How to Secure Distributed Filters Under Sensor Attacks

نویسندگان

چکیده

In this article, we study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able arbitrarily manipulate the observations a time-varying and unknown subset of sensors. We first propose recursive filter consisting two steps at each update. The step employs saturation-like scheme, which gives small gain if innovation large corresponding potential attack. second consensus operation state estimates among neighboring prove estimation error upper parameters satisfy condition. further analyze feasibility condition connect it sparse observability in centralized case. When attacked sensor set known be time-invariant, secured modified by adding an online local attack detector. detector identify sensors whose observation innovations are larger than detection thresholds. Also, more being detected, thresholds will adaptively adjust reduce space stealthy signals. resilience verified explicit relationship between bound number detected Moreover, noise-free case, that estimate asymptotically converges system certain conditions. Numerical simulations provided illustrate developed results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Satisfiability Modulo Theory Approach to Secure State Reconstruction in Differentially Flat Systems Under Sensor Attacks

We address the problem of estimating the state of a differentially flat system from measurements that may be corrupted by an adversarial attack. In cyber-physical systems, malicious attacks can directly compromise the system’s sensors or manipulate the communication between sensors and controllers. We consider attacks that only corrupt a subset of sensor measurements. We show that the possibili...

متن کامل

Secure Computation Under Network and Physical Attacks

Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network con...

متن کامل

Decentralized Sensor Fusion with Distributed Particle Filters

This paper presents a scalable Bayesian technique for decentralized state estimation from multiple platforms in dynamic environments. As has long been recognized, centralized architectures impose severe scaling limitations for distributed systems due to the enormous communication overheads. We propose a strictly decentralized approach in which only nearby platforms exchange information. They do...

متن کامل

Sensor Network Configuration Under Physical Attacks

Sensor networks typically operate in hostile outdoor environments. In such environments, sensor networks are highly susceptible to physical attacks that can result in physical node destructions. In this paper, we study the impacts of physical attacks on sensor network configuration. Lifetime is an important metric during configuration for many sensor applications. While lifetime is constrained ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Automatic Control

سال: 2022

ISSN: ['0018-9286', '1558-2523', '2334-3303']

DOI: https://doi.org/10.1109/tac.2021.3092603