Next Article in Journal
EMG-Based Recognition of Lower Limb Movements in Athletes: A Comparative Study of Classification Techniques
Previous Article in Journal
Personal Identification Using 3D Topographic Cubes Extracted from EEG Signals by Means of Automated Feature Representation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Consensus-Based Target Tracking Under False Data Injection Attacks in Multi-Agent Networks

by
Amir Ahmad Ghods
and
Mohammadreza Doostmohammadian
*
Faculty of Mechanical Engineering, Semnan University, Semnan 36714, Iran
*
Author to whom correspondence should be addressed.
Signals 2025, 6(3), 44; https://doi.org/10.3390/signals6030044
Submission received: 12 July 2025 / Revised: 18 August 2025 / Accepted: 18 August 2025 / Published: 2 September 2025

Abstract

Distributed target tracking in multi-agent networks plays a critical role in cooperative sensing and autonomous navigation. However, it faces significant challenges in highly dynamic and adversarial setups. This study aims to enhance the resilience of decentralized target tracking algorithms against measurement faults and cyber–physical threats, especially false data injection attacks. We propose a consensus-based estimation algorithm that integrates a nearly constant velocity model with saturation-based filtering to suppress impulsive measurement variations and promote robust, distributed state estimation. To counteract adversarial conditions, we incorporate a dynamic false data injection detection and isolation mechanism that uses innovation thresholds to identify and disregard suspicious measurements before they can degrade the global estimate. The effectiveness of the proposed algorithms is demonstrated through a series of simulation-based case studies under both benign and adversarial conditions. The results show that increased network connectivity and higher consensus iteration rates improve estimation accuracy and convergence speed, while properly tuned saturation filters achieve a practical balance between fault suppression and accurate estimation. Furthermore, under localized, coordinated, and transient false data injection attacks, the detection mechanism successfully identifies compromised agents and prevents their data from corrupting the distributed global estimate. Overall, this study illustrates that the proposed algorithm provides a simplified fault-tolerant solution that significantly enhances the accuracy and resilience of distributed target tracking without imposing excessive communication or computational burdens.

1. Introduction

In recent years, distributed target tracking has played a crucial role in various applications, including autonomous surveillance, environmental monitoring, and cooperative robotics. These systems rely on distributed estimation and local communication among agents to track moving targets in a scalable, robust, and real-time manner. However, maintaining estimation accuracy and network resilience in distributed systems is significantly challenged by faulty measurement, environmental disturbances, and the increasing risk of cyber–physical threats.
To address these challenges, researchers have examined various architectural strategies for estimation and communication in multi-agent systems. Estimation architectures are generally divided into two primary categories based on how information is shared. The first category is a centralized platform, where a single central node collects data from all agents in the communication network, conducts the necessary computations, and subsequently shares the results with those agents [1,2,3,4]. While this approach can achieve high estimation accuracy, it suffers from several critical drawbacks. The reliance on a single node introduces a potential point of failure, requires high computational capacity at that node, and leads to poor scalability and security concerns. As a result, many researchers have shifted their attention toward decentralized frameworks, in which the central node is eliminated and each agent processes data locally while communicating with neighboring agents. This structure improves system scalability and fault tolerance, and significantly reduces communication overheads. Nonetheless, decentralized systems come with their own set of challenges, including increased network complexity and the need for reliable communication and coordination to ensure accurate and consistent performance across all agents.
Several estimation strategies have been explored to address these challenges. Among the most widely studied are variants of the Kalman filter, which are adapted for distributed use, commonly known as distributed Kalman filters (DKFs) [5,6,7,8,9,10]. While these approaches allow each agent to maintain a local estimate, they still face limitations in practice. DKFs typically require high communication bandwidth due to the need for covariance information exchange and are not well-suited to adversarial environments due to their limited robustness and dependence on accurate model assumptions. These factors reduce their scalability and make them vulnerable to both faults and intentional data corruption in dynamic settings.
To address the shortcomings of DKFs, researchers have turned to adaptive and learning-based approaches that aim to improve resilience. For example, model-free adaptive control allows agents to follow reference signals using only local information, making it effective even in the presence of communication delays or denial-of-service attacks [11]. Neural network-based techniques have been employed to approximate unknown nonlinear dynamics in time-varying systems, enabling faster adaptation and more accurate tracking [12]. Likewise, adaptive fuzzy controllers provide a way to estimate unmeasurable states and reduce the impact of cyber–physical attacks, keeping tracking errors within acceptable bounds in large-scale networks [13]. More recently, data-driven and federated learning strategies have been explored to counter more severe disruptions such as Byzantine attacks or actuator faults, often by combining robust aggregation rules with online learning of uncertain system dynamics [14,15]. Despite these advances, such methods often entail trade-offs, including intensive computation, significant communication overhead, or complex agent coordination. These drawbacks limit their practicality in large, resource-constrained networks and leave open the need for simpler, more scalable, and inherently robust alternatives.
To overcome these limitations, researchers have increasingly turned to consensus-based estimation algorithms [16,17,18,19,20,21,22,23,24,25]. These approaches use simple local rules and information exchange between neighboring agents to gradually reach a shared understanding across the entire network. Unlike traditional distributed Kalman filters, consensus-based algorithms require less communication, scale more efficiently with larger systems, and are more resilient to issues like unstable connections and noisy measurements. Their simple design makes them particularly suitable for real-world deployments, especially in mobile or resource-constrained multi-agent systems [26].
Despite the advantages offered by decentralized estimation, a significant challenge remains in ensuring the resilience of such systems against cyber–physical threats, particularly false data injection attacks (FDIAs). In such situations, an attacker deliberately feeds false data into the system, often by taking control of certain agents or by tampering with their communication channels. When it comes to tracking moving targets, these types of attacks can cause serious errors in estimating position and velocity, which are essential for maintaining accurate and reliable system behavior. As a result, improving the resilience of distributed estimation methods against false data injection has become a key focus in recent research. Numerous studies have explored ways to enhance both the communication and estimation processes within distributed networks. A central approach in this area involves developing mechanisms that can detect and isolate suspicious data inputs quickly, preventing them from affecting the accuracy of the overall network estimation [27,28,29,30,31,32,33,34,35,36,37].
This paper builds upon our previous study in [38], which introduced a decentralized, consensus-based target tracking algorithm employing a nearly constant velocity (NCV) model and saturation-based filtering to mitigate impulsive measurement variations. While that earlier work established the baseline framework, it did not incorporate mechanisms to identify or isolate malicious data. In the present study, we extend the framework by introducing a dynamic false data injection (FDI) detection and isolation mechanism that allows the algorithm not only to achieve accurate estimates under nominal conditions, but also to remain resilient against adversarial attacks in multi-agent networks. This mechanism enables each agent to evaluate incoming measurements in real time, detect anomalies, and disregard suspicious data before they can corrupt the global estimate. To assess the effectiveness of this extension, we conduct a series of baseline and adversarial case studies, including localized, coordinated, and transient attack scenarios. The results demonstrate substantial improvements compared with [38]; for instance, under widespread coordinated attacks with 50% of agents compromised, the proposed method reduces the mean-squared estimation error (MSEE) by about 65% relative to the baseline algorithm. Overall, this paper goes beyond our earlier contribution by providing a more comprehensive solution that improves both the accuracy and the security of distributed target tracking, while keeping communication and computational costs low.
The remainder of this article is organized as follows. Section 2 reviews the system modeling setup, including the dynamic model of the moving target and the derivation of the observation matrix as introduced in our earlier work, along with a brief overview of graph theory and network representation. Section 3 is divided into two subsections. The first subsection outlines the consensus-based estimation algorithm with saturation filtering, as proposed in our previous study, and the second subsection introduces the enhancements made through a false data injection detection and isolation mechanism, including the detection thresholds and agent isolation process. Section 4 presents the simulation setup, baseline, and robustness case studies, and the associated results, illustrating the algorithm’s tracking accuracy and resilience under different network and attack scenarios, while also summarizing the key findings of this article. Section 5 discusses the resilience, limitations, and potential improvements of the proposed methods, and Section 6 provides the overall conclusion of this work.

