Cargando…
Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a network...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679323/ https://www.ncbi.nlm.nih.gov/pubmed/31337128 http://dx.doi.org/10.3390/s19143112 |
_version_ | 1783441312275496960 |
---|---|
author | Caballero-Águila, Raquel Hermoso-Carazo, Aurora Linares-Pérez, Josefa |
author_facet | Caballero-Águila, Raquel Hermoso-Carazo, Aurora Linares-Pérez, Josefa |
author_sort | Caballero-Águila, Raquel |
collection | PubMed |
description | In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a networked system, whose sensors are grouped into clusters. Each cluster is connected to a local processor which gathers the measured outputs of its sensors and, in turn, the local processors of all clusters are connected with a global fusion center. The proposed cluster-based fusion estimation structure involves two stages. First, every single sensor in a cluster transmits its observations to the corresponding local processor, where least-squares local estimators are designed by an innovation approach. During this transmission, deception attacks to the sensor measurements may be randomly launched by an adversary, with known probabilities of success that may be different at each sensor. In the second stage, the local estimators are sent to the fusion center, where they are combined to generate the proposed fusion estimators. The covariance-based design of the distributed fusion filtering and fixed-point smoothing algorithms does not require full knowledge of the signal evolution model, but only the first and second order moments of the processes involved in the observation model. Simulations are provided to illustrate the theoretical results and analyze the effect of the attack success probability on the estimation performance. |
format | Online Article Text |
id | pubmed-6679323 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-66793232019-08-19 Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks Caballero-Águila, Raquel Hermoso-Carazo, Aurora Linares-Pérez, Josefa Sensors (Basel) Article In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a networked system, whose sensors are grouped into clusters. Each cluster is connected to a local processor which gathers the measured outputs of its sensors and, in turn, the local processors of all clusters are connected with a global fusion center. The proposed cluster-based fusion estimation structure involves two stages. First, every single sensor in a cluster transmits its observations to the corresponding local processor, where least-squares local estimators are designed by an innovation approach. During this transmission, deception attacks to the sensor measurements may be randomly launched by an adversary, with known probabilities of success that may be different at each sensor. In the second stage, the local estimators are sent to the fusion center, where they are combined to generate the proposed fusion estimators. The covariance-based design of the distributed fusion filtering and fixed-point smoothing algorithms does not require full knowledge of the signal evolution model, but only the first and second order moments of the processes involved in the observation model. Simulations are provided to illustrate the theoretical results and analyze the effect of the attack success probability on the estimation performance. MDPI 2019-07-14 /pmc/articles/PMC6679323/ /pubmed/31337128 http://dx.doi.org/10.3390/s19143112 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Caballero-Águila, Raquel Hermoso-Carazo, Aurora Linares-Pérez, Josefa Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title | Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title_full | Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title_fullStr | Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title_full_unstemmed | Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title_short | Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks |
title_sort | covariance-based estimation for clustered sensor networks subject to random deception attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679323/ https://www.ncbi.nlm.nih.gov/pubmed/31337128 http://dx.doi.org/10.3390/s19143112 |
work_keys_str_mv | AT caballeroaguilaraquel covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks AT hermosocarazoaurora covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks AT linaresperezjosefa covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks |