Next Article in Journal
Towards Knowledge-Based Tourism Chinese Question Answering System
Previous Article in Journal
A Time-Delayed Deterministic Model for the Spread of COVID-19 with Calibration on a Real Dataset
Previous Article in Special Issue
Study of a Modified Kumaraswamy Distribution
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks

by
María Jesús García-Ligero
*,†,
Aurora Hermoso-Carazo
and
Josefa Linares-Pérez
Departamento de Estadística e I. O., Universidad de Granada, Avda Fuentenueva s/n, 18071 Granada, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Submission received: 28 December 2021 / Revised: 8 February 2022 / Accepted: 17 February 2022 / Published: 20 February 2022
(This article belongs to the Special Issue Analysis and Comparison of Probabilistic Models)

Abstract

:
This paper focuses on the distributed fusion estimation problem in which a signal transmitted over wireless sensor networks is subject to deception attacks and random delays. We assume that each sensor can suffer attacks that may corrupt and/or modify the output measurements. In addition, communication failures between sensors and their local processors can delay the receipt of processed measurements. The randomness of attacks and transmission delays is modelled by different Bernoulli random variables with known probabilities of success. According to these characteristics of the sensor networks and assuming that the measurement noises are cross-correlated at the same time step between sensors and are also correlated with the signal at the same and subsequent time steps, we derive a fusion estimation algorithm, including prediction and filtering, using the distributed fusion method. First, for each sensor, the local least-squares linear prediction and filtering algorithm are derived, using a covariance-based approach. Then, the distributed fusion predictor and the corresponding filter are obtained as the matrix-weighted linear combination of corresponding local estimators, checking that the mean squared error is minimised. A simulation example is then given to illustrate the effectiveness of the proposed algorithms.

1. Introduction

Wireless sensor networks (WSNs) are a growing focus of research, with applications in a wide variety of fields including industrial processes, signal processing, communications and navigation systems. In general, each WSN is composed of a large number of sensors that can be interconnected by wireless channels and also linked to the processing centre. While they are widely used, the structure of WSNs makes them vulnerable to external attacks and/or unreliability in data transmission. In this context, a topic that has attracted considerable attention is that of signal fusion estimation. This problem can be addressed by centralised or distributed fusion methods. Both are commonly used to tackle the question of fusion estimation; however, the distributed method is usually more suitable, since the structure of the sensors means that less online communication is required, because each local estimator is obtained using only its corresponding local data, and therefore manufacturing costs are reduced. Consequently, this method usually has stronger fault tolerance and lower calculation burdens than the centralised approach. Accordingly, the distributed fusion estimation problem has been of particular interest to researchers, and a large number of distributed fusion estimation algorithms have been developed, using different techniques, in the context of WSNs (see [1,2,3,4,5,6,7] and references therein).
As commented above, the characteristics of WSNs make them vulnerable to external attacks and hence less reliable. In general, three kinds of attack have been considered (classified according to the attack mechanisms and mathematical models involved): Denial-of-service (DoS) attacks, replay attacks and deception attacks. A DoS attack deteriorates system performance by temporarily or indefinitely interrupting the service, preventing information from reaching the destination. In a replay attack, the information is intercepted, captured and forwarded elsewhere, thus altering the system’s behaviour. Deception attacks tamper with the original signal measures by accessing the sensors and introducing false information. A problem of significant interest in WSNs subject to cyber-attacks is that of the distributed fusion estimation of the signal. This problem can be addressed in various ways, depending on the type of attack considered. Chen et al. [8] designed a distributed resilient filter for power systems exposed to DoS attacks and gain perturbations. Similarly, the distributed robust fusion estimation problem for systems under DoS attacks and uncertain covariances was studied by [9]. For replay attacks, [10] designed a recursive distributed Kalman fusion estimator focused on the linear minimum variance, for bandwidth-constrained cyber-physical systems. Finally, deception attacks are generally considered the most dangerous and complex types of aggression; for this reason, the scientific community is highly active in researching estimation problems for WSNs subject to this kind of attack. For instance, [11] developed a novel filter for a class of discrete time-delayed stochastic systems subject to the effects of both uniform quantisation and deception attacks. In this field, too, [12] considered a class of time-varying systems subject to multiplicative noises and deception attacks, with unknown but bounded disturbances, and designed an appropriate variance-constrained distributed filter. [13] derived a distributed H -consensus filter for a class of discrete time-varying systems subject to both multiplicative noises and deception attacks. In a related approach, assuming clustering sensor networks subject to random deception attacks, [14] considered distributed fusion filtering and fixed-point smoothing problems.
Another significant problem in WSNs is the limitation of network communication bandwidth, which can produce network congestion and hence delay reception of the measures at the processing centre, thus impairing the performance of the estimator. Accordingly, new algorithms must be developed to take these effects into account in distributed fusion estimation. In studies of one-step random delays modelled by Bernoulli random variables, various types of distributed fusion estimation algorithms have been proposed, assuming either that these variables are independent (see for example, [15,16,17,18]) or that they are correlated at consecutive sampling times [19,20]. In addition, various distributed fusion estimation algorithms describing random delays by Markov chains have been derived (see, for example, [21,22,23]).
Many early studies of the estimation problem in multi-sensor systems assumed that the system noises were white and uncorrelated. However, in practice, this assumption is not always realistic; for example, when all sensors observe a common target within a noisy environment, there may be cross-correlations between the different sensor noises. Cross-correlation between process and measurement noises can also arise, for example, when in a target tracking system both noises are dependent of the state of the system. In this respect, Li et al. [24] showed that if a discrete-time linear system is obtained from the discretisation of a continuous-time system, then the measurement noise is correlated with the system noise of the previous time step. These common situations in multi-sensor systems have led researchers to address the fusion estimation problem under the assumption of correlated noises. Thus, assuming that the measurement noises from different sensors are both cross-correlated and correlated with the system noise at the previous time step, Yan et al. [25] derived the optimal state estimator, in a sequential form and by means of distributed fusion. Similarly, ref. [26] developed globally optimal sequential and distributed fusion estimation algorithms assuming linear minimum variance. The distributed estimation problem has also been addressed when the noises between sensors are not correlated at the same instant, but the process and measurement noises are two-step cross-correlated; under this assumption, distributed filtering algorithms have been obtained assuming that the system is subject to stochastic uncertainties or multiplicative noises [27] and in systems with random matrices over a sensor network with a given topology [28].
Motivated by the above analysis, our aim in this paper is to address the distributed fusion estimation problem in WSNs subjected to the three situations described above, as often encountered in real life: Deception attacks, one-step random transmission delays and measurement noises cross-correlated between sensors and correlated with the signal. To the best of our knowledge, this problem has not been considered previously, although some papers have discussed deception attacks and delays or correlated noises. Specifically, for a single sensor, the estimation problem is studied assuming deception attacks and random communication delays in [29,30], and in a multi-sensor environment, ref. [31] investigated the distributed filtering problem in WSNs receiving deception attacks and when sensor additive noises are both cross-correlated and correlated with the process noise.
In this paper, we assume that each sensor of the WSN can suffer random attacks that modify the output measurements. The randomness of these attacks is modelled by independent random Bernoulli variables reflecting whether or not the attack succeeded in modifying the measure. Furthermore, the measurement noises from different sensors are cross-correlated at the same time step and are also correlated with the signal process at the same and subsequent time steps. Due to possible imperfections in communication channels, the processed measurements can be one-step delayed with different delay rates. Transmission delays, which occur randomly, are described by different random Bernoulli variables describing whether the processed measurements arrive on time, or are delayed by one sampling time. In this context, assuming that no signal evolution equation is available, a distributed fusion prediction and filtering algorithm is derived using the first and second-order moments of the signal and the processes involved in the observations. The design of the proposed distributed prediction and filtering estimators is structured in two stages. In the first, an innovation approach is used to obtain the local least-squares (LS) linear prediction and the filtering estimators. In the second stage, the information provided by the local estimators is combined to derive the fusion estimators; specifically, the distributed fusion predictor and filter are obtained as a matrix-weighted linear combination of the local LS linear estimators, using the mean squared error as the optimality criterion.
The rest of this paper is organised as follows. In the next section, we describe the model proposed and specify the assumptions under which the distributed fusion estimation problem is addressed. The distributed fusion prediction and filtering algorithm and the associated error covariance matrices, which provide a measure of the estimator performance, are then derived in Section 3. In order to illustrate the feasibility of the proposed distributed fusion estimators, a simulation example is given in Section 4. Finally, the main conclusions drawn are summarised in Section 5.
Notation. 
The notations used in this paper are standard. R n and R n × m denote the n-dimensional Euclidean space and the set of all n × m matrices, respectively. If the dimensions of vectors or matrices are not explicitly stated, they are assumed to be compatible with algebraic operations. The shorthand ( A 1 | | A m ) stands for a matrix partitioned into submatrices A i , i = 1 , , m . The Kronecker delta function is denoted as δ k , s . Finally, L ( i ) = L ( i i ) is written for any function L ( i j ) depending on sensors i and j; similarly, for any function G k , s , depending on the time instants k and s, we simply write G k when k = s .

2. Problem Formulation

This paper considers the linear estimation problem of a discrete-time signal over WSNs subject to deception attacks, random delays and correlated noises. More specifically, the problem is to estimate a signal from the sensor measurements z k ( i ) , i = 1 , , m , which are described by Equation (1). We assume that deception attacks are launched by potential adversaries, inserting false information that may perturb the real measurements. Assuming that the attacks may randomly succeed or not, the sensor-measured outputs subject to these attacks, z ˘ k ( i ) , are modeled by (2). It is also assumed that each sensor transmits its outputs to a local processor over a packet-erasure channel, where one-step random delays can occur during transmission; the measures received by the local processors, y k ( i ) , are given by (5). The linear estimation problem is addressed using the distributed fusion method, by which each local processor produces LS linear predictors and filters, x ^ k / s ( i ) , s = k 1 , k , of the signal, x k , based on the measures received from the corresponding sensor, y 1 ( i ) , , y s ( i ) ; afterwards, these estimators are transmitted, over perfect connections, to the fusion center, where new prediction and filtering estimators, x ^ k / s , s = k 1 , k , are obtained as matrix-weighted linear combination of the local estimators using the mean squared error as the optimality criterion (see Figure 1).

2.1. Multisensor Measurement

Consider a networked system consisting of m sensors which measure a n x -dimensional discrete-time signal x k according the following model:
z k ( i ) = H k ( i ) x k + v k ( i ) , k 1 , i = 1 , m ,
where z k ( i ) R n z , H k ( i ) R n z × n x are known matrices and v k ( i ) are the measurement noises.
The following assumptions on the measurement model (1) are required:
Assumption 1.
The n x -dimensional signal x k , k 1 is a second-order process with zero mean and autocovariance function expressed in a separable form as follows:
E x k x h T = A k B h T , h k ,
where A k , B h R n x × M are known matrices.
Assumption 2.
The measurement noises v k ( i ) , k 1 , i = 1 , , m , are white second-order processes with the following statistical properties:
( i )
E [ v k ( i ) ] = 0 and their correlation functions are known and given by
E [ v k ( i ) v h ( j ) T ] = R k ( i j ) δ k , h , i , j = 1 , , m .
( i i )
For i = 1 , , m , v k ( i ) , k 1 , is correlated with the signal process x k , k 1 and its correlation function is expressed in separable form as
E [ x k v h ( i ) T ] = C k D h ( i ) T , h k , 0 , h > k ,
where C k R n x × M and D h ( i ) R n z × M are known matrices.
Remark 1.
The general assumption of uncorrelation for the system noises is not always true and it can be restrictive in many real-world problems, where both correlation and cross-correlation of the noises may be present. Assumption 2 weakens this condition of uncorrelated noises. Concretely:
  • The sensor noise cross-correlation specified in ( i ) can be found, for example, when the signal process is observed by sensors that operate in a common noisy environment, or when the noises are state dependent; in this case, the cross-correlation between the process noise and the sensor noises leads to correlation between the different sensor noises. Moreover, after augmenting a system subject to uncertainties such as random delays or packet-dropouts, the transformed system presents correlated noises.
  • Condition ( i i ) allows us to consider models in which the sensor noises are correlated with the process noise at the previous time (see Section 4). One of the most common situations in which this type of correlation occurs is in the discretisation of continuous-time systems; actually, if a discrete-time linear system is obtained from the discretisation of a continuous-time system, then the measurement noise is correlated with the process noise at the previous time.

2.2. Deception Attack Model

As discussed above, the measurement process can be subject to attacks launched by malicious attackers. Specifically, at each sensor, attackers could inject false information that would degrade or deteriorate the real measurement. If deception attacks are launched randomly, the output measure may or may not be modified; therefore, the mathematical model for current output after a randomly occurring deception attack is modelled as:
z ˘ k ( i ) = z k ( i ) + β k ( i ) ξ k ( i ) , k 1 , i = 1 , , m ,
where β k ( i ) , k 1 , i = 1 , , m , are sequences of Bernoulli random variables, which model the success, β k ( i ) = 1 , or failure, β k ( i ) = 0 , of the attack on the i t h -sensor and ξ k ( i ) denotes the deception attack signal sent by adversaries to the i t h -sensor, which can be described as follows:
ξ k ( i ) = z k ( i ) + ε k ( i ) , k 1 , i = 1 , , m ,
where ε k ( i ) represents a random deception signal, which is inaccessible to the defenders.
According to the deception attacks (3), the attacked measurement outputs (2) can be rewritten as:
z ˘ k ( i ) = ( 1 β k ( i ) ) z k ( i ) + β k ( i ) ε k ( i ) , k 1 , i = 1 , , m .
The following assumptions are set on the sequences of random variables that model the occurrence or otherwise of the attack and the deception signal:
Assumption 3.
β k ( i ) , k 1 , i = 1 , , m , are independent sequences of independent Bernoulli random variables with known success probabilities P ( β k ( i ) = 1 ) = β ¯ k ( i ) , k 1 .
Assumption 4.
ε k ( i ) , k 1 , i = 1 , , m , are independent white second-order processes with zero-mean and known covariance matrices E [ ε k ( i ) ε h ( j ) T ] = T k ( i j ) δ k , h .
Remark 2.
For various reasons, such as the possible presence of safety protection devices, the attacks launched by adversaries are not always successful. From the defender’s perspective, the uncertainty about the success or failure of a deception attack should be considered random and included in the model with the certain-success rates, different for every sensor and every time instant. The nature of the uncertainty (successful or failed attacks) suggests that the randomness should be modelled using different sequences of random binary variables, β k ( i ) , k 1 , each taking the value 0 ( β k ( i ) = 0 , meaning that the attack against the i t h -sensor at time k has failed) or the value 1 ( β k ( i ) = 1 representing the success of the i t h -sensor attack at time k). Clearly, therefore, the measurement output of the i t h -sensor at time k, z ˘ k ( i ) , is modelled by (3); that is, it is only noise, z ˘ k ( i ) = ε k ( i ) , if β k ( i ) = 1 (successful attack) or, alternatively, it is the real measure, z ˘ k ( i ) = z k ( i ) , if β k ( i ) = 0 (failed attack). Assumption 3 on β k ( i ) , k 1 specifies the independence of the success or failure of attacks against different sensors or at different times. Consequently, under this assumption, each measurement output is either the real measure or consists only of noise, regardless of the other.

