Abstract
In this paper, we mainly study the distributed estimation problem under attacks, which is mainly used to estimate the position parameters. To solve this problem, a correction-based secure diffusion least mean square (CS-dLMS) algorithm, which is a hybrid algorithm that composes of a non-cooperative LMS (nc-LMS) algorithm and a correction-based diffusion least-mean squares (C-dLMS) algorithm, is proposed for distributed estimation. The nc-LMS algorithm is used to provide a reliable reference system, which can detect reliable neighbor nodes by setting a threshold under network attacks. The correction-based least mean square algorithm can estimate unknown parameters by interacting with neighbor nodes. In order to guarantee the mean performance of the CS-dLMS algorithm under attracks, a sufficient condition is proposed. Finally, Simulation results are provided to verify the effectiveness of the proposed algorithm and it outperforms the C-dLMS algorithm and nc-LMS algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Di Lorenzo P, Sayed AH (2013) Sparse distributed learning based on diffusion adaptation. IEEE Trans Signal Process 61(6):1419–1433
Sayed AH, Lopes CG (2007) Adaptive processing over distributed networks. IEICE Trans Fundam Electron 90(8):1504–1510
Nassif R, Richard C, Ferrari A, Sayed AH (2017) Diffusion LMS for multitask problems with local linear equality constraints. IEEE Trans Signal Process 65(19):4979–4993
Omer Bin Saeed M, Zerguine A, Zummo SA (2010) Variable step-size least mean square algorithms over adaptive networks. In: 10th international conference on information science, signal processing and their applications (ISSPA 2010), Kuala Lumpur, pp 381–384
Yuan K, Ying B, Zhao X, Sayed AH (2018) Exact diffusion for distributed optimization and learning - Part I: algorithm development. IEEE Trans Signal Process 67:708–723. https://doi.org/10.1109/TSP.2018.2875898
Wu SC, Liu B, Bai X, Hou YG (2015) Eavesdropping-based gossip algorithms for distributed consensus in wireless sensor networks. IEEE Signal Process Lett 22(9):1388–1391
Vempaty A, Ray P, Varshney P (2004) False discovery rate based distributed detection in the presence of Byzantines. IEEE Trans Aerosp Electron 50(3):1826–1840
Marano S, Matta V, Tong L (2009) Distributed detection in the presence of Byzantine attacks. IEEE Signal Process Mag 57(1):16–29
Vempaty A, Tong L, Varshney P (2013) Distributed inference with Byzantine data: state of the art review on data falsifification attacks. IEEE Signal Process Mag 30(5):65–75
Kailkhura B, Brahma S, Han YS, Varshney PK (2014) Distributed detection in tree topologies with Byzantines. IEEE Trans Signal Process 62:3208–3219
Lu G, Chen W, Huang D (2015) Distributed diffusion least mean square algorithm based on the reputation mechanism. J Electron Inf Technol 37(5):1234–1240 (in Chinese)
Liu Y, Li C (2018) Secure distributed estimation over wireless sensor networks under attacks. IEEE Trans Aerosp Electron Syst 54(4):1815–1831
Acknowledgments
This work was supported by the Science and Technology Major Project of Guangxi (GuikeAA18118054), NSFC (61573031, 61573059) and BJNSF (4162070).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chang, H., Li, W., Du, J. (2020). Correction-Based Diffusion LMS Algorithms for Secure Distributed Estimation Under Attacks. In: Jia, Y., Du, J., Zhang, W. (eds) Proceedings of 2019 Chinese Intelligent Systems Conference. CISC 2019. Lecture Notes in Electrical Engineering, vol 592. Springer, Singapore. https://doi.org/10.1007/978-981-32-9682-4_43
Download citation
DOI: https://doi.org/10.1007/978-981-32-9682-4_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-32-9681-7
Online ISBN: 978-981-32-9682-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)