Distributed estimation of sensor networks with false data injection attack recognition and communication triggering mechanism

被引:0
作者
Cai W. [1 ,2 ]
Zhang Y. [1 ,2 ]
机构
[1] School of Automation, Southeast University, Nanjing
[2] Key Laboratory of Measurement and Control of Complex Systems of Engineering of Ministry of Education, Southeast University, Nanjing
来源
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) | 2019年 / 49卷 / 05期
关键词
Distributed estimation; Event-trigger; False data injection attacks; Sensor networks;
D O I
10.3969/j.issn.1001-0505.2019.05.011
中图分类号
学科分类号
摘要
To improve the distributed filtering performance of sensor networks under injection attack and solve the problem of energy limitation in network communication transmission process, a distributed filtering algorithm with communication triggering mechanism and attack detection was designed. By studying the measurement residuals between the prior estimated data and the actual measurement data of the sensor node, the detection conditions of the sensor node under injection attack were obtained, so as to remove the attacked data and ensure the normal operation of the system. The sensor node established an event-triggered communication mechanism by comparing the latest data sent to the neighbor node with the new measurement data to decide whether to send data to neighbor nodes. Simulation results show that the algorithm has a high rate of attack recognition up to 90% and can improve the performance of the system while reducing the communication rate. The distributed filtering algorithm with communication triggering mechanism and attack detection can be used to solve distributed filtering problems with energy limitation and injection attack. © 2019, Editorial Department of Journal of Southeast University. All right reserved.
引用
收藏
页码:890 / 896
页数:6
相关论文
共 16 条
[1]  
Wang Q., Tai W., Tang Y., Et al., A review on false data injection attack toward cyber-physical power system, Acta Automatica Sinica, 45, 1, pp. 72-83, (2019)
[2]  
Ren X.Q., Wu J.F., Dey S., Et al., Attack allocation on remote state estimation in multi-systems: Structural results and asymptotic solution, Automatica, 87, pp. 184-194, (2018)
[3]  
Li L., Zhang H.X., Xia Y.Q., Et al., Security estimation under denial-of-service attack with energy constraint, Neurocomputing, 292, pp. 111-120, (2018)
[4]  
Ding K.M., Li Y.Z., Quevedo D.E., Et al., A multi-channel transmission schedule for remote state estimation under DoS attacks, Automatica, 78, pp. 194-201, (2017)
[5]  
Chang Y.H., Hu Q., Tomlin C.J., Secure estimation based Kalman Filter for cyber-physical systems against sensor attacks, Automatica, 95, pp. 399-412, (2018)
[6]  
Peng D.T., Dong J.M., Cai Z.M., Et al., On the stability of cyber-physical systems under false data injection attacks, Acta Automatica Sinica, 45, 1, pp. 196-205, (2019)
[7]  
Ao W., Song Y.D., Wen C.Y., Distributed secure state estimation and control for CPSs under sensor attacks: A finite time approach, Acta Automatica Sinica, 45, 1, pp. 174-184, (2019)
[8]  
Guo Z.Y., Shi D.W., Johansson K.H., Et al., Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 89, pp. 117-124, (2018)
[9]  
Anderson B.D.O., Moore J.B., Eslami M., Optimal filtering, IEEE Transactions on Systems, Man, and Cybernetics, 12, 2, pp. 235-236, (1982)
[10]  
Hu L., Wang Z.D., Han Q.L., Et al., State estimation under false data injection attacks: Security analysis and system protection, Automatica, 87, pp. 176-183, (2018)