2019
DOI: 10.1016/j.inffus.2018.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks

Abstract: As one of the widely used applications in wireless sensor networks, target tracking has attracted considerable attention. Although many tracking techniques have been developed, it is still a challenging problem if the network is under cyber attacks. Inaccurate or false information is maliciously broadcast by the compromised nodes to their neighbors. They are likely to threaten the security of the system and result in performance deterioration. In this paper, a distributed Kalman filtering technique with trust-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(36 citation statements)
references
References 57 publications
0
36
0
Order By: Relevance
“…A distributed filter owning the capabilities of attack detection and state estimation is designed and tested via the wide-area monitoring of a power network in [146], where a hybrid Bernoulli random set is introduced to describe the joint information on the attack presence or no. Different from distributed filtering algorithms in the mean square sense [147], the paradigm of Kullback-Leibler fusion is utilized to handle the challenge from probability density function. It should be pointed out that the obtained algorithm only has limited robustness to attacks arising from the assumption on attack intensity.…”
Section: Distributed Security Control and Filteringmentioning
confidence: 99%
“…A distributed filter owning the capabilities of attack detection and state estimation is designed and tested via the wide-area monitoring of a power network in [146], where a hybrid Bernoulli random set is introduced to describe the joint information on the attack presence or no. Different from distributed filtering algorithms in the mean square sense [147], the paradigm of Kullback-Leibler fusion is utilized to handle the challenge from probability density function. It should be pointed out that the obtained algorithm only has limited robustness to attacks arising from the assumption on attack intensity.…”
Section: Distributed Security Control and Filteringmentioning
confidence: 99%
“…Also in telecommunications and mobile networks, cyber-attacks can directly inject false data in the network, spread malware, send spam, or collect information for illegal purposes [169]. Self-organised networks [170,171] and virtual network functions [172,173] aid to get an early detection and better mitigation of cyber-attacks in mobile networks [174,175].…”
Section: Agent-based Complex Networkmentioning
confidence: 99%
“…More recently, surveys on deception attacks began to appear, see [34][35][36][37][38][39]. For instance, in [34], the most general model of sensor attack resilient has been proposed, which can allow any signal to be injected through the compromised sensor.…”
Section: Related Workmentioning
confidence: 99%
“…In [35,37,38], the distributed state estimator, which was used to defend against false data injection attacks over sensor networks, has been embedded with event-triggering transmission scheme. Based on clustering technology, which can remove bad data and/or inaccurate estimates, a distributed Kalman filtering approach with trust-based dynamic combination strategy has been proposed in [39] to enhance the robustness against cyber attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation