Skip to main content

Correction-Based Diffusion LMS Algorithms for Secure Distributed Estimation Under Attacks

  • Conference paper
  • First Online:
Proceedings of 2019 Chinese Intelligent Systems Conference (CISC 2019)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 592))

Included in the following conference series:

Abstract

In this paper, we mainly study the distributed estimation problem under attacks, which is mainly used to estimate the position parameters. To solve this problem, a correction-based secure diffusion least mean square (CS-dLMS) algorithm, which is a hybrid algorithm that composes of a non-cooperative LMS (nc-LMS) algorithm and a correction-based diffusion least-mean squares (C-dLMS) algorithm, is proposed for distributed estimation. The nc-LMS algorithm is used to provide a reliable reference system, which can detect reliable neighbor nodes by setting a threshold under network attacks. The correction-based least mean square algorithm can estimate unknown parameters by interacting with neighbor nodes. In order to guarantee the mean performance of the CS-dLMS algorithm under attracks, a sufficient condition is proposed. Finally, Simulation results are provided to verify the effectiveness of the proposed algorithm and it outperforms the C-dLMS algorithm and nc-LMS algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Di Lorenzo P, Sayed AH (2013) Sparse distributed learning based on diffusion adaptation. IEEE Trans Signal Process 61(6):1419–1433

    Article  MathSciNet  Google Scholar 

  2. Sayed AH, Lopes CG (2007) Adaptive processing over distributed networks. IEICE Trans Fundam Electron 90(8):1504–1510

    Article  Google Scholar 

  3. Nassif R, Richard C, Ferrari A, Sayed AH (2017) Diffusion LMS for multitask problems with local linear equality constraints. IEEE Trans Signal Process 65(19):4979–4993

    Article  MathSciNet  Google Scholar 

  4. Omer Bin Saeed M, Zerguine A, Zummo SA (2010) Variable step-size least mean square algorithms over adaptive networks. In: 10th international conference on information science, signal processing and their applications (ISSPA 2010), Kuala Lumpur, pp 381–384

    Google Scholar 

  5. Yuan K, Ying B, Zhao X, Sayed AH (2018) Exact diffusion for distributed optimization and learning - Part I: algorithm development. IEEE Trans Signal Process 67:708–723. https://doi.org/10.1109/TSP.2018.2875898

    Article  MathSciNet  MATH  Google Scholar 

  6. Wu SC, Liu B, Bai X, Hou YG (2015) Eavesdropping-based gossip algorithms for distributed consensus in wireless sensor networks. IEEE Signal Process Lett 22(9):1388–1391

    Article  Google Scholar 

  7. Vempaty A, Ray P, Varshney P (2004) False discovery rate based distributed detection in the presence of Byzantines. IEEE Trans Aerosp Electron 50(3):1826–1840

    Article  Google Scholar 

  8. Marano S, Matta V, Tong L (2009) Distributed detection in the presence of Byzantine attacks. IEEE Signal Process Mag 57(1):16–29

    Article  MathSciNet  Google Scholar 

  9. Vempaty A, Tong L, Varshney P (2013) Distributed inference with Byzantine data: state of the art review on data falsifification attacks. IEEE Signal Process Mag 30(5):65–75

    Article  Google Scholar 

  10. Kailkhura B, Brahma S, Han YS, Varshney PK (2014) Distributed detection in tree topologies with Byzantines. IEEE Trans Signal Process 62:3208–3219

    Article  MathSciNet  Google Scholar 

  11. Lu G, Chen W, Huang D (2015) Distributed diffusion least mean square algorithm based on the reputation mechanism. J Electron Inf Technol 37(5):1234–1240 (in Chinese)

    Google Scholar 

  12. Liu Y, Li C (2018) Secure distributed estimation over wireless sensor networks under attacks. IEEE Trans Aerosp Electron Syst 54(4):1815–1831

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the Science and Technology Major Project of Guangxi (GuikeAA18118054), NSFC (61573031, 61573059) and BJNSF (4162070).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huining Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chang, H., Li, W., Du, J. (2020). Correction-Based Diffusion LMS Algorithms for Secure Distributed Estimation Under Attacks. In: Jia, Y., Du, J., Zhang, W. (eds) Proceedings of 2019 Chinese Intelligent Systems Conference. CISC 2019. Lecture Notes in Electrical Engineering, vol 592. Springer, Singapore. https://doi.org/10.1007/978-981-32-9682-4_43

Download citation

Publish with us

Policies and ethics