Sensor Compromise Detection in Multiple-Target Tracking Systems

Tracking multiple targets using a single estimator is a problem that is commonly approached within a trusted framework. There are many weaknesses that an adversary can exploit if it gains control over the sensors. Because the number of targets that the estimator has to track is not known with anticipation, an adversary could cause a loss of information or a degradation in the tracking precision. Other concerns include the introduction of false targets, which would result in a waste of computational and material resources, depending on the application. In this work, we study the problem of detecting compromised or faulty sensors in a multiple-target tracker, starting with the single-sensor case and then considering the multiple-sensor scenario. We propose an algorithm to detect a variety of attacks in the multiple-sensor case, via the application of finite set statistics (FISST), one-class classifiers and hypothesis testing using nonparametric techniques.

[1]  Lucas M. Venter,et al.  A comparison of Intrusion Detection systems , 2001, Comput. Secur..

[2]  Y. Bar-Shalom,et al.  Probability hypothesis density filter for multitarget multisensor tracking , 2005, 2005 7th International Conference on Information Fusion.

[3]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[4]  Philip S. Yu,et al.  Outlier Detection with Uncertain Data , 2008, SDM.

[5]  R. Mahler Multitarget Bayes filtering via first-order multitarget moments , 2003 .

[6]  Subhabrata Chakraborti,et al.  Nonparametric Statistical Inference , 2011, International Encyclopedia of Statistical Science.

[7]  Marios M. Polycarpou,et al.  Distributed Sensor Fault Diagnosis for a Network of Interconnected Cyberphysical Systems , 2015, IEEE Transactions on Control of Network Systems.

[8]  Jitendra K. Tugnait,et al.  Validation and Comparison of Coordinated Turn Aircraft Maneuver Models , 2000 .

[9]  A. Doucet,et al.  Sequential Monte Carlo methods for multitarget filtering with random finite sets , 2005, IEEE Transactions on Aerospace and Electronic Systems.

[10]  R. Mahler,et al.  Objective functions for bayesian control-theoretic sensor management, 1: multitarget first-moment approximation , 2003, 2003 IEEE Aerospace Conference Proceedings (Cat. No.03TH8652).

[11]  LI X.RONG,et al.  Survey of maneuvering target tracking. Part I. Dynamic models , 2003 .

[12]  João Pedro Hespanha,et al.  Observability of linear systems under adversarial attacks , 2015, 2015 American Control Conference (ACC).

[13]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[14]  Vijay Gupta,et al.  On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds , 2017, IEEE Transactions on Automatic Control.

[15]  Anil K. Jain Data clustering: 50 years beyond K-means , 2008, Pattern Recognit. Lett..

[16]  Hae-Sang Park,et al.  A simple and fast algorithm for K-medoids clustering , 2009, Expert Syst. Appl..

[17]  David A. Clifton,et al.  A review of novelty detection , 2014, Signal Process..

[18]  Marios M. Polycarpou,et al.  Distributed fault diagnosis for process and sensor faults in a class of interconnected input–output nonlinear discrete-time systems , 2015, Int. J. Control.

[19]  Xu Jian,et al.  The multi-sensor PHD filter: Analytic implementation via Gaussian mixture and effective binary partition , 2013, Proceedings of the 16th International Conference on Information Fusion.

[20]  Ba-Ngu Vo,et al.  A Consistent Metric for Performance Evaluation of Multi-Object Filters , 2008, IEEE Transactions on Signal Processing.

[21]  R. K. Mehra,et al.  Correspondence item: An innovations approach to fault detection and diagnosis in dynamic systems , 1971 .

[22]  F. E. Grubbs Procedures for Detecting Outlying Observations in Samples , 1969 .

[23]  S. Shankar Sastry,et al.  Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[24]  Dieter Gollmann,et al.  Cyber-Physical Systems Security , 2015, The New Codebreakers.

[25]  Ronald P. S. Mahler,et al.  Multitarget miss distance via optimal assignment , 2004, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[26]  Sirish L. Shah,et al.  Fault detection and diagnosis in process data using one-class support vector machines , 2009 .

[27]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Sensor Networks , 2006, 2006 Securecomm and Workshops.

[28]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[29]  Dominique Heurguier,et al.  Multi-sensor PHD: Construction and implementation by space partitioning , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[30]  Fredrik Gustafsson,et al.  Best choice of coordinate system for tracking coordinated turns , 1996, Proceedings of 35th IEEE Conference on Decision and Control.

[31]  Marios M. Polycarpou,et al.  Adaptive Approximation for Multiple Sensor Fault Detection and Isolation of Nonlinear Uncertain Systems , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[32]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[33]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[34]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[35]  Marie Schmidt,et al.  Nonparametrics Statistical Methods Based On Ranks , 2016 .