Next Article in Journal
Gender Differences in Core Muscle Morphology of Elite Alpine Skiers: Insights from Ultrasonography
Previous Article in Journal
Intelligent Fault Diagnosis Method Based on Cross-Device Secondary Transfer Learning of Efficient Gated Recurrent Unit Network
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements

School of Automation, Guangdong-Hong Kong Joint Laboratory for Intelligent Decision and Cooperative Control, and Guangdong Provincial Key Laboratory for Intelligent Decision and Cooperative Control, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(13), 4071; https://doi.org/10.3390/s24134071
Submission received: 7 May 2024 / Revised: 30 May 2024 / Accepted: 20 June 2024 / Published: 22 June 2024
(This article belongs to the Section Sensor Networks)

Abstract

:
Cyber-security research on networked multi-sensor systems is crucial due to the vulnerability to various types of cyberattacks. For the development of effective defense measures, attention is required to gain insight into the complex characteristics and behaviors of cyber attacks from the attacker’s perspective. This paper aims to tackle the problem of distributed consensus estimation for networked multi-sensor systems subject to hybrid attacks and missing measurements. To account for both random denial of service (DoS) attacks and false data injection (FDI) attacks, a hybrid attack model on the estimator-to-estimator communication channel is presented. The characteristics of missing measurements are defined by random variables that satisfy the Bernoulli distribution. Then a modified consensus-based distributed estimator, integrated with the characteristics of hybrid attacks and missing measurements, is presented. For reducing the computational complexity of the optimal distributed estimation method, a scalable suboptimal distributed consensus estimator is designed. Sufficient conditions are further provided for guaranteeing the stability of the proposed suboptimal distributed estimator. Finally, a simulation experiment on aircraft tracking is executed to validate the effectiveness and feasibility of the proposed algorithm.

1. Introduction

With the advancement of communication technologies, networked multi-sensor systems have garnered significant interest in recent decades [1,2]. Networked multi-sensor systems contain components connected via a shared network, thus reducing unnecessary wired connections, lowering installation costs, and increasing system scalability [3,4,5]. It is because of such benefits that networked multi-sensor systems are extensively applied in smart grids, autonomous driving, robotics, and satellite navigation [6,7,8]. However, due to the data transmitted over open and shared communication links, networked multi-sensor systems are vulnerable to malicious cyber attacks, which can pose a huge threat to life and property security [9]. As a result, it is of utmost importance to enhance the security of networked multi-sensor systems to ensure their normal operation. This issue has attracted widespread attention in recent years [10,11,12].
There are two main categories into which typical attack models in networked multi-sensor systems fall: denial of service (DoS) attacks and deception attacks [13]. As all individuals know, false data injection (FDI) attacks, which are regarded as a typical deception attack, seek to manipulate the transmitted data by injecting some faked data [14]. DoS attacks attempt to prevent legitimate users from accessing the server by sending a great deal of false information, thereby blocking the communication channel [15]. Obviously, both types of cyber attacks can have profound negative impacts on networked multi-sensor systems. This problem has also aroused considerable interest among researchers, especially regarding the estimation and control issues under FDI and DoS attacks. For instance, based on prior research in [14], the author proposed a power system state estimation algorithm under imperfect FDI attacks. The FDI attack model in [14] aimed at compromising defenseless sensors to corrupt measurement information, focusing on the stealthiness of the attack strategy. By utilizing the event-triggered mechanism, a modified secure remote estimator under DoS attacks was designed for cyber-physical systems [16], in which DoS attacks occurring on the sensor-estimator communication channel considered noise and interference. It is common to find only a single type of attack considered in estimation for sensor networks. However, in practical systems, to increase the possibility of success of attacks, adversaries often alternately launch different types of attacks with a certain probability [13]. Such hybrid attacks not only have a greater negative impact on estimation and control algorithms, but also pose challenges to existing attack detection mechanisms [17]. Therefore, this has aroused the interest of researchers to address the estimation and control issues of networked multi-sensor systems under hybrid attacks.
As mentioned before, previous work focused more on centralised multi-sensor systems or single sensor systems, rather than on distributed systems. With the all-round development of computation and communication capabilities in sensor networks, distributed estimation is widely applied in networked multi-sensor systems due to its high robustness, scalability and flexibility [9,18]. However, since information sharing and data transmission are constrained by the inherent coupling relationship between different nodes, distributed sensor networks are more vulnerable to various cyber attacks [19,20]. As a result, it is a critically important yet complicated topic to investigate the security issues of distributed multi-sensor systems. In most existing research, some results such as [21,22,23] primarily addressed the distributed estimation problem under malicious cyber attacks on communication links connecting sensors, and only considering a single type of attack. To our knowledge, however, few research have addressed the distributed consensus estimation problem under hybrid attacks that occur between estimators, where data transmitted over wireless networks between nodes may be tampered with by attackers.
Note that distributed consensus estimation is formed by integrating multi-agent consensus theory into the standard Kalman filter, so it also faces the challenge of missing measurement issues in traditional state estimation. This challenge has spawned a large amount of related research [24,25,26]. For instance, a novel locally optimal distributed consensus estimator was presented in [25] for stochastic systems with missing measurements, where the missing measurement phenomena are represented by a set of random variables with Bernoulli distribution. However, reviewing the literature on distributed estimation from the past few years, it is rare to find that issues regarding cyber attacks and network communication such as missing measurements are taken into account simultaneously. This is mainly because the superimposed effect of missing measurements and cyber attacks will accelerate the degradation of distributed estimation performance, eventually leading to system instability.
Drawing from the aforementioned discussions, this paper focuses on distributed consensus estimation issues for networked multi-sensor systems subject to the dual impact of hybrid attacks and missing measurements. The following three points highlight the difficulties encountered in this paper: (1) how to construct a hybrid attack model targeting the estimator–estimator communication channel to account for the joint impact of FDI and DoS attacks? (2) how can the optimal filter gain matrix be determined under the influence of multi-random variables? (3) how to construct suitable sufficient conditions to ensure the convergence of the estimation error under the dual impact of hybrid attacks and missing measurements?
In light of these difficulties, the following is a summary of the main contributions in this paper:
  • Governed by multi-random variables with Bernoulli distribution, a unified hybrid attack model considering the joint impact of random FDI and DoS attacks is proposed. Different from cyber attacks on the sensor-to-estimator communication channel in [13,18], the proposed hybrid attack disrupts the data transmission between neighboring estimators in the distributed consensus estimation.
  • This paper is the first attempt to provide a modified distributed consensus estimation algorithm for networked multi-sensor systems subject to hybrid attacks and missing measurements. A suboptimal distributed estimation algorithm, simplified by an approximation method, is devised to circumvent the computation of the cross-covariance matrix, thereby reducing the computational complexity.
  • A co-design scheme of consensus gain coefficients, hybrid attack parameters, missing measurement probabilities and model parameters based on Lyapunov stability analysis is proposed. It is theoretically proved that the stability of the proposed distributed consensus estimator can be guaranteed by constructing a sufficient condition.
The following is how the rest of the paper is structured. System models under missing measurements, hybrid attack models, and problem descriptions on the distributed consensus estimation are covered in Section 2. The optimal/suboptimal distributed consensus estimation algorithms are presented in Section 3, respectively. A formal stability analysis procedure is performed in Section 4. A simulation experiment is executed in Section 5, and conclusions are provided in Section 6.
Notation 1. 
Throughout the paper, the notations are absolutely standard. R m means the m-dimensional Euclidean space. A T denotes the transpose of the variable A, and B 1 represents the inverse matrix of an invertible n × n matrix B. In addition, t r ( C ) is the trace of the matrix C. E { D } expresses the expectation of the random variable D. diag{•} is a diagonal matrix, and the random variable X has a probability density function denoted by P { X } . N ( μ , R ) denotes the Gaussian stochastic process with μ and R representing the corresponding mean value and covariance matrix, respectively.