2. System Modeling

This section introduces the mathematical models used to describe the systems. The target’s motion is described using a nearly constant velocity (NCV) model, which is a kinematic-based model that incorporates process noise to account for the acceleration uncertainties. The measurement model is based on time-of arrival (TOA) multilateration, enabling agents to estimate distances from the target and build local observation matrices. Finally, we used randomly generated networks to present the multi-agent system. These components together form the foundation for the distributed estimation and fault detection methods, which will be presented later on in this study.

2.1. Target Dynamics with NCV Model

The motion of the moving target is modeled using a nearly constant velocity framework. This approach employs a kinematic transition model and accounts for system uncertainty by incorporating acceleration terms as process noise inputs. Thus, the unmodeled accelerations are represented as disturbances in the following state-space formulation:
x k + 1 = A . x k + B . w k ,
where x k and x k + 1 denote the state vector at the current and next time steps, respectively. A and B are the state transition and input matrices, and w k is the process noise vector. Using the NCV model with sampling interval Δ , the matrices A and B are given by:
A = 1 0 0 Δ 0 0 0 1 0 0 Δ 0 0 0 1 0 0 Δ 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1   a n d   B = Δ 2 2 0 0 0 Δ 2 2 0 0 0 Δ 2 2 Δ 0 0 0 Δ 0 0 0 Δ ,
in the next section, we present the measurement model used by the agents to complete the mathematical representation of the system.

2.2. Measurement Model Using TOA Multilateration

In the context of distributed state estimation, each agent independently collects measurement data that are linked to the global state of the system. The process of capturing these local observations can be mathematically described by the following measurement model:
y i k = H i . x k + v i k ,
where y i k denotes the observation vector obtained by agent i at time step k . v i k ,   models the measurement noise in the data collected by the agents. H i is the observation matrix that shows how the system state is projected onto the measurements accessible to agent i .
The accurate formulation of the observation matrix H i is essential to ensure that each agent can accurately interpret and reconstruct the state of the system from its own measurements. In this study, we construct H i using a multilateration approach based on the Time-of-Arrival (TOA) principle, as introduced in [39]. In this setup, the target continuously sends out a signal that moves through the environment at a known speed. When agents detect this signal, they log the time at which it arrives, enabling the calculation of their respective distances from the source. These distance estimates form the basis for both localization and the mathematical formulation of the measurement model by capturing the differences in signal arrival times at various agents.
This derivation is visually illustrated in Figure 1, which shows a scenario where three agents work together to determine the location of a moving target. The figure demonstrates how sending and receiving the beacon signal helps the agents to understand their positions relative to the target.
For practical implementation, we assume that each agent exchanges data only with its set of immediate neighbors, reflecting a realistic scenario in localized and scalable multi-agent networks. This neighbor-limited information flow allows for the observation matrix to be defined in a linearized format as below:
p j , i x = p j x p i x p j , i y = p j y p i y p j , i z = p j z p i z ,     a n d   H i = p j 1 , i T 0 3 T p j N i , i T 0 3 T ,
where p n , i = ( p n , i x , p n , i y , p n , i z ) expresses the differences of positions between neighbor n and agent i . The notation N i denotes the immediate neighboring set for the agent i . This setup ensures that each agent’s observation matrix is customized to its local surroundings, using only data that can be directly measured or shared within a distributed system.

2.3. Graph Theory and Network Representation

In this section, we provide an overview of graph theory and describe the specific network configuration employed in this study. Multi-agent systems are modeled within the framework of graph theory as G = { N , L , W } , where N = { 1 , , n } denotes the set of nodes, L = i ,   j     i j ; i , j   N } represents the set of links (edges) among nodes, and W = [ w i j ] corresponds to the weight matrix quantifying relevant attributes of the connections, such as distance.
For the purposes of this work, all network topologies are generated using the Erdős–Rényi random graph model. In this model G ( n , p ) , a graph is formed from a fixed set of nodes n , where each possible edge between node pairs is included independently with probability p . This approach offers analytical simplicity, scalability, and serves as a standard benchmark for examining the effects of random connectivity and network structure in multi-agent systems.
In the following section, we provide a detailed demonstration of the estimation and fault detection algorithms.

3. Proposed Estimation and Fault Detection Algorithms

In this section, we first introduce the consensus-based estimation with saturation filtering, which was comprehensively explained in our previous work [38]. We then enhance the performance of this method by incorporating a false data injection detection mechanism. This addition aims to improve the robustness of our approach in adversarial environments and against cyber-physical threats, particularly false data injection attacks on agents, which typically appear as sharp anomalies in the innovation during the tracking of a moving target. For clarity and ease of reference, Table 1 summarizes all major variables, parameters, and symbols used throughout this manuscript.

3.1. Consensus-Based Estimation with Saturation Filtering

To provide context, we briefly summarize the distributed filtering framework in our earlier work. This framework operates in two steps: updating the state estimate using local observations (observation update) and then refining estimates by exchanging information between neighboring agents (estimation consensus).
During the observation update, each agent integrates its own measurement y i k through a saturation-based filtering for the purpose of limiting the effect of corrupted data. The update rule for agent i at time step k is computed as:
x ^ i k = A x ^ i k 1 + g i k H i T y i k H i A x ^ i k 1 ,
where x ^ i k represents the estimated state, A is the known state transition matrix obtained from Equation (2), H i is the observation matrix for agent i obtained from Equation (4), and g i k is a saturation gain that addresses the innovation magnitude, which is defined by the rule:
g i k = 1 , i f   y i k H i A x ^ i k 1 ξ ξ y i k H i A x ^ i k 1 ,   o t h e r w i s e .
in this format, ξ > 0 is the observation confidence parameter. This parameter restricts the influence of large innovations, which may be caused by measurement noise or adversarial interference, thereby enhancing the filter’s robustness against such disturbances.
Following the observation update, agents engage in an iterative consensus process to improve estimation accuracy by exchanging information with neighboring agents. This consensus step is performed multiple times within a single time iteration k . At consensus iteration l , agent i ’s estimate is updated by combining its own estimate with those of its immediate neighbors N i :
x ^ i , l k = x ^ i , l 1 k ε J N i x ^ i , l 1 k x ^ J , l 1 k ,
in this expression, x ^ i , l k is the updated estimate, ε is a small positive that controls the step size of the consensus update, and the summation adjusts the estimate toward the average of neighbors’ estimates. Performing multiple consensus steps promotes agreement across the network and improves accuracy compared to using local information alone.
By integrating the saturation-based observation filter with the consensus-based estimation step, the proposed method achieves robustness against corrupted measurements while effectively fusing information across agents. This combined approach forms the foundation of our decentralized mobile target tracking algorithm based on the NCV model. The detailed steps of this method are presented in Algorithm 1.
Algorithm 1. Decentralized mobile target tracking using the consensus-based estimation filter algorithm
Initialize variables = ( x ^ i 0 ,     ξ ,     L ,     ε )
for  k = 1 ,   2 ,    do
for  i = 1 ,   , N  do
  Observation Matrix Calculation:
  for  j = 1 ,   , | N i |  do
  Compute H i “from Equation (4)”
  End
  Measurement Update with Saturation Filtering:
   g i k = min 1 ,   ξ y i k H i A x ^ i k 1
   x ^ i k = A x ^ i k 1 + g i k H i T y i k H i A x ^ i k 1
  Estimate Consensus:
  Let x ^ i , 0 k = x ^ i k
  for  l = 1 ,   , L  do
   x ^ i , l k = x ^ i , l 1 k ε J N i x ^ i , l 1 k x ^ J , l 1 k
  End
  Let x ^ i k = x ^ i , L k
 End
End

3.2. False Data Injection Detection and Isolation

To improve the resilience of Algorithm 1 against cyber–physical threats, particularly false data injection attacks (FDIAs), we introduce a detection and isolation mechanism. The core idea is to verify whether each agent’s local measurement is consistent with its predicted observation before it is incorporated into the distributed estimation process. If a measurement deviates significantly from what the model expects, it is considered potentially compromised and excluded from the update step.
At each time step k , agent i computes an innovation value, which represents the difference between the current measurement and the predicted output based on the agent’s previous state estimate. This innovation is given by:
γ i ( k ) = y i k H i A x ^ i k 1 ,
where y i k is the measurement received by agent i , H i is the observation matrix, A is the state transition matrix defined by the nearly constant velocity model, and x ^ i k 1 is the predicted state estimate from the previous step.
To assess whether the innovation γ i ( k ) is acceptable, it is compared against a dynamic detection threshold φ i ( k ) . The threshold is defined as:
φ i k = A . ( ρ ¯ k 1 , i + f k 1 + b w + b v ) ,
where A is the norm of the state transition matrix A . The term ρ ¯ k 1 , i denotes the estimation error bound at the previous time step for agent i , and f k 1 represents the consensus mismatch across the network, which measures how far apart the agents’ estimates are at time k 1 . The constants b w and b v represent predefined upper bounds on the process and measurement noise, respectively.
The consensus mismatch term f k 1 is computed as the maximum deviation between any two agents’ state estimates at the previous time step and is calculated as:
f k 1 = max i , j N x ^ i k 1 x ^ j k 1 ,
where N denotes the set of all agents in the network. This term reflects the global estimation disagreement and captures the worst-case divergence among the agents.
The estimation error bound ρ ¯ k , i is updated recursively at each time step using the following relation:
ρ ¯ k , i = A . ρ ¯ k 1 , i + ε . δ k 1 , i + b w ,
where ε is the consensus step size and δ k 1 , i is the local consensus disagreement for agent i , representing the maximum deviation between its own estimate and those of its immediate neighbors of N i . This local mismatch is calculated as:
δ k 1 , i = max i , j N i x ^ i k 1 x ^ j k 1 ,
if the magnitude of the innovation exceeds the threshold γ i k > φ i k ), the agent is flagged as compromised. In this case, the agent does not incorporate its current measurement into the state update. Instead, it uses the best prediction of the dynamic model:
x ^ i ( k ) = A x ^ i k 1 ,
this action effectively isolates the compromised measurement, preventing it from corrupting the overall consensus process.
If the innovation falls within the acceptable threshold, the agent continues with the normal measurement update and consensus-based fusion steps as outlined in the original Algorithm 1. By applying this detection and isolation process at every iteration, the estimation process becomes capable of automatically identifying and isolating faulty measurements. The complete procedure, incorporating this fault-resilient mechanism, is summarized in Algorithm 2.
In the next section, we take a closer look at how Algorithms 1 and 2 perform in a range of testing scenarios. These fall into two main categories: tests under normal conditions with varying network setups, and tests where agents are subjected to false data injection attacks. This approach allows us to evaluate how effectively the algorithms handle disruptions, adapt to changing conditions, and detect faulty information. The analysis aims to assess estimation accuracy, convergence behavior, and overall resilience in a decentralized framework.
Algorithm 2. Decentralized mobile target tracking using consensus-based estimation algorithm with fault detection
Initialize variables = ( x ^ i 0 ,     ξ ,     L ,     ε )
for  k = 1 ,   2 ,    do
 for  i = 1 ,   , N  do
  Observation Matrix Calculation:
  for   j = 1 ,   , | N i |  do
  Compute H i “ from Equation (4)”
  End
  Innovation and Fault Detection:
  Compute γ i k and φ i k  “ from Equations (8) and (9)”
  if  | γ i k | >   φ i k  then
   x ^ i k = A x ^ i k 1
  Else
  Measurement Update with Saturation Filtering:
   g i k = min 1 ,   ξ y i k H i A x ^ i k 1
   x ^ i k = A x ^ i k 1 + g i k H i T y i k H i A x ^ i k 1
  Estimate Consensus:
  Let x ^ i , 0 k = x ^ i k
  for  l = 1 ,   , L
   x ^ i , l k = x ^ i , l 1 k ε J N i x ^ i , l 1 k x ^ J , l 1 k
  end if
  Let x ^ i k = x ^ i , L k
 End
End

4. Case Studies and Results

This section presents a comprehensive evaluation of the proposed decentralized, consensus-based target-tracking algorithm under a range of operating conditions. The evaluation is divided into two main categories. The first category, referred to as the Baseline Case Studies, investigates the performance of Algorithm 1 in attack-free environments. This part examines the effects of key design parameters, such as graph connectivity, the number of consensus iterations, and the saturation filter settings, on the accuracy of target tracking and the convergence behavior of the distributed estimates.
The second category, referred to as the Robustness Case Studies, evaluates the performance of both Algorithms 1 and 2 under various false data injection attacks. This part emphasizes the resilience and adaptability of the proposed framework when facing cyber-physical threats and highlights its effectiveness in mitigating the impact of faulty measurements.
Performance is assessed using the mean-squared estimation error (MSEE), defined in Equation (14), the average mean-squared estimation error given in Equation (15), and the innovation norm as defined in Equation (8):
e i = 1 k k = 1,2 , x ^ i k x i k 2 ,
e A v g = 1 N i = 1 N e i ,
all simulations were implemented and executed in the MATLAB R2022 environment. The simulation setup reflects realistic network conditions and includes multiple agent configurations. Finally, a summary and discussion of the results is provided to show clear comparative analysis.

4.1. Baseline Case Studies (1–3): Without FDIA

This set of experiments evaluates the performance of Algorithm 1 under benign conditions, where no false data injection attacks occur. The purpose of these baseline studies is to examine the influence of key design parameters, including the communication topology, the number of consensus iterations, and the configuration of the saturation filter on the estimation accuracy and convergence behavior. These tests provide a foundation for understanding the algorithm’s behavior under ideal conditions, before introducing adversarial scenarios.

4.1.1. Case Study 1—Effect of Graph Connectivity

This case study investigates how the density of the communication graph affects the tracking performance. Two random graphs with twenty agents are generated: one with a connection probability of p   =   0.7 , representing a highly connected network (Figure 2b), and one with a low connectivity of p   =   0.3 (Figure 2a). The corresponding average MSEE results for these configurations are shown in Figure 2c,d.
The results indicate that a higher level of connectivity improves estimation accuracy and accelerates convergence by allowing more information to be exchanged between agents. However, this enhanced performance requires greater communication bandwidth and computational resources. Therefore, designers must carefully balance the trade-off between estimation performance and the communication costs when choosing the network topology.

4.1.2. Case Study 2—Number of Consensus Iterations

This experiment examines the effect of the number of consensus iterations, denoted by L , which controls how often each agent exchanges information with its immediate neighbors between successive time steps. Two different settings are tested: a lower communication rate ( L   =   10 ) and a higher rate ( L   =   100 ).
The results for a random communication network in Figure 3a indicate that using fewer iterations slows the convergence process and yields higher estimation errors (Figure 3b,c), whereas increasing the number of iterations improves the convergence rate and reduces estimation errors (Figure 3d,e). However, this performance gain requires increased communication and computation. Therefore, the number of iterations must balance accuracy with system constraints.

4.1.3. Case Study 3—Saturation Filter Parameters

In this final baseline case, the influence of the saturation filter’s configuration on tracking robustness and sensitivity is investigated. Two filter settings are tested: a permissive (soft) threshold with ( ξ = 4 ) and a conservative (harsh) threshold with ( ξ = 2 ). These settings control how much deviation is tolerated in received data before they are attenuated or discarded.
The results are shown for a random communication network in Figure 4a. Under the soft threshold setting ( ξ = 4 ), the system achieves higher estimation errors, as seen in the innovation norm and average MSEE plots (Figure 4b,c), and it is more vulnerable to faulty measurements. In contrast, the harsh threshold setting ( ξ = 2 ) yields smoother innovation norms and more stable behavior (Figure 4d,e), at the cost of less sensitivity to measurement innovations. This case highlights the critical trade-off between filter sensitivity and robustness.

4.2. Robustness Case Studies (4–6): With FDIA

In this section, we extend our experiments to evaluate the performance of Algorithm 2 alongside baseline Algorithm 1 under adversarial conditions. Our focus is on cyber–physical threats posed by false data injection attacks from an external attacker. FDIAs can cause substantial disturbances in measurements, creating anomalies or sharp spikes in the data that degrade the accuracy of the state estimates.
In the first case, we introduce a localized false data injection attack of high magnitude to show how the detection and isolation mechanism protects the estimates and improves the reliability of the communication system under cyber–physical threats. The second case considers a widespread coordinated attack where half of the agents receive false data at varying magnitudes, allowing us to assess the algorithm’s resilience when a significant portion of the network is compromised. Finally, the third case investigates the algorithm’s behavior under transient attacks that last for only a short period of time. In each case, we evaluate and compare the performance of both algorithms to highlight the effectiveness of the proposed detection mechanism under different adversarial scenarios.

4.2.1. Case Study 4—Localized False Data Injection

In this case study, we assume that two randomly selected agents are subjected to a high-magnitude false data injection attack after a specified time step ( k > 40 ). The objective is to demonstrate how the detection and isolation mechanism can identify and isolate the compromised agents so that their corrupted data do not propagate through the network or degrade the overall consensus-based state estimation.
The detection process on a randomly generated network is illustrated in Figure 5a. The innovation norm for each agent is compared against the dynamic threshold explained in Equation (9), and any value exceeding this threshold is flagged as compromised, as shown in Figure 5b. Figure 5c,d present the MSEE over time for the algorithms without and with FDIA detection, respectively. The results clearly show that the proposed detection and isolation method effectively mitigates the impact of the attacks, achieving lower errors than the baseline algorithm without detection.
Figure 5e compares the average MSEE across all agents for both algorithms, further confirming the significant performance improvements provided by the detection mechanism under cyber–physical threats. Finally, Figure 5f illustrates the detection heat map, which correctly identifies agents 5 and 17 as under attack after k > 40 .

4.2.2. Case Study 5—Widespread Coordinated Attacks

In this case study, half of the agents in the communication network (Figure 6a) are randomly selected and subjected to false data injection attacks of varying magnitudes (low, medium, and high). The objective is to evaluate the algorithms under severe conditions where a large number of agents are compromised. Particular attention is paid to assessing the performance of the proposed detection algorithm when the attack magnitudes approach the detection threshold.
Figure 6b displays the innovation norm measurements across all agents, showing the presence of attacks with different magnitudes. The MSEE results for both algorithms are shown in Figure 6c,d, and a comparison of the average MSEE is provided in Figure 6e. In the case of low-magnitude attacks, which are close to the detection threshold, some of the compromised agents are successfully detected and isolated. In contrast, others remain undetected and continue to influence the estimates. Even under these challenging conditions, the algorithm with the detection mechanism outperforms the baseline version that lacks detection, achieving significantly lower estimation errors. Finally, Figure 6f presents a heat map indicating all detected attacks over time, illustrating the effectiveness of the proposed algorithm in mitigating widespread coordinated false data injections.

4.2.3. Case Study 6—Transient Attacks

In this final robustness case study, we evaluate the performance of the FDIA detection algorithm under transient attacks. Unlike the previous case studies, where the attackers influence continuously throughout the entire process, this scenario considers a situation where a subset of agents in the network (Figure 7a) experiences short-duration false data injection attacks with medium to high magnitudes. The corresponding innovation norm is shown in Figure 7b.
Figure 7c,d present the MSEE for the algorithms without and with FDIA detection, respectively. A comparison of the average MSEE for both algorithms is displayed in Figure 7e. The results demonstrate that the algorithm with detection enabled successfully prevents transient attacks from significantly affecting the estimation process and is able to quickly detect the attacked agents, as indicated in Figure 7f.

4.3. Summary and Discussion of Results

This section summarizes the key findings from the baseline and robustness case studies presented earlier. The baseline case studies assessed the performance of Algorithm 1 under attack-free conditions. In the first baseline case, increased network connectivity led to faster convergence and lower mean-squared state estimation error, although this also increased communication overhead. In the second baseline case, the impact of the number of consensus iterations was examined. The results showed that increasing the number of iterations accelerated agreement among agents and reduced estimation errors, but required greater communication bandwidth and power consumption. In the third baseline case, the influence of the saturation filter parameters was investigated. A more conservative threshold achieved higher resilience to measurement variations, but also reduced responsiveness to legitimate changes.
The second set of case studies focused on the performance of Algorithm 1 alongside its enhanced version with FDIA detection presented in Algorithm 2, under cyber–physical threats. The fourth case introduced localized high-magnitude false data injection attacks on two agents starting at time step k > 40 . Algorithm 2 successfully detected and isolated the compromised agents and maintained accurate tracking estimates. The fifth case involved widespread coordinated attacks on 50% of the agents with varying attack magnitudes. The results showed that the medium- and high-magnitude attacks were reliably detected and mitigated, while a few low-magnitude attacks near the detection threshold occasionally evaded detection. Even under these challenging conditions, Algorithm 2 achieved substantially better average MSEE and tracking accuracy than Algorithm 1. Finally, the sixth case investigated the algorithms performance under transient attacks. The enhanced algorithm responded quickly to these brief anomalies and preserved estimation performance with minimal delay.
Table 2 concisely summarizes the different scenarios investigated in this study, including both baseline and adversarial conditions explored through simulation. This table highlights the key experimental setups, such as graph connectivity, consensus steps, and attack types, along with the primary outcomes and performance observations for each case. It is important to note that all scenarios are evaluated under the assumption that a majority of agents in the network are benign, which is a standard requirement for consensus-based resilience.

5. Discussion

While the proposed algorithm demonstrates strong resilience against various false data injection attack scenarios, several limitations should be acknowledged to provide a balanced assessment. First, the method assumes that the majority of agents in the network are benign, a common condition for consensus-based resilience, which may not hold in highly compromised environments. Second, although computational and communication overheads remain modest for small- to medium-scale networks, scaling to very large networks may require additional optimization to prevent excessive processing and bandwidth usage. Third, the approach relies on a nearly constant velocity (NCV) motion model, which can reduce estimation accuracy for targets exhibiting highly nonlinear or rapidly changing dynamics; replacing or augmenting the NCV model with a nearly constant acceleration (NCA) model or adaptive/learning-based models could improve tracking performance in such scenarios. Finally, the detection mechanism’s performance may degrade when attack magnitudes are close to the detection threshold, occasionally resulting in missed detections, as observed in the widespread attack case study. Addressing these limitations could guide future research toward enhancing robustness, scalability, and adaptability of decentralized target tracking algorithms under adversarial conditions.

6. Conclusions

In this paper, we developed and analyzed a resilient decentralized target tracking algorithm that operates effectively under both benign and adversarial conditions. By combining a saturation-based consensus filter with a false data injection detection and isolation mechanism, the proposed algorithm can achieve accurate estimates across multi-agent networks even in the presence of localized, coordinated, and transient false data injection attacks. The results from the case studies showed that increased graph connectivity and more consensus iterations improve estimation accuracy, while carefully tuned saturation filters balance estimation precision and sensitivity toward faulty measurements. Under cyber–physical attacks, the dynamic detection threshold successfully identified and isolated compromised agents, allowing the system to maintain stable tracking performance and significantly reduce the mean squared estimation errors.

Author Contributions

Conceptualization, A.A.G. and M.D.; methodology, A.A.G. and M.D.; software, A.A.G.; validation, A.A.G. and M.D.; formal analysis, A.A.G. and M.D.; investigation, A.A.G. and M.D.; resources, M.D.; data curation, A.A.G.; writing—original draft preparation, A.A.G.; writing—review and editing, A.A.G. and M.D.; visualization, A.A.G.; supervision, M.D.; project administration, M.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No new data were created or analyzed in this study. The MATLAB simulation code and relevant configuration files used to generate the results are available from the authors upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Geng, N.; Meng, Q.; Gong, D.; Chung, P. How Good are Distributed Allocation Algorithms for Solving Urban Search and Rescue Problems? A Comparative Study With Centralized Algorithms. IEEE Trans. Autom. Sci. Eng. 2019, 16, 478–485. [Google Scholar] [CrossRef]
  2. Rahmani, M.; Abolhasani, M. State estimation for stochastic time-varying multisensor systems with multiplicative noises: Centralized and decentralized data fusion. Asian J. Control. 2019, 21, 1547–1555. [Google Scholar] [CrossRef]
  3. Rajoriya, A.; Budhiraja, R.; Hanzo, L. Centralized and decentralized channel estimation in FDD multi-user massive MIMO systems. IEEE Trans. Veh. Technol. 2022, 71, 7325–7342. [Google Scholar] [CrossRef]
  4. Kang, S.; Eryilmaz, A.; Joo, C. Comparison of Decentralized and Centralized Update Paradigms for Distributed Remote Estimation. IEEE/ACM Trans. Netw. 2023, 32, 1839–1853. [Google Scholar] [CrossRef]
  5. Olfati-Saber, R. Distributed Kalman filter with embedded consensus filters. In Proceedings of the 44th IEEE Conference on Decision and Control, Seville, Spain, 12–15 December 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 8179–8184. [Google Scholar]
  6. Olfati-Saber, R.; Shamma, J.S. Consensus filters for sensor networks and distributed sensor fusion. In Proceedings of the 44th IEEE Conference on Decision and Control, Seville, Spain, 12–15 December 2005; IEEE: Piscataway, NJ, USA, 2005; pp. 6698–6703. [Google Scholar]
  7. Olfati-Saber, R. Distributed Kalman filtering for sensor networks. In Proceedings of the 2007 46th IEEE Conference on Decision and Control, New Orleans, LA, USA, 12–14 December 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 5492–5498. [Google Scholar]
  8. Carli, R.; Chiuso, A.; Schenato, L.; Zampieri, S. Distributed Kalman filtering based on consensus strategies. IEEE J. Sel. Areas Commun. 2008, 26, 622–633. [Google Scholar] [CrossRef]
  9. Mahmoud, M.S.; Khalid, H.M. Distributed Kalman filtering: A bibliographic review. IET Control. Theory Appl. 2013, 7, 483–501. [Google Scholar] [CrossRef]
  10. Khalkhali, M.B.; Vahedian, A.; Yazdi, H.S. Multi-target state estimation using interactive Kalman filter for multi-vehicle tracking. IEEE Trans. Intell. Transp. Syst. 2019, 21, 1131–1144. [Google Scholar] [CrossRef]
  11. Deng, C.; Jin, X.-Z.; Wu, Z.-G.; Che, W.-W. Data-Driven-Based Cooperative Resilient Learning Method for Nonlinear MASs Under DoS Attacks. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 12107–12116. [Google Scholar] [CrossRef]
  12. Liu, S.; Jiang, X. Adaptive neural network decentralized control for nonlinear interconnected systems with time-varying constraints. Int. J. Robust Nonlinear Control. 2022, 32, 5520–5533. [Google Scholar] [CrossRef]
  13. Zhao, Z.; Wang, T.; Peng, F.; Yu, J. Adaptive Fuzzy Resilient Decentralized Control for Nonlinear Large-Scale CPSs Under DoS Attacks. IEEE Trans. Fuzzy Syst. 2024, 32, 5899–5909. [Google Scholar] [CrossRef]
  14. Deng, C.; Yue, D.; Che, W.-W.; Xie, X. Cooperative Fault-Tolerant Control for a Class of Nonlinear MASs by Resilient Learning Approach. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 670–679. [Google Scholar] [CrossRef]
  15. Yang, Y.; Wang, L. Byzantine-resilient decentralized network learning. J. Korean Stat. Soc. 2024, 53, 349–380. [Google Scholar] [CrossRef]
  16. Stanković, S.S.; Stankovic, M.S.; Stipanovic, D.M. Decentralized parameter estimation by consensus based stochastic approximation. IEEE Trans. Autom. Control. 2010, 56, 531–543. [Google Scholar] [CrossRef]
  17. Petitti, A.; Di Paola, D.; Rizzo, A.; Cicirelli, G. Consensus-based distributed estimation for target tracking in heterogeneous sensor networks. In Proceedings of the 2011 50th IEEE Conference on Decision and Control and European Control Conference, Orlando, Florida, USA, 12–15 December 2011; IEEE: Piscataway, NJ, USA, 2007; pp. 6648–6653. [Google Scholar]
  18. Ilić, N.; Stanković, M.S.; Stanković, S.S. Adaptive consensus-based distributed target tracking in sensor networks with limited sensing range. IEEE Trans. Control. Syst. Technol. 2013, 22, 778–785. [Google Scholar] [CrossRef]
  19. Zhou, Z.; Fang, H.; Hong, Y. Distributed estimation for moving target based on state-consensus strategy. IEEE Trans. Autom. Control. 2013, 58, 2096–2101. [Google Scholar] [CrossRef]
  20. Kamal, A.T.; Bappy, J.H.; Farrell, J.A.; Roy-Chowdhury, A.K. Distributed multi-target tracking and data association in vision networks. IEEE Trans. Pattern Anal. Mach. Intell. 2015, 38, 1397–1410. [Google Scholar] [CrossRef]
