Resilient Distributed Information Fusion Under Multiple Malicious Attacks

被引:1
|
作者
Hua, Yi [1 ]
Wan, Fangyi [1 ]
Liao, Bin [1 ]
Zhu, Shenrui [1 ]
Qing, Xinlin [2 ]
机构
[1] Northwestern Polytech Univ, Sch Aeronaut, Xian 710072, Peoples R China
[2] Xiamen Univ, Sch Aerosp Engn, Xiamen 361000, Peoples R China
基金
中国国家自然科学基金;
关键词
Estimation; Data models; Resilience; Aerospace and electronic systems; Security; Vectors; Robustness; Byzantine attack; data manipulation (DM) attack; distributed information fusion; false data injection (FDI) attack; resilient distributed estimation; DIFFUSION STRATEGIES; NETWORKS; ADAPTATION;
D O I
10.1109/TAES.2024.3416082
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
Currently, distributed information fusion technology is being deployed to monitor a parameter of interest in numerous electronic systems. To attain accurate parameter, ensuring the security of the distributed network forms a crucial foundation for information fusion. However, the stability of many detection algorithms remains inadequate when the network simultaneously contends with multiple attacks, including Byzantine attack, data manipulation attack, and false data injection attack. Moreover, some detection algorithms focus on resilience in both normal and compromised nodes, which increases severe restrictions on the network. To solve these problems, this article considers these three attacks simultaneously, and then proposes a resilient distributed estimation algorithm to achieve robust distribution information fusion. In the proposed resilient distributed estimation algorithm, a secure detection mechanism with double data verifications is first designed to detect the secure and compromised nodes. Afterwards, a resilient distributed data fusion method is developed to isolate the compromised nodes, decreasing network restrictions and providing the optimal estimation by secure data fusion. Statistical analyses of the proposed algorithm are carried out to assess its stability and mean-square behaviors, and the algorithm complexity is also analyzed. These analyses indicate that the proposed algorithm offers the better time and space complexities. Simulation experiments further illustrate that the proposed algorithm with the resilient information fusion is robust and effective under multiple attacks.
引用
收藏
页码:7367 / 7379
页数:13
相关论文
共 50 条
  • [31] Resilient distributed secondary control for islanded AC microgrids under FDI attacks
    Cai, Xin
    Gao, Bingpeng
    Nan, Xinyuan
    ELECTRIC POWER SYSTEMS RESEARCH, 2025, 238
  • [32] Resilient Distributed Coordination Control of Multiarea Power Systems Under Hybrid Attacks
    Cheng, Zihao
    Hu, Songlin
    Yue, Dong
    Dou, Chunxia
    Shen, Shigen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 52 (01): : 7 - 18
  • [33] Distributed Resilient Clustering Algorithm for Virtual Power Plants Under Cyber Attacks
    Wu, Jia
    Sun, Yifan
    Qian, Jinyue
    Cui, Yin
    Wang, Qian
    Zhuo, Li
    IEEE ACCESS, 2025, 13 : 38714 - 38725
  • [34] Distributed resilient optimization control for uncertain nonlinear MASs under DoS attacks☆
    Yue, Dong
    Deng, Chao
    Han, Qing-Long
    AUTOMATICA, 2025, 173
  • [35] Resilient Distributed Voltage Synchronization of CI Networks Under Denial of Service Attacks
    Lai, Jingang
    Lu, Xiaoqing
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (06) : 2052 - 2056
  • [36] Resilient Economic Control for Distributed Microgrids Under False Data Injection Attacks
    Zhang, Wenhao
    Qian, Tong
    Chen, Xingyu
    Huang, Kecan
    Tang, Wenhu
    Wu, Qinghua
    IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (05) : 4435 - 4446
  • [37] Distributed Resilient Secondary Voltage Control for AC Microgrids Under DoS Attacks
    Lian, Zhijie
    Wen, Changyun
    Guo, Fanghong
    Deng, Chao
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 80 - 84
  • [38] Resilient distributed control of islanded microgrids under false data injection attacks
    Zhan, Haoqin
    Du, Zhaobin
    Liu, Xiaojie
    Li, Feng
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2023, 57
  • [39] Resilient algorithm for distributed resource allocation under false data injection attacks
    Chen, Xingzhi
    Cai, Xin
    Gao, Bingpeng
    Nan, Xinyuan
    ASIAN JOURNAL OF CONTROL, 2024, 26 (04) : 1635 - 1645
  • [40] Resilient backup controller placement in distributed SDN under critical targeted attacks
    Calle, Eusebi
    Martinez, David
    Mycek, Mariusz
    Pioro, Michal
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 33