4.6 Article

Distributed Estimation With Cross-Verification Under False Data-Injection Attacks

期刊

IEEE TRANSACTIONS ON CYBERNETICS
卷 53, 期 9, 页码 5840-5853

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCYB.2022.3197591

关键词

Estimation; Distributed databases; Sensors; Adaptation models; Indexes; Distributed algorithms; Detectors; Diffusion least-mean-square (DLMS); distributed estimation; false data-injection (FDI) attack; secure estimation

向作者/读者索取更多资源

A conveniently distributed diffusion least-mean-square (DLMS) algorithm with cross-verification (CV) is proposed against false data-injection (FDI) attacks. The proposed DLMS-CV algorithm improves detection performance and addresses the problem of data tampering in FDI attacks through a CV mechanism and adaptive threshold design.
Under false data-injection (FDI) attacks, the data of some agents are tampered with by the FDI attackers, which causes that the distributed algorithm cannot estimate the ideal unknown parameter. Due to the concealment of the malicious data tampered with by the FDI attacks, many detection algorithms against FDI attacks often have poor detection results or low detection efficiencies. To solve these problems, a conveniently distributed diffusion least-mean-square (DLMS) algorithm with cross-verification (CV) is proposed against FDI attacks. The proposed DLMS with CV (DLMS-CV) algorithm is comprised of two subsystems: one subsystem provides a detection test of agents based on the CV mechanism, while the other provides a secure distribution estimation. In the CV mechanism, a smoothness strategy is introduced, which can improve the detection performance. The convergence performance of the proposed algorithm is analyzed, and then the design method of the adaptive threshold is also formulated. In particular, the probabilities of missing alarm and false alarm are examined, and they decay exponentially to zero under sufficiently small step size. Finally, simulation experiments are provided to illustrate the effectiveness and simplicity of the proposed DLMS-CV algorithm in comparison to other algorithms against FDI attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据