2.3. Randomly Delayed Observations

It is assumed that the measures arriving from each sensor to its processing centre may have suffered delays during the transmission process, due to possible imperfections in the communication channels. For each sensor, the absence or presence of delays in the transmission is modelled by different sequences of Bernoulli variables describing whether the measures arrive on time or are delayed by one sampling time; thus, the measure to be processed at time k is z ˘ k ( i ) or z ˘ k 1 ( i ) . In addition, it is assumed that at the initial instant the actual outputs are always available. Therefore, our mathematical model of randomly one-step delayed received measures is described by
y k ( i ) = ( 1 γ k ( i ) ) z ˘ k ( i ) + γ k ( i ) z ˘ k 1 ( i ) , k 2 ; y 1 ( i ) = z ˘ 1 ( i ) , i = 1 , , m ,
and the following assumption is made for the random variables γ k ( i ) modelling the delays:
Assumption 5.
γ k ( i ) , k 2 , i = 1 , , m , are independent sequences of independent Bernoulli random variables with known success probabilities P ( γ k ( i ) = 1 ) = γ ¯ k ( i ) , k 2 .
Finally, the following assumption is made about the signal and processes involved in the measurement model used to derive the LS linear estimators.
Assumption 6.
For i = 1 , , m , the processes x k , k 1 , v k ( i ) , k 1 , ε k ( i ) , k 1 , β k ( i ) , k 1 and γ k ( i ) , k 2 are mutually independent.
From the previous assumptions about the measurement, attacked measurement and observation processes, the expressions of their second order moments are deduced in the following lemma.
Lemma 1.
Under the model assumptions, the following statistical properties are satisfied:
( i )
The measurement processes z k ( i ) , k 1 , i = 1 , , m , have zero-mean and their covariance functions, Σ k , h z ( i j ) E z k ( i ) z h ( j ) T , are given by
Σ k , h z ( i j ) = H k ( i ) A k B h T H h ( j ) T + R k ( i j ) δ k , h + H k ( i ) C k D h ( j ) T + D k ( i ) C k T H h ( j ) T δ k , h , 1 h k .
( i i )
The measurements z ˘ k ( i ) , k 1 , i = 1 , , m , are zero-mean processes with
Σ k z ˘ ( i ) E z ˘ k ( i ) z ˘ k ( i ) T = ( 1 β ¯ k ( i ) ) Σ k z ( i ) + β ¯ k ( i ) T k ( i ) , k 1 . Σ k , h z ˘ ( i ) E z ˘ k ( i ) z ˘ h ( i ) T = ( 1 β ¯ k ( i ) ) ( 1 β ¯ h ( i ) ) Σ k , h z ( i ) , k , h 1 ; h k . Σ k , h z ˘ ( i j ) E z ˘ k ( i ) z ˘ h ( j ) T = ( 1 β ¯ k ( i ) ) ( 1 β ¯ h ( j ) ) Σ k , h z ( i j ) + β ¯ k ( i ) β ¯ h ( j ) T k ( i j ) δ k , h , k , h 1 ; j i .
( i i i )
The observation processes y k ( i ) , k 1 , i = 1 , , m , have zero-mean and their covariance functions, Σ k , h y ( i j ) E y k ( i ) y h ( j ) T , satisfy:
For i = j
Σ k y ( i ) = ( 1 γ ¯ k ( i ) ) Σ k z ˘ ( i ) + γ ¯ k ( i ) Σ k 1 z ˘ ( i ) , k 2 ; Σ 1 y ( i ) = Σ 1 z ˘ ( i ) . Σ k , h y ( i ) = ( 1 γ ¯ k ( i ) ) ( 1 γ ¯ h ( i ) ) Σ k , h z ˘ ( i ) + ( 1 γ ¯ k ( i ) ) γ ¯ h ( i ) Σ k , h 1 z ˘ ( i ) + γ ¯ k ( i ) ( 1 γ ¯ h ( i ) ) Σ k 1 , h z ˘ ( i ) + γ ¯ k ( i ) γ ¯ h ( i ) Σ k 1 , h 1 z ˘ ( i ) , 1 < h < k ; Σ k , 1 y ( i ) = ( 1 γ ¯ k ( i ) ) Σ k , 1 z ˘ ( i ) + γ ¯ k ( i ) Σ k 1 , 1 z ˘ ( i ) k 2 .
For i j
Σ k , h y ( i j ) = ( 1 γ ¯ k ( i ) ) ( 1 γ ¯ h ( j ) ) Σ k , h z ˘ ( i j ) + ( 1 γ ¯ k ( i ) ) γ ¯ h ( j ) Σ k , h 1 z ˘ ( i j ) + γ ¯ k ( i ) ( 1 γ ¯ h ( j ) ) Σ k 1 , h z ˘ ( i j ) + γ ¯ k ( i ) γ ¯ h ( j ) Σ k 1 , h 1 z ˘ ( i j ) , 1 < h k ; Σ k , 1 y ( i j ) = ( 1 γ ¯ k ( i ) ) Σ k , 1 z ˘ ( i j ) + γ ¯ k ( i ) Σ k 1 , 1 z ˘ ( i j ) , k 2 ; Σ 1 y ( i j ) = Σ 1 z ˘ ( i j ) .
Proof. 
These statistical properties are easily obtained taking into account Equations (1), (4) and (5), and model Assumptions (1)–(6). □

3. Least-Squares Linear Distributed Fusion Estimation Problem

The LS linear estimation problem of the signal from the observations coming from the m sensors is addressed by the distributed fusion method. This method is structured in two stages: The first consists of obtaining, for each sensor, LS linear estimators; in the second one, the distributed fusion estimators are calculated as matrix-weight linear combination of the local ones, using the LS optimisation criterion. Following this methodology, algorithms for the prediction and filtering problems are developed below.

