Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2024 Jun 22;24(13):4071. doi: 10.3390/s24134071

Distributed Consensus Estimation for Networked Multi-Sensor Systems under Hybrid Attacks and Missing Measurements

Zhijian Cheng 1, Lan Yang 1, Qunyao Yuan 1, Yinren Long 1, Hongru Ren 1,*
Editors: Sofiène Affes1, Wei Yi1
PMCID: PMC11244270  PMID: 39000850

Abstract

Cyber-security research on networked multi-sensor systems is crucial due to the vulnerability to various types of cyberattacks. For the development of effective defense measures, attention is required to gain insight into the complex characteristics and behaviors of cyber attacks from the attacker’s perspective. This paper aims to tackle the problem of distributed consensus estimation for networked multi-sensor systems subject to hybrid attacks and missing measurements. To account for both random denial of service (DoS) attacks and false data injection (FDI) attacks, a hybrid attack model on the estimator-to-estimator communication channel is presented. The characteristics of missing measurements are defined by random variables that satisfy the Bernoulli distribution. Then a modified consensus-based distributed estimator, integrated with the characteristics of hybrid attacks and missing measurements, is presented. For reducing the computational complexity of the optimal distributed estimation method, a scalable suboptimal distributed consensus estimator is designed. Sufficient conditions are further provided for guaranteeing the stability of the proposed suboptimal distributed estimator. Finally, a simulation experiment on aircraft tracking is executed to validate the effectiveness and feasibility of the proposed algorithm.

Keywords: networked multi-sensor systems, distributed consensus estimation, hybrid attacks, missing measurements

1. Introduction

With the advancement of communication technologies, networked multi-sensor systems have garnered significant interest in recent decades [1,2]. Networked multi-sensor systems contain components connected via a shared network, thus reducing unnecessary wired connections, lowering installation costs, and increasing system scalability [3,4,5]. It is because of such benefits that networked multi-sensor systems are extensively applied in smart grids, autonomous driving, robotics, and satellite navigation [6,7,8]. However, due to the data transmitted over open and shared communication links, networked multi-sensor systems are vulnerable to malicious cyber attacks, which can pose a huge threat to life and property security [9]. As a result, it is of utmost importance to enhance the security of networked multi-sensor systems to ensure their normal operation. This issue has attracted widespread attention in recent years [10,11,12].

There are two main categories into which typical attack models in networked multi-sensor systems fall: denial of service (DoS) attacks and deception attacks [13]. As all individuals know, false data injection (FDI) attacks, which are regarded as a typical deception attack, seek to manipulate the transmitted data by injecting some faked data [14]. DoS attacks attempt to prevent legitimate users from accessing the server by sending a great deal of false information, thereby blocking the communication channel [15]. Obviously, both types of cyber attacks can have profound negative impacts on networked multi-sensor systems. This problem has also aroused considerable interest among researchers, especially regarding the estimation and control issues under FDI and DoS attacks. For instance, based on prior research in [14], the author proposed a power system state estimation algorithm under imperfect FDI attacks. The FDI attack model in [14] aimed at compromising defenseless sensors to corrupt measurement information, focusing on the stealthiness of the attack strategy. By utilizing the event-triggered mechanism, a modified secure remote estimator under DoS attacks was designed for cyber-physical systems [16], in which DoS attacks occurring on the sensor-estimator communication channel considered noise and interference. It is common to find only a single type of attack considered in estimation for sensor networks. However, in practical systems, to increase the possibility of success of attacks, adversaries often alternately launch different types of attacks with a certain probability [13]. Such hybrid attacks not only have a greater negative impact on estimation and control algorithms, but also pose challenges to existing attack detection mechanisms [17]. Therefore, this has aroused the interest of researchers to address the estimation and control issues of networked multi-sensor systems under hybrid attacks.

As mentioned before, previous work focused more on centralised multi-sensor systems or single sensor systems, rather than on distributed systems. With the all-round development of computation and communication capabilities in sensor networks, distributed estimation is widely applied in networked multi-sensor systems due to its high robustness, scalability and flexibility [9,18]. However, since information sharing and data transmission are constrained by the inherent coupling relationship between different nodes, distributed sensor networks are more vulnerable to various cyber attacks [19,20]. As a result, it is a critically important yet complicated topic to investigate the security issues of distributed multi-sensor systems. In most existing research, some results such as [21,22,23] primarily addressed the distributed estimation problem under malicious cyber attacks on communication links connecting sensors, and only considering a single type of attack. To our knowledge, however, few research have addressed the distributed consensus estimation problem under hybrid attacks that occur between estimators, where data transmitted over wireless networks between nodes may be tampered with by attackers.

Note that distributed consensus estimation is formed by integrating multi-agent consensus theory into the standard Kalman filter, so it also faces the challenge of missing measurement issues in traditional state estimation. This challenge has spawned a large amount of related research [24,25,26]. For instance, a novel locally optimal distributed consensus estimator was presented in [25] for stochastic systems with missing measurements, where the missing measurement phenomena are represented by a set of random variables with Bernoulli distribution. However, reviewing the literature on distributed estimation from the past few years, it is rare to find that issues regarding cyber attacks and network communication such as missing measurements are taken into account simultaneously. This is mainly because the superimposed effect of missing measurements and cyber attacks will accelerate the degradation of distributed estimation performance, eventually leading to system instability.

