Secure distributed estimation against false data injection attack

Abstract With the development of wireless sensor networks, many distributed algorithms have been studied by researchers. This paper considers the situation of distributed estimation with false data injection (FDI) attack. Owing to the fact that Kullback-Leibler (KL) divergence is very effective to detect outliers caused by FDI attack, a distributed adaptive algorithm over KL divergence is proposed to detect FDI attack. When the malicious nodes are detected, three algorithms are explored separately to weaken the impact of FDI attack. The performance of the three algorithms is analyzed in mean and mean-square. The effectiveness of the three proposed algorithms is shown through some illustrative examples under continual FDI attack and time-sharing FDI attack.

[1]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[2]  Shukai Duan,et al.  Diffusion Sparse Sign Algorithm with Variable Step-Size , 2019, Circuits Syst. Signal Process..

[3]  Xiangjian He,et al.  A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Guojiang Shen,et al.  Communication-reducing diffusion LMS algorithm over multitask networks , 2017, Inf. Sci..

[5]  H.C. Papadopoulos,et al.  Locally constructed algorithms for distributed computations in ad-hoc networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[6]  Chunguang Li,et al.  Distributed Information Theoretic Clustering , 2014, IEEE Transactions on Signal Processing.

[7]  Yu Zhu,et al.  Stochastic gradient identification of Wiener system with maximum mutual information criterion , 2011 .

[8]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..

[9]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[10]  Peng Shi,et al.  Finite-Time Distributed State Estimation Over Sensor Networks With Round-Robin Protocol and Fading Channels , 2018, IEEE Transactions on Cybernetics.

[11]  Isao Yamada,et al.  Diffusion Least-Mean Squares With Adaptive Combiners: Formulation and Performance Analysis , 2010, IEEE Transactions on Signal Processing.

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Chunguang Li,et al.  Distributed Sparse Recursive Least-Squares Over Networks , 2014, IEEE Transactions on Signal Processing.

[14]  Anupam Joshi,et al.  AI based approach to identify compromised meters in data integrity attacks on smart grid , 2017 .

[15]  Shuai Li,et al.  An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[16]  Nanning Zheng,et al.  Steady-State Mean-Square Error Analysis for Adaptive Filtering under the Maximum Correntropy Criterion , 2014, IEEE Signal Processing Letters.

[17]  Shukai Duan,et al.  Distributed Data-Selective DLMS Estimation Under Channel Attacks , 2019, IEEE Access.

[18]  Shukai Duan,et al.  Diffusion Logarithm-Correntropy Algorithm for Parameter Estimation in Non-Stationary Environments over Sensor Networks , 2018, Sensors.

[19]  Soummya Kar,et al.  Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.

[20]  Shukai Duan,et al.  Diffusion least logarithmic absolute difference algorithm for distributed estimation , 2018, Signal Process..

[21]  Nanning Zheng,et al.  Generalized Correntropy for Robust Adaptive Filtering , 2015, IEEE Transactions on Signal Processing.

[22]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[23]  Pramod K. Varshney,et al.  On the performance analysis of data fusion schemes with Byzantines , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[24]  N. Metropolis,et al.  Equation of State Calculations by Fast Computing Machines , 1953, Resonance.

[25]  A. Monticelli State estimation in electric power systems : a generalized approach , 1999 .

[26]  Ali H. Sayed,et al.  Diffusion LMS Strategies for Distributed Estimation , 2010, IEEE Transactions on Signal Processing.

[27]  Pramod K. Varshney,et al.  Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[28]  Ali H. Sayed,et al.  Diffusion Least-Mean Squares Over Adaptive Networks: Formulation and Performance Analysis , 2008, IEEE Transactions on Signal Processing.

[29]  R. Moddemeijer On estimation of entropy and mutual information of continuous distributions , 1989 .

[30]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[31]  Xiaohua Ge,et al.  Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[32]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[33]  Ying Liu,et al.  Secure Distributed Estimation Over Wireless Sensor Networks Under Attacks , 2018, IEEE Transactions on Aerospace and Electronic Systems.

[34]  Cédric Richard,et al.  Diffusion LMS for Multitask Problems With Local Linear Equality Constraints , 2016, IEEE Transactions on Signal Processing.

[35]  Chong-Ho Choi,et al.  Input Feature Selection by Mutual Information Based on Parzen Window , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[36]  Shukai Duan,et al.  Diffusion generalized maximum correntropy criterion algorithm for distributed estimation over multitask network , 2018, Digit. Signal Process..

[37]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[38]  Stephen P. Boyd,et al.  Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[39]  Zhaoyang Zhang,et al.  Diffusion Sparse Least-Mean Squares Over Networks , 2012, IEEE Transactions on Signal Processing.

[40]  Jie Chen,et al.  Multitask Diffusion Adaptation Over Networks , 2013, IEEE Transactions on Signal Processing.

[41]  Ali H. Sayed,et al.  Diffusion recursive least-squares for distributed estimation over adaptive networks , 2008, IEEE Transactions on Signal Processing.

[42]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[43]  Wen-An Zhang,et al.  Distributed $H_\infty$ Estimation in Sensor Networks With Two-Channel Stochastic Attacks , 2020, IEEE Transactions on Cybernetics.