Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks

This paper is concerned with the distributed full- and reduced-order <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula&g...

Full description

Bibliographic Details
Main Authors: Fengzeng Zhu, Xu Liu, Jiwei Wen, Linbo Xie, Li Peng
Format: Article
Language:English
Published: MDPI AG 2020-03-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/7/1948
id doaj-a96bd3947993486c8b5b688888f6411f
record_format Article
spelling doaj-a96bd3947993486c8b5b688888f6411f2020-11-25T03:01:06ZengMDPI AGSensors1424-82202020-03-01201948194810.3390/s20071948Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception AttacksFengzeng Zhu0Xu Liu1Jiwei Wen2Linbo Xie3Li Peng4Engineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, ChinaEngineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, ChinaEngineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, ChinaEngineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, ChinaEngineering Research Center of Internet of Things Applied Technology, Jiangnan University, Ministry of Education, Wuxi 214122, Jiangsu, ChinaThis paper is concerned with the distributed full- and reduced-order <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> state estimation issue for a class of discrete time-invariant systems subjected to both randomly occurring switching topologies and deception attacks over wireless sensor networks. Firstly, a switching topology model is proposed which uses homogeneous Markov chain to reflect the change of filtering networks communication modes. Then, the sector-bound deception attacks among the communication channels are taken into consideration, which could better characterize the filtering network communication security. Additionally, a random variable obeying the Bernoulli distribution is used to describe the phenomenon of the randomly occurring deception attacks. Furthermore, through an adjustable parameter <i>E</i>, we can obtain full- and reduced-order <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> state estimator over sensor networks, respectively. Sufficient conditions are established for the solvability of the addressed switching topology-dependent distributed filtering design in terms of certain convex optimization problem. The purpose of solving the problem is to design a distributed full- and reduced-order filter such that, in the presence of deception attacks, stochastic external interference and switching topologies, the resulting filtering dynamic system is exponentially mean-square stable with prescribed <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> performance index. Finally, a simulation example is provided to show the effectiveness and flexibility of the designed approach.https://www.mdpi.com/1424-8220/20/7/1948wireless sensor networkswitching topologydeception attackdistributed filteringlinear matrix inequality
collection DOAJ
language English
format Article
sources DOAJ
author Fengzeng Zhu
Xu Liu
Jiwei Wen
Linbo Xie
Li Peng
spellingShingle Fengzeng Zhu
Xu Liu
Jiwei Wen
Linbo Xie
Li Peng
Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
Sensors
wireless sensor network
switching topology
deception attack
distributed filtering
linear matrix inequality
author_facet Fengzeng Zhu
Xu Liu
Jiwei Wen
Linbo Xie
Li Peng
author_sort Fengzeng Zhu
title Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
title_short Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
title_full Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
title_fullStr Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
title_full_unstemmed Distributed Robust Filtering for Wireless Sensor Networks with Markov Switching Topologies and Deception Attacks
title_sort distributed robust filtering for wireless sensor networks with markov switching topologies and deception attacks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2020-03-01
description This paper is concerned with the distributed full- and reduced-order <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> state estimation issue for a class of discrete time-invariant systems subjected to both randomly occurring switching topologies and deception attacks over wireless sensor networks. Firstly, a switching topology model is proposed which uses homogeneous Markov chain to reflect the change of filtering networks communication modes. Then, the sector-bound deception attacks among the communication channels are taken into consideration, which could better characterize the filtering network communication security. Additionally, a random variable obeying the Bernoulli distribution is used to describe the phenomenon of the randomly occurring deception attacks. Furthermore, through an adjustable parameter <i>E</i>, we can obtain full- and reduced-order <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> state estimator over sensor networks, respectively. Sufficient conditions are established for the solvability of the addressed switching topology-dependent distributed filtering design in terms of certain convex optimization problem. The purpose of solving the problem is to design a distributed full- and reduced-order filter such that, in the presence of deception attacks, stochastic external interference and switching topologies, the resulting filtering dynamic system is exponentially mean-square stable with prescribed <inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mn>2</mn> </msub> </semantics> </math> </inline-formula>-<inline-formula> <math display="inline"> <semantics> <msub> <mi>l</mi> <mo>∞</mo> </msub> </semantics> </math> </inline-formula> performance index. Finally, a simulation example is provided to show the effectiveness and flexibility of the designed approach.
topic wireless sensor network
switching topology
deception attack
distributed filtering
linear matrix inequality
url https://www.mdpi.com/1424-8220/20/7/1948
work_keys_str_mv AT fengzengzhu distributedrobustfilteringforwirelesssensornetworkswithmarkovswitchingtopologiesanddeceptionattacks
AT xuliu distributedrobustfilteringforwirelesssensornetworkswithmarkovswitchingtopologiesanddeceptionattacks
AT jiweiwen distributedrobustfilteringforwirelesssensornetworkswithmarkovswitchingtopologiesanddeceptionattacks
AT linboxie distributedrobustfilteringforwirelesssensornetworkswithmarkovswitchingtopologiesanddeceptionattacks
AT lipeng distributedrobustfilteringforwirelesssensornetworkswithmarkovswitchingtopologiesanddeceptionattacks
_version_ 1724694940653453312