LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Secure Distributed Estimation Against Data Integrity Attacks in Internet-of-Things Systems

Photo by campaign_creators from unsplash

A secure distributed estimation method against data integrity attacks is presented for general Internet-of-Things (IoT) systems. By exploiting the spatial sparsity of the attacks, a robust optimal estimation objective to… Click to show full abstract

A secure distributed estimation method against data integrity attacks is presented for general Internet-of-Things (IoT) systems. By exploiting the spatial sparsity of the attacks, a robust optimal estimation objective to protect the entire IoT system is established. Then, a false data processor is developed to suppress the bad effects of the attacks. The convergence of the presented method is analyzed. It shows that, under accessible conditions, the estimation error will converge to be uniformly bounded for all cases, i.e., all communication links and transmitted data are arbitrarily compromised. Furthermore, by utilizing the property of persistence, a quantitative trust model is established for IoT systems based on the past behaviors of the nodes. Then, a trust-based distributed estimation method is proposed to enhance security. Simulation results by considering an IoT system with 50 nodes and 145 edges are also provided to verify our theoretical results. Note to Practitioners—The increasingly serious attack events that happened in recent years demonstrate the importance of security in the development of Internet-of-Things (IoT) systems. Different from the traditional Internet, IoT systems are usually constrained by computing and storage resources. Then, complex encryption and authentication algorithms or protocols will not be applicable to IoT systems. Distributed estimation plays an important role in the collaborative control, monitoring, and management of IoT systems. Inevitably, attacks to distributed estimation could make false data spread throughout the networks and further cause terrible consequences, while the issues of network security have not been yet taken into consideration in the existing design of distributed estimation. In this article, we propose a secure distributed estimation method. By adding a security mechanism into the distributed estimation algorithm, the ability of resistance to any data integrity attacks can be achieved. Moreover, the possible damage will be completely controllable for arbitrary attacks. That is, our method can guarantee that the estimation performance will always be acceptable even in the worst case. Besides, it is simple and lightweight, and no additional communication consumption and hardware devices are needed for its deployment and operations.

Keywords: data integrity; secure distributed; distributed estimation; estimation; iot systems; integrity attacks

Journal Title: IEEE Transactions on Automation Science and Engineering
Year Published: 2022

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.