Next Article in Journal
Microfluidic Point-of-Care Devices: New Trends and Future Prospects for eHealth Diagnostics
Next Article in Special Issue
A Distributed Clustering Algorithm Guided by the Base Station to Extend the Lifetime of Wireless Sensor Networks
Previous Article in Journal
The Feasibility of Remotely Piloted Aircrafts for VOR Flight Inspection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks

1
Engineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, China
2
Jiangsu Province Internet of Things Application Technology Key Construction Laboratory, Wuxi Taihu College, Wuxi 214063, Jiangsu, China
*
Author to whom correspondence should be addressed.
Submission received: 3 February 2020 / Revised: 16 March 2020 / Accepted: 29 March 2020 / Published: 31 March 2020
(This article belongs to the Special Issue Distributed Algorithms for Wireless Sensor Networks)

Abstract

:
This paper is concerned with the distributed full- and reduced-order l 2 - l state estimation issue for a class of discrete time-invariant systems subjected to both randomly occurring switching topologies and deception attacks over wireless sensor networks. Firstly, a switching topology model is proposed which uses homogeneous Markov chain to reflect the change of filtering networks communication modes. Then, the sector-bound deception attacks among the communication channels are taken into consideration, which could better characterize the filtering network communication security. Additionally, a random variable obeying the Bernoulli distribution is used to describe the phenomenon of the randomly occurring deception attacks. Furthermore, through an adjustable parameter E, we can obtain full- and reduced-order l 2 - l state estimator over sensor networks, respectively. Sufficient conditions are established for the solvability of the addressed switching topology-dependent distributed filtering design in terms of certain convex optimization problem. The purpose of solving the problem is to design a distributed full- and reduced-order filter such that, in the presence of deception attacks, stochastic external interference and switching topologies, the resulting filtering dynamic system is exponentially mean-square stable with prescribed l 2 - l performance index. Finally, a simulation example is provided to show the effectiveness and flexibility of the designed approach.

1. Introduction

In the past few decades, wireless sensor networks (WSNs) have received widespread attention due to their enormous application potential in military installations, environmental monitoring, information collection, and power grids, see [1,2,3,4,5,6,7,8,9,10]. Unlike a single sensor in a traditional system, a sensor node in WSNs can collaborate with other sensors in a given topology based on information measured by itself and output information of adjacent sensors. Therefore, some initiatives have been taken to address the problems of distributed filtering based on WSNs in recent years, see [11,12,13,14,15,16,17,18,19,20]. For example, in [12], the filtering problem of nonlinear stochastic systems affected by sensor saturation in unstable communication channels has been solved. By using standard Kalman filter updating and consistency updating, a two-stage Kalman consistency filtering method has been proposed in [14]. Additionally in [18], the distributed robust filtering problem has been solved for a class of discrete T-S fuzzy systems with immeasurable premise variables and Sigma-Delta quantiser over WSNs. Besides, a distributed non-linear Kalman filter with a more general communication scheme has been presented in [19], which processed the additive white Gaussian noise in the system, measurement and communication. Furthermore, the developed algorithm has been applied to estimate the unknown information distribution in a certain area of the optimal coverage control problem over sensor networks. Based on the piecewise Lyapunov function approach and the concept of average dwell time, a convex optimization method has been used to deal with the distributed H filtering problem for a stochastic switching system with a fixed delay and a fading measurement over the sensor network in [20].
One of the important requirements of those applications over WSNs is high level of security while transferring information. Deception attacks, denial of service attacks and false information injection attacks are the mostly frequently occurred phenomena over WSNs. These attacks should be adequately considered during system analysis/synthesis to prevent undesired behavior (e.g., degradation, divergence, and instability), thus have attracted considerable attention during the past few years, see [21,22,23]. In addition, in practical applications, many factors may cause random changes in the topology of communication networks. For example, instability of communication link between filters, obstacle blocking, network-induced factors, adding new nodes due to application requirements, etc. In recent years, many achievements have been made on this issue, see [24,25,26,27]. As such, a seemingly natural question is that, when the WSNs are subject to both switching topologies and deception attacks, we need to design the distributed robust filter to realize system state estimation.

1.1. Related Work

There are several techniques including linear matrix inequality (LMI) approach, parameter-dependent/recursive LMI method, and Riccati difference equation method for distributed filtering or estimation problems, see [28,29,30,31,32,33]. For example, by using the LMI technology, a desired sampled data-based distributed filter has been constructed in [32] for stochastic nonlinear systems over WSNs with multiple bounded time-delays, the distributed filtering problem has been investigated in [33] for a class of discrete-time stochastic systems over WSNs with randomly missing measurements and varying nonlinearities, and the distributed state estimators have been designed in [28,31] for nonlinear systems with multiple network-induced phenomena. Besides, in order to reflect a more realistic situation, in [29,30], randomly packet dropouts, randomly occurring uncertainties and nonlinearities have been considered during designing event-triggered distributed filters.
More recently, surveys on deception attacks began to appear, see [34,35,36,37,38,39]. For instance, in [34], the most general model of sensor attack resilient has been proposed, which can allow any signal to be injected through the compromised sensor. Based on this model, the attack resilient state estimation problem has been studied under bounded noise. The effect of stealthy integrity attacks on Networked physical systems has been analyzed in [36], where the target system was a Stochastic Linear Time-Invariant (LTI) system with a linear estimator, a linear feedback controller and a χ 2 fault detector. In [35,37,38], the distributed state estimator, which was used to defend against false data injection attacks over sensor networks, has been embedded with event-triggering transmission scheme. Based on clustering technology, which can remove bad data and/or inaccurate estimates, a distributed Kalman filtering approach with trust-based dynamic combination strategy has been proposed in [39] to enhance the robustness against cyber attacks.
The corresponding research on switching topologies has been received preliminary attention due to its engineering insights, see [13,40,41,42,43,44,45,46]. For example, in [40], the distributed filtering problem of network topology with limited switching frequency has been investigated. In [41,42], a novel distributed H state estimation framework for discrete-time partial information exchange has been proposed by modeling time-varying network topologies with non-homogeneous Markov chains. In [43,44,45], the designed distributed robust filtering has been considered both Markov switching communication topologies and event triggering mechanism. Considering the two types of network-induced communication constraints that occur during sensor measurement and transmission between filters, i.e., channel fading and random packet dropouts, the distributed H -consensus problem with communication topology switching has been solved in [46] under those constraints. Up to now, the stability analysis and control, filtering and fault detection of Markov jump systems have been investigated in [47,48,49,50,51].

1.2. Main Contribution

It should be noted that, most existing design methods have been focused on distributed full-order filering, while little effort has been devoted to design distributed reduced-order filering, not to mention that both types of filters can be obtained simultaneously. As we all know, the distributed reduced-order filters can reduce the complexity of the filtering network and facilitate engineering application. In order to defend the effects of randomly deception attacks, switching communication topologies and external interference for WSNs, the design of distributed l-order robust filters is important and challenging. However, the current research results are not abundant in the l-order distributed state estimation over WSNs subjected to randomly deception attacks and switching communication topologies. Therefore, we aim to design a distributed full- and reduced-order filtering algorithm for a class of discrete time-invariant systems over WSNs, all possible unknown disturbances, deception attacks and switching topologies, the following design objectives are achieved simultaneously: (i) the distributed filtering dynamic system is exponentially stable in the mean square sense and (ii) a prescribed l 2 - l performance index is guaranteed.
The main contributions of this paper are summarized as follows:
(1) Through an adjustable parameter E, we can obtain full- and reduced-order l 2 - l state estimationer over sensor networks, respectively;
(2) The sector-bound deception attacks among the communication channels are taken into consideration, which could better characterize the filtering network communication security;
(3) Sufficient conditions are established for the solvability of the addressed switching topology-dependent distributed filtering design in terms of certain convex optimization problem.
The remainder of this paper is organized as follows: In Section 2, the studied issues and basic definitions are formulated. In Section 3 and Section 4 mainly introduces the performance analysis and the l-order filter design method, respectively. The effectiveness and flexibility of designed distributed filter is verified in Section 5. Finally, we conclude this paper in Section 6.
Notation. In this paper, R n and R n × m denote the n dimensional Euclidean space and the set of n × m all real matrices, respectively. · refers to the Euclidean norm. The notation X > 0 means that matrix X is real positive definite symmetric matrix. The superscript T stands for matrix transposition. I denotes the identity matrix of compatible dimension. d i a g n A i stands for the block-diagonal matrix d i a g A 1 , A 2 , , A n , and d i a g n A means the N-block-diagonal matrix d i a g A , A , , A . d i a g n i { A } represents the N-bolck-diagonal matrix with its i-th block A and the others zero matrices. v e c n x i denotes row vector x 1 , x 2 , , x n . E { x } stands for the mathematical expectation of the stochastic variable x. The symbol “∗” describes the symmetric part in a symmetric block matrix.

2. Problem Statement

2.1. Preliminaries

Consider a G = V , E , A sensor network whose topology is represented by a given digraph G of order n with the set of nodes V = { 1 , 2 , , n } , set of edges E V × V , and a weighted adjacency matrix A = a i j n × n a i j 0 with nonnegative adjacency elements a i j . An edge of G is denoted by the ordered pair ( i , j ) . The adjacency elements associated with the edges of the graph are positive, i.e., a i j > 0 . Also, we assume a i i = 1 for all i V , and therefore ( i , i ) can be regarded as an additional edge. The set of neighbors of node i V plus the node itself are denoted by N i = { j V : ( i , j ) E } .

2.2. System Model

In this paper, the target plant is a system whose state is estimated by distributed sensors. Consider the following discrete-time linear networked system:
x ( k + 1 ) = A x ( k ) + B w ( k ) , x ( 0 ) = x 0 z ( k ) = M x ( k )
where x ( k ) R n x is the system state vector, z ( k ) R n z the signal to be estimated, and w k R n w is the exogenous disturbance input that belongs to l 2 0 , . A , B , and M in system (1) are known matrices with proper dimensions.
As shown in Figure 1, this paper studies the design of dynamic target state estimation in sensor networks under random attacks. The considered attack type is deception information injection. The attack strategy is to randomly inject malicious vectors into the transmitted measurements of sensor nodes via wireless channel between sensor network and filtering network.
Consider the following sensor measurement models and attack models:
y i ( k ) = C i x ( k ) y ˜ i ( k ) = y i ( k ) + θ i ( k ) ς i ( k ) + D i v i ( k ) ς i ( k ) = y i ( k ) + ϕ i ( y i ( k ) )
where y i ( k ) R n y is the measurement output received by sensor i from system (1). y ˜ i ( k ) is the transmitted measurement values via the network subject to deception attacks, the signal ς i ( k ) , v i ( k ) is the random channel noise belonging to l 2 0 , , and ϕ i ( y i ( k ) ) is a malicious signal injected by the attacker, which is inaccessible to the defenders. C i and D i are known matrices with proper dimensions. In addition, we assume that ϕ i ( y i ( k ) ) satisfies the nonlinear vector-valued function ϕ i ( · ) : R n y ˜ R n y ˜ .
The nonlinear function ϕ i ( · ) is continuous and bounded, and satisfies the following inequality:
ϕ i ( y i ( k ) ) K 1 y i ( k ) T ϕ i ( y i ( k ) ) K 2 y i ( k ) 0
for all y ˜ i ( k ) R n y ˜ , where K 1 and K 2 are real matrices with appropriate dimensions.
The random variable θ i ( k ) is Bernoulli distributed white sequence, mutually independent and not equired to be equal to each other, satisfying the following probability distribution:
P r o b θ i ( k ) = 1 = E θ i ( k ) = β i , P r o b θ i ( k ) = 0 = E 1 θ i ( k ) = 1 β i , E θ i ( k ) β i 2 = α i , E θ i ( k ) β i θ j ( k ) β j = 0 , ( i j ) ,
where β i is a known nonnegative constant.
Due to the topology of the sensor networks, for each sensor node, the filter to be designed is assumed to be of the following form:
x ^ i ( k + 1 ) = j N i r ( k ) a i j r ( k ) W i j r ( k ) x ^ j ( k ) + j N i r ( k ) a i j r ( k ) H i j r ( k ) y ˜ j ( k ) z ^ i ( k ) = L i r ( k ) x ^ i ( k )
where x ^ i R l is the filter state, z ^ i ( k ) R n z is the estimated output. In addition, we assume that l represents the order of the filter. If l = m , the filter belongs to a full-order filter. Accordingly, it is a reduced-order filter when 1 l < m .
The Markov chain r ( · ) take values in a finite set S = { 1 , 2 , , n 0 } , Π = [ π s t ] n 0 × n 0 represents the probability of jumping from topology s to topology t, which can be expressed as:
π s t = P r o b ( r ( k + 1 ) = t | r ( k ) = s ) . s , t S
where π s t 0 , t = 1 n 0 π s t = 1 . Here, matrices W i j r ( k ) , H i j r ( k ) , L i r ( k ) ( j N i r ( k ) ) in (5) are filtering parameters to be determined.

2.3. Augmented Filtering Error System Model

For the sake of convenience, we define
x ^ ( k ) = v e c n T x ^ i T ( k ) , x ¯ ( k ) = v e c n T x T ( k ) , ϕ ( y ( k ) ) = v e c n T ϕ i T ( y i ( k ) ) , v ( k ) = v e c n T v i T ( k ) , e ( k ) = v e c n T e i T ( k ) , y ˜ ( k ) = v e c n T y ˜ i T ( k ) , B ¯ = v e c T B T , A ¯ = d i a g n { A } , M ¯ = d i a g n { M } , D ¯ = d i a g n D i , C ¯ 1 β = d i a g n ( 1 β i ) C i , L ¯ r ( k ) = d i a g n L i r ( k ) , C ˜ = C ¯ 0 , C ¯ n i = d i a g n i C i , K ¯ 1 = d i a g n K 1 , K ¯ 2 = d i a g n K 2 , E ¯ n i = d i a g n i I , C ¯ = d i a g n C i , α i = β i 1 β i , β ¯ = d i a g n β i .
Defining η ( k ) = x ¯ T x ^ T T , w ¯ ( k ) = w T ( k ) v T ( k ) T , e ( k ) = z ( k ) z ^ ( k ) . Then, it is easy to obtain the augmented filtering error system as follows:
η ( k + 1 ) = A s + i = 1 n θ i ( k ) β i F 1 i s η ( k ) + B 1 s + i = 1 n θ i ( k ) β i F 2 i s ϕ ( y ( k ) ) + B 2 s w ¯ ( k ) e ( k ) = M s η ( k )
where
A s = A ¯ 0 H ¯ s C ¯ 1 β W ¯ s , F 1 i s = 0 0 H ¯ s C ¯ n i 0 , F 2 i s = 0 H ¯ s E ¯ n i , B 1 s = 0 H ¯ s β ¯ , B 2 s = B ¯ 0 0 H ¯ s D ¯ , M s = M ¯ L ¯ s ,
with
W ¯ s = O i j n × n s , O i j = a i j s W i j s , H ¯ s = O ¯ i j n × n s , O ¯ i j = a i j s H i j s .
Clearly, since a i j = 0 when j N i s , W ¯ s and H ¯ s are two sparse matrices which can be described as:
W ¯ s W n x × n x , H ¯ s W n x × n y
where
W p × q = U = [ U i j ] R n p × n q | U i j R p × q , U i j = 0 , i f j N i s .
Furthermore, it follows from (3) that
ϕ ( y ( k ) ) K ¯ 1 C ˜ η ( k ) T ϕ ( y ( k ) ) K ¯ 2 C ˜ η ( k ) < 0 .
Definition 1.
For a given disturbance attenuation level γ > 0 , the estimation error e ( k ) from (8) is said to satisfy the l 2 - l performance constraint if the following inequalities (a) and (b) holds simultaneously:
(a) For all η ( 0 ) , the augmented system (8) with w ¯ ( k ) = 0 is exponentially mean-square stable if there exist scalars λ 1 and 0 < τ < 1 such that
η ( k ) λ τ k η ( 0 ) .
(b) Under the zero-initial condition, for all nonzero w ¯ ( k ) , the filter error e ( k ) satisfies
E e ( k ) 2 < γ 2 w ¯ ( k ) 2 2
where
e ( k ) 2 = sup k { e T ( k ) e ( k ) } , w ¯ ( k ) 2 2 = k = 0 w ¯ T ( k ) w ¯ ( k ) .
Remark 1.
The l 2 - l performance index used in this paper is the constraint of the total output estimation error peak of all filter nodes at a certain time k for the whole filter network, which is less than the constraint of the estimated error peak of each filter node output.
Lemma 1.
(See the work of Yang et al. [52]) Assume that V ( η ( k ) ) = η T ( k ) P η ( k ) is a Lyapunov function. If there are scalars λ 0 , μ > 0 , v > 0 and 0 < ψ < 1 , such that
μ η ( k ) 2 V ( η ( k ) ) v η ( k ) 2
and
E V ( η ( k + 1 ) | η ( k ) V ( η ( k ) ) λ ψ V ( η ( k ) )
then
E η ( k ) 2 v μ ( 1 ψ ) k E η ( 0 ) 2 + λ μ ψ .
Lemma 2.
(See the work of De et al. [53]) For matrices A , Q = Q T and P > 0 , the following matrix inequality
A T P A Q < 0
holds if and only if there exists a matrix T of appropriate dimensions such that
Q T T A P T T T < 0 .
Lemma 3.
(See the work of Yang et al. [16]) Let Q = d i a g { Q 1 , Q 2 , , Q n } with Q i R p × p ( 1 i n ) being invertible matrices. For W R n p × n q if X = Q W , then we can obtain W W p × q X W p × q .

3. Distributed Filtering Performance Analysis

In this section, the stochastic stability condition in the mean square sense for augmented system (8) with switching topologies and deception attacks will be discussed, and the l 2 - l performance index is achieved.
Theorem 1.
For given scalars γ > 0 . Assume that there exist matrices L ¯ s = d i a g n L i s , P ( s ) > 0 , and two families of matrices W ¯ s , H ¯ s satisfying the constraints
W ¯ s W n x × n x , H ¯ s W n x × n y , s = 1 , 2 , , n 0
and the following set of LMIs
Γ 11 s Γ 21 s I 0 0 I Γ 41 s Γ 42 s Γ 43 s Γ 44 s Γ 51 s Γ 52 s 0 0 Γ 55 s < 0
P ( s ) M s γ 2 I < 0
where
Γ 11 s = P ( s ) C ˜ T K ¯ 1 T K ¯ 2 C ˜ , Γ 21 s = 0.5 K ¯ 1 + K ¯ 2 C ˜ , Γ 41 s = P ¯ ( s ) A s , Γ 42 s = P ¯ ( s ) B 1 s , Γ 43 s = P ¯ ( s ) B 2 s , Γ 44 s = P ¯ ( s ) , Γ 51 s = v e c n α i P ¯ ( s ) F 1 i s , Γ 52 s = v e c n α i P ¯ ( s ) F 2 i s , Γ 55 s = d i a g n P ¯ ( s ) .
Proof of Theorem 1.
In order to prove the stability of the augmented system (8) (with w ¯ ( k ) = 0 ), we choose the Lyapunov function candidate as follows:
V ( η ( k ) , s ) = η T ( k ) P ( s ) η ( k ) .
Defining P ¯ ( s ) = t = 1 n 0 π s t P ( t ) and recalling the facts of (4), one has
Δ V ( η ( k ) , s ) = E V ( η ( k + 1 ) , t ) | η ( k ) , s V ( η ( k ) , s ) = E η T ( k + 1 ) P ( t ) η ( k + 1 ) η T ( k ) P ( s ) η ( k ) = η T ( k ) A s T P ¯ ( s ) A s η ( k ) + η T ( k ) A s T P ¯ ( s ) B 1 s ϕ ( y ( k ) ) + η T ( k ) i = 1 n α i F 1 i s T P ¯ ( s ) F 1 i s η ( k ) + η T ( k ) i = 1 n α i F 1 i s T P ¯ ( s ) F 2 i s ϕ ( y ( k ) ) + ϕ T ( y ( k ) ) B 1 s T P ¯ ( s ) A s η ( k ) + ϕ T ( y ( k ) ) B 1 s T P ¯ ( s ) B 1 s ϕ ( y ( k ) ) + ϕ T ( y ( k ) ) i = 1 n α i F 2 i s T P ¯ ( s ) F 1 i s η ( k ) + ϕ T ( y ( k ) ) i = 1 n α i F 2 i s T P ¯ ( s ) F 2 i s ϕ ( y ( k ) ) η T ( k ) P ( s ) η ( k ) .
Denoting ξ ( k ) = η T ( k ) ϕ T ( y ( k ) ) T , and Combining (13), then we have
Δ V ( η ( k ) , s ) ξ T ( k ) Λ s ξ ( k )
where
Λ s = Λ 11 s Λ 21 s Λ 22 s
and
Λ 11 s = A s T P ¯ ( s ) A s + i = 1 n α i F 1 i s T P ¯ ( s ) F 1 i s P ( s ) C ˜ T K ¯ 1 T K ¯ 2 C ˜ Λ 21 s = B 1 s T P ¯ ( s ) A s + i = 1 n α i F 2 i s T P ¯ ( s ) F 1 i s + 0.5 K ¯ 1 + K ¯ 2 C ˜ Λ 22 s = i = 1 n α i F 2 i s T P ¯ ( s ) F 2 i s I .
Subsequently, using Schur complement to (23), it is obvious that matrix Λ s < 0 , thus
Δ V ( η ( k ) , s ) ξ T ( k ) Λ s ξ ( k ) min λ min ( Λ s ) | s = 1 , 2 , , n 0 ξ T ( k ) ξ ( k ) σ ξ T ( k ) ξ ( k )
where 0 < σ min λ min ( Λ s ) | s = 1 , 2 , , n 0 .
Considering continuity, one can find a constant satisfying 0 < < v , v = max λ max ( P ( s ) ) | s = 1 , 2 , , n 0 . Such that
V ( η ( k ) , s ) v ξ T ( k ) ξ ( k ) .
The formulas (31) and (32) yield that
Δ V ( η ( k ) , s ) σ v V ( η ( k ) , s ) = λ ψ V ( η ( k ) , s )
where 0 < ψ = σ v < 1 .
On the other hand,
μ η ( k ) 2 V ( η ( k ) , s ) v η ( k ) 2 μ = min λ min ( P ( s ) ) | s = 1 , 2 , , n 0 .
Taking Lemma 1 into consideration, and selecting λ = 0 , it can be derived that
E η ( k ) 2 v μ ( 1 ψ ) k E η ( 0 ) 2 .
Consequently, we can conclude from Theorem 1 that the augmented system (8) is exponentially stable in the mean square sense.
Define the following performance functions
J = E V ( k ) E i = 0 k 1 w ¯ T ( i ) w ¯ ( i ) .
Under the zero-initial condition,
J = E V ( k ) E V ( 0 ) E i = 0 k 1 w ¯ T ( i ) w ¯ ( i ) = i = 0 k 1 Δ V ( i ) w ¯ T ( i ) w ¯ ( i ) .
One can obtain immediately that
Δ V ( k ) ξ T ( k ) Λ s ξ ( k ) + 2 w ¯ T ( k ) B 2 s T P ¯ ( s ) A s η ( k ) + 2 w ¯ T ( k ) B 2 s T P ¯ ( s ) B 1 s ϕ ( y ( k ) ) + w ¯ T ( k ) B 2 s T P ¯ ( s ) B 2 s w ¯ ( k ) .
From (37) and (38), it follows that
J = i = 0 k 1 Δ V ( i ) w ¯ T ( i ) w ¯ ( i ) i = 0 k 1 ξ T ( i ) w ¯ T ( i ) Λ s Ω 21 s Ω 22 s ξ ( i ) w ¯ ( i )
where
Ω 21 s = B 2 s T P ¯ ( s ) A s B 2 s T P ¯ ( s ) B 1 s , Ω 22 s = B 2 s T P ¯ ( s ) B 2 s I
and Λ s has been defined in (29).
Applying Schur complement to (23), it guarantees J < 0 , then
E η T ( k ) P ( s ) η ( k ) < i = 0 k 1 w ¯ T ( i ) w ¯ ( i ) .
Meanwhile, by using Schur complement to (24), we obtain
M s T M s < γ 2 P ( s ) .
By noting k > 0 , it is easy to be found that
E z ˜ T ( k ) z ˜ ( k ) = η T ( k ) M s T M s η ( k ) < γ 2 η T ( k ) P ( s ) η ( k ) = γ 2 E η T ( k ) P ( s ) η ( k ) < γ 2 i = 0 k 1 w ¯ T ( i ) w ¯ ( i ) γ 2 i = 0 w ¯ T ( i ) w ¯ ( i ) .
According to (43), we have
sup k E e T ( k ) e ( k ) < γ 2 i = 0 w ¯ T ( i ) w ¯ ( i ) .
Hence,
E e ( k ) 2 < γ 2 w ¯ ( k ) 2 2 .
Consequently, the proof of Theorem 1 is completed. □

4. Distributed l 2 - l Filter Design

In this section, based on these established conditions, the design method of full- and reduced-order estimators is obtained.
Theorem 2.
For given a prescribed disturbance attenuation level γ > 0 . System (8) is exponentially mean-square stable with energy-to-peak performance constraint, if there exist matrices P 2 ( s ) , V 1 s , V 2 s = d i a g n S i s , V 3 s , L ¯ f s = d i a g n L i s , P 1 ( s ) > 0 , P 3 ( s ) > 0 , and two families of matrices W ¯ f s , H ¯ f s satisfying the constraints
W ¯ f s W n x × n x , H ¯ f s W n x × n y , s = 1 , 2 , , n 0
and the following set of LMIs
Θ 11 s Θ 21 s Θ 22 s Θ 31 s 0 I 0 0 0 I 0 0 0 0 I Θ 61 s Θ 62 s Θ 63 s Θ 64 s Θ 65 s Θ 66 s Θ 71 s Θ 72 s Θ 73 s Θ 74 s Θ 75 s Θ 76 s Θ 77 s Θ 81 s 0 Θ 83 s 0 0 0 0 Θ 88 s < 0
P 1 ( s ) P 2 ( s ) P 3 ( s ) M ¯ L ¯ s γ 2 I < 0
where
Θ 11 s = P 1 ( s ) C ¯ T K ¯ 1 T K ¯ 2 C ¯ , Θ 21 s = P 2 ( s ) , Θ 22 s = P 3 ( s ) , Θ 31 s = 0.5 K ¯ 1 + K ¯ 2 C ¯ , Θ 61 s = V 1 s T A ¯ + E H ¯ f s C ¯ 1 β , Θ 62 s = E W ¯ f s , Θ 63 s = E H ¯ f s β ¯ , Θ 64 s = V 1 s T B ¯ , Θ 65 s = E H ¯ f s D ¯ , Θ 66 s = P ¯ 1 ( s ) V 1 s V 1 s T , Θ 71 s = V 3 s T A ¯ + H ¯ f s C ¯ 1 β , Θ 72 s = W ¯ f s , Θ 73 s = H ¯ f s β ¯ , Θ 74 s = V 3 s T B ¯ , Θ 75 s = H ¯ f s D ¯ , Θ 76 s = P ¯ 2 ( s ) V 3 s T V 2 s T E T , Θ 77 s = P ¯ 3 ( s ) V 2 s V 2 s T , Θ 81 s = v e c n α i E H ¯ f s C ¯ n i α i H ¯ f s C ¯ n i , Θ 83 s = v e c n α i E H ¯ f s E ¯ n i α i H ¯ f s E ¯ n i , Θ 88 s = d i a g n P ¯ 1 ( s ) V 1 s V 1 s T P ¯ 2 ( s ) V 3 s T V 2 s T E T P ¯ 3 ( s ) V 2 s V 2 s T .
The filter parameters can be expressed as follows:
W ¯ s = V 2 s T 1 W ¯ f s , H ¯ s = V 2 s T 1 H ¯ f s , L ¯ s = L ¯ f s .
Proof of Theorem 2.
By choosing
G s = V 1 s V 3 s Q s 1 F s Q s E T F s
where
E = I n l n l 0 n ( m l ) n l , V 1 s R n m n m , V 3 s R n m n l , Q s R n l n l , F s R n l n l .
In light of Lemma 2, it can be derived that
Φ 11 s Φ 21 s I 0 0 I Φ 41 s Φ 42 s Φ 43 s Φ 44 s Φ 51 s Φ 52 s 0 0 Φ 55 s < 0
where
Φ 11 s = P ( s ) C ˜ T K ¯ 1 T K ¯ 2 C ˜ , Φ 21 s = 0.5 K ¯ 1 + K ¯ 2 C ˜ , Φ 41 s = G s T A s , Φ 42 s = G s T B 1 s , Φ 43 s = G s T B 2 s , Φ 44 s = P ¯ ( s ) G s G s T , Φ 51 s = v e c n α i G T ( s ) F 1 i s , Φ 52 s = v e c n α i G T ( s ) F 2 i s , Φ 55 s = d i a g n P ¯ ( s ) G s G s T .
Denote
V 2 s = Q s T F s 1 Q s , J s = I 0 0 F s 1 Q s , J s T P ( s ) J s = P 1 ( s ) P 2 T ( s ) P 2 ( s ) P 3 ( s ) , J s T P ¯ ( s ) J s = P ¯ 1 ( s ) P ¯ 2 T ( s ) P ¯ 2 ( s ) P ¯ 3 ( s ) .
Pre- and post-multiplying (24) and (53) by T 1 s = d i a g J s , I , I , J s , J s and T 2 s = d i a g J s , I , respectively. Further define W ¯ f s = Q s T W ¯ s F s 1 Q s , H ¯ f s = Q s T H ¯ s , L ¯ f s = L ¯ s F s 1 Q s , V 2 s = Q s T F s 1 Q s , then the inequality (47) and (48) can be obtained readily.
Now, denoting the filter transfer function from y ˜ ( k ) to x ^ ( k ) by
T z F y ( z ) = L ¯ s z I W ¯ s 1 H ¯ s .
Considering
W ¯ s = Q s T 1 W ¯ f s Q s 1 F s , H ¯ s = Q s T 1 H ¯ f s , L ¯ s = L ¯ f s Q s 1 F s
we have
T z F y ( z ) = L ¯ f s Q s 1 F s z I Q s T 1 W ¯ f s Q s 1 F s 1 Q s T 1 H ¯ f s = L ¯ f s z Q s 1 F s Q s T 1 W ¯ f s 1 Q s T 1 H ¯ f s = L ¯ f s z I Q s 1 F s Q s T 1 W ¯ f s 1 Q s 1 F s Q s T 1 H ¯ f s = L ¯ f s z I V 2 s 1 W ¯ f s 1 V 2 s 1 H ¯ f s .
Then, the distributed full- and reduced-order filter parameters are given by
W ¯ s = V 2 s 1 W ¯ f s , H ¯ s = V 2 s 1 H ¯ f s , L ¯ s = L ¯ f s .
Moreover, it follows from Lemma 3 that W ¯ s W n x × n x , H ¯ s W n x × n y . The proof of Theorem 2 is now complete. □
Remark 2.
Eliminating the coupling term between Lyapunov matrix P ( s ) and system matrices by introducing additional slack variables G s . Then, it is found that (23) and (53) are equivalent, which helps us to easily obtain the filter (5).
Remark 3.
The order of the filter is controlled by the column dimension nl of matrix E (Where n, m, l represent the number of filter nodes, the order of full- and reduced-order filter, respectively). If the column dimension number nl = nm of matrix E, that is, matrix E is a unit matrix. Then the order of each local filter node is m, which means that it is a full order filter. Similarly, if 1 n l < n m , we will get the l-order filter, which is the reduced-order filter.
Remark 4.
In Theorem 2, the design approach of distributed l-order filters with non-Gauss interference input and deception attak is given. Then, the problem can be transformed into a feasible solution of linear matrix inequality (46)–(48), which is solved by the following convex optimization problem, where δ = γ 2
min P 1 ( s ) , P 2 ( s ) , P 3 ( s ) , V 1 s , V 2 s , V 3 s , W ¯ f s , H ¯ f s , L ¯ f s s . t . ( 46 ) ( 48 ) δ .
In the next section, we will validate the design scheme of distributed state estimator by a numerical simulation example.

5. Simulation Example

In order to illustrate the effectiveness of the proposed distributed filtering design approach in this paper, consider discrete-time system (1) with the following parameters:
x ( k + 1 ) = 0 0.3 0.5 0.6 x ( k ) + 0 1 w ( k ) z ( k ) = 0.4 0.1 x ( k ) .
Consider a distributed filtering network with 4 sensor nodes with the following corresponding parameters:
C 1 = 0.1 0.5 , C 2 = 0.1 0.2 , C 3 = 0.5 0.5 , C 4 = 0.1 0.4 , D 1 = 0.11 , D 2 = 0.15 , D 3 = 0.14 , D 4 = 0.21 , K 1 = 0.1 , K 2 = 1 , v i ( k ) = N 0 , 1 k 2 , w ( k ) = e 0.2 k sin ( k ) , ϕ i ( y i ( k ) ) = sin ( 0.7 C i x ( k ) ) , i = 1 , 2 , 3 , 4 .
The probability of deception attacks are taken as:
β 1 = E θ 1 ( k ) = 0.1 , β 2 = E θ 2 ( k ) = 0.2 , β 3 = E θ 3 ( k ) = 0.4 , β 4 = E θ 4 ( k ) = 0.1 .
The filtering network communication topology shown in Figure 2 is represented by three directed graphs G = V , E , A with the set of nodes V = 1 , 2 , 3 , 4 , the set of edges E r ( 1 ) = ( 1 , 1 ) , ( 1 , 4 ) , ( 2 , 2 ) , ( 2 , 3 ) , ( 3 , 1 ) , ( 3 , 3 ) , ( 4 , 2 ) , ( 4 , 4 ) ,   E r ( 2 ) = ( 1 , 1 ) , ( 1 , 3 ) , ( 2 , 2 ) , ( 2 , 4 ) , ( 3 , 3 ) , ( 4 , 3 ) , ( 4 , 4 ) , E r ( 3 ) = ( 1 , 1 ) , ( 1 , 2 ) , ( 1 , 4 ) , ( 2 , 1 ) , ( 2 , 2 ) , ( 2 , 3 ) , ( 3 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) . Let the initial topology of the filtering network be r 0 = 1 , and the filter initial states x ^ i ( 0 ) are all set to be zeros.
Consider the following probability transmission matrix of Markov chain:
Π = 0.6 0.2 0.2 0.2 0.7 0.1 0.1 0.1 0.8 .
In order to obtain full-order filters, we choose order control parameter
E = 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 .
By solving the LMIs in Theorem 2, we solve the switching topology-dependent optimal problem (60) subject to (46)–(48), and obtain the optimal l 2 - l disturbance rejection attenuation level γ = 0.2450 .
Then, we consider a reduced-order case where the order control parameter
E = 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 .
Keep other parameters the same as the full-order filtering. Simultaneously, we obtain γ = 0.4731 of reduced-order filter.
From Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7, the corresponding simulation results between the full- and reduced-order filtering can be obtained. The evolution of the Markov chain is depicted in Figure 3. The attack instants of each communication channel is shown in Figure 4, where θ i ( k ) = 1 means that the local sensor node is under malicious attacks and the communication channel is injected with false information. Correspondingly, the sensor node works normally at θ i ( k ) = 0 .
Figure 5 shows the dynamics of the filtering error norm of full- and reduced-order estimators, where e ( k ) = i = 1 4 e ( i ) , respectively. This confirms that the designed distributed full-order and distributed reduced-order filtering are both feasible and effective. Figure 6 and Figure 7 describe in detail the evolution of z(k) and its estimation from full- and reduced-filter for each sensor node 1, 2, 3 and 4, respectively. It can be easily seen that the filter estimation error is relatively large at the beginning, and then the accuracy of the estimation is gradually improved. By comparing Figure 5, Figure 6 and Figure 7, we can observe that (i) The overall estimation error of the distributed reduced-order filter slightly higher than that of the distributed full-order filter (ii) Malicious attacks do cause filter performance degradation, whether it is a full or reduced-order filter. Specifically, although the full-order filter performs better than the reduced-order filter, the distributed reduced-order filter is easier to apply to engineering.
It should be noted that, for the problem solved in this paper, (i) External interference in sensor networks does not require known statistical properties, and (ii) The order of the distributed filter is controlled by a parameter, and distributed full-order and distributed reduced-order filters can be obtained for each node of the sensor networks, respectively. Unfortunately, the first factor prevents existing methods (Kalman filtering, extended Kalman filtering, see [11,14,19,39]) from being applied to distributed state estimation problems for sensor networked systems with unknown interference. On the other hand, the second factor is ignored by many existing H methods, see [16,38,42,43], which often focus on designing distributed full-order filters over WSNs.

6. Conclusions and Future Work

In this paper, the problem of l-order distributed l 2 - l state estimation problem for a class of discrete time-invariant systems has been investigated. Through an adjustable parameter E, a distributed full-order filter and a distributed reduced-order filter can be obtained respectively. During the design of the filter, the random deception attacks, time-varying communication topology, stochastic noises are simultaneously considered to reflect more practical dynamic behavior of WSNs. By utilizing the Markovian switched Lyapunov functional method and the LMI technique, sufficient conditions on the designed distributed estimator have been obtained to ensure the prescribed energy-to-peak performance with given filter parameters. The filtering parameters can be determined and characterized with the explicit expressions by solving some LMIs. Finally, the validity of the design approach was verified by numerical simulation. In the future, we will concentrate on how to extend the achieved approachs to deal with filtering problems over WSNs with time-varying switching topologies under different communication protocols, such as round-robin protocol, stochastic communication protocol and weighted try-once-discard protocol, would be of interest.

Author Contributions

F.Z., X.L., J.W., L.X., and L.P. conceived and worked together to achieve this work; F.Z., J.W., L.X. and L.P. discussed the method and the derivation process of the theory analysis; F.Z. and L.P. compiled the simulation program by Matlab and analyzed the results; F.Z. and X.L. wrote the original draft. Finally, All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key R&D Program of China under Grant 2018YFD0400902, the National Natural Science Foundation of China under Grant 61873112, the Education Ministry and China Mobile Science Research Foundation under Grant MCM20170204, the Jiangsu Planned Projects for Postdoctoral Research Funds under Grant 1601085C, the Jiangsu Key Construction Laboratory of IoT Application Technology under Grant 190449 and 190450, and the Postgraduate Research & Practice Innovation Program of Jiangnan University under Grant JNKY19_043.

Acknowledgments

The authors thank the anonymous reviewers for their careful reading and constructive comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Stergiou, C.; Psannis, K.E.; Plageras, A.P.; Ishibashi, Y.; Kim, B.-G. Algorithms for efficient digital media transmission over IoT and cloud networking. J. Multimed. Inf. Syst. 2018, 5, 27–34. [Google Scholar]
  2. Stergiou, C.; Psannis, K.E. Recent advances delivered by mobile cloud computing and Internet of Things for big data applications: A survey. Int. J. Netw. Manag. 2017, 27, e1930. [Google Scholar] [CrossRef]
  3. De Bruin, T.; Verbert, K.; Babuska, R. Railway Track Circuit Fault Diagnosis Using Recurrent Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2017, 28, 523–533. [Google Scholar] [CrossRef]
  4. Bai, X.; Wang, Z.; Sheng, L.; Wang, Z. Reliable Data Fusion of Hierarchical Wireless Sensor Networks With Asynchronous Measurement for Greenhouse Monitoring. IEEE Trans. Control Syst. Technol. 2019, 27, 1036–1046. [Google Scholar] [CrossRef]
  5. Fortino, G.; Giannantonio, R.; Gravina, R.; Kuryloski, P.; Jafari, R. Enabling effective programming and flexible management of efficient body sensor network applications. IEEE Trans. Hum.-Mach. Syst. 2013, 43, 115–133. [Google Scholar] [CrossRef]
  6. León, R.A.; Vittal, V.; Manimaran, G. Application of sensor network for secure electric energy infrastructure. IEEE Trans. Power Deliv. 2007, 22, 1021–1028. [Google Scholar]
  7. Park, P.; Di Marco, P.; Johansson, K.H. Cross-Layer Optimization for Industrial Control Applications Using Wireless Sensor and Actuator Mesh Networks. IEEE Trans. Ind. Electron. 2017, 64, 3250–3259. [Google Scholar] [CrossRef]
  8. Stanković, M.S.; Johansson, K.H.; Stipanović, D.M. Distributed seeking of nash equilibria with applications to mobile sensor networks. IEEE Trans. Autom. Control 2012, 57, 904–919. [Google Scholar] [CrossRef]
  9. Ruiz-Garcia, L.; Lunadei, L.; Barreiro, P.; Robla, J.I. A review of wireless sensor technologies and applications in agriculture and food industry: State of the art and current trends. Sensors 2009, 9, 4728–4750. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Jiang, W.; Yin, Z.; Liu, R.; Li, Z.; Kim, S.M.; He, T. Boosting the Bitrate of Cross-Technology Communication on Commodity IoT Devices. IEEE/ACM Trans. Netw. 2019, 27, 1069–1083. [Google Scholar] [CrossRef]
  11. Das, S.; Moura, J.M.F. Consensus + Innovations Distributed Kalman Filter with Optimized Gains. IEEE Trans. Signal Process. 2017, 65, 467–481. [Google Scholar] [CrossRef] [Green Version]
  12. Yang, W.; Liu, M.; Shi, P. H filtering for nonlinear stochastic systems with sensor saturation, quantization and random packet losses. Signal Process. 2012, 92, 1387–1396. [Google Scholar] [CrossRef]
  13. Song, Y.; Wei, G.; Yang, G. Distributed H filtering for a class of sensor networks with uncertain rates of packet losses. Signal Process. 2014, 104, 143–151. [Google Scholar] [CrossRef]
  14. Liu, Q.; Wang, Z.; He, X.; Zhou, D.H. On kalman-consensus filtering with random link failures over sensor networks. IEEE Trans. Autom. Control 2018, 63, 2701–2708. [Google Scholar] [CrossRef]
  15. Ma, L.; Wang, Z.; Liu, Y.; Alsaadi, F.E. Distributed filtering for nonlinear time-delay systems over sensor networks subject to multiplicative link noises and switching topology. Int. J. Robust Nonlinear Control. 2019, 29, 2941–2959. [Google Scholar] [CrossRef]
  16. Shen, B.; Wang, Z.; Hung, Y.S. Distributed H-consensus filtering in sensor networks with multiple missing measurements: The finite-horizon case. Automatica 2010, 46, 1682–1688. [Google Scholar] [CrossRef] [Green Version]
  17. Xu, Y.; Lu, R.; Shi, P.; Li, H.; Xie, S. Finite-time distributed state estimation over sensor networks with round-robin protocol and fading channels. IEEE Trans. Cybern. 2018, 48, 336–345. [Google Scholar] [CrossRef] [PubMed]
  18. Duan, R.; Li, J. Distributed H filter design for T-S fuzzy systems with Sigma-Delta quantisation via non-PDC scheme. Int. J. Syst. Sci. 2019, 50, 694–712. [Google Scholar] [CrossRef]
  19. Tnunay, H.; Li, Z.; Ding, Z. Distributed nonlinear Kalman filter with communication protocol. Inf. Sci. (Ny) 2020, 513, 270–288. [Google Scholar] [CrossRef]
  20. Chen, Y.; Wang, Z.; Yuan, Y.; Date, P. Distributed H Filtering for Switched Stochastic Delayed Systems over Sensor Networks with Fading Measurements. IEEE Trans. Cybern. 2020, 50, 2–14. [Google Scholar] [CrossRef]
  21. Wang, D.; Wang, Z.; Shen, B.; Alsaadi, F.E. Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks. Int. J. Robust Nonlinear Control 2017, 27, 1194–1208. [Google Scholar] [CrossRef] [Green Version]
  22. Li, Y.; Wu, Q.E.; Peng, L. Simultaneous event-triggered fault detection and estimation for stochastic systems subject to deception attacks. Sensors 2018, 18, 321. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  23. Li, Y.; Shi, L.; Cheng, P.; Chen, J.; Quevedo, D.E. Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach. IEEE Trans. Autom. Control 2015, 60, 2831–2836. [Google Scholar] [CrossRef]
  24. Li, T.; Zhang, J. Consensus Conditions of Multi-Agent Systems With Time-Varying Topologies and Stochastic Communication Noises. IEEE Trans. Autom. Control 2010, 55, 2043–2057. [Google Scholar] [CrossRef]
  25. Lin, P.; Jia, Y. Consensus of second-order discrete-time multi-agent systems with nonuniform time-delays and dynamically changing topologies. Automatica 2009, 45, 2154–2158. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Tian, Y.P. Consentability and protocol design of multi-agent systems with stochastic switching topology. Automatica 2009, 45, 1195–1201. [Google Scholar] [CrossRef]
  27. Miao, G.; Xu, S.; Zou, Y. Necessary and sufficient conditions for mean square consensus under Markov switching topologies. Int. J. Syst. Sci. 2013, 44, 178–186. [Google Scholar] [CrossRef]
  28. Dong, H.; Wang, Z.; Gao, H. Distributed H filtering for a class of markovian jump nonlinear time-delay systems over lossy sensor networks. IEEE Trans. Ind. Electron. 2013, 60, 4665–4672. [Google Scholar] [CrossRef]
  29. Hu, J.; Wang, Z.; Liang, J.; Dong, H. Event-triggered distributed state estimation with randomly occurring uncertainties and nonlinearities over sensor networks: A delay-fractioning approach. J. Frankl. Inst. 2015, 352, 3750–3763. [Google Scholar] [CrossRef] [Green Version]
  30. Ding, D.; Wang, Z.; Shen, B.; Dong, H. Event-triggered distributed H state estimation with packet dropouts through sensor networks. IET Control Theory Appl. 2015, 9, 1948–1955. [Google Scholar] [CrossRef] [Green Version]
  31. Dong, H.; Wang, Z.; Lam, J.; Gao, H. Distributed filtering in sensor networks with randomly occurring saturations and successive packet dropouts. Int. J. Robust Nonlinear Control 2014, 24, 1743–1759. [Google Scholar] [CrossRef]
  32. Shen, B.; Wang, Z.; Liu, X. A stochastic sampled-data approach to distributed H Filtering in sensor networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2011, 58, 2237–2246. [Google Scholar] [CrossRef]
  33. Liang, J.; Wang, Z.; Liu, X. Distributed state estimation for discrete-time sensor networks with randomly varying nonlinearities and missing measurements. IEEE Trans. Neural Netw. 2011, 22, 486–496. [Google Scholar] [CrossRef] [Green Version]
  34. Pajic, M.; Lee, I.; Pappas, G.J. Attack-resilient state estimation for noisy dynamical systems. IEEE Trans. Control Netw. Syst. 2017, 4, 82–92. [Google Scholar] [CrossRef]
  35. Shoukry, Y.; Tabuada, P. Event-triggered state observers for sparse sensor noise/attacks. IEEE Trans. Autom. Control 2016, 61, 2079–2091. [Google Scholar] [CrossRef] [Green Version]
  36. Mo, Y.; Sinopoli, B. On the Performance Degradation of Cyber-Physical Systems under Stealthy Integrity Attacks. IEEE Trans. Autom. Control 2016, 61, 2618–2624. [Google Scholar] [CrossRef]
  37. Yang, W.; Lei, L.; Yang, C. Event-based distributed state estimation under deception attack. Neurocomputing 2017, 270, 145–151. [Google Scholar] [CrossRef]
  38. Bu, X.; Dong, H.; Han, F.; Li, G. Event-triggered distributed filtering over sensor networks with deception attacks and partial measurements. Int. J. Gen. Syst. 2018, 47, 395–407. [Google Scholar] [CrossRef]
  39. Liang, C.; Wen, F.; Wang, Z. Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks. Inf. Fusion 2019, 46, 44–50. [Google Scholar] [CrossRef] [Green Version]
  40. Ugrinovskii, V. Distributed robust estimation over randomly switching networks using H consensus. Automatica 2013, 49, 160–168. [Google Scholar] [CrossRef] [Green Version]
  41. Yan, H.; Yang, Q.; Zhang, H.; Yang, F.; Zhan, X. Distributed H State Estimation for a Class of Filtering Networks with Time-Varying Switching Topologies and Packet Losses. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 2047–2057. [Google Scholar] [CrossRef]
  42. Yang, F.; Han, Q.L.; Liu, Y. Distributed H State Estimation over a Filtering Network with Time-Varying and Switching Topology and Partial Information Exchange. IEEE Trans. Cybern. 2019, 49, 870–882. [Google Scholar] [CrossRef] [PubMed]
  43. Liu, B.; Zhang, X.M.; Han, Q.L. Event-triggered distributed H filtering for networked systems with switching topologies. In Proceedings of the IEEE 13th International Conference on Industrial Informatics, Cambridge, UK, 22–24 July 2015; pp. 162–167. [Google Scholar]
  44. Ji, H.; Zhang, H.; Cui, B. Event-triggered H filtering control for a class of distributed parameter systems with Markovian switching topology. J. Frankl. Inst. 2018, 355, 5928–5956. [Google Scholar] [CrossRef]
  45. Song, W.; Zhang, H.; Yan, H.; Peng, C. Distributed event triggered H filtering with nonhomogeneous Markov switching topologies. In Proceedings of the 2016 UKACC International Conference on Control, Belfast, UK, 31 August–2 September 2016; pp. 1–6. [Google Scholar]
  46. Qu, H.; Yang, F. Distributed H-consensus filtering for target state tracking over a wireless filter network with switching topology, channel fading and packet dropouts. Neurocomputing 2019, in press. [Google Scholar] [CrossRef]
  47. Li, H.; Gao, H.; Shi, P.; Zhao, X. Fault-tolerant control of Markovian jump stochastic systems via the augmented sliding mode observer approach. Automatica 2014, 50, 1825–1834. [Google Scholar] [CrossRef]
  48. Yan, H.; Zhang, H.; Yang, F.; Zhan, X.; Peng, C. Event-triggered asynchronous guaranteed cost control for markov jump discrete-time neural networks with distributed delay and channel fading. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 3588–3598. [Google Scholar]
  49. Li, H.; Shi, P.; Yao, D.; Wu, L. Observer-based adaptive sliding mode control for nonlinear Markovian jump systems. Automatica 2016, 64, 133–142. [Google Scholar] [CrossRef]
  50. Zhang, L.; Zhu, Y.; Shi, P.; Zhao, Y. Resilient asynchronous H filtering for markov jump neural networks with unideal measurements and multiplicative noises. IEEE Trans. Cybern. 2015, 45, 2840–2852. [Google Scholar] [CrossRef]
  51. Xu, Y.; Lu, R.; Shi, P.; Tao, J.; Xie, S. Robust Estimation for Neural Networks with Randomly Occurring Distributed Delays and Markovian Jump Coupling. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 845–855. [Google Scholar] [CrossRef]
  52. Yang, F.; Wang, Z.; Hung, Y.S.; Gani, M. H control for networked control systems with random communication delays. IEEE Trans. Autom. Control 2006, 51, 511–518. [Google Scholar] [CrossRef] [Green Version]
  53. De Oliveira, M.C.; Bernussou, J.; Geromel, J.C. A new discrete-time robust stability condition. Syst. Control Lett. 1999, 37, 261–265. [Google Scholar] [CrossRef]
Figure 1. Distributed filtering network with deception attacks.
Figure 1. Distributed filtering network with deception attacks.
Sensors 20 01948 g001
Figure 2. Filtering network topology.
Figure 2. Filtering network topology.
Sensors 20 01948 g002
Figure 3. Evolution of r ( k ) .
Figure 3. Evolution of r ( k ) .
Sensors 20 01948 g003
Figure 4. Evolution of attack variable θ i ( k ) , i = 1 , 2 , 3 , 4 .
Figure 4. Evolution of attack variable θ i ( k ) , i = 1 , 2 , 3 , 4 .
Sensors 20 01948 g004
Figure 5. Evolution of full- and reduced-order filtering e ( k ) .
Figure 5. Evolution of full- and reduced-order filtering e ( k ) .
Sensors 20 01948 g005
Figure 6. Evolution of full-order filtering z ^ i ( k ) , i = 1 , 2 , 3 , 4 .
Figure 6. Evolution of full-order filtering z ^ i ( k ) , i = 1 , 2 , 3 , 4 .
Sensors 20 01948 g006
Figure 7. Evolution of reduced-order filtering z ^ i ( k ) , i = 1 , 2 , 3 , 4 .
Figure 7. Evolution of reduced-order filtering z ^ i ( k ) , i = 1 , 2 , 3 , 4 .
Sensors 20 01948 g007

Share and Cite

MDPI and ACS Style

Zhu, F.; Liu, X.; Wen, J.; Xie, L.; Peng, L. Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks. Sensors 2020, 20, 1948. https://0-doi-org.brum.beds.ac.uk/10.3390/s20071948

AMA Style

Zhu F, Liu X, Wen J, Xie L, Peng L. Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks. Sensors. 2020; 20(7):1948. https://0-doi-org.brum.beds.ac.uk/10.3390/s20071948

Chicago/Turabian Style

Zhu, Fengzeng, Xu Liu, Jiwei Wen, Linbo Xie, and Li Peng. 2020. "Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks" Sensors 20, no. 7: 1948. https://0-doi-org.brum.beds.ac.uk/10.3390/s20071948

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop