Distributed H\infty Secure Fusion Estimation for Energy-Constrained Multi-Sensor Systems Under Hybrid Attacks
This paper investigates the distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation problem for energy-constrained multi-sensor systems subject to hybrid attacks. Given the limited energy supply, sensor...
Saved in:
Published in | IEEE transactions on signal and information processing over networks Vol. 11; pp. 994 - 1004 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
IEEE
2025
|
Subjects | |
Online Access | Get full text |
ISSN | 2373-776X 2373-7778 |
DOI | 10.1109/TSIPN.2025.3594164 |
Cover
Loading…
Abstract | This paper investigates the distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation problem for energy-constrained multi-sensor systems subject to hybrid attacks. Given the limited energy supply, sensor nodes operate in two modes: high-energy mode, which ensures robust security during information transmission, and low-energy mode, which makes transmissions more vulnerable to hybrid attacks. The phenomenon of hybrid attacks is described as the stochastic occurrence of false data injection (FDI) and denial-of-service (DoS) attacks in the communication channels from sensors to local estimators. To handle these challenges, we propose a novel distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation model designed specifically for energy-constrained multi-sensor systems under hybrid attacks scenarios. Subsequently, sufficient conditions are derived to ensure that the secure fusion estimation error system achieves exponential mean-square stability and <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> performance level. Additionally, the design of optimal fusion weight matrices is addressed. Finally, the effectiveness of the proposed distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation method is demonstrated through an illustrative example. |
---|---|
AbstractList | This paper investigates the distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation problem for energy-constrained multi-sensor systems subject to hybrid attacks. Given the limited energy supply, sensor nodes operate in two modes: high-energy mode, which ensures robust security during information transmission, and low-energy mode, which makes transmissions more vulnerable to hybrid attacks. The phenomenon of hybrid attacks is described as the stochastic occurrence of false data injection (FDI) and denial-of-service (DoS) attacks in the communication channels from sensors to local estimators. To handle these challenges, we propose a novel distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation model designed specifically for energy-constrained multi-sensor systems under hybrid attacks scenarios. Subsequently, sufficient conditions are derived to ensure that the secure fusion estimation error system achieves exponential mean-square stability and <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> performance level. Additionally, the design of optimal fusion weight matrices is addressed. Finally, the effectiveness of the proposed distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation method is demonstrated through an illustrative example. |
Author | Chen, Linyi Yu, Li Song, Haiyu Chen, Bo Zhang, Wen-An |
Author_xml | – sequence: 1 givenname: Haiyu orcidid: 0000-0003-4772-2855 surname: Song fullname: Song, Haiyu email: haiyusong@gmail.com organization: School of Information Technology and Artificial Intelligence, Zhejiang University of Finance and Economics, Hangzhou, China – sequence: 2 givenname: Linyi orcidid: 0009-0005-7466-0313 surname: Chen fullname: Chen, Linyi organization: School of Information Technology and Artificial Intelligence, Zhejiang University of Finance and Economics, Hangzhou, China – sequence: 3 givenname: Bo orcidid: 0000-0001-6150-3881 surname: Chen fullname: Chen, Bo organization: Department of Automation, Zhejiang University of Technology, Hangzhou, China – sequence: 4 givenname: Wen-An orcidid: 0000-0002-4355-2783 surname: Zhang fullname: Zhang, Wen-An organization: Department of Automation, Zhejiang University of Technology, Hangzhou, China – sequence: 5 givenname: Li orcidid: 0000-0003-3889-3863 surname: Yu fullname: Yu, Li organization: Department of Automation, Zhejiang University of Technology, Hangzhou, China |
BookMark | eNpFkF1LwzAUhoMoOOf-gHiRP9CZpEnTXI65ucH8gE7wQihNeirRLZUkvei_t3NDr84L530OnOcKnbvWAUI3lEwpJepuW6xfnqaMMDFNheI042doxFKZJlLK_PwvZ2-XaBLCJyGECsmlUiO0v7chequ7CDVevVvXxB4XYDoPeNkF2zq8CNHuq3iITevxwoH_6JN56wawsm7gHrtdtEkBLgz7og8R9gG_uho8XvXa2xrPYqzMV7hGF021CzA5zTHaLhfb-SrZPD-s57NNYjKuEiFZRlgOVCtQ2kgmNE-lYSrLuWC6Esw0ucqV0FpmQqs6FzwFWnGSy1qZKh0jdjxrfBuCh6b89sMLvi8pKQ_Kyl9l5UFZeVI2QLdHyALAP3CoE6HSH_XYa08 |
CODEN | ITSIBW |
Cites_doi | 10.1109/TASE.2024.3401740 10.1109/TCYB.2021.3051963 10.1109/TASE.2024.3424190 10.1109/TIFS.2024.3376250 10.1109/TIM.2024.3381699 10.1109/JPROC.2017.2781198 10.1109/TFUZZ.2023.3262609 10.1016/j.inffus.2022.06.004 10.1109/TIE.2024.3390733 10.1109/TSIPN.2023.3295768 10.1016/j.ins.2023.119527 10.1016/j.inffus.2017.03.006 10.1109/TAC.2023.3250094 10.1016/j.inffus.2023.101963 10.1109/TAC.2011.2164022 10.1109/JSEN.2023.3323869 10.1109/JIOT.2023.3289625 10.1109/TAC.2005.864207 10.1016/j.dcan.2022.03.013 10.1109/TSMC.2022.3156848 10.1109/TSIPN.2022.3182273 10.1016/j.automatica.2022.110406 10.1109/TSIPN.2021.3139351 10.1109/TCYB.2017.2789296 10.1109/TSIPN.2021.3074882 10.1109/JAS.2022.105623 10.1109/TCSII.2021.3102327 10.1109/TII.2022.3233657 10.1109/TSIPN.2023.3334496 10.1109/SP.2010.34 10.1109/TSIPN.2023.3341410 10.1109/TNSE.2023.3267724 10.1109/TCNS.2021.3113265 10.1109/TCYB.2020.3015507 10.1109/JAS.2022.105548 10.1109/TNSE.2020.3018871 10.1109/TCST.2022.3180942 10.1137/1.9781611970777 10.1007/s11071-021-07098-4 10.1016/j.automatica.2004.01.014 10.1109/TSIPN.2024.3356789 10.1016/j.inffus.2023.03.001 10.1109/MWC.2019.1800297 10.1016/j.ins.2020.08.124 |
ContentType | Journal Article |
DBID | 97E RIA RIE AAYXX CITATION |
DOI | 10.1109/TSIPN.2025.3594164 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2373-7778 |
EndPage | 1004 |
ExternalDocumentID | 10_1109_TSIPN_2025_3594164 11109059 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 62073284; 62173305 funderid: 10.13039/501100001809 – fundername: Zhejiang Province Science and Technology Leading Talent Plan Project of China grantid: 2023R5213 – fundername: Zhejiang Provincial Postdoctoral Research Project grantid: ZJ2024163 – fundername: China Post-doctoral Science Foundation grantid: 2024M763156 |
GroupedDBID | 0R~ 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFS AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 O9- OCL RIA RIE AAYXX CITATION |
ID | FETCH-LOGICAL-c649-5726028e1b9e9bc725b437c2968452ba52cf89895bb765b9d8543e1a4087d9ca3 |
IEDL.DBID | RIE |
ISSN | 2373-776X |
IngestDate | Thu Aug 21 00:16:14 EDT 2025 Wed Aug 20 06:21:04 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c649-5726028e1b9e9bc725b437c2968452ba52cf89895bb765b9d8543e1a4087d9ca3 |
ORCID | 0000-0001-6150-3881 0000-0003-4772-2855 0000-0002-4355-2783 0000-0003-3889-3863 0009-0005-7466-0313 |
PageCount | 11 |
ParticipantIDs | ieee_primary_11109059 crossref_primary_10_1109_TSIPN_2025_3594164 |
PublicationCentury | 2000 |
PublicationDate | 20250000 2025-00-00 |
PublicationDateYYYYMMDD | 2025-01-01 |
PublicationDate_xml | – year: 2025 text: 20250000 |
PublicationDecade | 2020 |
PublicationTitle | IEEE transactions on signal and information processing over networks |
PublicationTitleAbbrev | TSIPN |
PublicationYear | 2025 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 ref38 ref19 ref18 Fuwen (ref41) 2006; 51 ref24 ref23 ref26 ref25 ref20 ref42 ref22 ref44 ref21 ref43 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
References_xml | – ident: ref13 doi: 10.1109/TASE.2024.3401740 – ident: ref28 doi: 10.1109/TCYB.2021.3051963 – ident: ref37 doi: 10.1109/TASE.2024.3424190 – ident: ref25 doi: 10.1109/TIFS.2024.3376250 – ident: ref2 doi: 10.1109/TIM.2024.3381699 – ident: ref22 doi: 10.1109/JPROC.2017.2781198 – ident: ref29 doi: 10.1109/TFUZZ.2023.3262609 – ident: ref14 doi: 10.1016/j.inffus.2022.06.004 – ident: ref24 doi: 10.1109/TIE.2024.3390733 – ident: ref6 doi: 10.1109/TSIPN.2023.3295768 – ident: ref35 doi: 10.1016/j.ins.2023.119527 – ident: ref5 doi: 10.1016/j.inffus.2017.03.006 – ident: ref19 doi: 10.1109/TAC.2023.3250094 – ident: ref10 doi: 10.1016/j.inffus.2023.101963 – ident: ref16 doi: 10.1109/TAC.2011.2164022 – ident: ref4 doi: 10.1109/JSEN.2023.3323869 – ident: ref23 doi: 10.1109/JIOT.2023.3289625 – volume: 51 start-page: 511 issue: 3 year: 2006 ident: ref41 article-title: $ H_{\infty }$ control for networked systems with random communication delays publication-title: IEEE Trans. Autom. Control doi: 10.1109/TAC.2005.864207 – ident: ref21 doi: 10.1016/j.dcan.2022.03.013 – ident: ref33 doi: 10.1109/TSMC.2022.3156848 – ident: ref34 doi: 10.1109/TSIPN.2022.3182273 – ident: ref9 doi: 10.1016/j.automatica.2022.110406 – ident: ref39 doi: 10.1109/TSIPN.2021.3139351 – ident: ref42 doi: 10.1109/TCYB.2017.2789296 – ident: ref38 doi: 10.1109/TSIPN.2021.3074882 – ident: ref40 doi: 10.1109/JAS.2022.105623 – ident: ref17 doi: 10.1109/TCSII.2021.3102327 – ident: ref12 doi: 10.1109/TII.2022.3233657 – ident: ref7 doi: 10.1109/TSIPN.2023.3334496 – ident: ref31 doi: 10.1109/SP.2010.34 – ident: ref8 doi: 10.1109/TSIPN.2023.3341410 – ident: ref15 doi: 10.1109/TNSE.2023.3267724 – ident: ref27 doi: 10.1109/TCNS.2021.3113265 – ident: ref26 doi: 10.1109/TCYB.2020.3015507 – ident: ref30 doi: 10.1109/JAS.2022.105548 – ident: ref36 doi: 10.1109/TNSE.2020.3018871 – ident: ref1 doi: 10.1109/TCST.2022.3180942 – ident: ref44 doi: 10.1137/1.9781611970777 – ident: ref18 doi: 10.1007/s11071-021-07098-4 – ident: ref43 doi: 10.1016/j.automatica.2004.01.014 – ident: ref11 doi: 10.1109/TSIPN.2024.3356789 – ident: ref3 doi: 10.1016/j.inffus.2023.03.001 – ident: ref20 doi: 10.1109/MWC.2019.1800297 – ident: ref32 doi: 10.1016/j.ins.2020.08.124 |
SSID | ssj0001574799 |
Score | 2.2808623 |
Snippet | This paper investigates the distributed <inline-formula><tex-math notation="LaTeX">H_{\infty }</tex-math></inline-formula> secure fusion estimation problem for... |
SourceID | crossref ieee |
SourceType | Index Database Publisher |
StartPage | 994 |
SubjectTerms | Costs energy constraints Energy consumption Estimation Estimation error hybrid attacks Information processing multi-sensor systems Noise Power system stability Secure fusion estimation Security State estimation Stochastic processes |
Title | Distributed H\infty Secure Fusion Estimation for Energy-Constrained Multi-Sensor Systems Under Hybrid Attacks |
URI | https://ieeexplore.ieee.org/document/11109059 |
Volume | 11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF5sT3rwWbG-2IM32TbJ7mazx6ItUbAIrdCDEPbVi9iKJIf6653dpLQKgreQZGGZmTDfTPabD6GblEJSojYiIlacMD6nJGNSEBtbA3AEUozw5OSncZq_sMcZnzVk9cCFcc6Fw2eu5y_Dv3y7NJVvlfVjPx4T8EALtaByq8lam4YKB2Qs5ZoYE8n-dPLwPIYSMOE9yiUgD_Yj-WypqYRkMjpA4_U26jMkb72q1D3z9WtC47_3eYj2G1iJB3UcHKEdtzhGe1vDBk_Q-72fkevlrZzF-StEVrnCod3u8KjyTTM8hO-9pjJiwLJ4GHiBxGt6BiUJWBf4umQCtS88b6ad46CdhPOVJ3_hQVl62n4HTUfD6V1OGrEFYlImCRdQ2CSZi7V0UhuRcM2oMIlMM8YTrXhi5l5pkmstUq6lzTijLlYsyoSVRtFT1F4sF-4M4UxRG0dWsTgxjCmmMgOmn6tIqsjJVHXR7doJxUc9UqMIpUgki-CywrusaFzWRR1v4M2bjW3P_7h_gXb98rpLcona5WflrgA3lPo6xMs3n1jAqQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF60HtSDb7E-9-BNts1jN8kei7ak2gahFXoQwr56EVuR5FB_vbOblFZB8BbyYpmZMN9M9psPodsohKQUao_EvmCEsmlIEspjon2tAI5AioktOXmYRekLfZywSU1Wd1wYY4zbfGZa9tD9y9dzVdpWWdu34zEBD2yiLUj8zK_oWquWCgNszPmSGuPx9njUf86gCAxYK2QcsAf9kX7W9FRcOunto2y5kGoXyVurLGRLff2a0fjvlR6gvRpY4k4VCYdow8yO0O7auMFj9P5gp-RagSujcfoKsVUssGu4G9wrbdsMd-GLr8iMGNAs7jpmILGqnk5LAp5zjF0yguoXrtfzzrFTT8LpwtK_cKcoLHH_BI173fF9Smq5BaIiygmLobQJEuNLbrhUccAkDWMV8CihLJCCBWpqtSaZlHHEJNcJo6HxBfWSWHMlwlPUmM1n5gzhRITa97SgfqAoFVQkCkw_FR4XnuGRaKK7pRPyj2qoRu6KEY_nzmW5dVleu6yJTqyBV3fWtj3_4_wN2k7Hw0E-6GdPF2jHvqrqmVyiRvFZmitAEYW8drHzDdesw_I |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Distributed+H%5Cinfty+Secure+Fusion+Estimation+for+Energy-Constrained+Multi-Sensor+Systems+Under+Hybrid+Attacks&rft.jtitle=IEEE+transactions+on+signal+and+information+processing+over+networks&rft.au=Song%2C+Haiyu&rft.au=Chen%2C+Linyi&rft.au=Chen%2C+Bo&rft.au=Zhang%2C+Wen-An&rft.date=2025&rft.pub=IEEE&rft.eissn=2373-7778&rft.volume=11&rft.spage=994&rft.epage=1004&rft_id=info:doi/10.1109%2FTSIPN.2025.3594164&rft.externalDocID=11109059 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2373-776X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2373-776X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2373-776X&client=summon |