Performance of Target Tracking in Radar Network System Under Deception Attack

This paper studies security issue of target tracking in radar network system. We first derive the analytical result for the attack’s effect on the performance of target tracking when one radar station is under deception attack. Based on this, by extending to radar network system, we find the relationship between the performance of target tracking and attack parameter. Simulation is presented to demonstrate the effectiveness of our results.

[1]  Lin Wang,et al.  Simplified Particle PHD Filter for Multiple-Target Tracking: Algorithm and Architecture , 2011 .

[2]  Zheng Ying,et al.  Radar netting technology & its development , 2011, Proceedings of 2011 IEEE CIE International Conference on Radar.

[3]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Wesley E. Snyder,et al.  Secure Tracking in Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[5]  Mladen Kos,et al.  Secure target detection and tracking in mission critical wireless sensor networks , 2014, 2014 International Conference on Anti-Counterfeiting, Security and Identification (ASID).

[6]  Myung Hwangbo,et al.  A stable target-tracking control for unicycle mobile robots , 2000, Proceedings. 2000 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2000) (Cat. No.00CH37113).

[7]  Xuemin Shen,et al.  An Efficient Data-Driven Particle PHD Filter for Multitarget Tracking , 2013, IEEE Transactions on Industrial Informatics.

[8]  Oscar Pozzobon,et al.  Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services , 2004 .

[9]  Ling Shi,et al.  Optimal DoS attack policy against remote state estimation , 2013, 52nd IEEE Conference on Decision and Control.

[10]  Taek Lyul Song,et al.  Multi-sensor distributed fusion based on integrated probabilistic data association , 2014, 17th International Conference on Information Fusion (FUSION).

[11]  Ling Shi,et al.  Online Deception Attack against Remote State Estimation , 2014 .

[12]  Benjamin Pannetier,et al.  Multiple target tracking with wireless sensor network for ground battlefield surveillance , 2014, 17th International Conference on Information Fusion (FUSION).

[13]  Robert J. Condon Data processing with applications , 1981 .