Distributed Secure Estimation Over Wireless Sensor Networks Against Random Multichannel Jamming Attacks

This paper addresses the distributed secure estimation problem over wireless sensor networks subject to random multichannel jamming attacks. Each sensor’s measurement is divided into <inline-formula> <tex-math notation="LaTeX">$n_{y}$ </tex-math></inline-formula> (the dimension of measurement signal) components and transmitted via <inline-formula> <tex-math notation="LaTeX">$n_{y}$ </tex-math></inline-formula> relevant wireless channels. The attacker is an active adversary in the sense that sensors’ measurements through wireless transmission channels are randomly dropped if the corresponding channels are successfully jammed. By employing a piecewise homogeneous Markov chain, a sophisticated two-level switching multichannel jamming attack model is developed. From the perspective of the attacker, this attack model is promising and makes the wireless channels highly vulnerable, because the attacker can randomly and arbitrarily decide when and where to launch the attacks. We then focus our attention on the secure estimation of a target signal with the caveat that some of the measurements can be incomplete induced by the attacks. A system theoretic framework is then developed to cast the network-based security problem into an <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> estimation theory problem of a piecewise homogeneous Markov jump system. Criteria for analyzing <inline-formula> <tex-math notation="LaTeX">$H_{\infty }$ </tex-math></inline-formula> estimation performance and designing resilient estimators against noises and attacks are also presented. The effectiveness of the proposed results is illustrated through a military F404 aircraft engine system.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Husheng Li,et al.  Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid , 2011, IEEE Transactions on Smart Grid.

[3]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[5]  A. Michel,et al.  Qualitative analysis of discrete-time switched systems , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).

[6]  Parameswaran Ramanathan,et al.  Distributed target classification and tracking in sensor networks , 2003 .

[7]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[8]  Antonio Petitti,et al.  Consensus-based distributed estimation for target tracking in heterogeneous sensor networks , 2011, IEEE Conference on Decision and Control and European Control Conference.

[9]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[10]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.

[11]  Lei Guo,et al.  Resilient Control of Networked Control System Under DoS Attacks: A Unified Game Approach , 2016, IEEE Transactions on Industrial Informatics.

[12]  Ling Shi,et al.  Optimal DoS Attack Scheduling in Wireless Networked Control System , 2016, IEEE Transactions on Control Systems Technology.

[13]  Zikuan Liu,et al.  Robust H∞ control of discrete-time Markovian jump linear systems with mode-dependent time-delays , 2001, IEEE Trans. Autom. Control..

[14]  Wen-An Zhang,et al.  Energy Efficient Distributed Filtering for a Class of Nonlinear Systems in Sensor Networks , 2015, IEEE Sensors Journal.

[15]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[16]  Qing-Long Han,et al.  Absolute stability of time-delay systems with sector-bounded nonlinearity , 2005, Autom..

[17]  Lixian Zhang,et al.  H∞ estimation for discrete-time piecewise homogeneous Markov jump linear systems , 2009, Autom..

[18]  Johan Nilsson,et al.  Real-Time Control Systems with Delays , 1998 .

[19]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[20]  Ling Shi,et al.  SATS: Secure Average-Consensus-Based Time Synchronization in Wireless Sensor Networks , 2013, IEEE Transactions on Signal Processing.

[21]  A. Morse,et al.  Stability of switched systems with average dwell-time , 1999, Proceedings of the 38th IEEE Conference on Decision and Control (Cat. No.99CH36304).

[22]  Ling Shi,et al.  A Game-Theoretic Approach to Fake-Acknowledgment Attack on Cyber-Physical Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[23]  Wei Xing Zheng,et al.  Distributed ℋ∞ Filtering for a Class of Discrete-Time Markov Jump Lur'e Systems With Redundant Channels , 2016, IEEE Trans. Ind. Electron..

[24]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[25]  B. A. Woodyatt,et al.  Fault Signatures Obtained From Fault Implant Tests on an F404 Engine , 1992 .

[26]  Xin-Ping Guan,et al.  Distributed optimal consensus filter for target tracking in heterogeneous sensor networks , 2011, 2011 8th Asian Control Conference (ASCC).

[27]  Li Yu,et al.  Energy-Efficient Distributed Filtering in Sensor Networks: A Unified Switched System Approach. , 2017, IEEE transactions on cybernetics.

[28]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[29]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[30]  Qing-Long Han,et al.  Distributed H ∞ filtering over sensor networks with heterogeneous Markovian coupling intercommunication delays , 2015 .

[31]  Parv Venkitasubramaniam,et al.  Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems , 2017, IEEE Transactions on Information Forensics and Security.

[32]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[33]  Daniel W. C. Ho,et al.  Partial-Information-Based Distributed Filtering in Two-Targets Tracking Sensor Networks , 2012, IEEE Transactions on Circuits and Systems I: Regular Papers.

[34]  Anna Scaglione,et al.  Data Injection Attacks in Randomized Gossiping , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[35]  Qing-Long Han,et al.  Distributed event-triggered H1 filtering over sensor networks with communication delays , 2014 .