 2005, pp. 8179–8184.
[6]
R. Olfati-Saber, Distributed Kalman filtering for sensor networks, in: Proc. 46th IEEE Conference on Decision and Control, 2007, pp. 5492–5498.
[7]
F. Cattivelli, A.H. Sayed, Diffusion distributed Kalman filtering with adaptive weights, in: Proc. Asilomar Conference on Signals, Systems and Computers, 2009.
[8]
F.S. Cattivelli, A.H. Sayed, Diffusion strategies for distributed Kalman filtering and smoothing, IEEE Trans. Autom. Control 55 (9) (2010) 2069–2084.
[9]
S. Julier, J. Uhlmann, A non-divergent estimation algorithm in the presence of unknown correlations, in: Proc. American Control Conference, 1997, pp. 2369–2373.
[10]
Y. Wang, X.R. Li, A fast and fault-tolerant convex combination fusion algorithm under unknown cross-correlation, in: Proc. International Conference on Information Fusion, 2009, pp. 571–578.
[11]
O. Hlinka, O. Sluciak, F. Hlawatsch, M. Rupp, Distributed data fusion using iterative covariance intersection, in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, 2014.
[12]
M. Reinhardt, B. Noack, P.O. Arambel, U.D. Hanebeck, Minimum covariance bounds for the fusion under unknown correlations, IEEE Signal Process. Lett. 22 (9) (2015) 1210–1214.
[13]
J. Hu, L. Xie, C. Zhang, Diffusion Kalman filtering based on covariance intersection, IEEE Trans. Signal Process. 60 (2) (2012) 891–902.
[14]
B. Khaleghi, A. Khamis, F.O. Karray, S.N. Razavi, Multisensor data fusion: a review of the state-of-the-art, Inf. Fusion 14 (1) (2013) 28–44.
[15]
L. Lei, W. Yang, C. Yang, H.B. Shi, False data injection attack on consensus-based distributed estimation, Int. J. Robust Nonlinear Control 27 (9) (2017) 1419–1432.
[16]
K. Manandhar, X. Cao, F. Hu, Y. Liu, Detection of faults and attacks including false data injection attack in smart grid using Kalman filter, IEEE Trans. Control Netw. Syst. 1 (4) (2014) 370–379.
[17]
Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids, ACM Trans. Inf. Syst. Secur. 14 (1) (2011) 13:1–13:33.
[18]
Y. Sang, H. Shen, Y. Inoguchi, Y. Tan, N. Xiong, Secure data aggregation in wireless sensor networks: a survey, in: Proc. International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006.
[19]
T. Jiang, I. Matei, J.S. Baras, A trust based distributed Kalman filtering approach for mode estimation in power systems, in: Proc. Workshop on Secure Control Systems, 2010, pp. 1–6.
[20]
S. Zheng, T. Jiang, J.S. Baras, Robust state estimation under false data injection in distributed sensor networks, in: Proc. IEEE Global Telecommunications Conference, 2010, pp. 1–5.
[21]
S.S. Kia, J. Cortés, S. Martínez, Distributed event-triggered communication for dynamic average consensus in networked systems, Automatica 59 (2015) 112–119.
[22]
T. Kanungo, D. Mount, N. Netanyahu, C. Piatko, R. Silverman, A. Wu, An efficient k-means clustering algorithm: analysis and implementation, IEEE Trans. Pattern Anal. Mach. Intell. 24 (7) (2002) 881–892.
[23]
V. Shnayder, M. Hempstead, B. rong Chen, G.W. Allen, M. Welsh, Simulating the power consumption of large-scale sensor network applications, in: Proc. of the 2nd International Conference on Embedded Networked Sensor Systems, 2004, pp. 188–200.
[24]
V.D. Blondel, J.M. Hendrickx, A. Olshevsky, J.N. Tsitsiklis, Convergence in multiagent coordination, consensus, and flocking, in: Proc. 44th IEEE Conference on Decision and Control and European Control Conference, IEEE, 2005, pp. 2996–3000.
[25]
F.S. Cattivelli, A.H. Sayed, Diffusion LMS strategies for distributed estimation, IEEE Trans. Signal Process. 58 (3) (2010) 1035–1048.

Cited By

View all
  • (2024)A Survey on Cyber-Resilience Approaches for Cyber-Physical SystemsACM Computing Surveys10.1145/365295356:8(1-37)Online publication date: 26-Apr-2024
  • (2024)Near-field beamforming method based on motion model analysis for UAVs communicationDigital Signal Processing10.1016/j.dsp.2024.104478149:COnline publication date: 1-Jun-2024
  • (2022)A hybrid framework for sequential data prediction with end-to-end optimizationDigital Signal Processing10.1016/j.dsp.2022.103687129:COnline publication date: 1-Sep-2022
  • Show More Cited By

Index Terms

  1. Distributed Kalman filtering for robust state estimation over wireless sensor networks under malicious cyber attacks
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Information & Contributors

              Information

              Published In

              cover image Digital Signal Processing
              Digital Signal Processing  Volume 78, Issue C
              Jul 2018
              404 pages

              Publisher

              Academic Press, Inc.

              United States

              Publication History

              Published: 01 July 2018

              Author Tags

              1. Distributed Kalman filtering
              2. Wireless sensor networks
              3. Cyber attacks
              4. Secured nodes
              5. Clustering

              Qualifiers

              • Research-article

              Contributors

              Other Metrics

              Bibliometrics & Citations

              Bibliometrics

              Article Metrics

              • Downloads (Last 12 months)0
              • Downloads (Last 6 weeks)0
              Reflects downloads up to 22 Feb 2025

              Other Metrics

              Citations

              Cited By

              View all
              • (2024)A Survey on Cyber-Resilience Approaches for Cyber-Physical SystemsACM Computing Surveys10.1145/365295356:8(1-37)Online publication date: 26-Apr-2024
              • (2024)Near-field beamforming method based on motion model analysis for UAVs communicationDigital Signal Processing10.1016/j.dsp.2024.104478149:COnline publication date: 1-Jun-2024
              • (2022)A hybrid framework for sequential data prediction with end-to-end optimizationDigital Signal Processing10.1016/j.dsp.2022.103687129:COnline publication date: 1-Sep-2022
              • (2022)Secure multitarget tracking over decentralized sensor networks with malicious cyber attacksDigital Signal Processing10.1016/j.dsp.2021.103132117:COnline publication date: 22-Apr-2022
              • (2021)Robust filtering algorithm against hybrid-attacks and randomly occurring nonlinearitiesDigital Signal Processing10.1016/j.dsp.2021.103159117:COnline publication date: 1-Oct-2021
              • (2020)Adaptive event-triggered synchronization control for complex networks with quantization and cyber-attacksNeurocomputing10.1016/j.neucom.2019.11.096382:C(249-258)Online publication date: 21-Mar-2020

              View Options

              View options

              Figures

              Tables

              Media

              Share

              Share

              Share this Publication link

              Share on social media