Drawing from the aforementioned discussions, this paper focuses on distributed consensus estimation issues for networked multi-sensor systems subject to the dual impact of hybrid attacks and missing measurements. The following three points highlight the difficulties encountered in this paper: (1) how to construct a hybrid attack model targeting the estimator–estimator communication channel to account for the joint impact of FDI and DoS attacks? (2) how can the optimal filter gain matrix be determined under the influence of multi-random variables? (3) how to construct suitable sufficient conditions to ensure the convergence of the estimation error under the dual impact of hybrid attacks and missing measurements?

In light of these difficulties, the following is a summary of the main contributions in this paper:

  1. Governed by multi-random variables with Bernoulli distribution, a unified hybrid attack model considering the joint impact of random FDI and DoS attacks is proposed. Different from cyber attacks on the sensor-to-estimator communication channel in [13,18], the proposed hybrid attack disrupts the data transmission between neighboring estimators in the distributed consensus estimation.

  2. This paper is the first attempt to provide a modified distributed consensus estimation algorithm for networked multi-sensor systems subject to hybrid attacks and missing measurements. A suboptimal distributed estimation algorithm, simplified by an approximation method, is devised to circumvent the computation of the cross-covariance matrix, thereby reducing the computational complexity.

  3. A co-design scheme of consensus gain coefficients, hybrid attack parameters, missing measurement probabilities and model parameters based on Lyapunov stability analysis is proposed. It is theoretically proved that the stability of the proposed distributed consensus estimator can be guaranteed by constructing a sufficient condition.

The following is how the rest of the paper is structured. System models under missing measurements, hybrid attack models, and problem descriptions on the distributed consensus estimation are covered in Section 2. The optimal/suboptimal distributed consensus estimation algorithms are presented in Section 3, respectively. A formal stability analysis procedure is performed in Section 4. A simulation experiment is executed in Section 5, and conclusions are provided in Section 6.

Notation 1. 

Throughout the paper, the notations are absolutely standard. Rm means the m-dimensional Euclidean space. AT denotes the transpose of the variable A, and B1 represents the inverse matrix of an invertible n×n matrix B. In addition, tr(C) is the trace of the matrix C. E{D} expresses the expectation of the random variable D. diag{•} is a diagonal matrix, and the random variable X has a probability density function denoted by P{X}. N(μ,R) denotes the Gaussian stochastic process with μ and R representing the corresponding mean value and covariance matrix, respectively.

2. Problem Statement

2.1. System Description

This paper considers a class of linear time-invariant systems as

xk+1=Axk+wk (1)
yi,k=Hixk+vi,k,i=1,2,,M (2)

where xkRN and yi,kRM are the state vector and measurement vector of the i-th sensor at time instant k, respectively. A and Hi denote the system and measurement matrices, respectively. In addition, the random variables wk and vi,k are the system noise and the measurement noise respectively, which are assumed to be mutually independent, and satisfy wkN(0,Qk) and vi,kN(0,Ri,k).

In practical applications, due to sensor failure, unsuccessful measurement, or network congestion, etc., the measurement values from sensors are not always consecutive and may be randomly lost [27]. Therefore, the missing measurement model in this paper is described as follows:

zi,k=γi,kHixk+vi,k (3)

where the random variable γi,k that satisfies the Bernoulli distribution is used to describe the missing measurement phenomenon, which is assumed to be uncorrelated with all noise signals. Furthermore, the probability density function of γi,k is

P{γi,k=0}=1λiP{γi,k=1}=λi

where λi represents the probability that the measurement information of the i-th sensor successfully arrives.

2.2. Hybrid Attack Model

To characterize the communication topology of the above sensor network in Equations (1) and (2), consider a fixed undirected graph G=(Vx,Ex) with a set of nodes Vx={v1,v2,,vn} and a set of edges ExVx×Vx. In this sensor network, the neighbor set of node i is defined as Ni={j|(i,j)Ex}, where the total number of neighbors of node i, also called its degree, is expressed as di=|Ni|.

Derived from previous works in [28], a distributed consensus estimation algorithm is introduced for the above sensor network:

x^i,k+1=Ax^i,k+Ki,k(yi,kHix^i,k)+ϵAjNi(x^j,kx^i,k) (4)

where x^i,k is the estimate of the state xk for node i at time instant k. Ki,k is the filter gain matrix to be determined, and ϵ is the consensus gain coefficient. Referring to existing works [29,30], it is noted that ϵ(0,1δ) with δ=maxidi.

When executing the state estimation process under the distributed consensus estimation in (4), it can be found that not only the innovation of node i itself is utilized, but also the estimation information from node j needs to be integrated. This prompts us to investigate the security of the estimation information transmitted between nodes i and j since the information may be subject to various malicious cyber attacks. Therefore, in order to describe the actual cyber attack characteristics more realistically in this paper, the following hybrid attack model is constructed as

x^j,ka=αij,k(x^j,k+qij,kbij,k)+(1αij,k)Ax^j,k1a (5)

where x^j,ka denotes the state estimation for node j under hybrid attacks. The random variable αij,k is used to characterize the occurrence of DoS attacks, which satisfies the Bernoulli distribution. In other words, αij,k=0 means that the estimation information x^j,k is subject to DoS attacks and cannot be successfully transmitted; αij,k=1 indicates otherwise. Furthermore, in the case of DoS attacks, this paper introduces the compensation strategy in [31,32] to improve the loss of transmitted data. qij,k indicates whether the estimation information transmitted between nodes i and j is subject to FDI attacks, taking values of 0 or 1. The random variable bij,kN(0,Bij,k) is used to model FDI attacks, which is also assumed to be uncorrelated with all noise signals.

2.3. Problem Statement

In terms of that, this paper considers the issues of missing measurements in (3) and hybrid attacks in (5), so the distributed consensus estimation algorithm in (4) is redesigned as

x^i,k+1=Ax^i,k+Ki,k(zi,kλiHix^i,k)+ϵAjNi(x^j,kax^i,k) (6)

The main goal of this paper, as indicated by the discussion above, is to derive a suitable distributed consensus estimator to estimate the system states under the dual impact of missing measurements and hybrid attacks, and then seek sufficient conditions to ensure the stability of the proposed distributed estimator.

3. Distributed Consensus Estimator

In this section, a suitable Kalman filter gain matrix and error covariance matrix are derived to obtain the state estimates.

For the convenience of presentation, first define

ei,k=xkx^i,k,ej,ka=xkx^j,kaPij,k=E{ei,kej,kT},P^ij,k=E{ei,kaej,kT}Pˇij,k=E{ei,k(ej,ka)T},Pij,ka=E{ei,ka(ej,ka)T}

Theorem 1. 

Consider the linear time-invariant system in (1) and (2) under missing measurements in (3) and hybrid attacks in (5). Then, the distributed consensus estimation algorithm designed in (6) has the optimal filter gain as follows:

Ki,k=λiA[Pi,k+ϵrNi(P^ri,kPi,k)]HiTGi,k1

where Gi,k=λi2HiPi,kHiT+λ˜iHiΛkHiT+Ri,k.

Proof of Theorem 1. 

According to the above definition, it can be known

ei,k+1=xk+1x^i,k+1=(AλiKi,kHi)ei,kKi,k(γi,kλi)Hixk+ϵAjNi(ej,kaei,k)+wkKi,kvi,k (7)

where

ej,ka=xkx^j,ka=αij,kej,kαij,kqij,kbij,k+(1αij,k)Aej,k1a+(1αij,k)wk1 (8)

Naturally, we can easily obtain the error covariance matrix

Pij,k+1=E{ei,k+1ej,k+1T}=(AλiKi,kHi)Pij,k(AλjKj,kHj)T+Ki,kHi×E{(γi,kλi)(γj,kλj)xkxkT}HjTKj,kT+ϵ2×ArNisNj(Prs,kaP^rj,kPˇis,k+Pij,k)AT+ϵ(AλiKi,kHi)sNj(Pˇis,kPij,k)AT+ϵArNi(P^rj,kPij,k)(AλjKj,kHj)T+Ki,kE{vi,kvj,kT}Kj,kT+Qk (9)

When i=j, it yields

Pi,k+1=(AλiKi,kHi)Pi,k(AλiKi,kHi)T+λ˜iKi,k×HiΛkHiTKi,kT+ϵ2ArNisNi(Prs,kaP^ri,kPˇis,k+Pi,k)AT+Ki,kRi,kKi,kT+Qk+ϵ(AλiKi,kHi)sNi(Pˇis,kPi,k)AT+ϵArNi(P^ri,kPi,k)(AλiKi,kHi)T (10)

where λ˜i=E{(γi,kλi)(γi,kλi)}=λi(1λi), and Λk=E{xkxkT}=AΛk1AT+Qk1.

In addition, it has

P^ri,k=E{er,kaei,kT}=αiPri,k+(1αi)[AP^ri,k1(AλiKi,k1Hi)T+ϵAsNi(Prs,k1aP^ri,k1)AT+Qk1] (11)
Pˇis,k=E{ei,k(es,ka)T}=αiPis,k+(1αi)[(AλiKi,k1Hi)Pˇis,k1AT+ϵArNi(Prs,k1aPˇis,k1)AT+Qk1] (12)

where αi=P{αij,k=1}.

From the definition of Pij,ka, it follows that

Prs,ka=E{er,ka(es,ka)T}=αi2Prs,k+αi(Pˇrs,kαiPrs,k)+αi(P^rs,kαiPrs,k)+(1αi)2(APrs,k1aAT+Qk1)+αiqir,kBir,k (13)

Note that the total estimation error for all nodes is expressed as i=1ME{xkx^i,k2}, which is equivalent to i=1Mtr(Pi,k). Based on this, the optimal filter gain matrix Ki,k can be obtained by solving the equation tr(Pi,k+1)/Ki,k=0.

Thus, applying the matrix calculus operation theory yields

tr(Pi,k+1)Ki,k=2(AλiKi,kHi)Pi,k(λiHi)T+2λ˜iKi,kHiΛkHiT+2Ki,kRi,k+ϵAsNi(Pˇis,kPi,k)T(λiHi)T+ϵArNi(P^ri,kPi,k)(λiHi)T=0 (14)

From Equation (14), we have

Ki,k=λiA[Pi,k+ϵrNi(P^ri,kPi,k)]HiTGi,k1 (15)

where Gi,k=λi2HiPi,kHiT+λ˜iHiΛkHiT+Ri,k. This finishes the proof of Theorem 1. □

4. A Scalable Estimation Algorithm and Stability Analysis

Note that the derived error covariance matrix in (10) for the proposed distributed consensus estimation algorithm is not scalable in the number of nodes, making it unsuitable for large-scale systems such as smart grids and mobile communication networks [33]. In order to compensate for this weakness, this paper derives the following suboptimal estimation method:

x^i,k+1=Ax^i,k+Ki,k(zi,kλiHix^i,k)+ϵAjNi(x^j,kax^i,k)x^j,ka=αij,k(x^j,k+qij,kbij,k)+(1αij,k)Ax^j,k1aKi,k=λiAPi,kHiT(λi2HiPi,kHiT+λ˜iHiΛkHiT+Ri,k)1Pi,k+1=(AλiKi,kHi)Pi,k(AλiKi,kHi)T+λ˜iKi,k×HiΛkHiTKi,kT+Ki,kRi,kKi,kT+Qk (16)

Remark 1. 

Such an assumption is achieved by eliminating the influence of the cross-covariance matrices in the proposed distributed consensus estimation algorithm. Instead, by setting ϵ=0 in solving Equations (10) and (15) in this paper, a scalable estimator in (16) is obtained. Meanwhile, it can be easily known that the designed estimator is suboptimal due to the missing terms.

In the following, a formal stability analysis for the suboptimal distributed consensus estimator constructed as (16) is presented. The following assumptions and lemmas are first given as

Assumption 1. 

For some positive numbers, the following inequalities are satisfied

f_Af¯,h_iHih¯iq_IQkq¯I,r_iIRi,kr¯iIp_iIPi,kp¯iI

Lemma 1 

([34]). There are real numbers ν¯,ν_,υ>0 and 0<σ1 such that the stochastic process Vk(ξk) satisfies the following inequalities

ν_ξk2Vk(ξk)ν¯ξk2 (17)

and

E{Vk+1(ξk+1)|ξk}Vk(ξk)υσVk(ξk) (18)

which means that the stochastic process Vk(ξk) is exponentially bounded in mean square, and is bounded with probability one.

Then, the following will present the main results of the stability analysis.

Theorem 2. 

For the linear time-invariant system in (1) and (2), consider missing measurements in (3) and hybrid attacks in (5) and the suboptimal distributed consensus estimation algorithm proposed in (16). Under Assumption 1 and setting the following condition

jNi(x^j,kax^i,k)T(x^j,kax^i,k)ςi

where ςi>0,i=1,2,,n, the estimation error ei,k is exponentially bounded in mean square and is bounded with probability one.

Proof of Theorem 2. 

In order to satisfy the conditions of Lemma 1, first construct the augmented estimation error as ek=[e1,kT,e2,kT,,en,kT] and the augmented estimation error covariance as Pk=diag{P1,k,P2,k,,Pn,k}, and then define a suitable Lyapunov function as follows

Vk(ek)=ekTPk1ek=i=1nei,kTPi,k1ei,k (19)

By Assumption 1, it can be easily obtained

1p¯ek2Vk(ek)1p_ek2 (20)

which proves that the first condition (17) of Lemma 1 is satisfied with ν_=1p¯ and ν¯=1p_. Here, p¯=max{p¯1,p¯2,,p¯n} and p_=min{p_1,p_2,,p_n}.

To further meet the second requirement for Lemma 1, Equation (19) needs to be extended. Combining Equation (7), the following expression is obtained:

E{Vk+1(ek+1)}=i=1nE{ei,kT(AλiKi,kHi)TPi,k+11(AλiKi,kHi)×ei,k}+i=1nE{λ˜ixkTHiTKi,kTPi,k+11Ki,kHixk}+ϵ2i=1nE{jNi(ej,kaei,k)TATPi,k+11AjNi(ej,kaei,k)}+2ϵi=1nE{ei,kT(AλiKi,kHi)TPi,k+11×AjNi(ej,kaei,k)}+i=1nE{wkTPi,k+11wk}+i=1nE{vi,kTKi,kTPi,k+11Ki,kvi,k} (21)

According to the definition, λ˜i0 is horizontally established. Therefore, it follows from Equation (16) and Assumption 1 that

Ki,k=λiAPi,kHiT(λi2HiPi,kHiT+λ˜iHiΛkHiT+Ri,k)1f¯p¯ih¯iλih_i2p_i (22)

Similarly, according to (16) and (22), we obtain

Pi,k+1(AλiKi,kHi)Pi,k(AλiKi,kHi)T+Qk(AλiKi,kHi)[Pi,k+q_(f¯+f¯p¯ih¯i2h_i2p_i)2](AλiKi,kHi)T (23)

Then, it can be further obtained, as from inequality (23),

(AλiKi,kHi)TPi,k+11(AλiKi,kHi)[1+q_p¯i(f¯+f¯p¯ih¯i2h_i2p_i)2]1Pi,k1

Therefore, the first term on the right-hand side of Equation (21) can be scaled as

i=1nE{ei,kT(AλiKi,kHi)TPi,k+11(AλiKi,kHi)ei,k}[1+q_p¯i(f¯+f¯p¯ih¯i2h_i2p_i)2]1E{Vk(ek)} (24)

In addition, from (16), we have

Pi,k+1λ˜iKi,kHiΛkHiTKi,kT

Then we have

i=1nE{λ˜ixkTHiTKi,kTPi,k+11Ki,kHixk}i=1nE{xkTΛk1xk}=n (25)

Further, we proceed to deal with the other terms in (21). Under Assumption 1, we have

ϵ2i=1nE{jNi(ej,kaei,k)TATPi,k+11AjNi(ej,kaei,k)}ϵ2f¯2p_ii=1njNi(ej,kaei,k)T(ej,kaei,k)=ϵ2f¯2p_ii=1njNi(x^j,kax^i,k)T(x^j,kax^i,k) (26)

Choose a condition as

jNi(x^j,kax^i,k)T(x^j,kax^i,k)ςi (27)

where ςi>0,i=1,2,,n is a real number. After that, (26) can be scaled as

ϵ2i=1nE{jNi(ej,kaei,k)TATPi,k+11AjNi(ej,kaei,k)}ϵ2f¯2p_ii=1nςi (28)

In terms of the elementary inequality xTy+xyTxTx+yTy, it naturally follows that

2ϵi=1nE{ei,kT(AλiKi,kHi)TPi,k+11AjNi(ej,kaei,k)}ϵi=1nE{ei,kT(AλiKi,kHi)TPi,k+11(AλiKi,kHi)ei,k}+ϵi=1njNiE{(ej,kaei,k)TPi,k+11(ej,kaei,k)}ϵ[1+q_p¯i(f¯+f¯p¯ih¯i2h_i2p_i)2]1E{Vk(ek)}+ϵi=1nςi (29)

The remaining noise terms will be processed next, and we have

i=1nE{wkTPi,k+11wk}1p_ii=1nE{tr(wkwkT)}q¯Nnp_i (30)

and

i=1nE{vi,kTKi,kTPi,k+11Ki,kvi,k}f¯2p¯i2h¯i2λi2h_i4p_i3i=1nE{tr(vi,kvi,kT)}f¯2p¯i2h¯i2r¯iMnλi2h_i4p_i3 (31)

According to Equations (21), (24), (25) and (28)–(31) can be further scaled as

E{Vk+1(ek+1)}υ+(1σ)E{Vk(ek)} (32)

where

σ=1(1+ϵ)[1+q_p¯i(f¯+f¯p¯ih¯i2h_i2p_i)2]1ϵ=(ϵ2f¯2p_i+ϵ)i=1nςi+n+q¯Nnp_i+f¯2p¯i2h¯i2r¯iMnλi2h_i4p_i3

It can be found that the second condition (18) of Lemma 1 is satisfied when ϵ<q_/p¯i(f¯+f¯p¯ih¯i2h_i2p_i)2. Finally, it can be concluded that the estimation error is bounded with probability one and exponentially bounded in mean square, which completes the proof of Theorem 2. □

5. Simulation Results

In this section, a simulation example of the aircraft tracking problem moving in two-dimensional horizontal plane is presented. The state vector is defined as xk=[ζk,ζ˙k,ηk,η˙k]T, which consists of position (ζk,ηk) and velocity (ζ˙k,η˙k). The tracking system considered in this section is as described in (1) and (2), where the relevant parameters are defined as follows:

A=1T000100001T0001,T=1
Qk=0.04T4/4T3/200T3/2T20000T4/4T3/200T3/2T2

To track the target aircraft, ten distributed sensors with the topology shown in Figure 1 are utilized, where each sensor interacts with only a matched estimator. The target position is generated as the sensor measurement

yi,k=10000010xk+vi,k,i=1,2,,M

where the measurement noise covariance is set to Ri,k=iR0 with R0=diag{0.22,0.22}. Further, the initial state is set to x0=[10,1.5,10,1.2]T.

Figure 1.

Figure 1

Network topology with M=10.

In addition, the root-mean-square errors (RMSEs) are introduced to more precisely assess the estimation performance. The RMSEs on position and velocity over all sensors are respectively defined as

RMSEkp=1Mt=1Mζkζ^t,k2+ηkη^t,k2RMSEkv=1Mt=1Mζ˙kζ˙^t,k2+η˙kη˙^t,k2

where M=100 represents 100 Monte Carlo runs over 10 targets. ζ^t,k, η^t,k, ζ˙^t,k, and η˙^t,k are the estimates of position and velocity at time k from the i-th run, respectively.

The performance of the proposed distributed consensus estimation algorithm under hybrid attacks and missing measurements is shown in Figure 2, where the measurement arrival probability λi is set to 0.9 and the consensus gain is chosen as 0.05. It is assumed that the hybrid attack considered in (5) only occurs between two targets, where the relevant parameters are set to αi=0.5 and Bij,k=0.04I. It can be found that the distributed consensus estimator still has good tracking performance in position and velocity under hybrid attacks and missing measurements. In addition, the RMSEs in position for ten estimators are presented in Figure 3. It can be seen that all the curves fluctuate around the horizontal axis 0, which also proves the effectiveness of the proposed algorithm in (16). Further, RMSEs in position with different consensus gains ϵ=0.05,0.1,0.15,0.2 are plotted in Figure 4. It can be seen that when ϵ=0.05,0.1,0.15, the curves still fluctuate near the horizontal axis 0, but when ϵ=0.2, the curve rises rapidly. Thus, it can be found that the consensus parameter in this paper has an upper bound. Once this upper bound is exceeded, the estimator lacks stability, which also proves the correctness of Theorem 2. It is worth noting that the consensus parameters need to be chosen very carefully to make a tradeoff between tracking performance and stability.

Figure 2.

Figure 2

States and their estimations for sensors 5 and 7.

Figure 3.

Figure 3

RMSEs in position for ten estimators.

Figure 4.

Figure 4

RMSEs in position with different consensus parameter.

On the other hand, the performance of the proposed distributed consensus estimation algorithm under hybrid attacks, FDI attacks in [30] and DoS attacks, as well as without attacks in [35] are compared in Figure 5. For examining the impact of different attack scenarios on the proposed distributed estimation algorithm, it is first necessary to exclude the interference of the missing measurement, so the measurement arrival probability λi is set to 1 in this comparison experiment. As shown in Figure 5, RMSEs under hybrid attacks are significantly higher than those under other attack scenarios, while RMSEs under only DoS attacks are almost the same as those without attacks. This proves that hybrid attacks have a greater impact on the proposed distributed estimator than only one single type of attack. In addition, this paper introduces a compensation strategy for DoS attacks. Thus, only DoS attacks have little impact on the estimation performance of the proposed distributed estimator, which is clearly demonstrated in Figure 6. As shown in Figure 6, RMSEs in position do not change significantly as the DoS attack probability increases, strongly proving the effectiveness of the compensation strategy. Further, RMSEs in position under different FDI attack intensities are plotted in Figure 7. In order to better characterize the FDI attack intensity, the standard deviation ς of the random attack variable bij,k is introduced. It is clear that the proposed distributed consensus estimator has certain resistance to FDI attacks when ς is small. Finally, it is noted that hybrid attacks will degrade the estimation performance in Figure 5, but the distributed estimator proposed in this paper can still remain stable, which is a major advantage of this algorithm.

Figure 5.

Figure 5

RMSEs in position under hybrid attacks, FDI attacks and DoS attacks as well without attacks.

Figure 6.

Figure 6

RMSEs in position under different DoS attack probabilities.

Figure 7.

Figure 7

RMSEs in position under different FDI attack intensities.

6. Conclusions

In this paper, a modified distributed consensus estimation algorithm has been provided for networked multi-sensor systems subject to hybrid attacks and missing measurements. A random variable satisfying the Bernoulli distribution has been applied to account for the missing measurement phenomenon. From the viewpoint of the attacker, a unified hybrid attack model has been constructed to disrupt the data transmission between neighboring estimators, which takes into account the characteristics and behaviors of both random FDI and DoS attacks. Starting from optimality and scalability, optimal/suboptimal distributed consensus estimators have been proposed, respectively. Furthermore, sufficient conditions for convergence of the proposed distributed suboptimal estimator have been obtained. It has been explicitly established that there are correlations between the convergence and hybrid attack model as well as missing measurement parameters. Future works will focus on extending linear multi-sensor systems to nonlinear systems.

Abbreviations

The following abbreviations are used in this manuscript:

FDI false data injection
DoS denial of service
RMSEs root-mean-square errors

Author Contributions

Conceptualization, Z.C. and H.R.; methodology, Z.C.; software, L.Y. and Q.Y.; validation, Z.C., L.Y. and Q.Y.; formal analysis, Z.C.; investigation, Z.C.; resources, L.Y.; data curation, L.Y. and Q.Y.; writing—original draft preparation, Z.C.; writing—review and editing, Z.C.; visualization, Y.L.; supervision, H.R.; project administration, Y.L.; funding acquisition, Z.C. and H.R. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This work was partially supported by the National Natural Science Foundation of China under Grants 62303121, 62121004, U23A20341, 62303125, and 62373111, the China Postdoctoral Science Foundation under Grants 2023M740750, and in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2022A1515110949 and 2023B1515120010.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Zhou H., Sun S. Distributed filtering for multi-sensor networked systems with stochastic communication protocol and correlated noises. Inf. Fusion. 2024;104:102121. doi: 10.1016/j.inffus.2023.102121. [DOI] [Google Scholar]
  • 2.Zhou J., Yang W., Zhang H., Zheng W.X., Xu Y., Tang Y. Security analysis and defense strategy of distributed filtering under false data injection attacks. Automatica. 2022;138:110151. doi: 10.1016/j.automatica.2021.110151. [DOI] [Google Scholar]
  • 3.Zha L., Guo Y., Liu J., Xie X., Tian E. Protocol-based distributed security fusion estimation for time-varying uncertain systems over sensor networks: Tackling DoS attacks. IEEE Trans. Signal Inf. Process. Over Netw. 2024;10:119–130. doi: 10.1109/TSIPN.2024.3356789. [DOI] [Google Scholar]
  • 4.Ren H., Ma H., Li H., Wang Z. Adaptive fixed-time control of nonlinear MASs with actuator faults. IEEE/CAA J. Autom. Sin. 2023;10:1252–1262. doi: 10.1109/JAS.2023.123558. [DOI] [Google Scholar]
  • 5.Ren H., Liu Z., Liang H., Li H. Pinning-based neural control for multiagent systems with self-regulation intermediate event-triggered method. IEEE Trans. Neural Netw. Learn. Syst. 2024 doi: 10.1109/TNNLS.2024.3386881. [DOI] [PubMed] [Google Scholar]
  • 6.Xu S., Ye D., Li G., Yang D. Globally stealthy attacks against distributed state estimation in smart grid. IEEE Trans. Autom. Sci. Eng. 2024 doi: 10.1109/TASE.2024.3364231. [DOI] [Google Scholar]
  • 7.Wang J., Liu J., Kato N. Networking and communications in autonomous driving: A survey. IEEE Commun. Surv. Tutor. 2018;21:1243–1274. doi: 10.1109/COMST.2018.2888904. [DOI] [Google Scholar]
  • 8.Lee J.H., Hashimoto H. Controlling mobile robots in distributed intelligent sensor network. IEEE Trans. Ind. Electron. 2003;50:890–902. doi: 10.1109/TIE.2003.817488. [DOI] [Google Scholar]
  • 9.Huang J., Tang Y., Yang W., Li F. Resilient consensus-based distributed filtering: Convergence analysis under stealthy attacks. IEEE Trans. Ind. Inform. 2020;16:4878–4888. doi: 10.1109/TII.2019.2960042. [DOI] [Google Scholar]
  • 10.Niu M., Wen G., Lv Y., Chen G. Innovation-based stealthy attack against distributed state estimation over sensor networks. Automatica. 2023;152:110962. doi: 10.1016/j.automatica.2023.110962. [DOI] [Google Scholar]
  • 11.Chen Y., Kar S., Moura J.M. Resilient distributed estimation: Sensor attacks. IEEE Trans. Autom. Control. 2019;64:3772–3779. doi: 10.1109/TAC.2018.2882168. [DOI] [Google Scholar]
  • 12.Han F., Wang Z., Dong H., Alsaadi F.E., Alharbi K.H. A local approach to distributed H∞-consensus state estimation over sensor networks under hybrid attacks: Dynamic event-triggered scheme. IEEE Trans. Signal Inf. Process. Over Netw. 2022;8:556–570. doi: 10.1109/TSIPN.2022.3182273. [DOI] [Google Scholar]
  • 13.Chen Y., Meng X., Wang Z., Dong H. Event-triggered recursive state estimation for stochastic complex dynamical networks under hybrid attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023;34:1465–1477. doi: 10.1109/TNNLS.2021.3105409. [DOI] [PubMed] [Google Scholar]
  • 14.Cheng Z., Ren H., Qin J., Lu R. Security analysis for dynamic state estimation of power systems with measurement delays. IEEE Trans. Cybern. 2023;53:2087–2096. doi: 10.1109/TCYB.2021.3108884. [DOI] [PubMed] [Google Scholar]
  • 15.Li T., Chen B., Yu L., Zhang W.A. Active security control approach against DoS attacks in cyber-physical systems. IEEE Trans. Autom. Control. 2021;66:4303–4310. doi: 10.1109/TAC.2020.3032598. [DOI] [Google Scholar]
