Robust State Estimation under False Data Injection in Distributed Sensor Networks

Distributed sensor networks have been widely employed to monitor and protect critical infrastructure assets. The network status can be estimated by centralized state estimation using coordinated data aggregation or by distributed state estimation, where nodes only exchange information locally to achieve enhanced scalability and adaptivity to network dynamics. One important property of state estimation is robustness against false data injection from sensors compromised by attackers. Different from most existing works in the literature that focus on centralized state estimation, we propose two novel robust distributed state estimation algorithms against false data injection. They are built upon an existing distributed Kalman filtering algorithm. In the first algorithm, we use variational Bayesian learning to estimate attack parameters and achieve performance similar to a centralized majority voting rule, without causing extra communication overhead. In the second algorithm, we introduce heterogeneity into the network by utilizing a subset of pre-trusted nodes to achieve performance better than majority voting. We show that as long as there is a path connecting each node to some of the pre-trusted nodes, the attackers can not subvert the network. Experimental results demonstrate the effectiveness of our proposed schemes.

[1]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[2]  Yong Guan,et al.  A Dynamic En-Route Scheme for Filtering False Data Injection in Wireless Sensor Networks , 2005, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  Johannes Gehrke,et al.  Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[4]  Daji Qiao,et al.  Distinguishing Data Transience from False Injection in Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[5]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[6]  Pratik K. Biswas,et al.  Special issue on information fusion in distributed sensor networks , 2008, Inf. Fusion.

[7]  Sushil Jajodia,et al.  Interleaved hop-by-hop authentication against false data injection attacks in sensor networks , 2007, TOSN.

[8]  Matthew J. Beal,et al.  The variational Bayesian EM algorithm for incomplete data: with application to scoring graphical model structures , 2003 .

[9]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[10]  Alexander Zien,et al.  Semi-Supervised Learning , 2006 .

[11]  Reza Olfati-Saber,et al.  Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.

[12]  Taher H. Haveliwala,et al.  The Second Eigenvalue of the Google Matrix , 2003 .

[13]  R. Olfati-Saber,et al.  Distributed Kalman Filter with Embedded Consensus Filters , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[14]  Jun Yang,et al.  The interleaved authentication for filtering false reports in multipath routing based sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.