2. Problem Statement

2.1. System Description

This paper considers a class of linear time-invariant systems as
x k + 1 = A x k + w k
y i , k = H i x k + v i , k , i = 1 , 2 , , M
where x k R N and y i , k R M are the state vector and measurement vector of the i-th sensor at time instant k, respectively. A and H i denote the system and measurement matrices, respectively. In addition, the random variables w k and v i , k are the system noise and the measurement noise respectively, which are assumed to be mutually independent, and satisfy w k N ( 0 , Q k ) and v i , k N ( 0 , R i , k ) .
In practical applications, due to sensor failure, unsuccessful measurement, or network congestion, etc., the measurement values from sensors are not always consecutive and may be randomly lost [27]. Therefore, the missing measurement model in this paper is described as follows:
z i , k = γ i , k H i x k + v i , k
where the random variable γ i , k that satisfies the Bernoulli distribution is used to describe the missing measurement phenomenon, which is assumed to be uncorrelated with all noise signals. Furthermore, the probability density function of γ i , k is
P { γ i , k = 0 } = 1 λ i P { γ i , k = 1 } = λ i
where λ i represents the probability that the measurement information of the i-th sensor successfully arrives.

2.2. Hybrid Attack Model

To characterize the communication topology of the above sensor network in Equations (1) and (2), consider a fixed undirected graph G = ( V x , E x ) with a set of nodes V x = { v 1 , v 2 , , v n } and a set of edges E x V x × V x . In this sensor network, the neighbor set of node i is defined as N i = { j | ( i , j ) E x } , where the total number of neighbors of node i, also called its degree, is expressed as d i = | N i | .
Derived from previous works in [28], a distributed consensus estimation algorithm is introduced for the above sensor network:
x ^ i , k + 1 = A x ^ i , k + K i , k ( y i , k H i x ^ i , k ) + ϵ A j N i ( x ^ j , k x ^ i , k )
where x ^ i , k is the estimate of the state x k for node i at time instant k. K i , k is the filter gain matrix to be determined, and ϵ is the consensus gain coefficient. Referring to existing works [29,30], it is noted that ϵ ( 0 , 1 δ ) with δ = max i d i .
When executing the state estimation process under the distributed consensus estimation in (4), it can be found that not only the innovation of node i itself is utilized, but also the estimation information from node j needs to be integrated. This prompts us to investigate the security of the estimation information transmitted between nodes i and j since the information may be subject to various malicious cyber attacks. Therefore, in order to describe the actual cyber attack characteristics more realistically in this paper, the following hybrid attack model is constructed as
x ^ j , k a = α i j , k ( x ^ j , k + q i j , k b i j , k ) + ( 1 α i j , k ) A x ^ j , k 1 a
where x ^ j , k a denotes the state estimation for node j under hybrid attacks. The random variable α i j , k is used to characterize the occurrence of DoS attacks, which satisfies the Bernoulli distribution. In other words, α i j , k = 0 means that the estimation information x ^ j , k is subject to DoS attacks and cannot be successfully transmitted; α i j , k = 1 indicates otherwise. Furthermore, in the case of DoS attacks, this paper introduces the compensation strategy in [31,32] to improve the loss of transmitted data. q i j , k indicates whether the estimation information transmitted between nodes i and j is subject to FDI attacks, taking values of 0 or 1. The random variable b i j , k N ( 0 , B i j , k ) is used to model FDI attacks, which is also assumed to be uncorrelated with all noise signals.

2.3. Problem Statement

In terms of that, this paper considers the issues of missing measurements in (3) and hybrid attacks in (5), so the distributed consensus estimation algorithm in (4) is redesigned as
x ^ i , k + 1 = A x ^ i , k + K i , k ( z i , k λ i H i x ^ i , k ) + ϵ A j N i ( x ^ j , k a x ^ i , k )
The main goal of this paper, as indicated by the discussion above, is to derive a suitable distributed consensus estimator to estimate the system states under the dual impact of missing measurements and hybrid attacks, and then seek sufficient conditions to ensure the stability of the proposed distributed estimator.

3. Distributed Consensus Estimator

In this section, a suitable Kalman filter gain matrix and error covariance matrix are derived to obtain the state estimates.
For the convenience of presentation, first define
e i , k = x k x ^ i , k , e j , k a = x k x ^ j , k a P i j , k = E { e i , k e j , k T } , P ^ i j , k = E { e i , k a e j , k T } P ˇ i j , k = E { e i , k ( e j , k a ) T } , P i j , k a = E { e i , k a ( e j , k a ) T }
Theorem 1. 
Consider the linear time-invariant system in (1) and (2) under missing measurements in (3) and hybrid attacks in (5). Then, the distributed consensus estimation algorithm designed in (6) has the optimal filter gain as follows:
K i , k = λ i A [ P i , k + ϵ r N i ( P ^ r i , k P i , k ) ] H i T G i , k 1
where G i , k = λ i 2 H i P i , k H i T + λ ˜ i H i Λ k H i T + R i , k .
Proof of Theorem 1. 
According to the above definition, it can be known
e i , k + 1 = x k + 1 x ^ i , k + 1 = ( A λ i K i , k H i ) e i , k K i , k ( γ i , k λ i ) H i x k + ϵ A j N i ( e j , k a e i , k ) + w k K i , k v i , k
where
e j , k a = x k x ^ j , k a = α i j , k e j , k α i j , k q i j , k b i j , k + ( 1 α i j , k ) A e j , k 1 a + ( 1 α i j , k ) w k 1
Naturally, we can easily obtain the error covariance matrix
P i j , k + 1 = E { e i , k + 1 e j , k + 1 T } = ( A λ i K i , k H i ) P i j , k ( A λ j K j , k H j ) T + K i , k H i × E { ( γ i , k λ i ) ( γ j , k λ j ) x k x k T } H j T K j , k T + ϵ 2 × A r N i s N j ( P r s , k a P ^ r j , k P ˇ i s , k + P i j , k ) A T + ϵ ( A λ i K i , k H i ) s N j ( P ˇ i s , k P i j , k ) A T + ϵ A r N i ( P ^ r j , k P i j , k ) ( A λ j K j , k H j ) T + K i , k E { v i , k v j , k T } K j , k T + Q k
When i = j , it yields
P i , k + 1 = ( A λ i K i , k H i ) P i , k ( A λ i K i , k H i ) T + λ ˜ i K i , k × H i Λ k H i T K i , k T + ϵ 2 A r N i s N i ( P r s , k a P ^ r i , k P ˇ i s , k + P i , k ) A T + K i , k R i , k K i , k T + Q k + ϵ ( A λ i K i , k H i ) s N i ( P ˇ i s , k P i , k ) A T + ϵ A r N i ( P ^ r i , k P i , k ) ( A λ i K i , k H i ) T
where λ ˜ i = E { ( γ i , k λ i ) ( γ i , k λ i ) } = λ i ( 1 λ i ) , and Λ k = E { x k x k T } = A Λ k 1 A T + Q k 1 .
In addition, it has
P ^ r i , k = E { e r , k a e i , k T } = α i P r i , k + ( 1 α i ) [ A P ^ r i , k 1 ( A λ i K i , k 1 H i ) T + ϵ A s N i ( P r s , k 1 a P ^ r i , k 1 ) A T + Q k 1 ]
P ˇ i s , k = E { e i , k ( e s , k a ) T } = α i P i s , k + ( 1 α i ) [ ( A λ i K i , k 1 H i ) P ˇ i s , k 1 A T + ϵ A r N i ( P r s , k 1 a P ˇ i s , k 1 ) A T + Q k 1 ]
where α i = P { α i j , k = 1 } .
From the definition of P i j , k a , it follows that
P r s , k a = E { e r , k a ( e s , k a ) T } = α i 2 P r s , k + α i ( P ˇ r s , k α i P r s , k ) + α i ( P ^ r s , k α i P r s , k ) + ( 1 α i ) 2 ( A P r s , k 1 a A T + Q k 1 ) + α i q i r , k B i r , k
Note that the total estimation error for all nodes is expressed as i = 1 M E { x k x ^ i , k 2 } , which is equivalent to i = 1 M tr ( P i , k ) . Based on this, the optimal filter gain matrix K i , k can be obtained by solving the equation tr ( P i , k + 1 ) / K i , k = 0 .
Thus, applying the matrix calculus operation theory yields
tr ( P i , k + 1 ) K i , k = 2 ( A λ i K i , k H i ) P i , k ( λ i H i ) T + 2 λ ˜ i K i , k H i Λ k H i T + 2 K i , k R i , k + ϵ A s N i ( P ˇ i s , k P i , k ) T ( λ i H i ) T + ϵ A r N i ( P ^ r i , k P i , k ) ( λ i H i ) T = 0
From Equation (14), we have
K i , k = λ i A [ P i , k + ϵ r N i ( P ^ r i , k P i , k ) ] H i T G i , k 1
where G i , k = λ i 2 H i P i , k H i T + λ ˜ i H i Λ k H i T + R i , k . This finishes the proof of Theorem 1. □

4. A Scalable Estimation Algorithm and Stability Analysis

Note that the derived error covariance matrix in (10) for the proposed distributed consensus estimation algorithm is not scalable in the number of nodes, making it unsuitable for large-scale systems such as smart grids and mobile communication networks [33]. In order to compensate for this weakness, this paper derives the following suboptimal estimation method:
x ^ i , k + 1 = A x ^ i , k + K i , k ( z i , k λ i H i x ^ i , k ) + ϵ A j N i ( x ^ j , k a x ^ i , k ) x ^ j , k a = α i j , k ( x ^ j , k + q i j , k b i j , k ) + ( 1 α i j , k ) A x ^ j , k 1 a K i , k = λ i A P i , k H i T ( λ i 2 H i P i , k H i T + λ ˜ i H i Λ k H i T + R i , k ) 1 P i , k + 1 = ( A λ i K i , k H i ) P i , k ( A λ i K i , k H i ) T + λ ˜ i K i , k × H i Λ k H i T K i , k T + K i , k R i , k K i , k T + Q k
Remark 1. 
Such an assumption is achieved by eliminating the influence of the cross-covariance matrices in the proposed distributed consensus estimation algorithm. Instead, by setting ϵ = 0 in solving Equations (10) and (15) in this paper, a scalable estimator in (16) is obtained. Meanwhile, it can be easily known that the designed estimator is suboptimal due to the missing terms.
In the following, a formal stability analysis for the suboptimal distributed consensus estimator constructed as (16) is presented. The following assumptions and lemmas are first given as
Assumption 1. 
For some positive numbers, the following inequalities are satisfied
f ̲ A f ¯ , h ̲ i H i h ¯ i q ̲ I Q k q ¯ I , r ̲ i I R i , k r ¯ i I p ̲ i I P i , k p ¯ i I
Lemma 1 
([34]). There are real numbers ν ¯ , ν ̲ , υ > 0 and 0 < σ 1 such that the stochastic process V k ( ξ k ) satisfies the following inequalities
ν ̲ ξ k 2 V k ( ξ k ) ν ¯ ξ k 2
and
E { V k + 1 ( ξ k + 1 ) | ξ k } V k ( ξ k ) υ σ V k ( ξ k )
which means that the stochastic process V k ( ξ k ) is exponentially bounded in mean square, and is bounded with probability one.
Then, the following will present the main results of the stability analysis.
Theorem 2. 
For the linear time-invariant system in (1) and (2), consider missing measurements in (3) and hybrid attacks in (5) and the suboptimal distributed consensus estimation algorithm proposed in (16). Under Assumption 1 and setting the following condition
j N i ( x ^ j , k a x ^ i , k ) T ( x ^ j , k a x ^ i , k ) ς i
where ς i > 0 , i = 1 , 2 , , n , the estimation error e i , k is exponentially bounded in mean square and is bounded with probability one.
Proof of Theorem 2. 
In order to satisfy the conditions of Lemma 1, first construct the augmented estimation error as e k = [ e 1 , k T , e 2 , k T , , e n , k T ] and the augmented estimation error covariance as P k = diag { P 1 , k , P 2 , k , , P n , k } , and then define a suitable Lyapunov function as follows
V k ( e k ) = e k T P k 1 e k = i = 1 n e i , k T P i , k 1 e i , k
By Assumption 1, it can be easily obtained
1 p ¯ e k 2 V k ( e k ) 1 p ̲ e k 2
which proves that the first condition (17) of Lemma 1 is satisfied with ν ̲ = 1 p ¯ and ν ¯ = 1 p ̲ . Here, p ¯ = max { p ¯ 1 , p ¯ 2 , , p ¯ n } and p ̲ = min { p ̲ 1 , p ̲ 2 , , p ̲ n } .
To further meet the second requirement for Lemma 1, Equation (19) needs to be extended. Combining Equation (7), the following expression is obtained:
E { V k + 1 ( e k + 1 ) } = i = 1 n E { e i , k T ( A λ i K i , k H i ) T P i , k + 1 1 ( A λ i K i , k H i ) × e i , k } + i = 1 n E { λ ˜ i x k T H i T K i , k T P i , k + 1 1 K i , k H i x k } + ϵ 2 i = 1 n E { j N i ( e j , k a e i , k ) T A T P i , k + 1 1 A j N i ( e j , k a e i , k ) } + 2 ϵ i = 1 n E { e i , k T ( A λ i K i , k H i ) T P i , k + 1 1 × A j N i ( e j , k a e i , k ) } + i = 1 n E { w k T P i , k + 1 1 w k } + i = 1 n E { v i , k T K i , k T P i , k + 1 1 K i , k v i , k }
According to the definition, λ ˜ i 0 is horizontally established. Therefore, it follows from Equation (16) and Assumption 1 that
K i , k = λ i A P i , k H i T ( λ i 2 H i P i , k H i T + λ ˜ i H i Λ k H i T + R i , k ) 1 f ¯ p ¯ i h ¯ i λ i h ̲ i 2 p ̲ i
Similarly, according to (16) and (22), we obtain
P i , k + 1 ( A λ i K i , k H i ) P i , k ( A λ i K i , k H i ) T + Q k ( A λ i K i , k H i ) [ P i , k + q ̲ ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 ] ( A λ i K i , k H i ) T
Then, it can be further obtained, as from inequality (23),
( A λ i K i , k H i ) T P i , k + 1 1 ( A λ i K i , k H i ) [ 1 + q ̲ p ¯ i ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 ] 1 P i , k 1
Therefore, the first term on the right-hand side of Equation (21) can be scaled as
i = 1 n E { e i , k T ( A λ i K i , k H i ) T P i , k + 1 1 ( A λ i K i , k H i ) e i , k } [ 1 + q ̲ p ¯ i ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 ] 1 E { V k ( e k ) }
In addition, from (16), we have
P i , k + 1 λ ˜ i K i , k H i Λ k H i T K i , k T
Then we have
i = 1 n E { λ ˜ i x k T H i T K i , k T P i , k + 1 1 K i , k H i x k } i = 1 n E { x k T Λ k 1 x k } = n
Further, we proceed to deal with the other terms in (21). Under Assumption 1, we have
ϵ 2 i = 1 n E { j N i ( e j , k a e i , k ) T A T P i , k + 1 1 A j N i ( e j , k a e i , k ) } ϵ 2 f ¯ 2 p ̲ i i = 1 n j N i ( e j , k a e i , k ) T ( e j , k a e i , k ) = ϵ 2 f ¯ 2 p ̲ i i = 1 n j N i ( x ^ j , k a x ^ i , k ) T ( x ^ j , k a x ^ i , k )
Choose a condition as
j N i ( x ^ j , k a x ^ i , k ) T ( x ^ j , k a x ^ i , k ) ς i
where ς i > 0 , i = 1 , 2 , , n is a real number. After that, (26) can be scaled as
ϵ 2 i = 1 n E { j N i ( e j , k a e i , k ) T A T P i , k + 1 1 A j N i ( e j , k a e i , k ) } ϵ 2 f ¯ 2 p ̲ i i = 1 n ς i
In terms of the elementary inequality x T y + x y T x T x + y T y , it naturally follows that
2 ϵ i = 1 n E { e i , k T ( A λ i K i , k H i ) T P i , k + 1 1 A j N i ( e j , k a e i , k ) } ϵ i = 1 n E { e i , k T ( A λ i K i , k H i ) T P i , k + 1 1 ( A λ i K i , k H i ) e i , k } + ϵ i = 1 n j N i E { ( e j , k a e i , k ) T P i , k + 1 1 ( e j , k a e i , k ) } ϵ [ 1 + q ̲ p ¯ i ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 ] 1 E { V k ( e k ) } + ϵ i = 1 n ς i
The remaining noise terms will be processed next, and we have
i = 1 n E { w k T P i , k + 1 1 w k } 1 p ̲ i i = 1 n E { tr ( w k w k T ) } q ¯ N n p ̲ i
and
i = 1 n E { v i , k T K i , k T P i , k + 1 1 K i , k v i , k } f ¯ 2 p ¯ i 2 h ¯ i 2 λ i 2 h ̲ i 4 p ̲ i 3 i = 1 n E { tr ( v i , k v i , k T ) } f ¯ 2 p ¯ i 2 h ¯ i 2 r ¯ i M n λ i 2 h ̲ i 4 p ̲ i 3
According to Equations (21), (24), (25) and (28)–(31) can be further scaled as
E { V k + 1 ( e k + 1 ) } υ + ( 1 σ ) E { V k ( e k ) }
where
σ = 1 ( 1 + ϵ ) [ 1 + q ̲ p ¯ i ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 ] 1 ϵ = ( ϵ 2 f ¯ 2 p ̲ i + ϵ ) i = 1 n ς i + n + q ¯ N n p ̲ i + f ¯ 2 p ¯ i 2 h ¯ i 2 r ¯ i M n λ i 2 h ̲ i 4 p ̲ i 3
It can be found that the second condition (18) of Lemma 1 is satisfied when ϵ < q ̲ / p ¯ i ( f ¯ + f ¯ p ¯ i h ¯ i 2 h ̲ i 2 p ̲ i ) 2 . Finally, it can be concluded that the estimation error is bounded with probability one and exponentially bounded in mean square, which completes the proof of Theorem 2. □

5. Simulation Results

In this section, a simulation example of the aircraft tracking problem moving in two-dimensional horizontal plane is presented. The state vector is defined as x k = [ ζ k , ζ ˙ k , η k , η ˙ k ] T , which consists of position ( ζ k , η k ) and velocity ( ζ ˙ k , η ˙ k ) . The tracking system considered in this section is as described in (1) and (2), where the relevant parameters are defined as follows:
A = 1 T 0 0 0 1 0 0 0 0 1 T 0 0 0 1 , T = 1
Q k = 0.04 T 4 / 4 T 3 / 2 0 0 T 3 / 2 T 2 0 0 0 0 T 4 / 4 T 3 / 2 0 0 T 3 / 2 T 2
To track the target aircraft, ten distributed sensors with the topology shown in Figure 1 are utilized, where each sensor interacts with only a matched estimator. The target position is generated as the sensor measurement
y i , k = 1 0 0 0 0 0 1 0 x k + v i , k , i = 1 , 2 , , M
where the measurement noise covariance is set to R i , k = i R 0 with R 0 = diag { 0.2 2 , 0.2 2 } . Further, the initial state is set to x 0 = [ 10 , 1.5 , 10 , 1.2 ] T .
In addition, the root-mean-square errors (RMSEs) are introduced to more precisely assess the estimation performance. The RMSEs on position and velocity over all sensors are respectively defined as
RMSE k p = 1 M t = 1 M ζ k ζ ^ t , k 2 + η k η ^ t , k 2 RMSE k v = 1 M t = 1 M ζ ˙ k ζ ˙ ^ t , k 2 + η ˙ k η ˙ ^ t , k 2
where M = 100 represents 100 Monte Carlo runs over 10 targets. ζ ^ t , k , η ^ t , k , ζ ˙ ^ t , k , and η ˙ ^ t , k are the estimates of position and velocity at time k from the i-th run, respectively.
The performance of the proposed distributed consensus estimation algorithm under hybrid attacks and missing measurements is shown in Figure 2, where the measurement arrival probability λ i is set to 0.9 and the consensus gain is chosen as 0.05 . It is assumed that the hybrid attack considered in (5) only occurs between two targets, where the relevant parameters are set to α i = 0.5 and B i j , k = 0.04 I . It can be found that the distributed consensus estimator still has good tracking performance in position and velocity under hybrid attacks and missing measurements. In addition, the RMSEs in position for ten estimators are presented in Figure 3. It can be seen that all the curves fluctuate around the horizontal axis 0, which also proves the effectiveness of the proposed algorithm in (16). Further, RMSEs in position with different consensus gains ϵ = 0.05 , 0.1 , 0.15 , 0.2 are plotted in Figure 4. It can be seen that when ϵ = 0.05 , 0.1 , 0.15 , the curves still fluctuate near the horizontal axis 0, but when ϵ = 0.2 , the curve rises rapidly. Thus, it can be found that the consensus parameter in this paper has an upper bound. Once this upper bound is exceeded, the estimator lacks stability, which also proves the correctness of Theorem 2. It is worth noting that the consensus parameters need to be chosen very carefully to make a tradeoff between tracking performance and stability.
On the other hand, the performance of the proposed distributed consensus estimation algorithm under hybrid attacks, FDI attacks in [30] and DoS attacks, as well as without attacks in [35] are compared in Figure 5. For examining the impact of different attack scenarios on the proposed distributed estimation algorithm, it is first necessary to exclude the interference of the missing measurement, so the measurement arrival probability λ i is set to 1 in this comparison experiment. As shown in Figure 5, RMSEs under hybrid attacks are significantly higher than those under other attack scenarios, while RMSEs under only DoS attacks are almost the same as those without attacks. This proves that hybrid attacks have a greater impact on the proposed distributed estimator than only one single type of attack. In addition, this paper introduces a compensation strategy for DoS attacks. Thus, only DoS attacks have little impact on the estimation performance of the proposed distributed estimator, which is clearly demonstrated in Figure 6. As shown in Figure 6, RMSEs in position do not change significantly as the DoS attack probability increases, strongly proving the effectiveness of the compensation strategy. Further, RMSEs in position under different FDI attack intensities are plotted in Figure 7. In order to better characterize the FDI attack intensity, the standard deviation ς of the random attack variable b i j , k is introduced. It is clear that the proposed distributed consensus estimator has certain resistance to FDI attacks when ς is small. Finally, it is noted that hybrid attacks will degrade the estimation performance in Figure 5, but the distributed estimator proposed in this paper can still remain stable, which is a major advantage of this algorithm.

6. Conclusions

In this paper, a modified distributed consensus estimation algorithm has been provided for networked multi-sensor systems subject to hybrid attacks and missing measurements. A random variable satisfying the Bernoulli distribution has been applied to account for the missing measurement phenomenon. From the viewpoint of the attacker, a unified hybrid attack model has been constructed to disrupt the data transmission between neighboring estimators, which takes into account the characteristics and behaviors of both random FDI and DoS attacks. Starting from optimality and scalability, optimal/suboptimal distributed consensus estimators have been proposed, respectively. Furthermore, sufficient conditions for convergence of the proposed distributed suboptimal estimator have been obtained. It has been explicitly established that there are correlations between the convergence and hybrid attack model as well as missing measurement parameters. Future works will focus on extending linear multi-sensor systems to nonlinear systems.

Author Contributions

Conceptualization, Z.C. and H.R.; methodology, Z.C.; software, L.Y. and Q.Y.; validation, Z.C., L.Y. and Q.Y.; formal analysis, Z.C.; investigation, Z.C.; resources, L.Y.; data curation, L.Y. and Q.Y.; writing—original draft preparation, Z.C.; writing—review and editing, Z.C.; visualization, Y.L.; supervision, H.R.; project administration, Y.L.; funding acquisition, Z.C. and H.R. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partially supported by the National Natural Science Foundation of China under Grants 62303121, 62121004, U23A20341, 62303125, and 62373111, the China Postdoctoral Science Foundation under Grants 2023M740750, and in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2022A1515110949 and 2023B1515120010.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
FDIfalse data injection
DoSdenial of service
RMSEsroot-mean-square errors

References

  1. Zhou, H.; Sun, S. Distributed filtering for multi-sensor networked systems with stochastic communication protocol and correlated noises. Inf. Fusion 2024, 104, 102121. [Google Scholar] [CrossRef]
  2. Zhou, J.; Yang, W.; Zhang, H.; Zheng, W.X.; Xu, Y.; Tang, Y. Security analysis and defense strategy of distributed filtering under false data injection attacks. Automatica 2022, 138, 110151. [Google Scholar] [CrossRef]
  3. Zha, L.; Guo, Y.; Liu, J.; Xie, X.; Tian, E. Protocol-based distributed security fusion estimation for time-varying uncertain systems over sensor networks: Tackling DoS attacks. IEEE Trans. Signal Inf. Process. Over Netw. 2024, 10, 119–130. [Google Scholar] [CrossRef]
  4. Ren, H.; Ma, H.; Li, H.; Wang, Z. Adaptive fixed-time control of nonlinear MASs with actuator faults. IEEE/CAA J. Autom. Sin. 2023, 10, 1252–1262. [Google Scholar] [CrossRef]
  5. Ren, H.; Liu, Z.; Liang, H.; Li, H. Pinning-based neural control for multiagent systems with self-regulation intermediate event-triggered method. IEEE Trans. Neural Netw. Learn. Syst. 2024. [Google Scholar] [CrossRef] [PubMed]
  6. Xu, S.; Ye, D.; Li, G.; Yang, D. Globally stealthy attacks against distributed state estimation in smart grid. IEEE Trans. Autom. Sci. Eng. 2024. [Google Scholar] [CrossRef]
  7. Wang, J.; Liu, J.; Kato, N. Networking and communications in autonomous driving: A survey. IEEE Commun. Surv. Tutor. 2018, 21, 1243–1274. [Google Scholar] [CrossRef]
  8. Lee, J.H.; Hashimoto, H. Controlling mobile robots in distributed intelligent sensor network. IEEE Trans. Ind. Electron. 2003, 50, 890–902. [Google Scholar] [CrossRef]
  9. Huang, J.; Tang, Y.; Yang, W.; Li, F. Resilient consensus-based distributed filtering: Convergence analysis under stealthy attacks. IEEE Trans. Ind. Inform. 2020, 16, 4878–4888. [Google Scholar] [CrossRef]
  10. Niu, M.; Wen, G.; Lv, Y.; Chen, G. Innovation-based stealthy attack against distributed state estimation over sensor networks. Automatica 2023, 152, 110962. [Google Scholar] [CrossRef]
  11. Chen, Y.; Kar, S.; Moura, J.M. Resilient distributed estimation: Sensor attacks. IEEE Trans. Autom. Control 2019, 64, 3772–3779. [Google Scholar] [CrossRef]
  12. Han, F.; Wang, Z.; Dong, H.; Alsaadi, F.E.; Alharbi, K.H. A local approach to distributed H-consensus state estimation over sensor networks under hybrid attacks: Dynamic event-triggered scheme. IEEE Trans. Signal Inf. Process. Over Netw. 2022, 8, 556–570. [Google Scholar] [CrossRef]
  13. Chen, Y.; Meng, X.; Wang, Z.; Dong, H. Event-triggered recursive state estimation for stochastic complex dynamical networks under hybrid attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 34, 1465–1477. [Google Scholar] [CrossRef] [PubMed]
  14. Cheng, Z.; Ren, H.; Qin, J.; Lu, R. Security analysis for dynamic state estimation of power systems with measurement delays. IEEE Trans. Cybern. 2023, 53, 2087–2096. [Google Scholar] [CrossRef]
  15. Li, T.; Chen, B.; Yu, L.; Zhang, W.A. Active security control approach against DoS attacks in cyber-physical systems. IEEE Trans. Autom. Control 2021, 66, 4303–4310. [Google Scholar] [CrossRef]
  16. Sun, Y.C.; Yang, G.H. Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks. Inf. Sci. 2022, 602, 43–56. [Google Scholar] [CrossRef]
  17. Liu, J.; Wang, Y.; Cao, J.; Yue, D.; Xie, X. Secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. IEEE Trans. Cybern. 2021, 51, 4000–4010. [Google Scholar] [CrossRef]
  18. Lv, Y.; Lu, J.; Liu, Y.; Lou, J. Resilient distributed state estimation under stealthy attack. IEEE Trans. Inf. Forensics Secur. 2022, 17, 3254–3263. [Google Scholar] [CrossRef]
  19. Zhou, J.; Yang, W.; Ding, W.; Zheng, W.X.; Xu, Y. Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation. IEEE Trans. Autom. Control 2023, 68, 628–635. [Google Scholar] [CrossRef]
