论文标题
如何在传感器攻击下固定分布式过滤器
How to Secure Distributed Filters Under Sensor Attacks
论文作者
论文摘要
我们研究了如何在虚假数据注射攻击下使用有界噪声的线性时变形系统保护分布式过滤器。恶意攻击者能够为传感器的时变和未知子集操纵观测值。我们首先提出了一个递归分布式过滤器,该过滤器在每个更新时由两个步骤组成。第一步采用类似饱和的方案,如果创新对应于潜在攻击,则可以将其略有收益。第二步是在相邻传感器之间进行状态估计的共识操作。如果滤波器参数满足条件,我们证明估计误差是上限的。我们进一步分析了条件的可行性,并将其连接到集中式情况下的稀疏可观察性。当已知攻击传感器集是时间不变时,通过添加在线本地攻击探测器来修改安全过滤器。检测器能够确定其观察创新大于检测阈值的攻击传感器。同样,在检测到更多攻击的传感器时,阈值将自适应地调整以减少隐形攻击信号的空间。通过检测的安全过滤器的弹性通过估计误差的上限与检测到的攻击传感器数量之间的显式关系来验证。此外,对于无噪声情况,我们证明,在某些条件下,每个传感器的状态估计值渐近地收敛到系统状态。提供数值模拟以说明开发的结果。
We study how to secure distributed filters for linear time-invariant systems with bounded noise under false-data injection attacks. A malicious attacker is able to arbitrarily manipulate the observations for a time-varying and unknown subset of the sensors. We first propose a recursive distributed filter consisting of two steps at each update. The first step employs a saturation-like scheme, which gives a small gain if the innovation is large corresponding to a potential attack. The second step is a consensus operation of state estimates among neighboring sensors. We prove the estimation error is upper bounded if the filter parameters satisfy a condition. We further analyze the feasibility of the condition and connect it to sparse observability in the centralized case. When the attacked sensor set is known to be time-invariant, the secured filter is modified by adding an online local attack detector. The detector is able to identify the attacked sensors whose observation innovations are larger than the detection thresholds. Also, with more attacked sensors being detected, the thresholds will adaptively adjust to reduce the space of the stealthy attack signals. The resilience of the secured filter with detection is verified by an explicit relationship between the upper bound of the estimation error and the number of detected attacked sensors. Moreover, for the noise-free case, we prove that the state estimate of each sensor asymptotically converges to the system state under certain conditions. Numerical simulations are provided to illustrate the developed results.