Total Variation-Based Distributed Kalman Filtering for Resiliency Against Byzantines

This article proposes a distributed Kalman filter (DKF) with enhanced robustness against Byzantine adversaries. A Byzantine agent is a legitimate network agent that, unlike an honest agent, manipulates information before sharing it with neighbors to impair the overall system performance. In contrast to the literature, the DKF is modeled as a distributed optimization problem where resiliency against Byzantine agents is accomplished by employing a total variation (TV) penalty term. We utilize a distributed subgradient algorithm to compute the state estimate and error covariance matrix updates of the DKF. Additionally, we prove that the proposed suboptimal solution converges to a neighborhood of the optimal centralized solution of the KF with a bounded radius when Byzantine agents are present. Numerical simulations corroborate the theoretical findings and demonstrate the robustness of the proposed DKF against Byzantine attacks.

[1]  Bo Zhou,et al.  Secure Distributed Estimation Against Data Integrity Attacks in Internet-of-Things Systems , 2022, IEEE Transactions on Automation Science and Engineering.

[2]  Qing Ling,et al.  Variance Reduction-Boosted Byzantine Robustness in Decentralized Stochastic Optimization , 2022, ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  Youqing Wang,et al.  Online Secure State Estimation of Multiagent Systems Using Average Consensus , 2022, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[4]  Ping Zhang,et al.  Resilient Homomorphic Encryption Scheme for Cyber-Physical Systems , 2021, 2021 60th IEEE Conference on Decision and Control (CDC).

[5]  Prashanth Krishnamurthy,et al.  Resilient redundancy-based control of cyber-physical systems through adaptive randomized switching , 2021, Syst. Control. Lett..

[6]  Naveen K. D. Venkategowda,et al.  Securing the D istributed Kalman Filter Against Curious Agents , 2021, 2021 IEEE 24th International Conference on Information Fusion (FUSION).

[7]  Naveen K. D. Venkategowda,et al.  Distributed Kalman Filtering with Privacy against Honest-but-Curious Adversaries , 2021, 2021 55th Asilomar Conference on Signals, Systems, and Computers.

[8]  Derui Ding,et al.  Recursive Filtering of Distributed Cyber-Physical Systems With Attack Detection , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[9]  Xinting Zhang,et al.  Distributed Secure State Estimation Under Stochastic Linear Attacks , 2021, IEEE Transactions on Network Science and Engineering.

[10]  Yanhong Liu,et al.  Global Estimation Method Based on Spatial–Temporal Kalman Filter for DPOS , 2021, IEEE Sensors Journal.

[11]  Li Li,et al.  Multi-Party Dynamic State Estimation That Preserves Data and Model Privacy , 2021, IEEE Transactions on Information Forensics and Security.

[12]  Ping Zhang,et al.  Resilience of Cyber-Physical Systems to Covert Attacks by Exploiting an Improved Encryption Scheme , 2020, 2020 59th IEEE Conference on Decision and Control (CDC).

[13]  Derui Ding,et al.  Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks , 2020, IEEE Transactions on Cybernetics.

[14]  Qing Ling,et al.  Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks , 2020, Signal Process..

[15]  K. Johansson,et al.  How to Secure Distributed Filters Under Sensor Attacks , 2020, IEEE Transactions on Automatic Control.

[16]  Jin Gyu Lee,et al.  Fully Distributed Resilient State Estimation Based on Distributed Median Solver , 2020, IEEE Transactions on Automatic Control.

[17]  Fangfei Li,et al.  False Data Injection Attack for Cyber-Physical Systems With Resource Constraint , 2020, IEEE Transactions on Cybernetics.

[18]  Shreyas Sundaram,et al.  On the Impacts of Redundancy, Diversity, and Trust in Resilient Distributed State Estimation , 2020, IEEE Transactions on Control of Network Systems.

[19]  Stefan Werner,et al.  Coordinated Data-Falsification Attacks in Consensus-based Distributed Kalman Filtering , 2019, 2019 IEEE 8th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[20]  Wen-An Zhang,et al.  Attack and estimator design for multi-sensor systems with undetectable adversary , 2019, Autom..

[21]  Guang-Hong Yang,et al.  Distributed secure state estimation for cyber-physical systems under sensor attacks , 2019, Autom..

[22]  Ravishankar K. Iyer,et al.  RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers , 2019, IEEE Transactions on Smart Grid.

[23]  Hongyi Wang,et al.  DETOX: A Redundancy-based Framework for Faster and More Robust Gradient Aggregation , 2019, NeurIPS.

[24]  Soummya Kar,et al.  Resilient Distributed Parameter Estimation With Heterogeneous Data , 2018, IEEE Transactions on Signal Processing.

[25]  Chao Yang,et al.  Distributed filtering under false data injection attacks , 2019, Autom..

[26]  Juhoon Back,et al.  Distributed Kalman-filtering: Distributed optimization viewpoint , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[27]  Mehmet Necip Kurt,et al.  Real-Time Detection of Hybrid and Stealthy Cyber-Attacks in Smart Grid , 2018, IEEE Transactions on Information Forensics and Security.

[28]  Shreyas Sundaram,et al.  Byzantine-resilient distributed observers for LTI systems , 2018, Autom..

[29]  Mehmet Necip Kurt,et al.  Distributed Quickest Detection of Cyber-Attacks in Smart Grid , 2018, IEEE Transactions on Information Forensics and Security.

[30]  Soummya Kar,et al.  Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.

[31]  Yihua Yu,et al.  Consensus-Based Distributed Linear Filter for Target Tracking With Uncertain Noise Statistics , 2017, IEEE Sensors Journal.

[32]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[33]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[34]  Ling Shi,et al.  Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.

[35]  P. Varshney,et al.  Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[36]  Soummya Kar,et al.  Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems , 2016, IEEE Transactions on Control of Network Systems.

[37]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.

[38]  Qingjie Zhao,et al.  Distributed Multi-Target Tracking Based on the K-MTSCF Algorithm in Camera Networks , 2016, IEEE Sensors Journal.

[39]  Pascal Bianchi,et al.  Robust Distributed Consensus Using Total Variation , 2016, IEEE Transactions on Automatic Control.

[40]  Fredrik Rusek,et al.  Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks , 2015, IEEE Communications Magazine.

[41]  Heyu Wang,et al.  Distributed Frequency Estimation Over Sensor Network , 2015, IEEE Sensors Journal.

[42]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[43]  Georgios B. Giannakis,et al.  Distributed Robust Power System State Estimation , 2012, IEEE Transactions on Power Systems.

[44]  Ali H. Sayed,et al.  Diffusion Strategies for Distributed Kalman Filtering and Smoothing , 2010, IEEE Transactions on Automatic Control.

[45]  Reza Olfati-Saber,et al.  Kalman-Consensus Filter : Optimality, stability, and performance , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[46]  Rocky K. C. Chang,et al.  Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..

[47]  Xiu-Xiu Ren,et al.  Statistical-Based Optimal $\epsilon$-Stealthy Attack Under Stochastic Communication Protocol: An Application to Networked Permanent Magnet Synchronous Machine Systems , 2022, IEEE Transactions on Industrial Electronics.

[48]  Naveen K. D. Venkategowda,et al.  Privacy-Preserving Distributed Kalman Filtering , 2022, IEEE Transactions on Signal Processing.

[49]  Wen Yang,et al.  A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation , 2022, IEEE Transactions on Information Forensics and Security.

[50]  Ismail Uysal,et al.  Sequential Attack Detection in Recommender Systems , 2021, IEEE Transactions on Information Forensics and Security.

[51]  Guang-Hong Yang,et al.  Byzantine-resilient distributed state estimation: A min-switching approach , 2021, Autom..

[52]  Cheng-Chew Lim,et al.  Distributed H∞ Estimation in Sensor Networks With Two-Channel Stochastic Attacks , 2020, IEEE Trans. Cybern..

[53]  Ryu Kunhee,et al.  Distributed Kalman-filtering: Distributed optimization viewpoint , 2019 .