{"title":"欺骗攻击下的分布式多核最大熵状态约束卡尔曼滤波","authors":"Guoqing Wang;Zhaolei Zhu;Chunyu Yang;Lei Ma;Wei Dai;Xinkai Chen","doi":"10.1109/TNSE.2024.3506553","DOIUrl":null,"url":null,"abstract":"In this paper, we investigate the distributed robust state estimation of non-Gaussian systems under unknown deception attacks with the imprecise constraint information. Leveraging the advantage of multi-kernel maximum correntropy criterion (MK-MCC) in non-Gaussian signal processing, a novel maximum-a-posterior like utility function (MAP-LUF) is designed inspired by the traditional 2-norm form cost function, where the inaccurate constraint information is taken into consideration. The direct solution of MAP-LUF gives rise to the centralized MK-MCC based state-constrained Kalman filter (C-MKMCSCKF) through fixed point iteration. Subsequently, the corresponding distributed algorithm is obtained by incorporating the consensus average in the computation of sum terms existing in the C-MKMCSCKF algorithm, which enables local information sharing to approximate the centralized estimation accuracy. Furthermore, we also establish the connection between the proposed centralized algorithm and the Banach theorem through dimension extension, and provide the convergence condition. The effectiveness of our proposed algorithms is validated through comparisons with related works in typical target tracking scenarios over sensor network.","PeriodicalId":54229,"journal":{"name":"IEEE Transactions on Network Science and Engineering","volume":"12 1","pages":"533-546"},"PeriodicalIF":6.7000,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Distributed Multi-Kernel Maximum Correntropy State-Constrained Kalman Filter Under Deception Attacks\",\"authors\":\"Guoqing Wang;Zhaolei Zhu;Chunyu Yang;Lei Ma;Wei Dai;Xinkai Chen\",\"doi\":\"10.1109/TNSE.2024.3506553\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we investigate the distributed robust state estimation of non-Gaussian systems under unknown deception attacks with the imprecise constraint information. Leveraging the advantage of multi-kernel maximum correntropy criterion (MK-MCC) in non-Gaussian signal processing, a novel maximum-a-posterior like utility function (MAP-LUF) is designed inspired by the traditional 2-norm form cost function, where the inaccurate constraint information is taken into consideration. The direct solution of MAP-LUF gives rise to the centralized MK-MCC based state-constrained Kalman filter (C-MKMCSCKF) through fixed point iteration. Subsequently, the corresponding distributed algorithm is obtained by incorporating the consensus average in the computation of sum terms existing in the C-MKMCSCKF algorithm, which enables local information sharing to approximate the centralized estimation accuracy. Furthermore, we also establish the connection between the proposed centralized algorithm and the Banach theorem through dimension extension, and provide the convergence condition. The effectiveness of our proposed algorithms is validated through comparisons with related works in typical target tracking scenarios over sensor network.\",\"PeriodicalId\":54229,\"journal\":{\"name\":\"IEEE Transactions on Network Science and Engineering\",\"volume\":\"12 1\",\"pages\":\"533-546\"},\"PeriodicalIF\":6.7000,\"publicationDate\":\"2024-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Network Science and Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10767294/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Network Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10767294/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, MULTIDISCIPLINARY","Score":null,"Total":0}
Distributed Multi-Kernel Maximum Correntropy State-Constrained Kalman Filter Under Deception Attacks
In this paper, we investigate the distributed robust state estimation of non-Gaussian systems under unknown deception attacks with the imprecise constraint information. Leveraging the advantage of multi-kernel maximum correntropy criterion (MK-MCC) in non-Gaussian signal processing, a novel maximum-a-posterior like utility function (MAP-LUF) is designed inspired by the traditional 2-norm form cost function, where the inaccurate constraint information is taken into consideration. The direct solution of MAP-LUF gives rise to the centralized MK-MCC based state-constrained Kalman filter (C-MKMCSCKF) through fixed point iteration. Subsequently, the corresponding distributed algorithm is obtained by incorporating the consensus average in the computation of sum terms existing in the C-MKMCSCKF algorithm, which enables local information sharing to approximate the centralized estimation accuracy. Furthermore, we also establish the connection between the proposed centralized algorithm and the Banach theorem through dimension extension, and provide the convergence condition. The effectiveness of our proposed algorithms is validated through comparisons with related works in typical target tracking scenarios over sensor network.
期刊介绍:
The proposed journal, called the IEEE Transactions on Network Science and Engineering (TNSE), is committed to timely publishing of peer-reviewed technical articles that deal with the theory and applications of network science and the interconnections among the elements in a system that form a network. In particular, the IEEE Transactions on Network Science and Engineering publishes articles on understanding, prediction, and control of structures and behaviors of networks at the fundamental level. The types of networks covered include physical or engineered networks, information networks, biological networks, semantic networks, economic networks, social networks, and ecological networks. Aimed at discovering common principles that govern network structures, network functionalities and behaviors of networks, the journal seeks articles on understanding, prediction, and control of structures and behaviors of networks. Another trans-disciplinary focus of the IEEE Transactions on Network Science and Engineering is the interactions between and co-evolution of different genres of networks.