  • 16.Sun Y.C., Yang G.H. Event-triggered remote state estimation for cyber-physical systems under malicious DoS attacks. Inf. Sci. 2022;602:43–56. doi: 10.1016/j.ins.2022.04.033. [DOI] [Google Scholar]
  • 17.Liu J., Wang Y., Cao J., Yue D., Xie X. Secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. IEEE Trans. Cybern. 2021;51:4000–4010. doi: 10.1109/TCYB.2020.3003752. [DOI] [PubMed] [Google Scholar]
  • 18.Lv Y., Lu J., Liu Y., Lou J. Resilient distributed state estimation under stealthy attack. IEEE Trans. Inf. Forensics Secur. 2022;17:3254–3263. doi: 10.1109/TIFS.2022.3202119. [DOI] [Google Scholar]
  • 19.Zhou J., Yang W., Ding W., Zheng W.X., Xu Y. Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation. IEEE Trans. Autom. Control. 2023;68:628–635. doi: 10.1109/TAC.2022.3171422. [DOI] [Google Scholar]
  • 20.Li X.M., Yao D., Li P., Meng W., Li H., Lu R. Secure finite-horizon consensus control of multiagent systems against cyber attacks. IEEE Trans. Cybern. 2022;52:9230–9239. doi: 10.1109/TCYB.2021.3052467. [DOI] [PubMed] [Google Scholar]
  • 21.An D., Zhang F., Cui F., Yang Q. Toward data integrity attacks against distributed dynamic state estimation in smart grid. IEEE Trans. Autom. Sci. Eng. 2024;21:881–894. doi: 10.1109/TASE.2023.3236102. [DOI] [Google Scholar]
  • 22.Lei X., Wen G., Zheng W.X., Fu J. Security strategy against location-varying sparse attack on distributed state monitoring. IEEE Trans. Autom. Control. 2024;69:2514–2521. doi: 10.1109/TAC.2023.3307528. [DOI] [Google Scholar]
  • 23.Zhang T.Y., Ye D., Shi Y. Decentralized false-data injection attacks against state omniscience: Existence and security analysis. IEEE Trans. Autom. Control. 2023;68:4634–4649. doi: 10.1109/TAC.2022.3209396. [DOI] [Google Scholar]
  • 24.Li W., Jia Y., Du J. Distributed Kalman consensus filter with intermittent observations. J. Frankl. Inst. 2015;352:3764–3781. doi: 10.1016/j.jfranklin.2015.01.002. [DOI] [Google Scholar]
  • 25.Hu J., Wang Z., Liu G.P., Zhang H., Navaratne R. A prediction-based approach to distributed filtering with missing measurements and communication delays through sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 2021;51:7063–7074. doi: 10.1109/TSMC.2020.2966977. [DOI] [Google Scholar]
  • 26.Jin H., Sun S. Distributed filtering for multi-sensor systems with missing data. Inf. Fusion. 2022;86:116–135. doi: 10.1016/j.inffus.2022.06.007. [DOI] [Google Scholar]
  • 27.Liang J., Wang Z., Liu X. State estimation for coupled uncertain stochastic networks with missing measurements and time-varying delays: The discrete-time case. IEEE Trans. Neural Netw. 2009;20:781–793. doi: 10.1109/TNN.2009.2013240. [DOI] [PubMed] [Google Scholar]
  • 28.Ren H., Cheng Z., Qin J., Lu R. Deception attacks on event-triggered distributed consensus estimation for nonlinear systems. Automatica. 2023;154:111100. doi: 10.1016/j.automatica.2023.111100. [DOI] [Google Scholar]
  • 29.Yang W., Yang C., Shi H., Shi L., Chen G. Stochastic link activation for distributed filtering under sensor power constraint. Automatica. 2017;75:109–118. doi: 10.1016/j.automatica.2016.09.009. [DOI] [Google Scholar]
  • 30.Yang W., Zhang Y., Chen G., Yang C., Shi L. Distributed filtering under false data injection attacks. Automatica. 2019;102:34–44. doi: 10.1016/j.automatica.2018.12.027. [DOI] [Google Scholar]
  • 31.Du D., Li X., Li W., Chen R., Fei M., Wu L. ADMM-based distributed state estimation of smart grid under data deception and denial of service attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019;49:1698–1711. doi: 10.1109/TSMC.2019.2896292. [DOI] [Google Scholar]
  • 32.Qin J., Li M., Shi L., Yu X. Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Trans. Autom. Control. 2018;63:1648–1663. doi: 10.1109/TAC.2017.2756259. [DOI] [Google Scholar]
  • 33.Cheng Z., Ren H., Zhang B., Lu R. Distributed Kalman filter for large-scale power systems with state inequality constraints. IEEE Trans. Ind. Electron. 2021;68:6238–6247. doi: 10.1109/TIE.2020.2994874. [DOI] [Google Scholar]
  • 34.Reif K., Gunther S., Yaz E., Unbehauen R. Stochastic stability of the discrete-time extended Kalman filter. IEEE Trans. Autom. Control. 1999;44:714–728. doi: 10.1109/9.754809. [DOI] [Google Scholar]
  • 35.Li W., Wang Z., Ho D.W., Wei G. On boundedness of error covariances for Kalman consensus filtering problems. IEEE Trans. Autom. Control. 2019;65:2654–2661. doi: 10.1109/TAC.2019.2942826. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

Data are contained within the article.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES