Resilient Distributed Information Fusion Under Multiple Malicious Attacks

被引:1
|
作者
Hua, Yi [1 ]
Wan, Fangyi [1 ]
Liao, Bin [1 ]
Zhu, Shenrui [1 ]
Qing, Xinlin [2 ]
机构
[1] Northwestern Polytech Univ, Sch Aeronaut, Xian 710072, Peoples R China
[2] Xiamen Univ, Sch Aerosp Engn, Xiamen 361000, Peoples R China
基金
中国国家自然科学基金;
关键词
Estimation; Data models; Resilience; Aerospace and electronic systems; Security; Vectors; Robustness; Byzantine attack; data manipulation (DM) attack; distributed information fusion; false data injection (FDI) attack; resilient distributed estimation; DIFFUSION STRATEGIES; NETWORKS; ADAPTATION;
D O I
10.1109/TAES.2024.3416082
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Currently, distributed information fusion technology is being deployed to monitor a parameter of interest in numerous electronic systems. To attain accurate parameter, ensuring the security of the distributed network forms a crucial foundation for information fusion. However, the stability of many detection algorithms remains inadequate when the network simultaneously contends with multiple attacks, including Byzantine attack, data manipulation attack, and false data injection attack. Moreover, some detection algorithms focus on resilience in both normal and compromised nodes, which increases severe restrictions on the network. To solve these problems, this article considers these three attacks simultaneously, and then proposes a resilient distributed estimation algorithm to achieve robust distribution information fusion. In the proposed resilient distributed estimation algorithm, a secure detection mechanism with double data verifications is first designed to detect the secure and compromised nodes. Afterwards, a resilient distributed data fusion method is developed to isolate the compromised nodes, decreasing network restrictions and providing the optimal estimation by secure data fusion. Statistical analyses of the proposed algorithm are carried out to assess its stability and mean-square behaviors, and the algorithm complexity is also analyzed. These analyses indicate that the proposed algorithm offers the better time and space complexities. Simulation experiments further illustrate that the proposed algorithm with the resilient information fusion is robust and effective under multiple attacks.
引用
收藏
页码:7367 / 7379
页数:13
相关论文
共 50 条
  • [21] Distributed Resilient Estimator Design for Positive Systems Under Topological Attacks
    Xiao, Shunyuan
    Ge, Xiaohua
    Han, Qing-Long
    Zhang, Yijun
    IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (07) : 3676 - 3686
  • [22] Distributed Fuzzy Resilient Tracking for Nonlinear MASs Under DoS Attacks
    Shu-Huan Gao
    Mengmeng Chen
    Chao Deng
    International Journal of Control, Automation and Systems, 2023, 21 : 3176 - 3186
  • [23] Distributed Fuzzy Resilient Tracking for Nonlinear MASs Under DoS Attacks
    Gao, Shu-Huan
    Chen, Mengmeng
    Deng, Chao
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2023, 21 (10) : 3176 - 3186
  • [24] Resilient distributed economic dispatch of smart grids under deception attacks
    Wang, Zheng
    Chen, Guo
    Dong, Zhao Yang
    NONLINEAR DYNAMICS, 2024, 112 (07) : 5421 - 5438
  • [25] Distributed Resilient Nash Equilibrium Seeking Under Network Attacks and Disturbances
    Shao, Guangru
    Wang, Xue-Fang
    Ye, Maojiao
    Wang, Rui
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (06): : 4287 - 4296
  • [26] Resilient distributed economic dispatch of smart grids under deception attacks
    Zheng Wang
    Guo Chen
    Zhao Yang Dong
    Nonlinear Dynamics, 2024, 112 : 5421 - 5438
  • [27] Distributed Resilient Secondary Control for AC Microgrid Under FDI Attacks
    Yang, Hanlu
    Deng, Chao
    Xie, Xiangpeng
    Ding, Lei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (07) : 2570 - 2574
  • [28] Distributed resilient consensus on general digraphs under cyber-attacks
    Iqbal, Muhammad
    Qu, Zhihua
    Gusrialdi, Azwirman
    EUROPEAN JOURNAL OF CONTROL, 2022, 68
  • [29] Dynamically Triggering Resilient Control for Networked Nonlinear Systems under Malicious Aperiodic DoS Attacks
    Tan, Wei
    Wang, He
    Hou, Huazhou
    Liu, Xiaoxu
    Zheng, Meng
    PROCESSES, 2022, 10 (12)
  • [30] Resilient Distributed Estimation: Sensor Attacks
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) : 3772 - 3779