3.1. Stage One: LS Local Prediction and Filtering Algorithm

In this stage, our aim is to obtain a recursive algorithm for the local estimators of the signal x k based on the observations y 1 ( i ) , , y s ( i ) , for s k , applying an innovation approach. Under this approach, the observation process is transformed, by an orthogonalisation procedure, into an equivalent one that provides the same information; this is termed the innovation process. The innovation at time k is defined as μ k ( i ) = y k ( i ) y ^ k / k 1 ( i ) , where y ^ k / k 1 ( i ) is the one-stage observation predictor. Due to this equivalence, the local estimator of a vector u k based on the observations y 1 ( i ) , , y s ( i ) can be expressed as a linear combination of the innovations μ 1 ( i ) , , μ s ( i ) , as follows:
u ^ k / s ( i ) = h = 1 s E [ u k μ h ( i ) T ] Π h ( i ) 1 μ h ( i ) ,
where Π h ( i ) E [ μ h ( i ) μ h ( i ) T ] denotes the innovation covariance matrix.
Then, our first objective is to find an adequate expression for the innovations μ h ( i ) = y h ( i ) y ^ h / h 1 ( i ) , h s , or, equivalently, for the one-stage observation predictors y ^ h / h 1 ( i ) , which simplifies the general expression of the local estimators of the signal, x ^ k / s ( i ) = h = 1 s E [ x k μ h ( i ) T ] Π h ( i ) 1 μ h ( i ) , s k . This expression of the innovations will enable us to obtain the coefficients E [ x k μ h ( i ) T ] and the innovation covariance matrices Π h ( i ) that appear in the above expression of x ^ k / s ( i ) .
One-stage observation predictor.
To facilitate the derivation of the one-stage observation predictor, we rewrite the observation expression (5) as
y k ( i ) = ( 1 γ k ( i ) ) ( 1 β k ( i ) ) ( H k ( i ) x k + v k ( i ) ) + ( 1 γ k ( i ) ) β k ( i ) ε k ( i ) + γ k ( i ) ( 1 β ¯ k 1 ( i ) ) H k 1 ( i ) x k 1 + w k 1 ( i ) , k 2 ; y 1 ( i ) = z ˘ 1 ( i ) ,
where
w k 1 ( i ) = γ k ( i ) ( β ¯ k 1 ( i ) β k 1 ( i ) ) H k 1 ( i ) x k 1 + γ k ( i ) ( 1 β k 1 ( i ) ) v k 1 ( i ) + γ k ( i ) β k 1 ( i ) ε k 1 ( i ) , k 2 .
Then, taking into account the independence assumption and the Orthogonal Projection Lemma (OPL), it is clear that the one-stage observation predictor is given by
y ^ k / k 1 ( i ) = ( 1 γ ¯ k ( i ) ) ( 1 β ¯ k ( i ) ) H k ( i ) x ^ k / k 1 ( i ) + γ ¯ k ( i ) ( 1 β ¯ k 1 ( i ) ) H k 1 ( i ) x ^ k 1 / k 1 ( i ) + w ^ k 1 / k 1 ( i ) , k 2 ,
where x ^ k / k 1 ( i ) and x ^ k 1 / k 1 ( i ) are the predictor and filter of the signal, respectively, and w ^ k 1 / k 1 ( i ) is the filter of w k 1 ( i ) .
From (6) for w ^ k 1 / k 1 ( i ) , and taking into account that w k 1 ( i ) is independent of y 1 ( i ) , , y k 2 ( i ) , it is easy to obtain that
w ^ k 1 / k 1 ( i ) = W k 1 ( i ) Π k 1 ( i ) 1 μ k 1 ( i ) , k 2 ,
where W k 1 ( i ) = E [ w k 1 ( i ) μ k 1 ( i ) T ] .
Therefore, the one-stage observation predictor is given by
y ^ k / k 1 ( i ) = ( 1 γ ¯ k ( i ) ) ( 1 β ¯ k ( i ) ) H k ( i ) x ^ k / k 1 ( i ) + γ ¯ k ( i ) ( 1 β ¯ k 1 ( i ) ) H k 1 ( i ) x ^ k 1 / k 1 ( i ) + W k 1 ( i ) Π k 1 ( i ) 1 μ k 1 ( i ) , k 2 ; y ^ 1 / 0 ( i ) = 0 .
To simplify the expressions of the local estimation algorithm derived in Theorem 1, the following notations are used for i = 1 , , m :
H G k ( i ) = ( 1 γ ¯ k ( i ) ) ( 1 β ¯ k ( i ) ) H k ( i ) G k + γ ¯ k ( i ) ( 1 β ¯ k 1 ( i ) ) H k 1 ( i ) G k 1 , k 2 ; H G 1 ( i ) = ( 1 β ¯ 1 ( i ) ) H 1 ( i ) G 1 .
D k ( i ) = ( 1 γ ¯ k ( i ) ) ( 1 β ¯ k ( i ) ) D k ( i ) + γ ¯ k ( i ) ( 1 β ¯ k 1 ( i ) ) D k 1 ( i ) , k 2 ; D 1 ( i ) = ( 1 β ¯ 1 ( i ) ) D 1 ( i ) ,
where G k = A k , B k and C k .
Theorem 1.
Under the model assumptions set out in Section 2, for i = 1 , , m , the local predictor and filter, x ^ k / s ( i ) , s k , and the associated error covariances matrices, P k / s ( i ) E [ ( x k x ^ k / s ( i ) ) ( x k x ^ k / s ( i ) ) T ] , are given by
x ^ k / s ( i ) = ( A k | C k ) O s ( i ) , s k ,
P k / s ( i ) = A k B s T ( A k | C k ) r s ( i ) ( A k | C k ) T , s k ,
where the vectors O s ( i ) and the matrices r s ( i ) E [ O s ( i ) O s ( i ) T ] are recursively obtained from
O s ( i ) = O s 1 ( i ) + J s ( i ) Π s ( i ) 1 μ s ( i ) , s 1 ; O 0 ( i ) = 0 ,
r s ( i ) = r s 1 ( i ) + J s ( i ) Π s ( i ) 1 J s ( i ) T , s 1 ; r 0 ( i ) = 0 ,
and J s ( i ) E [ O s ( i ) μ s ( i ) T ] satisfies
J s ( i ) = H B s ( i ) | D s ( i ) T r s 1 ( i ) H A s ( i ) | H C s ( i ) T J s 1 ( i ) Π s 1 ( i ) 1 W s 1 ( i ) T , s 2 ; J 1 ( i ) = H B 1 ( i ) | D 1 ( i ) T .
The innovations, μ s ( i ) = y s ( i ) y ^ s / s 1 ( i ) , and their covariance matrices, Π s ( i ) E [ μ s ( i ) μ s ( i ) T ] are calculated as
μ s ( i ) = y s ( i ) H A s ( i ) | H C s ( i ) O s 1 ( i ) W s 1 ( i ) Π s 1 ( i ) 1 μ s 1 ( i ) , s 2 ; μ 1 ( i ) = y 1 ( i ) ,
Π s ( i ) = Σ s y ( i ) H A s ( i ) | H C s ( i ) H B s ( i ) | D s ( i ) T J s ( i ) W s 1 ( i ) Π s 1 ( i ) 1 H A s ( i ) | H C s ( i ) J s 1 ( i ) + W s 1 ( i ) T , s 2 ; Π 1 ( i ) = Σ 1 y ( i ) .
Finally, the coefficients W s 1 ( i ) E [ w s 1 ( i ) μ s 1 ( i ) T ] , s 2 , are obtained by
W s 1 ( i ) = Σ s , s 1 y ( i ) H A s ( i ) | H C s ( i ) H B s 1 ( i ) | D s 1 ( i ) T , s 2 ,
and the matrices Σ s y ( i ) and Σ s , s 1 y ( i ) are given in Lemma 1.
Proof. 
See Appendix A. □

3.2. Stage Two: Distributed LS Fusion Predictor and Filter

In this stage, the distributed fusion predictor and filter, x ^ k / s , s k , are obtained as the matrix-weight linear combination of the m corresponding local estimators, x ^ k / s ( i ) , s k , i = 1 , , m , by using the mean squared error as the optimality criterion.
Let X ^ k / s = x ^ k / s ( 1 ) T , , x ^ k / s ( m ) T T be the vector constituted by the local estimators calculated from the algorithm given in Theorem 1; then, the distributed estimators and the error covariance matrices are obtained by the following algorithm.
Distributed fusion prediction and filtering algorithm. The distributed fusion predictor and filter are given by
x ^ k / s = Σ ^ k / s ( 1 ) | | Σ ^ k / s ( m ) Σ ^ k / s 1 X ^ k / s , s k ,
and the error covariance matrices P k / s = E [ ( x k x ^ k / s ) ( x k x ^ k / s ) T ] are obtained as
P k / s = A k B s T Σ ^ k / s ( 1 ) | | Σ ^ k / s ( m ) Σ ^ k / s 1 Σ ^ k / s ( 1 ) | | Σ ^ k / s ( m ) T , s k ,
where Σ ^ k / s Σ ^ k / s ( i j ) i , j = 1 , , m and Σ ^ k / s ( i j ) E x ^ k / s ( i ) x ^ k / s ( j ) T , the cross-correlation matrices between any two local estimators, are given in the following theorem.
Expressions (19) and (20) for the estimators and the error covariance matrices can be easily obtained by applying the LS criterion (see e.g., García-Ligero et al. [21] ).
Theorem 2.
Under the model assumptions, the cross-correlation matrices Σ ^ k / s ( i j ) E [ x ^ k / s ( i ) x ^ k / s ( j ) T ] , i , j = 1 , , m , are calculated by
Σ ^ k / s ( i j ) = ( A k | C k ) r s ( i j ) ( A k | C k ) T , s k .
The matrices r s ( i j ) E [ O s ( i ) O s ( j ) T ] verify the following recursive relation
r s ( i j ) = r s 1 ( i j ) + J s 1 , s ( i j ) Π s ( j ) 1 J s ( j ) T + J s ( i ) Π s ( i ) 1 J s ( j i ) T , s 1 ; r 0 ( i j ) = 0 ,
where J s 1 , s ( i j ) E [ O s 1 ( i ) μ s ( j ) T ] and J s ( i j ) E [ O s ( i ) μ s ( j ) T ] satisfy
J s 1 , s ( i j ) = r s 1 ( i ) r s 1 ( i j ) H A s ( j ) | H C s ( j ) T + J s 1 ( i ) Π s 1 ( i ) 1 W s 1 ( j i ) T J s 1 ( i j ) Π s 1 ( j ) 1 W s 1 ( j ) T , s 2 ; J 0 , 1 ( i j ) = 0 ,
and
J s ( i j ) = J s 1 , s ( i j ) + J s ( i ) Π s ( i ) 1 Π s ( i j ) , s 1 .
The innovations cross-covariance matrices Π s ( i j ) E [ μ s ( i ) μ s ( i ) T ] are obtained as
Π s ( i j ) = Σ s y ( i j ) H A s ( i ) | H C s ( i ) H B s ( j ) | D s ( j ) T J s ( j ) J s 1 , s ( i j ) W s 1 ( i j ) Π s 1 ( j ) 1 H A s ( j ) | H C s ( j ) J s 1 ( j ) + W s 1 ( j ) T W s 1 ( i ) Π s 1 ( i ) 1 Π s 1 , s ( i j ) , s 2 ; Π 1 ( i j ) = Σ 1 y ( i j ) ,
where Π s , s 1 ( i j ) E [ μ s ( i ) μ s 1 ( i ) T ] verifies
Π s , s 1 ( i j ) = H A s ( i ) | H C s ( i ) J s 1 ( j ) J s 1 ( i j ) + W s 1 ( i j ) W s 1 ( i ) Π s 1 ( i ) 1 Π s 1 ( i j ) , s 2 .
Finally, the coefficients W s 1 ( i j ) E [ w s 1 ( i ) μ s 1 ( j ) T ] are given by
W s 1 ( i j ) = Σ s , s 1 y ( i j ) H A s ( i ) | H C s ( i ) H B s 1 ( j ) | D s 1 ( j ) T , s 2 ,
and the matrices Σ s y ( i j ) and Σ s , s 1 y ( i j ) are given in Lemma 1.
Proof. 
See Appendix B. □

4. Illustrative Example

In this section, a numerical simulation example is used to illustrate the effectiveness of the proposed prediction and filtering algorithm in WSNs subject to deception attacks, correlated noises and random delays. The quality of the estimators is analysed considering different probability distributions for the random variables modelling the attacks and delays.
Let us consider a two-dimensional signal with the following evolution equation:
x k + 1 = F x k + G τ k , k 0 ,
where F = 0.95 0.03 0.01 0.95 a n d G = 0.8 0.6 . The additive noise τ k , k 0 is a standard white Gaussian scalar noise and the initial signal, x 0 , is a zero-mean vector with covariance matrix E [ x 0 x 0 T ] = 0.1 I . Assuming that the initial signal vector and additive noise are independent, the autocovariance function of the signal is expressed as:
E [ x k x h T ] = F k h E [ x h x h T ] , h k ,
which is clearly factorised, according to Assumption 1, taking, for example, A k = F k and B h T = F h E [ x h x h T ] , where
E [ x h x h T ] = F E [ x h 1 x h 1 T ] F T + G G T , h 1 .
Consider a WSN with two sensors, in which the measured signal is described by model (1). As in the theoretical model, we assume that the measurements at each sensor can experience deception attacks such as those described by (3) and that during the transmission the measurements can be delayed by one sample period; then, the received measurements in the local processing centers are modelled by (5). To analyze the performance of the proposed estimation algorithm, the following assumptions are made on the involved processes.
Simulation assumptions:
  • v k ( i ) , k 1 , i = 1 , 2 , are defined as v k ( i ) = c ( i ) τ k 1 , k 1 .
  • ε k ( i ) , k 1 , i = 1 , 2 , are given by ε k ( i ) = e ( i ) ε k , where ε k , k 1 is a standard Gaussian white process.
  • β k ( i ) , k 1 , i = 1 , 2 , are independent sequences of independent Bernoulli random variables with P ( β k ( i ) = 1 ) = β ¯ ( i ) , k 1 .
  • γ k ( i ) , k 1 , i = 1 , 2 , are independent sequences of independent Bernoulli random variables with P ( γ k ( i ) = 1 ) = γ ¯ ( i ) , k 1 .
The parameter values involved in this observation model are given in Table 1.
From the above assumptions it is easy to find out the following properties:
( i )
The measurement noises v k ( i ) , k 1 , i = 1 , 2 , have zero-mean and are correlated, with R k ( i j ) = c ( i ) c ( j ) .
( i i )
The signal process and measurement noises are correlated, with the correlation function given by E [ x k v h ( i ) ] = 0 , h > k , and E [ x k v h ( i ) ] = c ( i ) F k h G , h k , which can be expressed in separable form, as indicated in Assumption 2, taking, for example, C k = F k and D h ( i ) T = c ( i ) F h G , h k .
( i i i )
The noises ε k ( i ) , k 1 , i = 1 , 2 , have zero-mean and variances T k ( i j ) = e ( i ) e ( j ) .
Performance of the local and distributed estimators. Figure 2 illustrates the local and distributed prediction and filtering error variances for s = k 3 , k 1 , k , of the first and second signal components. For each signal component, this figure shows, on the one hand, that the error variances of the distributed estimators are lower than those of local ones; hence, the distributed fusion estimators provide better estimations of the signal. On the other hand, this figure reveals that the performance of the estimators improves as more observations are used; that is, the error variances of the local and distributed filters are smaller than those of the predictors, and these predictors became more accurate as s increases.
Influence of deception attacks. To analyse the effect of deception attacks, let us assume different values of β ¯ ( 1 ) = 0 , 0.1 , , 0.9 . Figure 3 shows that the distributed filtering error variances for both signal components decrease in line with the probability of success β ¯ ( 1 ) . Hence, as expected, better estimations of the signal are obtained for lower values of successful attack probability and the best ones are obtained when β ¯ ( 1 ) = 0 , since in this case Sensor 1 has not been attacked. A similar analysis for different values of β ¯ ( 2 ) as well as for the distributed prediction error variances leads us to the same conclusions.
Influence of transmission delays. As in our to analysis of the impact of the deception attack, here we consider that only the delay probabilities for the first sensor change, while the other probabilities remain fixed. Figure 4 shows the distributed filtering error variances when γ ¯ ( 1 ) = 0 , 0.1 , 0.3 , 0.5 , 0.7 ; values greater than 0.7 have not been taken into account since in this case the difference in the results is negligible. From this figure it can be concluded that, as the values of γ ¯ ( 1 ) decrease, the distributed filtering error variances become smaller, which means that smaller probabilities of transmission delays provide better results.
Finally, Figure 5 shows the distributed filtering error variances at k = 55 , varying jointly the different values of β ¯ ( 1 ) and γ ¯ ( 1 ) previously considered (actually, the results from k = 30 are very similar, with only negligible variation). In this figure it can be clearly seen that the variances of the filtering error increase with the probability of success of the attacks on the first sensor ( β ¯ ( 1 ) ) and also with the probability of delay in the measurements from the first sensor ( γ ¯ ( 1 ) ). Similar results are obtained by varying these probabilities in the second sensor.

5. Conclusions

In this paper, we investigate the distributed fusion linear estimation problem in WSNs that are affected by three types of phenomena that are very common in practical situations, namely deception attacks, correlated noises and delays during transmission. At each sensor, the adversaries may launch random attacks, falsifying the output measurements; these deception attacks are modelled by independent sequences of independent Bernoulli random variables with different and known success probabilities. The measurement noises from different sensors are cross-correlated at the same time step and are also correlated with the signal at the same and subsequent time steps, an assumption that is fulfilled in many practical situations. During the transmission of the sensor outputs through the communication channels to their respective processing centres, these signals can suffer delays, which are modelled by Bernoulli variables describing whether the measures arrive on time or are delayed by one sampling time. For this model, we have derived a distributed fusion prediction and filtering algorithm, using only the information provided by the first and second-order moments of the processes involved in the model; that is, they do not require knowledge of the signal evolution model, although they are also applicable to the classical formulation using this model. In addition, we use a simulation example to show that the estimator accuracy is influenced by the success probabilities of deception attacks and by transmission delays.
Among further research topics of interest in this field, we investigate the stability property in the framework of estimation algorithms using covariance information, and address the problem of the vulnerability or destabilisation of systems subject to sensor deception attacks, as recently discussed in [32,33] for stealthy attacks.
Finally, it would also be of interest to design distributed fusion estimation algorithms in energy-efficient wireless sensor networks whilst considering some of the alternatives that have generated great interest in recent years; for example, event-triggered strategies [34] or other energy-efficient sensor transmission schemes, such as those described in [35].

Author Contributions

M.J.G.-L., A.H.-C. and J.L.-P. contributed equally in deriving and implementing the proposed estimation algorithms and in writing this manuscript. M.J.G.-L., A.H.-C. and J.L.-P. have read and agreed to the published version of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare they have no conflict of interest.

Appendix A. Proof of Theorem 1

The expression for the LS estimators x ^ k / s ( i ) , s k , of the signal x k , is obtained from general expression (6). To do so, the coefficients X k , h ( i ) = E [ x k μ h ( i ) T ] = E [ x k y h ( i ) T ] E [ x k y ^ h / h 1 ( i ) T ] , 1 h k , must be calculated.
Using (5) for the observations and taking into account the independence assumption and that the covariance function of the signal and the correlation function of the signal and measurement noises are separable (Assumptions 2 and 3, respectively), it can easily be seen that the first expectation is given by
E [ x k y h ( i ) T ] = ( A k | C k ) ( H B h ( i ) | D h ( i ) ) T , 1 h k ,
with H B h ( i ) and D h ( i ) given by (9) and (10), respectively.
Now, we calculate E [ x k y ^ h / h 1 ( i ) T ] , h 2 ; using (8) for the one-stage observation predictor and general expression (6) for x ^ h / h 1 ( i ) and x ^ h 1 / h 1 ( i ) , we obtain that
E [ x k y ^ h / h 1 ( i ) T ] = l = 1 h 1 X k , l ( i ) Π l ( i ) 1 ( 1 γ ¯ h ( i ) ) ( 1 β ¯ h ( i ) ) X h , l ( i ) T H h ( i ) T + γ ¯ h ( i ) ( 1 β ¯ h 1 ( i ) ) X h 1 , l ( i ) T H h 1 ( i ) T X k , h 1 ( i ) Π h 1 ( i ) 1 W h 1 ( i ) T , 2 h k .
Hence, the coefficients are expressed as
X k , h ( i ) = ( A k | C k ) ( H B h ( i ) | D h ( i ) ) T l = 1 h 1 X k , l ( i ) Π l ( i ) 1 ( 1 γ ¯ h ( i ) ) ( 1 β ¯ h ( i ) ) X h , l ( i ) T H h ( i ) T + γ ¯ h ( i ) ( 1 β ¯ h 1 ( i ) ) X h 1 , l ( i ) T H h 1 ( i ) T X k , h 1 ( i ) Π h 1 ( i ) 1 W h 1 ( i ) T , 2 h k ; X k , 1 ( i ) = ( A k | C k ) ( H B 1 ( i ) | D 1 ( i ) ) T ,
or, equivalently,
X k , h ( i ) = A k | C k J h ( i ) , 1 h k ,
where J h ( i ) is a function satisfying
J h ( i ) = H B h ( i ) | D h ( i ) T l = 1 h 1 J l ( i ) Π l ( i ) 1 J l ( i ) T H A h ( i ) | H C h ( i ) T J h 1 ( i ) Π h 1 ( i ) 1 W h 1 ( i ) T , h 2 ; J 1 ( i ) = H B 1 ( i ) | D 1 ( i ) T .
Therefore, (11) is obtained immediately by defining O s ( i ) = h = 1 s J h ( i ) Π h ( i ) 1 μ h ( i ) , s 1 , and O 0 ( i ) = 0 .
Again using the OPL, the error covariance matrices are expressed as P k / s ( i ) = E [ x k x s T ] E [ x ^ k / s ( i ) x ^ k / s ( i ) T ) ] , s k , and from (11), expression (12) is obtained by denoting r s ( i ) E [ O s ( i ) O s ( i ) T ] = h = 1 s J h ( i ) Π h ( i ) 1 J h ( i ) T , s 1 , and r 0 ( i ) = 0 .
The recursive relations (13) and (14) are directly deduced from their respective definitions and expression (15) for J s ( i ) is immediate from (A1), taking into account the definition of r s ( i ) .
The following equivalent expression for the one-stage observation predictor (8) is obtained using (11) for the predictor, x ^ s / s 1 , and filter, x ^ s 1 / s 1 :
y ^ s / s 1 ( i ) = H A s ( i ) | H C s ( i ) O s 1 ( i ) + W s 1 ( i ) Π s 1 ( i ) 1 μ s 1 ( i ) , s 2 ,
and then, expression (16) for innovation is immediate.
Now, applying the OPL, the innovation covariance matrices are expressed as Π s ( i ) = E [ y s ( i ) y s ( i ) T ] E [ y ^ s / s 1 ( i ) y s ( i ) T ] and, using (A2), we have
Π s ( i ) = Σ s y ( i ) H A s ( i ) | H C s ( i ) E [ O s 1 ( i ) y s ( i ) T ] W s 1 ( i ) Π s 1 ( i ) 1 E [ μ s 1 ( i ) y s ( i ) T ] , s 2 ; Π 1 ( i ) = Σ 1 y ( i ) .
Next, we calculate the two expectations that appear in the above expression. Taking into account (13) and that Π s ( i ) = E [ μ s ( i ) y s ( i ) T ] , we have E [ O s 1 ( i ) y s ( i ) T ] = E [ O s ( i ) y s ( i ) T ] J s ( i ) . Now, substituting y s ( i ) = μ s ( i ) + y ^ s / s 1 ( i ) , using that J s ( i ) E [ O s ( i ) μ s ( i ) T ] and expression (15) for J s ( i ) , together with (A2) for the one-stage observation predictor, it is deduced that E [ O s ( i ) y s ( i ) T ] = H B s ( i ) | D s ( i ) T and, therefore,
E [ O s 1 ( i ) y s ( i ) T ] = H B s ( i ) | D s ( i ) T J s ( i ) .
Again, using the OPL and (A2) it is clear that
E [ μ s 1 ( i ) y s ( i ) T ] = E [ μ s 1 ( i ) y ^ s / s 1 ( i ) T ] = H A s ( i ) | H C s ( i ) J s 1 ( i ) + W s 1 ( i ) T , s 2 .
Then, from (A3) and (A4), expression (17) is obtained.
Finally, we obtain (18) for the coefficients W s 1 ( i ) . Since w s 1 ( i ) is uncorrelated with y h ( i ) T , h s 2 , the coefficients W s 1 ( i ) are expressed as W s 1 ( i ) = E [ w s 1 ( i ) y s 1 ( i ) T ] and the expression of w s 1 ( i ) obtained from (7) leads to
W s 1 ( i ) = Σ s , s 1 y ( i ) ( 1 γ ¯ s ( i ) ) ( 1 β ¯ s ( i ) ) H s ( i ) E [ x s y s 1 ( i ) T ] γ ¯ s ( i ) ( 1 β ¯ s 1 ( i ) ) H s 1 ( i ) E [ x s 1 y s 1 ( i ) T ] .
Now, using (5) for y s 1 ( i ) and the model assumptions, expression (18) is easily obtained.

Appendix B. Proof of Theorem 2

From (11), using that r s ( i j ) E [ O s ( i ) O s ( j ) T ] , expression (21) for the cross-correlation matrices is directly obtained. The recursive relation (22) is immediate using (13) together with J s 1 , s ( i j ) E [ O s 1 ( i ) μ s ( j ) T ] and J s ( i j ) E [ O s ( i ) μ s ( j ) T ] .
Next, to facilitate obtaining Equations (23)–(27), we determine an expression for the one-stage observation predictor of y s ( j ) based on the observations of sensor i, which will be denoted by y ^ s / s 1 ( j / i ) . This expression is easily obtained from (7), taking into account the model assumptions and (11) for x ^ s / s 1 ( j ) and x ^ s 1 / s 1 ( j ) ,
y ^ s / s 1 ( j / i ) = H A s ( j ) | H C s ( j ) O s 1 ( j ) + W s 1 ( j i ) Π s 1 ( j ) 1 μ s 1 ( j ) , s 2 ,
where W s 1 ( j i ) E [ w s 1 ( j ) μ s 1 ( i ) T ] .
Now, we obtain (23) and (24). Clearly, by the OPL, E [ O s 1 ( i ) y s ( j ) T ] = E [ O s 1 ( i ) y ^ s / s 1 ( j / i ) T ] and then J s 1 , s ( i j ) = E [ O s 1 ( i ) y ^ s / s 1 ( j / i ) T ] E [ O s 1 ( i ) y ^ s / s 1 ( j ) T ] . Taking into account (A2) and (A5) for y ^ s / s 1 ( j ) and y ^ s / s 1 ( j / i ) , respectively, it is seen that J s 1 , s ( i j ) satisfies (23). Expression (24) is straightforwardly derived using (13) and Π s ( i j ) E [ μ s ( i ) μ s ( j ) T ] .
In order to calculate the innovation covariance matrices, Π s ( i j ) and Π s , s 1 ( i j ) , i j , we apply the OPL to express these matrices as:
Π s ( i j ) = Σ s y ( i j ) E [ y ^ s / s 1 ( i / j ) y s ( j ) T ] E [ y ^ s / s 1 ( i ) μ s ( j ) T ] , s 2 ; Π 1 ( i j ) = Σ 1 y ( i j ) , Π s , s 1 ( i j ) = E [ y ^ s / s 1 ( i / j ) μ s 1 ( j ) T ] E [ y ^ s / s 1 ( i ) μ s 1 ( j ) T ] , s 2 .
Again, using (A2) and (A5) for the one-stage observation predictors, y ^ s / s 1 ( i ) and y ^ s / s 1 ( i / j ) , and taking into account (A3) and (A4) as well as the definitions of J s 1 , s ( i j ) and Π s , s 1 ( i j ) , the expressions (25) and (26) are confirmed.
By reasoning similar to that used to obtain (18) for the coefficients W s 1 ( i ) , the expression (27) is derived for the coefficients W s 1 ( i j ) .

