This paper addresses fusion of labeled multi-Bernoulli (LMB) densities in a peer-to-peer sensor network subject to misbehaviors due to abnormal conditions of the signal propagation channel (i.e. low signal-noise-ratio) or to malicious attacks. In such situations unintentional or intentional modifications of the transmitted messages can occur which degrade the performance of standard fusion methods. In order to overcome the aforementioned difficulties, we propose a resilient approach to distributed fusion of LMB densities in which each node exploits the local density as trusted source of information to detect the modified/false data coming from neighboring nodes. The implementation issues of the proposed method as well as possible cyber-attack models in the context of multi-object filtering are also discussed. The performance of the proposed method is verified via simulation experiments concerning fusion under cyber-attacks.

Resilient labeled multi-Bernoulli fusion with peer-to-peer sensor network / Lin Gao, Giorgio Battistelli, Luigi Chisci. - In: INFORMATION FUSION. - ISSN 1566-2535. - ELETTRONICO. - 100:(2023), pp. 101965.0-101965.0. [10.1016/j.inffus.2023.101965]

Resilient labeled multi-Bernoulli fusion with peer-to-peer sensor network

Lin Gao;Giorgio Battistelli;Luigi Chisci
2023

Abstract

This paper addresses fusion of labeled multi-Bernoulli (LMB) densities in a peer-to-peer sensor network subject to misbehaviors due to abnormal conditions of the signal propagation channel (i.e. low signal-noise-ratio) or to malicious attacks. In such situations unintentional or intentional modifications of the transmitted messages can occur which degrade the performance of standard fusion methods. In order to overcome the aforementioned difficulties, we propose a resilient approach to distributed fusion of LMB densities in which each node exploits the local density as trusted source of information to detect the modified/false data coming from neighboring nodes. The implementation issues of the proposed method as well as possible cyber-attack models in the context of multi-object filtering are also discussed. The performance of the proposed method is verified via simulation experiments concerning fusion under cyber-attacks.
2023
100
0
0
Goal 9: Industry, Innovation, and Infrastructure
Lin Gao, Giorgio Battistelli, Luigi Chisci
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/1326852
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact