Resilient Consensus-Based Distributed Filtering: Convergence Analysis Under Stealthy Attacks
被引:43
作者:
Huang, Jiahao
论文数: 0引用数: 0
h-index: 0
机构:
East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R ChinaEast China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
Huang, Jiahao
[1
]
Tang, Yang
论文数: 0引用数: 0
h-index: 0
机构:
East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R ChinaEast China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
Tang, Yang
[1
]
Yang, Wen
论文数: 0引用数: 0
h-index: 0
机构:
East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R ChinaEast China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
Yang, Wen
[1
]
Li, Fangfei
论文数: 0引用数: 0
h-index: 0
机构:
East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R ChinaEast China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
Li, Fangfei
[2
]
机构:
[1] East China Univ Sci & Technol, Key Lab Adv Control & Optimizat Chem Proc, Minist Educ, Shanghai 200237, Peoples R China
[2] East China Univ Sci & Technol, Dept Math, Shanghai 200237, Peoples R China
Cyber-physical systems (CPSs);
distributed estimation;
security;
stealthy attack;
ENERGY MANAGEMENT ALGORITHM;
CYBER-PHYSICAL SYSTEMS;
FALSE DATA INJECTION;
DATA INTEGRITY;
STATE ESTIMATION;
ACTIVATION;
D O I:
10.1109/TII.2019.2960042
中图分类号:
TP [自动化技术、计算机技术];
学科分类号:
0812 ;
摘要:
In this article, we consider the security problem for the consensus-based distributed state estimation. To resist the malicious attacker who can falsify the data transmitted through the wireless channel, each node equips with an attack defender, which is based on the measurement of its built-in sensor. Under the stealthy attack, which can deceive the defender, we investigate the resilience and convergence of the distributed estimation in two different attack scenarios. For the attack with enough communication resources, we provide a sufficient condition of the optimal attack to quantify the maximum estimation performance degradation. We also analyze the resilience of the worst case distributed estimation caused by the attacker. For the attack with limited resources, the optimal Kalman gain for each node is derived to maximize its estimation performance under the attack. We also give a sufficient condition to guarantee the convergence of the distributed estimation in this case. Finally, numerical simulations are provided to illustrate the effect of the defender on guaranteeing the resilience of sensor networks against attacks.