Trust-Based Distributed H∞ Diffusion Filtering for Target Tracking Under Cyber Attacks

Concerning the problem of target tracking in wireless sensor networks under cyber attacks, this paper proposes a trust-based distributed <inline-formula> <tex-math notation="LaTeX">H\infty </tex-math></inline-formula> diffusion filtering method, designed to maintain...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 11; pp. 119388 - 119395
Main Authors Gao, Yanshen, Zhu, Hongbo, Li, Xueyang, Amuri, Minane Joel Villier
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2023
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Concerning the problem of target tracking in wireless sensor networks under cyber attacks, this paper proposes a trust-based distributed <inline-formula> <tex-math notation="LaTeX">H\infty </tex-math></inline-formula> diffusion filtering method, designed to maintain resilience against diverse types of cyber attacks. Firstly, the distributed <inline-formula> <tex-math notation="LaTeX">H\infty </tex-math></inline-formula> filtering equation for a linear discrete system is implemented for iterative updates of state estimation and error covariance. Secondly, to address the impact of cyber attacks, the <inline-formula> <tex-math notation="LaTeX">K </tex-math></inline-formula>-means-based trust set extracting algorithm is employed to identify and remove attacked untrusted nodes. Subsequently, the data from trusted nodes is fused based on a diffusion strategy, leading to recalculations of state estimation and covariance, thus improving the overall target tracking performance. Experimental results demonstrate the effectiveness of our method in resisting denial of service attacks and deception attacks, such as random, replay, and false data injection attacks. The proposed approach offers robustness and adaptability, making it suitable for practical applications in distributed sensor networks under cyber attacks.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2023.3326874