Visible to the public Trust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks

TitleTrust-Based Distributed Kalman Filter Estimation Fusion under Malicious Cyber Attacks
Publication TypeConference Paper
Year of Publication2019
AuthorsChen, Yanping, Ma, Long, Xia, Hong, Gao, Cong, Wang, Zhongmin, Yu, Zhong
Conference Name2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)
Date Publishedaug
KeywordsCovariance matrices, Cyber Attacks, distributed cooperative localization, Distributed databases, Distributed Kalman filter, distributed processing, Dynamic state estimation, False Data Injection, false trust, information exchange, Kalman filters, malicious attacks, malicious cyber attacks, malicious network attack, measurement errors, neighbor nodes, policy-based governance, Policy-Governed Secure Collaboration, pubcrawl, replay attacks, resilience, Resiliency, Scalability, security, security of data, sensor fusion, Sensor networks, state estimation, trust-based distributed Kalman filter estimation fusion, trust-based distributed processing frame, Trusted Computing, trusted nodes, truth discovery, Wireless sensor networks
Abstract

We consider distributed Kalman filter for dynamic state estimation over wireless sensor networks. It is promising but challenging when network is under cyber attacks. Since the information exchange between nodes, the malicious attacks quickly spread across the entire network, which causing large measurement errors and even to the collapse of sensor networks. Aiming at the malicious network attack, a trust-based distributed processing frame is proposed. Which allows neighbor nodes to exchange information, and a series of trusted nodes are found using truth discovery. As a demonstration, distributed Cooperative Localization is considered, and numerical results are provided to evaluate the performance of the proposed approach by considering random, false data injection and replay attacks.

DOI10.1109/HPCC/SmartCity/DSS.2019.00313
Citation Keychen_trust-based_2019