Secure Distributed Estimation Over Wireless Sensor Networks Under Attacks

被引:53
作者
Liu, Ying [1 ]
Li, Chunguang [1 ]
机构
[1] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
LEAST-MEAN SQUARES; DATA INJECTION ATTACKS; GOSSIP ALGORITHMS; FORMULATION; STRATEGIES; CONSENSUS;
D O I
10.1109/TAES.2018.2803578
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The problem of distributed estimation over wireless sensor networks in an adversarial environment with the presence of attacks on sensed and communicated information is considered. To tackle with this problem, a secure diffusion least-mean squares (S-dLMS) algorithm is proposed. The proposed S-dLMS can be considered as a hybrid system, which consists of a noncooperative LMS (nc-LMS) subsystem and a diffusion LMS (dLMS) subsystem. The nc-LMS subsystem is used to provide a reliable reference estimate, which is further used for constructing the threshold test to detect the trust neighbors of each node. Then, based on the detected secure network topology, the dLMS subsystem is performed by combining the received information from the trust neighbors. The performance of the proposed S-dLMS algorithm in the mean and mean-square senses is analyzed, and then an adaptive rule is suggested to select the threshold for detection. Finally, some simulations are performed to show the effectiveness of the proposed S-dLMS algorithm under fixed and time-varying attacks, respectively.
引用
收藏
页码:1815 / 1831
页数:17
相关论文
共 42 条
[1]  
[Anonymous], 2003, Fundamentals of Adaptive Filtering
[2]  
[Anonymous], STATE ESTIMATION ELE
[3]  
Blondel VD, 2005, IEEE DECIS CONTR P, P2996
[4]   Diffusion recursive least-squares for distributed estimation over adaptive networks [J].
Cattivelli, Federico S. ;
Lopes, Cassio G. ;
Sayed, Ali. H. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (05) :1865-1877
[5]   Diffusion LMS Strategies for Distributed Estimation [J].
Cattivelli, Federico S. ;
Sayed, Ali H. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1035-1048
[6]   Gossip Algorithms for Distributed Signal Processing [J].
Dimakis, Alexandros G. ;
Kar, Soummya ;
Moura, Jose M. F. ;
Rabbat, Michael G. ;
Scaglione, Anna .
PROCEEDINGS OF THE IEEE, 2010, 98 (11) :1847-1864
[7]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[8]   Data Injection Attacks in Randomized Gossiping [J].
Gentz, Reinhard ;
Wu, Sissi Xiaoxiao ;
Wai, Hoi-To ;
Scaglione, Anna ;
Leshem, Amir .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2016, 2 (04) :523-538
[9]   Estimation in Wireless Sensor Networks With Security Constraints [J].
Guo, Xiaoxi ;
Leong, Alex S. ;
Dey, Subhrakanti .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2017, 53 (02) :544-561
[10]   Distributed Bayesian Detection in the Presence of Byzantine Data [J].
Kailkhura, Bhavya ;
Han, Yunghsiang S. ;
Brahma, Swastik ;
Varshney, Pramod K. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (19) :5250-5263