Learning-Based Cooperative False Data Injection Attack and Its Mitigation Techniques in Consensus-Based Distributed Estimation

For the false data injection attack (FDIA) in the consensus-based distributed estimation, the information of weight matrix is critical for both attackers and defenders. In this paper, we study the impact of the weight matrix on the FDIA and the attack mitigation techniques. We first propose a learning-based cooperative FDIA strategy, where malicious nodes acquire the information of weight matrix cooperatively and launch the attack covertly. Two types of FDIA, the sudden FDIA and the dynamic FDIA, are considered to tamper the consensus result of the network to a pre-designed false value. Moreover, using the obtained information of weight matrix, a real-time surveillance and response mechanism is constructed to enhance the covertness of FDIA strategy. Since the surveillance and response mechanism can bypass existing FDIA detection methods, we further investigate the attack mitigation techniques against the learning-based cooperative FDIA. A real-time FDIA detection method and a reassessment mechanism with a punishment scheme are presented to resist the surveillance and response mechanism in the learning-based cooperative FDIA. Comprehensive simulation results verify that the attacker can obtain the information of weight matrix, and tamper the consensus result to a false value by launching the learning-based cooperative FDIA. And the real-time FDIA detection method can detect the malicious nodes efficiently and promptly.

[1]  Carlos Sagüés,et al.  Chebyshev Polynomials in Distributed Consensus Applications , 2011, IEEE Transactions on Signal Processing.

[2]  C.N. Hadjicostis,et al.  Finite-Time Distributed Consensus in Graphs with Time-Invariant Topologies , 2007, 2007 American Control Conference.

[3]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[4]  Anna Scaglione,et al.  Data Injection Attacks in Randomized Gossiping , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[5]  Pramod K. Varshney,et al.  Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[6]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[7]  Luca Schenato,et al.  A Survey on Distributed Estimation and Control Applications Using Linear Consensus Algorithms , 2010 .

[8]  Sandro Zampieri,et al.  Mean Square Performance of Consensus-Based Distributed Estimation over Regular Geometric Graphs , 2012, SIAM J. Control. Optim..

[9]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[10]  Soummya Kar,et al.  Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.

[11]  Shreyas Sundaram,et al.  Robustness of information diffusion algorithms to locally bounded adversaries , 2011, 2012 American Control Conference (ACC).

[12]  Jiming Chen,et al.  Resilient Consensus with Mobile Detectors Against Malicious Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[13]  Soummya Kar,et al.  The Internet of Things: Secure Distributed Inference , 2018, IEEE Signal Processing Magazine.

[14]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[15]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[16]  Stephen P. Boyd,et al.  A scheme for robust distributed sensor fusion based on average consensus , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[17]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[18]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[19]  Kurt Johannes Reinschke,et al.  Multivariable Control a Graph-theoretic Approach , 1988 .

[20]  Qing-Long Han,et al.  Distributed Krein space-based attack detection over sensor networks under deception attacks , 2019, Autom..

[21]  Robert H. Halstead,et al.  Matrix Computations , 2011, Encyclopedia of Parallel Computing.

[22]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[23]  Shui-Hung Hou,et al.  Classroom Note: A Simple Proof of the Leverrier-Faddeev Characteristic Polynomial Algorithm , 1998, SIAM Rev..

[24]  Stephen P. Boyd,et al.  Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[25]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[26]  Vijay Kumar,et al.  Resilient consensus for time-varying networks of dynamic agents , 2017, 2017 American Control Conference (ACC).

[27]  Anna Scaglione,et al.  Detection of data injection attacks in decentralized learning , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.