Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach

  • Xuqiang Lei*
  • , Guanghui Wen
  • , Shuai Wang
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper investigates the problem of sparse attack isolation and distributed secure state estimation (SSE) for remote sensor network in an attack-prone environment. The attack considered in the present paper is a variant of the sparse sensor attack model, and is characterized by the number of sensors clusters that can be compromised at each moment. By analyzing the worst-case scenario in the presence of the considered attack, an attack detection and isolation mechanism based on the weighted communication design is provided to block the spread of the attack across the observer network. Moreover, based on the attack isolation, a distributed SSE algorithm is constructed to ensure globally consistent state estimation. Finally, a numerical simulation is provided to validate the effectiveness of the proposed conditions and algorithm.

Original languageEnglish
Title of host publication2023 62nd Annual Conference of the Society of Instrument and Control Engineers, SICE 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages973-978
Number of pages6
ISBN (Electronic)9784907764807
DOIs
StatePublished - 2023
Event62nd Annual Conference of the Society of Instrument and Control Engineers, SICE 2023 - Tsu, Japan
Duration: 6 Sep 20239 Sep 2023

Publication series

Name2023 62nd Annual Conference of the Society of Instrument and Control Engineers, SICE 2023

Conference

Conference62nd Annual Conference of the Society of Instrument and Control Engineers, SICE 2023
Country/TerritoryJapan
CityTsu
Period6/09/239/09/23

Keywords

  • Sensor network
  • distributed secure state estimation
  • sparse attack
  • weighted communication

Fingerprint

Dive into the research topics of 'Distributed Secure State Estimation Against Sparse Attacks: A Sensor Clustering Approach'. Together they form a unique fingerprint.

Cite this