  20. Li, X.M.; Yao, D.; Li, P.; Meng, W.; Li, H.; Lu, R. Secure finite-horizon consensus control of multiagent systems against cyber attacks. IEEE Trans. Cybern. 2022, 52, 9230–9239. [Google Scholar] [CrossRef]
  21. An, D.; Zhang, F.; Cui, F.; Yang, Q. Toward data integrity attacks against distributed dynamic state estimation in smart grid. IEEE Trans. Autom. Sci. Eng. 2024, 21, 881–894. [Google Scholar] [CrossRef]
  22. Lei, X.; Wen, G.; Zheng, W.X.; Fu, J. Security strategy against location-varying sparse attack on distributed state monitoring. IEEE Trans. Autom. Control 2024, 69, 2514–2521. [Google Scholar] [CrossRef]
  23. Zhang, T.Y.; Ye, D.; Shi, Y. Decentralized false-data injection attacks against state omniscience: Existence and security analysis. IEEE Trans. Autom. Control 2023, 68, 4634–4649. [Google Scholar] [CrossRef]
  24. Li, W.; Jia, Y.; Du, J. Distributed Kalman consensus filter with intermittent observations. J. Frankl. Inst. 2015, 352, 3764–3781. [Google Scholar] [CrossRef]
  25. Hu, J.; Wang, Z.; Liu, G.P.; Zhang, H.; Navaratne, R. A prediction-based approach to distributed filtering with missing measurements and communication delays through sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 7063–7074. [Google Scholar] [CrossRef]
  26. Jin, H.; Sun, S. Distributed filtering for multi-sensor systems with missing data. Inf. Fusion 2022, 86, 116–135. [Google Scholar] [CrossRef]
  27. Liang, J.; Wang, Z.; Liu, X. State estimation for coupled uncertain stochastic networks with missing measurements and time-varying delays: The discrete-time case. IEEE Trans. Neural Netw. 2009, 20, 781–793. [Google Scholar] [CrossRef]
  28. Ren, H.; Cheng, Z.; Qin, J.; Lu, R. Deception attacks on event-triggered distributed consensus estimation for nonlinear systems. Automatica 2023, 154, 111100. [Google Scholar] [CrossRef]
  29. Yang, W.; Yang, C.; Shi, H.; Shi, L.; Chen, G. Stochastic link activation for distributed filtering under sensor power constraint. Automatica 2017, 75, 109–118. [Google Scholar] [CrossRef]
  30. Yang, W.; Zhang, Y.; Chen, G.; Yang, C.; Shi, L. Distributed filtering under false data injection attacks. Automatica 2019, 102, 34–44. [Google Scholar] [CrossRef]
  31. Du, D.; Li, X.; Li, W.; Chen, R.; Fei, M.; Wu, L. ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1698–1711. [Google Scholar] [CrossRef]
  32. Qin, J.; Li, M.; Shi, L.; Yu, X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans. Autom. Control 2018, 63, 1648–1663. [Google Scholar] [CrossRef]
  33. Cheng, Z.; Ren, H.; Zhang, B.; Lu, R. Distributed Kalman filter for large-scale power systems with state inequality constraints. IEEE Trans. Ind. Electron. 2021, 68, 6238–6247. [Google Scholar] [CrossRef]
  34. Reif, K.; Gunther, S.; Yaz, E.; Unbehauen, R. Stochastic stability of the discrete-time extended Kalman filter. IEEE Trans. Autom. Control 1999, 44, 714–728. [Google Scholar] [CrossRef]
  35. Li, W.; Wang, Z.; Ho, D.W.; Wei, G. On boundedness of error covariances for Kalman consensus filtering problems. IEEE Trans. Autom. Control 2019, 65, 2654–2661. [Google Scholar] [CrossRef]
Figure 1. Network topology with M = 10 .
Figure 1. Network topology with M = 10 .
Sensors 24 04071 g001
Figure 2. States and their estimations for sensors 5 and 7.
Figure 2. States and their estimations for sensors 5 and 7.
Sensors 24 04071 g002
Figure 3. RMSEs in position for ten estimators.
Figure 3. RMSEs in position for ten estimators.
Sensors 24 04071 g003
Figure 4. RMSEs in position with different consensus parameter.
Figure 4. RMSEs in position with different consensus parameter.
Sensors 24 04071 g004
Figure 5. RMSEs in position under hybrid attacks, FDI attacks and DoS attacks as well without attacks.
Figure 5. RMSEs in position under hybrid attacks, FDI attacks and DoS attacks as well without attacks.
Sensors 24 04071 g005
Figure 6. RMSEs in position under different DoS attack probabilities.
Figure 6. RMSEs in position under different DoS attack probabilities.
Sensors 24 04071 g006
Figure 7. RMSEs in position under different FDI attack intensities.
Figure 7. RMSEs in position under different FDI attack intensities.
Sensors 24 04071 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cheng, Z.; Yang, L.; Yuan, Q.; Long, Y.; Ren, H. Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements. Sensors 2024, 24, 4071. https://doi.org/10.3390/s24134071

AMA Style

Cheng Z, Yang L, Yuan Q, Long Y, Ren H. Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements. Sensors. 2024; 24(13):4071. https://doi.org/10.3390/s24134071

Chicago/Turabian Style

Cheng, Zhijian, Lan Yang, Qunyao Yuan, Yinren Long, and Hongru Ren. 2024. "Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements" Sensors 24, no. 13: 4071. https://doi.org/10.3390/s24134071

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop