Cargando…

Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks

In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a network...

Descripción completa

Detalles Bibliográficos
Autores principales: Caballero-Águila, Raquel, Hermoso-Carazo, Aurora, Linares-Pérez, Josefa
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679323/
https://www.ncbi.nlm.nih.gov/pubmed/31337128
http://dx.doi.org/10.3390/s19143112
_version_ 1783441312275496960
author Caballero-Águila, Raquel
Hermoso-Carazo, Aurora
Linares-Pérez, Josefa
author_facet Caballero-Águila, Raquel
Hermoso-Carazo, Aurora
Linares-Pérez, Josefa
author_sort Caballero-Águila, Raquel
collection PubMed
description In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a networked system, whose sensors are grouped into clusters. Each cluster is connected to a local processor which gathers the measured outputs of its sensors and, in turn, the local processors of all clusters are connected with a global fusion center. The proposed cluster-based fusion estimation structure involves two stages. First, every single sensor in a cluster transmits its observations to the corresponding local processor, where least-squares local estimators are designed by an innovation approach. During this transmission, deception attacks to the sensor measurements may be randomly launched by an adversary, with known probabilities of success that may be different at each sensor. In the second stage, the local estimators are sent to the fusion center, where they are combined to generate the proposed fusion estimators. The covariance-based design of the distributed fusion filtering and fixed-point smoothing algorithms does not require full knowledge of the signal evolution model, but only the first and second order moments of the processes involved in the observation model. Simulations are provided to illustrate the theoretical results and analyze the effect of the attack success probability on the estimation performance.
format Online
Article
Text
id pubmed-6679323
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66793232019-08-19 Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks Caballero-Águila, Raquel Hermoso-Carazo, Aurora Linares-Pérez, Josefa Sensors (Basel) Article In this paper, a cluster-based approach is used to address the distributed fusion estimation problem (filtering and fixed-point smoothing) for discrete-time stochastic signals in the presence of random deception attacks. At each sampling time, measured outputs of the signal are provided by a networked system, whose sensors are grouped into clusters. Each cluster is connected to a local processor which gathers the measured outputs of its sensors and, in turn, the local processors of all clusters are connected with a global fusion center. The proposed cluster-based fusion estimation structure involves two stages. First, every single sensor in a cluster transmits its observations to the corresponding local processor, where least-squares local estimators are designed by an innovation approach. During this transmission, deception attacks to the sensor measurements may be randomly launched by an adversary, with known probabilities of success that may be different at each sensor. In the second stage, the local estimators are sent to the fusion center, where they are combined to generate the proposed fusion estimators. The covariance-based design of the distributed fusion filtering and fixed-point smoothing algorithms does not require full knowledge of the signal evolution model, but only the first and second order moments of the processes involved in the observation model. Simulations are provided to illustrate the theoretical results and analyze the effect of the attack success probability on the estimation performance. MDPI 2019-07-14 /pmc/articles/PMC6679323/ /pubmed/31337128 http://dx.doi.org/10.3390/s19143112 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Caballero-Águila, Raquel
Hermoso-Carazo, Aurora
Linares-Pérez, Josefa
Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title_full Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title_fullStr Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title_full_unstemmed Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title_short Covariance-Based Estimation for Clustered Sensor Networks Subject to Random Deception Attacks
title_sort covariance-based estimation for clustered sensor networks subject to random deception attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679323/
https://www.ncbi.nlm.nih.gov/pubmed/31337128
http://dx.doi.org/10.3390/s19143112
work_keys_str_mv AT caballeroaguilaraquel covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks
AT hermosocarazoaurora covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks
AT linaresperezjosefa covariancebasedestimationforclusteredsensornetworkssubjecttorandomdeceptionattacks