  21. Yan, J.; Xu, Z.; Wan, Y.; Chen, C.; Luo, X. Consensus estimation-based target localization in underwater acoustic sensor networks. Int. J. Robust Nonlinear Control. 2017, 27, 1607–1627. [Google Scholar] [CrossRef]
  22. Ding, Z.; Liu, Y.; Liu, J.; Yu, K.; You, Y.; Jing, P.; He, Y. Adaptive interacting multiple model algorithm based on information-weighted consensus for maneuvering target tracking. Sensors 2018, 18, 2012. [Google Scholar] [CrossRef]
  23. Doostmohammadian, M.; Khan, U.A.; Pirani, M.; Charalambous, T. Consensus-based distributed estimation in the presence of heterogeneous, time-invariant delays. IEEE Control. Syst. Lett. 2021, 6, 1598–1603. [Google Scholar] [CrossRef]
  24. Verma, J.K.; Chhabra, J.K.; Ranga, V. Track consensus-based labeled multi-target tracking in mobile distributed sensor network. IEEE Trans. Mob. Comput. 2023, 23, 7351–7362. [Google Scholar] [CrossRef]
  25. Sun, Y.; Yang, X.; Shi, P.; Su, H. Consensus tracking of switched heterogeneous nonlinear systems with uncertain target. In IEEE Transactions on Circuits and Systems I: Regular Papers; IEEE: Piscataway, NJ, USA, 2024. [Google Scholar]
  26. Doostmohammadian, M.; Aghasi, A.; Pirani, M.; Nekouei, E.; Zarrabi, H.; Keypour, R.; Rikos, A.I.; Johansson, K.H. Survey of distributed algorithms for resource allocation over multi-agent systems. Annu. Rev. Control. 2025, 59, 100983. [Google Scholar] [CrossRef]
  27. Teixeira, A.; Pérez, D.; Sandberg, H.; Johansson, K.H. Attack models and scenarios for networked control systems. In Proceedings of the 1st international conference on High Confidence Networked Systems, Beijing, China, 17–18 April 2012; pp. 55–64. [Google Scholar]
  28. Giraldo, J.; Urbina, D.; Cardenas, A.; Valente, J.; Faisal, M.; Ruths, J.; Tippenhauer, N.O.; Sandberg, H.; Candell, R. A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. 2018, 51, 1–36. [Google Scholar] [CrossRef] [PubMed]
  29. He, X.; Ren, X.; Sandberg, H.; Johansson, K.H. Design of secure filters under attacked measurements: A saturation method. Security and Resilience of Control Systems: Theory and Applications; Springer Nature: Heidelberg, Germany, 2020. [Google Scholar]
  30. Jiang, Q.; Chen, H.; Xie, L.; Wang, K. Learning-based cooperative false data injection attack and its mitigation techniques in consensus-based distributed estimation. IEEE Access 2020, 8, 166852–166869. [Google Scholar] [CrossRef]
  31. Liu, H.; Niu, B.; Li, Y. False-data-injection attacks on remote distributed consensus estimation. IEEE Trans. Cybern. 2020, 52, 433–443. [Google Scholar] [CrossRef] [PubMed]
  32. He, X.; Ren, X.; Sandberg, H.; Johansson, K.H. How to secure distributed filters under sensor attacks. IEEE Trans. Autom. Control. 2021, 67, 2843–2856. [Google Scholar] [CrossRef]
  33. Shui, Y.; Wang, Y.; Li, Y.; Shan, Y.; Cui, N.; Pang, B. Consensus-based distributed target tracking with false data injection attacks over radar network. Appl. Sci. 2021, 11, 4564. [Google Scholar] [CrossRef]
  34. He, X.; Ren, X.; Sandberg, H.; Johansson, K.H. Secured Filters Based on Saturated Innovations. In Security and Resilience of Control Systems: Theory and Applications; Springer: Heidelberg, Germany, 2022; pp. 3–29. [Google Scholar]
  35. Luo, X.; He, J.; Wang, X.; Zhang, Y.; Guan, X. Resilient defense of false data injection attacks in smart grids via virtual hidden networks. IEEE Internet Things J. 2022, 10, 6474–6490. [Google Scholar] [CrossRef]
  36. Yang, Y.; Gao, X.; Song, S.; Li, Z. Distributed consensus-based filtering against false data injection attacks. IEEE Trans. Netw. Sci. Eng. 2024, 12, 110–121. [Google Scholar] [CrossRef]
  37. Cheng, Z.; Ren, H.; Qin, J.; Lu, R. Distributed Secure Consensus Estimation for Power Systems Against False Data Injection Attacks. Int. J. Robust Nonlinear Control. 2025, 35, 4724–4737. [Google Scholar] [CrossRef]
  38. Ghods, A.A.; Doostmohammadian, M. Decentralized Mobile Target Tracking Using Consensus-Based Estimation with Nearly-Constant-Velocity Modeling. In Proceedings of the 2024 12th RSI International Conference on Robotics and Mechatronics (ICRoM), Tehran, Iran, 17–19 December 2024; pp. 70–75. [Google Scholar] [CrossRef]
  39. Doostmohammadian, M.; Taghieh, A.; Zarrabi, H. Distributed Estimation Approach for Tracking a Mobile Target via Formation of UAVs. IEEE Trans. Autom. Sci. Eng. 2022, 19, 3765–3776. [Google Scholar] [CrossRef]
Figure 1. Illustration of the multilateration approach used to construct the observation matrix.
Figure 1. Illustration of the multilateration approach used to construct the observation matrix.
Signals 06 00044 g001
Figure 2. Effect of network connectivity on tracking accuracy: (a) Graph with p   =   0.3 ; (b) Graph with p   =   0.7 ; (c) Average MSEE for the low-density network (shown in blue lines); (d) Average MSEE for the high-density network (shown in blue lines).
Figure 2. Effect of network connectivity on tracking accuracy: (a) Graph with p   =   0.3 ; (b) Graph with p   =   0.7 ; (c) Average MSEE for the low-density network (shown in blue lines); (d) Average MSEE for the high-density network (shown in blue lines).
Signals 06 00044 g002
Figure 3. Impact of the number of consensus iterations on estimation performance: (a) Communication graph; (b,c) MSEE of individual agents and the average MSEE of all agents for L   =   10 , shown in colored and blue curves, respectively; (d,e) MSEE of individual agents and the average MSEE of all agents for L   =   100 , shown in colored and blue curves, respectively.
Figure 3. Impact of the number of consensus iterations on estimation performance: (a) Communication graph; (b,c) MSEE of individual agents and the average MSEE of all agents for L   =   10 , shown in colored and blue curves, respectively; (d,e) MSEE of individual agents and the average MSEE of all agents for L   =   100 , shown in colored and blue curves, respectively.
Signals 06 00044 g003aSignals 06 00044 g003b
Figure 4. Effect of saturation filter parameters on tracking performance: (a) Network graph; (b,c) Normalized innovation of individual agents and average MSEE of all agents for the soft filter ( ξ = 4 ), shown in colored and blue curves, respectively; (d,e) Normalized innovation of individual agents and average MSEE of all agents for the harsh filter ( ξ = 2 ), shown in colored and blue curves, respectively.
Figure 4. Effect of saturation filter parameters on tracking performance: (a) Network graph; (b,c) Normalized innovation of individual agents and average MSEE of all agents for the soft filter ( ξ = 4 ), shown in colored and blue curves, respectively; (d,e) Normalized innovation of individual agents and average MSEE of all agents for the harsh filter ( ξ = 2 ), shown in colored and blue curves, respectively.
Signals 06 00044 g004
Figure 5. Effect of localized false data injection on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), while values below the threshold (gray curves) correspond to benign agents; (c) Mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Figure 5. Effect of localized false data injection on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), while values below the threshold (gray curves) correspond to benign agents; (c) Mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Signals 06 00044 g005aSignals 06 00044 g005b
Figure 6. Effect of widespread coordinated attacks on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), while values below the threshold (gray curves) correspond to benign agents; (c) Mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Figure 6. Effect of widespread coordinated attacks on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), while values below the threshold (gray curves) correspond to benign agents; (c) Mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Signals 06 00044 g006aSignals 06 00044 g006b
Figure 7. Effect of transient attacks on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), whereas values below the threshold (gray curves) correspond to benign agents; (c) mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Figure 7. Effect of transient attacks on the proposed algorithms: (a) Random network topology; (b) Normalized innovation values for individual agents compared against the detection threshold φ , where spikes above the threshold (red dashed line) indicate agents under false data injection attack (colored curves), whereas values below the threshold (gray curves) correspond to benign agents; (c) mean-squared estimation error (MSEE) over time for individual agents for the baseline algorithm without FDIA detection (shown in colored curves); (d) MSEE over time for individual agents for the proposed algorithm with FDIA detection enabled (shown in colored curves); (e) Comparison of average MSEE of all agents for both algorithms, where the blue line denotes the FDIA-enabled method and the red dashed line denotes the baseline; (f) Attack detection map (“heat map”), where red regions indicate malicious agents and green regions indicate benign agents.
Signals 06 00044 g007
Table 1. Summary of key parameters and variables used throughout this manuscript.
Table 1. Summary of key parameters and variables used throughout this manuscript.
SymbolDescription
x k State vector of the target at time step k
x ^ i k Estimated state of the target by agent i at time step k
| N i | Set of immediate neighbors of agent i
A State transition matrix
B Input matrix
H i Observation matrix for agent i
y i k Measurement/Observation vector of agent i at time step k
v i k Measurement noise of agent i
w k Process noise
g i k Saturation gain agent i at time step k
ξ Observation confidence parameter
L Number of consensus iterations
ε Consensus step size
γ i ( k ) Innovation of agent i at time step k
φ i k Dynamic detection threshold for agent i at time step k
b w Upper bounds on the process noise
b v Upper bounds on the measurement noise
f k Global consensus mismatch at time step k
ρ ¯ k , i Estimation error bound of agent i at time step k
δ k , i Local consensus mismatch of agent i at time step k
e i Mean-squared estimation error (MSEE) of agent i
e A v g Average mean-squared estimation error of all agents
Table 2. Summary of baseline and robustness case studies.
Table 2. Summary of baseline and robustness case studies.
ScenarioFDA UsedAttack TypeKey Parameters Main Outcome
1. Graph ConnectivityNoNonep = 0.3 vs. p = 0.7Dense graphs improved convergence and lowered MSEE
2. Consensus IterationsNoNoneL = 10 vs. L = 100More iterations improved accuracy with increased communication cost
3. Saturation Filter ParametersNoNone ξ = 4   v s .   ξ = 2 Conservative filters enhanced robustness but reduced responsiveness
4. Localized Fault InjectionYesTargeted high-magnitude FDI on 2 agentsFault at k = 30Algorithm 2 detected and suppressed the faulty data
5. Widespread AttackYesRandomized FDI (mixed magnitude) on 50% of agentsFDI levels varied (low/med/high)Algorithm 2 detected most attacks; low-magnitude injections sometimes evaded detection but accuracy was preserved
6. Transient AttackYesRandom short-duration FDILimited attack durationAlgorithm 2 suppressed transient anomalies with minimal delay
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ghods, A.A.; Doostmohammadian, M. Resilient Consensus-Based Target Tracking Under False Data Injection Attacks in Multi-Agent Networks. Signals 2025, 6, 44. https://doi.org/10.3390/signals6030044

AMA Style

Ghods AA, Doostmohammadian M. Resilient Consensus-Based Target Tracking Under False Data Injection Attacks in Multi-Agent Networks. Signals. 2025; 6(3):44. https://doi.org/10.3390/signals6030044

Chicago/Turabian Style

Ghods, Amir Ahmad, and Mohammadreza Doostmohammadian. 2025. "Resilient Consensus-Based Target Tracking Under False Data Injection Attacks in Multi-Agent Networks" Signals 6, no. 3: 44. https://doi.org/10.3390/signals6030044

APA Style

Ghods, A. A., & Doostmohammadian, M. (2025). Resilient Consensus-Based Target Tracking Under False Data Injection Attacks in Multi-Agent Networks. Signals, 6(3), 44. https://doi.org/10.3390/signals6030044

Article Metrics

Back to TopTop