TY - JOUR
T1 - Attack Detection and Distributed Filtering for State-Saturated Systems under Deception Attack
AU - Li, Li
AU - Yang, Huan
AU - Xia, Yuanqing
AU - Zhu, Cui
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/12/1
Y1 - 2021/12/1
N2 - In this article, a secure distributed filtering problem is investigated for a state-saturated system subject to random occurring nonlinearities and deception attack. To resist the hostile attack from a malicious attacker who can modify the data of the transmission module according to a certain probability, an attack detector with a dynamic threshold is designed for each sensor to decide whether to broadcast the current measurement innovation to neighbors. A distributed filtering algorithm is proposed to estimate system state, and a sufficient condition is established to guarantee mean-square boundedness of the estimation error. Moreover, a critical attack probability above which the steady-state estimation error covariance will exceed a preset value is found. In addition, a minimum attack magnitude is given to ensure that the attack signal is able to be completely detected. A numerical example is carried out to testify the validity of the proposed results.
AB - In this article, a secure distributed filtering problem is investigated for a state-saturated system subject to random occurring nonlinearities and deception attack. To resist the hostile attack from a malicious attacker who can modify the data of the transmission module according to a certain probability, an attack detector with a dynamic threshold is designed for each sensor to decide whether to broadcast the current measurement innovation to neighbors. A distributed filtering algorithm is proposed to estimate system state, and a sufficient condition is established to guarantee mean-square boundedness of the estimation error. Moreover, a critical attack probability above which the steady-state estimation error covariance will exceed a preset value is found. In addition, a minimum attack magnitude is given to ensure that the attack signal is able to be completely detected. A numerical example is carried out to testify the validity of the proposed results.
KW - Deception attack
KW - distributed filtering
KW - state-saturated system
KW - stochastic nonlinearity
UR - http://www.scopus.com/inward/record.url?scp=85112153965&partnerID=8YFLogxK
U2 - 10.1109/TCNS.2021.3089146
DO - 10.1109/TCNS.2021.3089146
M3 - Article
AN - SCOPUS:85112153965
SN - 2325-5870
VL - 8
SP - 1918
EP - 1929
JO - IEEE Transactions on Control of Network Systems
JF - IEEE Transactions on Control of Network Systems
IS - 4
ER -