References

  1. Ding, D.; Wang, Z.; Shen, B. Recent advances on distributed filtering for stochastic systems over sensor networks. Int. J. Gen. Syst. 2014, 43, 372–386. [Google Scholar] [CrossRef]
  2. Dong, H.; Wang, Z.; Ding, S.X.; Gao, H. A Survey on Distributed Diltering and Fault Detection for Sensor Networks. Math. Probl. Eng. 2014, 2014, 858624. [Google Scholar] [CrossRef] [Green Version]
  3. Li, W.; Wang, Z.; Wei, G.; Ma, L.; Hu, J.; Ding, D. A Survey on Multisensor Fusion and Consensus Filtering for Sensor Networks. Discrete Dyn. Nat. Soc. 2015, 2015, 683701. [Google Scholar] [CrossRef] [Green Version]
  4. Sun, S.L.; Lin, H.; Ma, J.; Li, X. Multi-sensor distributed fusion estimation with applications in networked systems: A review paper. Inf. Fusion. 2017, 38, 122–134. [Google Scholar] [CrossRef]
  5. Yang, C.; Yang, Z.; Deng, Z. Robust weighted state fusion Kalman estimators for networked systems with mixed uncertainties. Inf. Fus. 2019, 45, 246–265. [Google Scholar] [CrossRef]
  6. Xia, J.; Gao, S.; Qi, X.; Zhang, J.; Li, G. Distributed cubature H-infinity information filtering for target tracking against uncertain noise statistics. Signal Proccess. 2020, 177, 107725. [Google Scholar] [CrossRef]
  7. Hu, Z.; Hu, J.; Yang, G. A survey on distributed filtering, estimation and fusion for nonlinear systems with communication constraints: New advances and prospects. Syst. Sci. Control Eng. 2020, 8, 189–205. [Google Scholar] [CrossRef] [Green Version]
  8. Chen, W.; Ding, D.; Dong, H.; Wei, G. Distributed Resilient Filtering for Power Systems Subject to Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1688–1697. [Google Scholar] [CrossRef]
  9. Xu, M.; Zhang, Y.; Zhang, D.; Chen, B. Distributed Robust Dimensionality Reduction Fusion Estimation under DoS Attacks and Uncertain Covariances. IEEE Access. 2021, 9, 10328–10337. [Google Scholar] [CrossRef]
  10. Chen, B.; Ho, D.; Hu, G.; Yu, L. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems under Replay Attacks. IEEE Trans. Cybern. 2018, 48, 1862–1876. [Google Scholar] [CrossRef]
  11. Ding, D.; Wang, Z.; Ho, D.; Wei, G. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica 2017, 78, 231–240. [Google Scholar] [CrossRef]
  12. Ma, L.; Wang, Z.; Han, Q.-L.; Lam, H.-K. Variance Constrained Distributed Filtering for Time-Varying Systems with Multiplicative Noises and Deception Attacks over Sensor Networks. IEEE Sens. J. 2017, 17, 2279–2288. [Google Scholar] [CrossRef] [Green Version]
  13. Han, F.; Dong, H.; Wang, Z.; Li, G. Local design of distributed H-consensus filtering over sensor networks under multiplicative noises and deception attacks. Int. J. Robust Nonlinear Control. 2019, 29, 2296–2314. [Google Scholar] [CrossRef]
  14. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Covariance-Based Estimation for Clustered Sensor Networks subject to Random Deception Attacks. Sensors 2019, 19, 3112. [Google Scholar] [CrossRef] [Green Version]
  15. Feng, J.; Zeng, M. Descriptor recursive estimation for multiple sensors with different delay rates. Int. J. Control. 2011, 84, 584–596. [Google Scholar] [CrossRef]
  16. Li, N.; Sun, S.; Ma, J. Multi-sensor distributed fusion filtering for networked systems with different delay and loss rates. Digit. Signal Process. 2014, 34, 29–38. [Google Scholar] [CrossRef]
  17. Chen, B.; Zhang, W.; Yu, L. Distributed Fusion Estimation with Missing Measurements, Random Transmission Delays and Packet Dropouts. IEEE Trans. Automat. Control. 2014, 59, 1961–1967. [Google Scholar] [CrossRef]
  18. Ma, J.; Sun, S. Distributed fusion filter for networked stochastic uncertain systems with transmission delays and packet dropouts. Signal Process. 2017, 130, 268–278. [Google Scholar] [CrossRef]
  19. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Networked Fusion Filtering from Outputs with Stochastic Uncertainties and Correlated Random Transmission Delays. Sensors 2016, 16, 847. [Google Scholar] [CrossRef] [Green Version]
  20. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Fusion Estimation from Multisensor Observations with Multiplicative Noises and Correlated Random Delays in Transmission. Mathematics 2017, 5, 45. [Google Scholar] [CrossRef]
  21. García-Ligero, M.J.; Hermoso-Carazo, A.; Linares-Pérez, J. Distributed and centralized fusion estimation from multiple sensors with Markovian delays. Appl. Math. Comput. 2012, 219, 2932–2948. [Google Scholar] [CrossRef]
  22. Shang, Y. Consensus seeking over Markovian switching networks with time-varying delays and uncertain topologies. Appl. Math. Comput. 2016, 273, 1234–1245. [Google Scholar] [CrossRef]
  23. García-Ligero, M.J.; Hermoso-Carazo, A.; Linares-Pérez, J. Distributed Fusion Estimation with Sensor Gain Degradation and Markovian Delays. Mathematics 2020, 8, 1948. [Google Scholar] [CrossRef]
  24. Li, X.; Zhu, Y.; Wang, J.; Han, C. Optimal Linear Estimation Fusion—Part I: Unified Fusion Rules. IEEE Trans. Inf. Theory 2003, 49, 2192–2208. [Google Scholar] [CrossRef]
  25. Yan, L.; Li, X.; Xia, Y.; Fu, M. Optimal sequential and distributed fusion for state estimation in cross-correlated noise. Automatica 2013, 49, 3607–3612. [Google Scholar] [CrossRef]
  26. Lin, H.; Sun, S. Globally optimal sequential and distributed fusion state estimation for multi-sensor systems with cross-correlated noises. Automatica 2019, 101, 128–137. [Google Scholar] [CrossRef]
  27. Feng, J.; Wang, Z.; Zeng, M. Distributed weighted robust Kalman filter fusion for uncertain systems with autocorrelated and cross-correlated noises. Inf. Fus. 2013, 14, 78–86. [Google Scholar] [CrossRef]
  28. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J.; Wang, Z. A new approach to distributed fusion filtering for networked systems with random parameter matrices and correlated noises. Inf. Fus. 2019, 45, 324–332. [Google Scholar] [CrossRef]
  29. Wang, D.; Wang, Z.; Shen, B.; Alsaadi, F. Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks. Int. J. Robust Nonlinear Control 2017, 27, 1194–1208. [Google Scholar] [CrossRef] [Green Version]
  30. Zhang, D.; Xie, J.; Ning, B. Network-based filtering for positive systems with random communication delays and deception attacks. Neurocomputing 2020, 400, 450–457. [Google Scholar] [CrossRef]
  31. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. A Two-Phase Distributed Filtering Algorithm for Networked Uncertain with Fading Measuremente under Deception Attacks. Sensors 2020, 20, 6445. [Google Scholar] [CrossRef] [PubMed]
  32. Sui, T.; Mo, Y.; Marelli, D.; Sun, X.; Fu, M. The Vulnerability of Cyber-Physical System Under Stealthy Attacks. IEEE Trans. Automat. Control 2021, 66, 637–650. [Google Scholar] [CrossRef] [Green Version]
  33. Sui, T.; Sun, X. The vulnerability of distributed state estimator under stealthy attacks. Autoatica 2021, 133, 1–12. [Google Scholar] [CrossRef]
  34. Jiang, L.; Yan, L.; Xia, Y.; Guo, Q.; Fu, M.; Li, L. Distributed fusion in wireless sensor networks based on a novel event-triggered strategy. J. Franklin Inst. 2019, 356, 10315–10334. [Google Scholar] [CrossRef]
  35. Sriranga, N.; Nagananda, K.G.; Blum, R.S.; Saucan, A.; Varshney, P.K. Energy-efficient Decision Fusion for Distributed Detection in Wireless Sensor Networks. In Proceedings of the 21st International Conference on Information Fusion (FUSION), Cambrige, UK, 10–13 July 2018; pp. 1541–1547. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Distributed fusion estimation scheme in WNS with attacks and delays.
Figure 1. Distributed fusion estimation scheme in WNS with attacks and delays.
Mathematics 10 00662 g001
Figure 2. Local and distributed prediction and filtering error variances.
Figure 2. Local and distributed prediction and filtering error variances.
Mathematics 10 00662 g002
Figure 3. Distributed filtering error variances for different values of β ¯ ( 1 ) .
Figure 3. Distributed filtering error variances for different values of β ¯ ( 1 ) .
Mathematics 10 00662 g003
Figure 4. Distributed filtering error variances for different values of γ ¯ ( 1 ) .
Figure 4. Distributed filtering error variances for different values of γ ¯ ( 1 ) .
Mathematics 10 00662 g004
Figure 5. Distributed filtering error variances for different values at k = 55 , of γ ¯ ( 1 ) and β ¯ ( 1 ) .
Figure 5. Distributed filtering error variances for different values at k = 55 , of γ ¯ ( 1 ) and β ¯ ( 1 ) .
Mathematics 10 00662 g005
Table 1. Model parameter values.
Table 1. Model parameter values.
H k ( i ) c ( i ) e ( i ) β ¯ k ( i ) γ ¯ k ( i )
Sensor 1(0.8, 0.9)50.250.70.3
Sensor 2(0.6, 0.7)100.50.20.6
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

García-Ligero, M.J.; Hermoso-Carazo, A.; Linares-Pérez, J. Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks. Mathematics 2022, 10, 662. https://0-doi-org.brum.beds.ac.uk/10.3390/math10040662

AMA Style

García-Ligero MJ, Hermoso-Carazo A, Linares-Pérez J. Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks. Mathematics. 2022; 10(4):662. https://0-doi-org.brum.beds.ac.uk/10.3390/math10040662

Chicago/Turabian Style

García-Ligero, María Jesús, Aurora Hermoso-Carazo, and Josefa Linares-Pérez. 2022. "Distributed Fusion Estimation in Network Systems Subject to Random Delays and Deception Attacks" Mathematics 10, no. 4: 662. https://0-doi-org.brum.beds.ac.uk/10.3390/math10040662

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop