This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Simultaneous Distributed Estimation and Attack Detection/Isolation in Social Networks: Structural Observability, Kronecker-Product Network, and Chi-Square Detector

Abstract

This paper considers distributed estimation of linear systems when the state observations are corrupted with Gaussian noise of unbounded support and under possible random adversarial attacks. We consider sensors equipped with single time-scale estimators and local chi-square (χ2\chi^{2}) detectors to simultaneously opserve the states, share information, fuse the noise/attack-corrupted data locally, and detect possible anomalies in their own observations. While this scheme is applicable to a wide variety of systems associated with full-rank (invertible) matrices, we discuss it within the context of distributed inference in social networks. The proposed technique outperforms existing results in the sense that: (i) we consider Gaussian noise with no simplifying upper-bound assumption on the support; (ii) all existing χ2\chi^{2}-based techniques are centralized while our proposed technique is distributed, where the sensors locally detect attacks, with no central coordinator, using specific probabilistic thresholds; and (iii) no local-observability assumption at a sensor is made, which makes our method feasible for large-scale social networks. Moreover, we consider a Linear Matrix Inequalities (LMI) approach to design block-diagonal gain (estimator) matrices under appropriate constraints for isolating the attacks.

Index Terms—  Attack detection and isolation, Kronecker-product network, distributed estimation, χ2\chi^{2}-test.

1 Introduction

The unprecedented large size of social networks mandates distributed sensing, inference, and detection [1, 2, 3, 4, 5, 6, 7], where the information is collected and processed locally while meeting certain security concerns. Recent distributed estimation protocols [6, 7, 8, 9, 10, 11] are prone to faults/attacks that may result in inaccurate state estimates. Different attack detection and FDI (fault detection and isolation) strategies are thus proposed in the literature, ranging in applications from biological modeling [12] to smart-grid monitoring [13, 14], and from centralized approaches [15, 16, 17, 18, 19, 20] to more recent distributed methods [21, 22, 23]. Among the centralized solutions, deterministic FDI and attack detection methods design decision thresholds based on the upper-bound on the noise support [17, 18], while, in contrast, probabilistic χ2\chi^{2}-test with no such assumption on the noise is proposed in [15] and further developed in [19, 20]. Among the distributed strategies, [23] requires injecting a watermarking input signal conceding to a loss in the control/estimation performance, which is not applicable to autonomous systems (such as the social network model in this paper). In order to close this gap, this paper aims at developing a technique for distributed inference of autonomous (social) systems while simultaneously detecting and isolating adversarial attacks locally with no central coordinator.

The main contributions of this paper are as follows. (i) This work considers a windowed χ2\chi^{2} benchmark to locally design probabilistic decision thresholds based on certain false alarm rates (FARs). This is in contrast to existing deterministic thresholds assuming certain upper-bound on the noise support [17, 18], which results in faulty outcome when the noise upper-bound is considerably larger than the attack/fault magnitude. (ii) This work extends the recent centralized χ2\chi^{2} detectors [19, 20] to distributed ones, where the sensors are widespread over a large social network and, thus, the centralized solutions are infeasible/undesirable due to heavy communication loads or inability for parallel processing. In this direction, the notion of Kronecker-product network [24] is used to perceive (structural) observability of the composite social/sensor network, which allows to find minimal connectivity requirement on the sensor network for distributed estimation/detection. (iii) Our distributed technique, as in [21, 22], does not require local-observability at every sensor. However, unlike fixed biasing faults/attacks on sensor outputs in [21, 22], this work extends the results to general anomalies in the form of a random variable. In particular, we adopt the notion of distance measure [19], a scalar variable to compare the residual variance in presence and absence of attacks.

2 Problem Formulation

We consider the interaction of individuals in a social network as a linear-structure-invariant (LSI) autonomous model [4, 5, 7, 6],

𝐱k+1=A𝐱k+νk,k0,\displaystyle\mathbf{x}_{k+1}=A\mathbf{x}_{k}+\nu_{k},\qquad k\geq 0, (1)

where kk is the time-step, AA is the social system matrix associated with social digraph 𝒢\mathcal{G}, νk𝒩(0,Q)\nu_{k}\sim\mathcal{N}(0,Q) is additive i.i.d noise vector, and vector 𝐱k=[xk1,,xkn]n{\mathbf{x}_{k}=\left[{x}_{k}^{1},\dots,{x}_{k}^{n}\right]^{\top}\in\mathbb{R}^{n}} represents the global social state. Note that nn is the size of social network and 𝐱ki\mathbf{x}_{k}^{i} represents the ii’th individual’s social state, e.g., opinion, rumor, or attitude [1, 2, 3, 4, 6, 7, 5]. The state 𝐱ki\mathbf{x}_{k}^{i} of individual ii at time kk is a weighted average of the states 𝐱k1j\mathbf{x}_{k-1}^{j} of its in-neighbors in 𝒢\mathcal{G} and its own previous state 𝐱k1i\mathbf{x}_{k-1}^{i}. This is well-justified for opinion-dynamics in social systems, and particularly implies that matrix AA is (structurally) full-rank [7]. Consider NN social sensors (agents or information-gatherers [5]) sensing the state of some individuals as,

yki=Hi𝐱k+τki+ηki,\displaystyle{y}_{k}^{i}=H_{i}\mathbf{x}_{k}+\tau_{k}^{i}+\eta_{k}^{i}, (2)

with HiH_{i} as the measurement matrix, τki\tau_{k}^{i} as possible attack and ηki𝒩(0,Ri)\eta_{k}^{i}\sim\mathcal{N}(0,R_{i}) as Gaussian noise at sensor ii at time kk. Define R=diag[Ri]R=\text{diag}[R_{i}] as the covariance matrix of the i.i.d noise vector ηk\eta_{k}. Throughout this paper, without loss of generality, we assume every sensor observes one state variable, i.e., yki{y}_{k}^{i}\in\mathbb{R}. Further, as in similar works [15, 19, 20], we assume the system and measurement noise covariance (QQ and RR) are known. Then, sensors share their information over a sensor network 𝒢N\mathcal{G}_{N}. Clearly, system AA is not locally observable to any sensor, but globally observable to all sensors. The condition on (A,H)(A,H)-observability is given in the following lemma.

Lemma 1

[7] Given a social network 𝒢\mathcal{G} (with structurally full-rank adjacency matrix AA), if at least one social state is sensed in every strongly-connected-component (SCC) in 𝒢\mathcal{G}, then, the pair (A,H)(A,H) is (structurally) observable.

Given (social) system (1) and state observations (2) satisfying Lemma 1, we aim to design a distributed iterative procedure to simultaneously estimate the (social) state 𝐱ki\mathbf{x}_{k}^{i} while detecting adversary attacks at (social) sensors. The attack by the adversary is modeled as an additive random term τki\tau_{k}^{i} at sensor ii in (2). The proposed distributed estimation makes the entire system observable to every sensor, and the attack-detection technique enables each sensor to locally detect anomalies in its observation with a certain FAR (false-alarm rate).

3 Main Algorithm

We consider a modified version of the single time-scale distributed estimator in [7] with one step of averaging on a-priori estimates (similar to DeGroot consensus model [8]) and one step of measurement update (also known as innovation [8]),

𝐱^k|k1i\displaystyle\widehat{\mathbf{x}}^{i}_{k|k-1} =\displaystyle= j𝒩(i)wijA𝐱^k1|k1j,\displaystyle\sum_{j\in\mathcal{N}(i)}w_{ij}A\widehat{\mathbf{x}}^{j}_{k-1|k-1}, (3)
𝐱^k|ki\displaystyle\widehat{\mathbf{x}}^{i}_{k|k} =\displaystyle= 𝐱^k|k1i+KiHi(ykiHi𝐱^k|k1i).\displaystyle\widehat{\mathbf{x}}^{i}_{k|k-1}+K_{i}H_{i}^{\top}\left(y^{i}_{k}-H_{i}\widehat{\mathbf{x}}^{i}_{k|k-1}\right). (4)

with stochastic matrix W={wij}W=\{w_{ij}\} as the adjacency matrix of the sensor network 𝒢N\mathcal{G}_{N} representing the fusion weights among the sensors, KiK_{i} as the local gain matrix at agent ii, and 𝐱^k|k1i\widehat{\mathbf{x}}^{i}_{k|k-1} and 𝐱^k|ki\widehat{\mathbf{x}}^{i}_{k|k} as the state estimate at time kk given all the information of agent ii and its in-neighbors 𝒩(i)\mathcal{N}(i), respectively, at time k1k-1 and kk. In contrast to double time-scale estimators/observers [11] with many consensus iterations between every two consecutive time-steps k1k-1 and kk of social dynamics (1), the estimator (3)-(4) performs one iteration of information fusion between steps k1k-1 and kk, which is more efficient in terms of computation/communication loads.

Define the estimation error at agent ii as 𝐞ki=𝐱k𝐱^k|ki\mathbf{e}_{k}^{i}=\mathbf{x}_{k}-\widehat{\mathbf{x}}^{i}_{k|k} and the error vector 𝐞k=[(𝐞k1),,(𝐞kn)]\mathbf{e}_{k}=\left[(\mathbf{e}_{k}^{1})^{\top},\dots,(\mathbf{e}_{k}^{n})^{\top}\right]^{\top}. Following similar procedure as in [6], the error dynamics is as follows,

𝐞k=(WAKDH(WA))𝐞k1+𝐪k,\displaystyle\mathbf{e}_{k}=(W\otimes A-KD_{H}(W\otimes A))\mathbf{e}_{k-1}+\mathbf{q}_{k}, (5)

with DH=diag[HiHi]D_{H}=\text{diag}[H_{i}^{\top}H_{i}], K=diag[Ki]K=\text{diag}[K_{i}] as the feedback gain matrix, and 𝐪k\mathbf{q}_{k} as the collective vector of noise-related terms 𝐪k=[(𝐪k1),,(𝐪kn)]\mathbf{q}_{k}=\left[(\mathbf{q}_{k}^{1})^{\top},\dots,(\mathbf{q}_{k}^{n})^{\top}\right]^{\top} as,

𝐪ki=\displaystyle\mathbf{q}_{k}^{i}= νk1Ki(Hiηki+Hiτki+HiHiνk1),\displaystyle\mathbf{\nu}_{k-1}-K_{i}\Bigl{(}H_{i}^{\top}\mathbf{\eta}^{i}_{k}+H_{i}^{\top}\mathbf{\tau}^{i}_{k}+H_{i}^{\top}H_{i}\mathbf{\nu}_{k-1}\Bigr{)}, (6)
𝐪k=\displaystyle\mathbf{q}_{k}= 𝟏Nνk1KDH(𝟏Nνk1)\displaystyle\mathbf{1}_{N}\otimes\mathbf{\nu}_{k-1}-KD_{H}(\mathbf{1}_{N}\otimes\mathbf{\nu}_{k-1})
KD¯HηkKD¯Hτk,\displaystyle-K\overline{D}_{H}\mathbf{\eta}_{k}-K\overline{D}_{H}\mathbf{\tau}_{k}, (7)

with 𝟏N\mathbf{1}_{N} as the vector of 11’s of size NN and D¯H=diag[Hi]\overline{D}_{H}=\mbox{diag}[H_{i}^{\top}]. Following Kalman theory, for bounded steady-state estimation error, (WA,DH)(W\otimes A,D_{H}) needs to be observable, characterizing the distributed observability condition for network of estimators/observers [25]. Using structured system theory, this condition can be investigated via graph theoretic notions. In this direction, the associated network to WAW\otimes A is a Kronecker-product network, whose observability condition relies on the structure of both 𝒢\mathcal{G} and 𝒢N\mathcal{G}_{N}. Given the social network 𝒢\mathcal{G}, the conditions on the sensor network 𝒢N\mathcal{G}_{N} to satisfy distributed observability follows the recent results on composite-network theory and network observability discussed in [24], which is summarized in the following lemma.

Lemma 2

[24] Given (A,H)(A,H)-observability via Lemma 1, minimal sufficient condition for (WA,DH)(W\otimes A,D_{H})-observability is that matrix WW be irreducible, i.e., the network 𝒢N\mathcal{G}_{N} be strongly-connected (SC).

For an observable pair (WA,DH)(W\otimes A,D_{H}), the feedback gain matrix KK can be designed to stabilize the error dynamics (5). Mathematically, for A¯=WAKDH(WA)\overline{A}=W\otimes A-KD_{H}(W\otimes A), we need to design KK such that ρ(A¯)<1\rho(\overline{A})<1 (Schur stability of error dynamics (5)) for general social systems with ρ(A)>1\rho(A)>1 with ρ()\rho(\cdot) as the spectral radius. As mentioned before, for distributed case, KK needs to be further block-diagonal such that each sensor only uses local information in its own neighborhood. The iterative LMI-based algorithm to design such block-diagonal gain KK is given in [26]. In attack-free scenario, the distributed estimator/observer (3)-(4) with proper gain KK ensures tracking the global social state with bounded steady-state error as discussed in [6, 7]. Next, in this section, we further study the performance of the proposed protocol in the presence of non-zero random attack signals. Define y^ki=Hi𝐱^k|ki\widehat{y}_{k}^{i}=H_{i}\widehat{\mathbf{x}}_{k|k}^{i} as the estimated output at sensor ii at time kk. To detect possible attacks, each sensor calculates its residual as the difference of its original output and the estimated one,

rki=\displaystyle r_{k}^{i}= ykiy^ki=ykiHi𝐱^k|ki=Hi𝐞ki+ηki+τki.\displaystyle{y}_{k}^{i}-\widehat{y}_{k}^{i}={y}_{k}^{i}-H_{i}\widehat{\mathbf{x}}_{k|k}^{i}=H_{i}\mathbf{e}_{k}^{i}+\mathbf{\eta}^{i}_{k}+\mathbf{\tau}^{i}_{k}. (8)

Having ρ(A¯)<1\rho(\overline{A})<1, the steady-state error in (5) only relies on the term 𝐪ki\mathbf{q}_{k}^{i} defined in (6) as,

Hi𝐪ki\displaystyle H_{i}\mathbf{q}_{k}^{i} =Hiνk1HiKiHiηki\displaystyle=H_{i}\mathbf{\nu}_{k-1}-H_{i}K_{i}H_{i}^{\top}\mathbf{\eta}^{i}_{k}
+HiKiHiτki+HiKiHiHiνk1.\displaystyle+H_{i}K_{i}H_{i}^{\top}\mathbf{\tau}^{i}_{k}+H_{i}K_{i}H_{i}^{\top}H_{i}\mathbf{\nu}_{k-1}. (9)

From (8) and (9), it is clear that for τki0\mathbf{\tau}^{i}_{k}\neq 0, only the residual rkir_{k}^{i} at sensor ii is biased with no effect on the residual of other sensors jij\neq i. This allows to isolate the attacked sensor as rkir_{k}^{i} only depends on τki\mathbf{\tau}^{i}_{k} and not on τkj\mathbf{\tau}^{j}_{k}’s. To detect a possible attack at agent ii via residual rkir_{k}^{i}, the non-zero term τkiHiKiHiτki\mathbf{\tau}^{i}_{k}-H_{i}K_{i}H_{i}^{\top}\mathbf{\tau}_{k}^{i} needs to be sufficiently larger than other noise terms. This ensures that the residual in attacked case is large enough to be distinguished from the noise terms in attack-free case. This is done by adding the constraint |1HiKiHi|>C|1-H_{i}K_{i}H_{i}^{\top}|>C (with CC as a pre-selected lower-bound) to the proposed LMI in [26]. To the best of our knowledge, no other analytical solution for such constrained design is given in the literature. Clearly, the detecting probability of an attack depends on the magnitude of τki\mathbf{\tau}^{i}_{k}, which justifies the probabilistic threshold design. In this direction, we consider a distributed probability-based χ2\chi^{2}-test which outperforms the deterministic fault/attack detection methods as it considers noise of unbounded support. In this case, instead of a deterministic threshold with 0 (no attack) or 11 (attack detected) outcome, different probabilistic thresholds (with different sensitivities) are defined each assigned with an FAR. In fact, higher residual-to-noise ratio (RNR) stimulates the threshold with lower FAR. In this direction, first the covariance of error 𝐞k\mathbf{e}_{k} and (attack-free) residuals need to be calculated, which are tied with the noise covariance QQ and RR. Let Ξk=𝔼(𝐞k𝐞k)\Xi_{k}=\mathbb{E}(\mathbf{e}_{k}\mathbf{e}_{k}^{\top}) and Σ=𝔼(𝐪k𝐪k)\Sigma=\mathbb{E}(\mathbf{q}_{k}\mathbf{q}^{\top}_{k}). Then, from (5),

Ξk\displaystyle\Xi_{k} =\displaystyle= A¯kΞ0(A¯k)+j=1k1A¯jΣ(A¯j)+Σ.\displaystyle\overline{A}^{k}\Xi_{0}(\overline{A}^{k})^{\top}+\sum_{j=1}^{k-1}\overline{A}^{j}\Sigma(\overline{A}^{j})^{\top}+\Sigma. (10)

Knowing that ρ(A¯)<1\rho(\overline{A})<1, the first term in (10) goes to zero. Therefore, it can be proved from [4] that for Ξ=limkΞk\Xi_{\infty}=\lim_{k\rightarrow\infty}\Xi_{k},

Ξ2=j=1A¯jΣ(A¯j)+Σ2Σ21b2,\displaystyle\|\Xi_{\infty}\|_{2}=\|\sum_{j=1}^{\infty}\overline{A}^{j}\Sigma(\overline{A}^{j})^{\top}+\Sigma\|_{2}\leq\frac{\|\Sigma\|_{2}}{1-b^{2}}, (11)

with b=A¯2<1b=\|\overline{A}\|_{2}<1. For attack-free case (τk=𝟎N\mathbf{\tau}_{k}=\mathbf{0}_{N} in (6)),

𝐪k𝐪k\displaystyle\mathbf{q}_{k}\mathbf{q}^{\top}_{k} =(INnKDH)(𝟏NNνk1νk1)(INnKDH)\displaystyle=(I_{Nn}-KD_{H})(\mathbf{1}_{NN}\otimes\nu_{k-1}\nu_{k-1}^{\top})(I_{Nn}-KD_{H})^{\top}
+(KD¯C)ηkηk(KD¯H),\displaystyle+(K\overline{D}_{C})\eta_{k}\eta_{k}^{\top}(K\overline{D}_{H})^{\top}, (12)

where 𝟏NN\mathbf{1}_{NN} is the 11’s matrix of size NN. Applying the 𝔼()\mathbb{E}(\cdot) and 22-norm operators,

Σ2\displaystyle\|\Sigma\|_{2} =(INnKDH)(𝟏NNQ)(INnKDH)2\displaystyle=\|(I_{Nn}-KD_{H})(\mathbf{1}_{NN}\otimes Q)(I_{Nn}-KD_{H})^{\top}\|_{2}
+(KD¯H)R(KD¯H)2.\displaystyle+\|(K\overline{D}_{H})R(K\overline{D}_{H})^{\top}\|_{2}. (13)

Then, the upper-bound on Σ2\|\Sigma\|_{2} is,

Σ2INnKDH22NQ2+K22R¯2,\displaystyle\|\Sigma\|_{2}\leq\|I_{Nn}-KD_{H}\|_{2}^{2}N\|Q\|_{2}+\|K\|_{2}^{2}\|\overline{R}\|_{2},

with R¯=diag[HiRiHi]\overline{R}=\mbox{diag}[H_{i}^{\top}R_{i}H_{i}]. Then, using (11),

Ξ2Na1NQ2+a2a3R2N(1b2)=Φ,\displaystyle\frac{\|\Xi_{\infty}\|_{2}}{N}\leq\frac{a_{1}N\|Q\|_{2}+a_{2}a_{3}\|R\|_{2}}{N(1-b^{2})}=\Phi, (14)

where INnKDH22=a1\|I_{Nn}-KD_{H}\|_{2}^{2}=a_{1}, K22=a2\|K\|_{2}^{2}=a_{2}, and R¯2=a3R2\|\overline{R}\|_{2}=a_{3}\|R\|_{2}. Note that in (14) the error covariance is scaled by the number of sensors NN. From (14), assuming no attack is present (τki=0\mathbf{\tau}_{k}^{i}=0), a conservative approximation for error variance at sensor ii is 𝔼((𝐞ki)(𝐞ki))=Φ\mathbb{E}((\mathbf{e}^{i}_{k})(\mathbf{e}_{k}^{i})^{\top})=\Phi. Then, following the discussion in [19], the residual rkir^{i}_{k} in (8) can be assumed as a zero-mean Gaussian variable with maximum variance Λi=𝔼((rki)(rki))=HiΦHi+Ri{\Lambda_{i}=\mathbb{E}((r^{i}_{k})(r_{k}^{i})^{\top})=H_{i}^{\top}\Phi H_{i}+R_{i}}, i.e., rki𝒩(0,Λi)r_{k}^{i}\sim\mathcal{N}(0,\Lambda_{i}). Define,

zki=(rki)2Λi,vki=t=kT+1kzti,z_{k}^{i}=\frac{(r_{k}^{i})^{2}}{\Lambda_{i}},~{}v_{k}^{i}=\sum_{t=k-T+1}^{k}z_{t}^{i}, (15)

with TT as the length of the sliding window111In general, each agent can consider a different length for the horizon T.. It is known that, for a Gaussian variable rkir_{k}^{i}, scalars zkiz_{k}^{i} and vkiv_{k}^{i} follow χ12\chi_{1}^{2}-distribution with degree 11 and TT respectively (𝔼[zki]=1\mathbb{E}[z_{k}^{i}]=1 and 𝔼[vki]=T\mathbb{E}[v_{k}^{i}]=T) [27]. In fact, these so-called distance measures zkiz_{k}^{i} and vkiv_{k}^{i} give an estimate of variance of rkir_{k}^{i} relative to the attack-free variance Λi\Lambda_{i} [19], and are known to outperform simple detectors comparing absolute residual to a threshold as in [21, 22]. Next, we determine the decision threshold θ\theta on vkiv_{k}^{i} based on a pre-specified FAR pp. It can be shown that p=1F(θ)p=1-F(\theta) where F()F(\cdot) is the cumulative distribution function (CDF) of χ12\chi_{1}^{2}-distribution. Then,

θ=2Γ1(1p,T2),\theta=2\Gamma^{-1}(1-p,\frac{T}{2}), (16)

with Γ1(,)\Gamma^{-1}(\cdot,\cdot) as the inverse regularized lower incomplete gamma function [27]. Using (16), our attack detection logic at each sensor ii is as follows,

If{vkiθvki<θThen{1i:Attack Detected0i:No Attack\text{If}~{}\left\{\begin{array}[]{@{}l}v_{k}^{i}\geq\theta\\ v_{k}^{i}<\theta\end{array}\right.~{}\text{Then}~{}\left\{\begin{array}[]{@{}l}\mathcal{H}^{i}_{1}:\text{Attack Detected}\\ \mathcal{H}^{i}_{0}:\text{No Attack}\end{array}\right. (17)

It should be noted that the existing χ2\chi^{2}-based attack detection scenarios in literature are all centralized [15, 19, 20] and in this work, using distributed estimation, we enable detection of attacks locally at every sensor with no need of a central unit. We summarize our proposed simultaneous distributed estimation and attack detection technique in Algorithm 1.

1 Given: System matrix AA, Network 𝒢N\mathcal{G}_{N}, Fusion matrix WW, Measurements yk{y}_{k}, Measurement matrix HH, System/Measurement noise covariance QQ/RR, false-alarm probability (FAR) pp, sliding window TT
2Choose block-diagonal gain KK via LMI in [26];
3 Find 𝐱^k|ki\widehat{\mathbf{x}}^{i}_{k|k} at every sensor ii via (3)-(4);
4 Find Λi\Lambda_{i} based on RR, QQ, and (14);
5 Find residuals rkir_{k}^{i} at every sensor ii via (8);
6 Find zkiz_{k}^{i} and vkiv_{k}^{i} at every sensor ii via (15) ;
7 Define threshold θ\theta based on pp and TT via (16);
8 If vkiθv_{k}^{i}\geq\theta return 1i\mathcal{H}^{i}_{1}: Attack Detected with FAR pp;
9 If vki<θv_{k}^{i}<\theta return 0i\mathcal{H}^{i}_{0}: No Attack;
Return: Hypothesis 0i\mathcal{H}^{i}_{0} or 1i\mathcal{H}^{i}_{1} for i={1,,N}i=\{1,...,N\}.
Algorithm 1 Proposed iterative methodology.

Note that after detecting a malicious attack with low FAR, the strategy in [28] can be adopted to remove unreliable data and replace the compromised sensor with its observationally equivalent counterpart to regain distributed observability.

4 Simulation Results

We evaluate our theoretical results on an example social network 𝒢\mathcal{G} of 1010 state nodes with 44 sensor observations shown in Fig. 1. The network 𝒢N\mathcal{G}_{N} of 44 sensors is considered as a cycle (satisfying Lemma 2). The fixed non-zero entries of AA and WW are chosen randomly in (0,1.1](0,1.1]. Further, ρ(A)=1.1\rho(A)=1.1 implying a potentially unstable system, ηki,νki𝒩(0,0.06)\eta_{k}^{i},\nu_{k}^{i}\sim\mathcal{N}(0,0.06), and non-zero entries of HH are set as 11. Using MATLAB’s CVX, the stabilizing block-diagonal gain KK is designed via the iterative LMI in [26] subject to |1HiKiHi|>0.2|1-H_{i}K_{i}H_{i}^{\top}|>0.2, which results in ρ(A¯)=0.97\rho(\overline{A})=0.97, b=1.42b=1.42, Φ=4.82\Phi=4.82, and Λi=4.88\Lambda_{i}=4.88. In attack-free case, each sensor is able to track the global social state 𝐱k\mathbf{x}_{k} over time via protocol (3)-(4). The time-evolution of mean squared errors 𝐞ki2n\frac{\|\mathbf{e}_{k}^{i}\|^{2}}{n} and distance measures at all sensors are shown in Fig. 2(top). Next, considering two non-zero attack sequences as τk3𝒩(0.2,0.3)\tau_{k}^{3}\sim\mathcal{N}(0.2,0.3) for k60k\geq 60 and τk1𝒩(0,0.8)\tau_{k}^{1}\sim\mathcal{N}(0,0.8) for k40k\geq 40, the distance measures vkiv_{k}^{i}’s over a sliding window of T=12T=12-step length are shown in Fig. 2(bottom). The figure clearly shows that the attacks affect the estimation error at all sensors. Setting two FARs p1=5%p_{1}=5\%, p2=35%p_{2}=35\%, the associated decision thresholds are θ1=21\theta_{1}=21, θ2=13.3\theta_{2}=13.3 via (16). From the figure, the less conservative threshold θ2\theta_{2} reveals both attacks, while θ1\theta_{1} only detects one and the other one remains stealthy most of the times.

Refer to caption
Fig. 1: The small social network 𝒢\mathcal{G} considered for simulation. The black state nodes are observed by the sensors (satisfying Lemma 1).
Refer to caption
Refer to caption
Refer to caption
Refer to caption
Fig. 2: (top) No attack: mean squared estimation error at all sensors are steady-state stable. (bottom) Attack at sensors 11 and 33: the non-zero attacks add bias to the estimation error at all sensors. Distance measures vk1v_{k}^{1} and vk3v_{k}^{3} exceeding θ2\theta_{2} reveal possible attacks at sensors 11 and 33 with FAR p2=35%p_{2}=35\%, while vk1v_{k}^{1} exceeding θ1\theta_{1} implies lower FAR p1=5%p_{1}=5\% for attack at sensor 11.

5 Conclusion

We proposed an algorithm for simultaneous estimation of states and attack detection over a distributed sensor network. Using a windowed chi-square detector, every sensor is able to locally detect possible measurement anomalies causing the residuals to exceed an FAR-based threshold. As future research directions, the results in [5, 29] can be adopted to optimally locate the sensing nodes and design the network among the social sensors to reduce cost. Additionally, adopting the pruning strategies in [1, 2], one can change the social network structure and, in turn, tune its observability and information flow to improve estimation/detection properties.

References

  • [1] M. Doostmohammadian, H. R. Rabiee, and U. A. Khan, “Centrality-based epidemic control in complex social networks,” Social Network Analysis and Mining, vol. 10, pp. 1–11, 2020.
  • [2] P. Block, M. Hoffman, I. J. Raabe, J. B. Dowd, C. Rahal, R. Kashyap, and M. C. Mills, “Social network-based distancing strategies to flatten the COVID-19 curve in a post-lockdown world,” Nature Human Behaviour, vol. 4, no. 6, pp. 588–596, 2020.
  • [3] H. Wai, A. Scaglione, and A. Leshem, “Active sensing of social networks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 2, no. 3, pp. 406–419, 2016.
  • [4] U. A. Khan and A. Jadbabaie, “Collaborative scalar-gain estimators for potentially unstable social dynamics with limited communication,” Automatica, vol. 50, no. 7, pp. 1909–1914, 2014.
  • [5] S. Pequito, S. Kar, and A. P. Aguiar, “Minimum number of information gatherers to ensure full observability of a dynamic social network: A structural systems approach,” in IEEE Global Conference on Signal and Information Processing. IEEE, 2014, pp. 750–753.
  • [6] M. Doostmohammadian, H. R. Rabiee, and U. A. Khan, “Cyber-social systems: modeling, inference, and optimal design,” IEEE Systems Journal, vol. 14, no. 1, pp. 73–83, 2019.
  • [7] M. Doostmohammadian and U. Khan, “Graph-theoretic distributed inference in social networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 4, pp. 613–623, Aug. 2014.
  • [8] S. Kar and J. M. F. Moura, “Consensus + innovations distributed inference over networks: cooperation and sensing in networked systems,” IEEE Signal Processing Magazine, vol. 30, no. 3, pp. 99–109, 2013.
  • [9] A. Mitra and S. Sundaram, “Distributed observers for LTI systems,” IEEE Transactions on Automatic Control, vol. 63, no. 11, pp. 3689–3704, 2018.
  • [10] P. Duan, Z. Duan, G. Chen, and L. Shi, “Distributed state estimation for uncertain linear systems: A regularized least-squares approach,” Automatica, vol. 117, pp. 109007, 2020.
  • [11] X. He, X. Ren, H. Sandberg, and K. H. Johansson, “Secure distributed filtering for unstable dynamics under compromised observations,” in IEEE 58th Conference on Decision and Control (CDC), 2019, pp. 5344–5349.
  • [12] M. Mansouri, M. N. Nounou, and H. N. Nounou, “Improved statistical fault detection technique and application to biological phenomena modeled by s-systems,” IEEE Transactions on Nanobioscience, vol. 16, no. 6, pp. 504–512, 2017.
  • [13] H. Karimipour, A. Dehghantanha, R. M. Parizi, K. R. Choo, and H. Leung, “A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids,” IEEE Access, vol. 7, pp. 80778–80788, 2019.
  • [14] M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H V. Poor, “Machine learning methods for attack detection in the smart grid,” IEEE Transactions on Neural Networks and Learning Systems, vol. 27, no. 8, pp. 1773–1786, 2015.
  • [15] B. Brumback and M. Srinath, “A chi-square test for fault-detection in Kalman filters,” IEEE Transactions on Automatic Control, vol. 32, no. 6, pp. 552–554, 1987.
  • [16] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Transactions on Automatic control, vol. 59, no. 6, pp. 1454–1467, 2014.
  • [17] J. Kim, C. Lee, H. Shim, Y. Eun, and J. H. Seo, “Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems having redundant sensors,” IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1162–1169, 2018.
  • [18] M. S. Chong, M. Wakaiki, and J. P. Hespanha, “Observability of linear systems under adversarial attacks,” in American Control Conference (ACC). IEEE, 2015, pp. 2439–2444.
  • [19] R. Tunga, C. Murguia, and J. Ruths, “Tuning windowed chi-squared detectors for sensor attacks,” in American Control Conference (ACC). IEEE, 2018, pp. 1752–1757.
  • [20] Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyber-attack on remote state estimation,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 4–13, 2017.
  • [21] M. Doostmohammadian and N. Meskin, “Sensor fault detection and isolation via networked estimation: Full-rank dynamical systems,” IEEE Transactions on Control of Network Systems, 2020.
  • [22] M. Deghat, V. Ugrinovskii, I. Shames, and C. Langbort, “Detection and mitigation of biasing attacks on distributed estimation networks,” Automatica, vol. 99, pp. 369–381, 2019.
  • [23] B. Satchidanandan and P. R. Kumar, “Dynamic watermarking: Active defense of networked cyber–physical systems,” Proceedings of the IEEE, vol. 105, no. 2, pp. 219–240, 2016.
  • [24] M. Doostmohammadian and U. A. Khan, “Minimal sufficient conditions for structural observability/controllability of composite networks via kronecker product,” IEEE Transactions on Signal and Information Processing over Networks, vol. 6, pp. 78–87, 2019.
  • [25] M. Doostmohammadian and U. A. Khan, “On the characterization of distributed observability from first principles,” in 2nd IEEE Global Conference on Signal and Information Processing, 2014, pp. 914–917.
  • [26] U. A. Khan and A. Jadbabaie, “Coordinated networked estimation strategies using structured systems theory,” in 49th IEEE Conference on Decision and Control, 2011, pp. 2112–2117.
  • [27] P. E. Greenwood and M. S. Nikulin, A guide to chi-squared testing, John Wiley & Sons, 1996.
  • [28] M. Doostmohammadian, H. R. Rabiee, H. Zarrabi, and U. A. Khan, “Distributed estimation recovery under sensor failure,” IEEE Signal Processing Letters, vol. 24, no. 10, pp. 1532–1536, 2017.
  • [29] M. Doostmohammadian, H. R. Rabiee, and U. A. Khan, “Structural cost-optimal design of sensor networks for distributed estimation,” IEEE Signal Processing Letters, vol. 25, no. 6, pp. 793–797, 2018.