skip to main content
10.1145/3512388.3512445acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicigpConference Proceedingsconference-collections
research-article

Bayesian-based Security Distributed Estimation

Published: 28 March 2022 Publication History

Abstract

In recent years, the distributed estimation of wireless sensor networks has been widely studied, but there are often security threats in practical applications. For example, attackers damage data information in different ways and reduce the performance of network estimation. In order to solve this problem, this paper proposes an algorithm framework of attack detection based on distributed LMS. The algorithm classifies the states of adjacent nodes, and then realizes attack detection through Bayesian criterion. An adaptive detection threshold is proposed to improve the detection performance. The reliable information of the last time is used to replace the detected lossy information and fuse to ensure the performance of the algorithm. Finally, the simulation results of several algorithms under different attack models are given to prove the effectiveness of the algorithm.

References

[1]
M. Rabbat, R. Nowak, Distributed optimization in sensor networks, in: Third International Symposium on Information Processing in Sensor Networks (IPSN 2004), 2004.
[2]
H. T. Banks, K. Kunisch, Estimation Techniques for Distributed Parameter Systems, Estimation Techniques for Distributed Parameter Systems, 1989.
[3]
F. S. Cattivelli, C. G. Lopes, A. H. Sayed, Diffusion recursive least-squares for distributed estimation over adaptive networks, IEEE Transactions on Signal Processing 56 (5) (2008) 1865-1877.
[4]
L. Li, H. Zhao, S. Lv, Diffusion recursive total least square algorithm over adaptive networks and performance analysis, Signal Processing 182 (7) (2020) 107954.
[5]
F. S. Cattivelli, A. H. Sayed, Diffusion lms strategies for distributed estimation, IEEE Transactions on Signal Processing 58 (3) (2010) 10351048
[6]
A. Khalili, M. A. Tinati, A. Rastegarnia, Performance analysis of distributed incremental lms algorithm with noisy links, International Journal of Distributed Sensor Networks 2011 (1) (2011) 215-218.
[7]
I. D. Schizas, G. Mateos, G. B. Giannakis, Distributed lms for consensusbased in-network adaptive processing, IEEE Transactions on Signal Processing 57 (6) (2009) 2365-2382.
[8]
Nikola, Bogdanovic, Kostas, Berberidis, Jorge, Plata-Chaves, Distributed incremental-based lms for node-specific adaptive parameter estimation, IEEE Transactions on Signal Processing A Publication of the IEEE Signal Processing Society (2014).
[9]
A. H. Sayed, S. Y. Tu, J. Chen, X. Zhao, Z. J. Towfic, Diffusion strategies for adaptation and learning over networks: An examination of distributed strategies and network behavior, IEEE Signal Processing Magazine 30 (3) (2013) 155-171.
[10]
C. G. Lopes, A. H. Sayed, Diffusion least-mean squares over adaptive networks: Formulation and performance analysis, Proc.ieee Int.conf.acoustics Speech Signal Processing Honolulu Hi Apr 56 (7) (2007) 3122-3136.
[11]
F. Pasqualetti, R. Carli, F. Bullo, Distributed estimation via iterative projections with application to power network monitoring, Automatica 48 (5) (2012) 747-758.
[12]
A. Richard, C. Allan, Y. Azusa, H. Neil, T. Nikos, A. Shakir, L. Galina, G. Alexey, S. Anatoly, O. E. Akman, Sbsi: an extensible distributed software infrastructure for parameter estimation in systems biology, Bioinformatics (5) (2013) 664-665.
[13]
Y. Hua, F. Chen, S. Deng, S. Duan, L. Wang, Secure distributed estimation against false data injection attack, Information Sciences 515 (2020)248-262
[14]
M. Conti, R. D. Pietro, L. Mancini, and A. Mei, “Distributed detection of clone attacks in wireless sensor networks,” IEEE Transactions on Dependable Secure Computing, vol. 8, no. 5, pp. 685–698, 2011.
[15]
H. Yuan, Y. Xia, H. Yang, Resilient state estimation of cyber-physical system with multichannel transmission under dos attack, IEEE Transactions on Systems, Man, and Cybernetics: Systems PP (99) (2020) 1-12
[16]
M. Tiloca, D. D. Guglielmo, G. Dini, and G. Anastasi, “Sad-sj: A self-adaptive decentralized solution against selective jamming attack in wireless sensor networks,” in IEEE, 2013
[17]
Y. Chen, S. Kar, J. Moura, Distributed estimation under sensor attacks (2017)
[18]
Vempaty, A, Tong, L, Varshney, P, Distributed inference with byzantine data: State-of-the-art review on data falsification attacks, IEEE Signal Processing Magazine 30 (5) (2013) 65-75.
[19]
G. Y. Lu, W. X. Chen, Q. D. Huang, Distributed diffusion least mean square algorithm based on the reputation mechanism, Journal of Electronics Information Technology 37 (5) (2015) 1234-1240.
[20]
Y. Liu, C. Li, Secure distributed estimation over wireless sensor networks under attacks, IEEE Transactions on Aerospace and Electronic Systems (2018)
[21]
J .Zhang, X. Wang, R. S. Blum, L. M. Kaplan, Attack Detection in Sensor Network Target Localization Systems with Quantized Data(2017)
[22]
K. Balcombe, A. Chalak, I. Fraser, Model selection for the mixed logit with bayesian estimation, Journal of Environmental Economics and Management 57 (2) (2009) 226-237.
[23]
G. Marrelec, H. Benali, P. Ciuciu, M. P\\tildẽ@lÃ@(C)grini-Issac, J.B. Poline, Robust bayesian estimation of the hemodynamic response function in event-related bold fmri using basic physiological information, Human Brain Mapping 19 (1) (2003) 1-17.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIGP '22: Proceedings of the 2022 5th International Conference on Image and Graphics Processing
January 2022
391 pages
ISBN:9781450395465
DOI:10.1145/3512388
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 March 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attack detect
  2. Bayesian
  3. Distributed estimation

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIGP 2022

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 33
    Total Downloads
  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media