Next Article in Journal
An Elastic Fine-Tuning Dual Recurrent Framework for Non-Rigid Point Cloud Registration
Previous Article in Journal
Global Optimal Solving Algorithm for Power Distribution Based on Selective Harmonic Elimination in Cascaded H-Bridge Multilevel Inverters
Previous Article in Special Issue
A Simple and Efficient Method for RSS-AOA-Based Localization with Heterogeneous Anchor Nodes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Fusion with Labeled Multi-Bernoulli Filter for Multisensor Multitarget Tracking Against False Data Injection Attacks

1
School of Mathematical Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
School of Economics, Beijing Institute of Technology, Beijing 100081, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(11), 3526; https://doi.org/10.3390/s25113526
Submission received: 10 April 2025 / Revised: 17 May 2025 / Accepted: 26 May 2025 / Published: 3 June 2025

Abstract

:

Highlights

What are the main findings?
  • A multisensor multitarget tracking algorithm against the false data injection (FDI) attacks over networks.
  • A detection method for FDI attacks based on Kullback–Leibler divergence (KLD) between labeled multi-Bernoulli densities.
What is the implication of the main finding?
  • The proposed algorithm can efficiently detect/defend the FDI attacks and provide reliable tracking performance.

Abstract

This paper addresses multisensor multitarget tracking where the sensor network can potentially be compromised by false data injection (FDI) attacks. The existence of the targets is not known and time-varying. A tracking algorithm is proposed that can detect the possible FDI attacks over the networks. First, a local estimate is generated from the measurements of each sensor based on the labeled multi-Bernoulli (LMB) filter. Then, a detection method for FDI attacks is derived based on the Kullback–Leibler divergence (KLD) between LMB random finite set (RFS) densities. The statistical characteristics of the KLD are analyzed when the measurements are secure or compromised by FDI attacks, from which the value of the threshold is selected. Finally, the global estimate is obtained by minimizing the weighted sum of the information gains from all secure local estimates to itself. A set of suitable weight parameters is selected for the information fusion of LMB densities. An efficient Gaussian implementation of the proposed algorithm is also presented for the linear Gaussian state evolution and measurement model. Experimental results illustrate that the proposed algorithm can provide reliable tracking performance against the FDI attacks.

1. Introduction

Multitarget tracking is to jointly detect and track the number of targets and their individual trajectories of multiple mobile targets. The number of targets is time-varying, i.e., new targets can appear and existing targets can disappear. The sensor’s measurements suffer from missed detection, false alarms, and uncertain associations between targets and measurements. Multitarget tracking is a fundamental topic in many engineering fields, including traffic control [1], remote sensing [2], and computer vision [3,4].
Various methods have been developed to perform the multitarget tracking. A popular class is the random finite set (RFS)-based recursive Bayesian filtering methods, which are mainly composed of two types: unlabeled and labeled methods. The unlabeled RFS-based methods include the probability hypothesis density (PHD) filter [5], the cardinalized PHD (CPHD) filter [6], and the multi-Bernoulli (MB) filter [7]. Compared to the unlabeled methods, the labeled RFS-based methods not only track the target states but also incorporate the target labels into the target states. The labeled RFS-based methods include the generalized labeled multi-Bernoulli (GLMB) filter [8] and the labeled multi-Bernoulli (LMB) filter [9,10].
The availability of low-cost sensors has employed multiple sensors to cooperatively perform the tracking tasks. A local estimate is first computed with the measurements of each sensor. Then, the global estimate is generated by fusing all local estimates. The most commonly used fusion method is the generalized covariance intersection (GCI) fusion [11], also called as exponential mixture density [12]. The global estimate produced by GCI fusion is actually the one that minimized a weighted average of Kullback–Leibler divergence (KLD) from all local estimates to itself [13,14]. It can be interpreted as the one that leads to minimum cross-entropy from the information-theoretic viewpoint. Using the GCI fusion rule, many algorithms have been proposed for different multisensor multitarget tracking scenarios, e.g., the sensors have different fields of view [15,16], sensor fusion with event-triggered communication [17,18,19], and so on. For the event-triggered communication in [17,18,19], each sensor evaluates the KLD between the current local density and the last transmitted one and selectively sends the information that is worth transmitting, i.e., the KLD exceeds a threshold.
During these works, it is assumed that the sensor networks are secure and trusted all the time. Unfortunately, the sensor networks, such as the networked radar system [20] and the intelligent transportation networks [21], are vulnerable to unforeseen breaches in security. Due to the open communication between sensors, the data may not be transmitted with proper security protections. It is of great importance to accurately and quickly detect the adversarial attacks.
Among various types of adversarial attacks, false data injection (FDI) attacks [22,23] are a major concern. The FDI attacks are known as specific deception attacks or integrity attacks. With a successful FDI attack, an adversary can gain access to the communication and modify the transmitted data between sensors, which can manipulate the estimated values of the state variables and disrupt the system’s operation.
How to detect and defend against FDI attacks has attracted much research attention. For single-target tracking in [24], the KLDs between local posteriors are used to partition the sensors into secure and insecure sensors. In [25], the relative entropy was utilized as a stealthiness metric to detect whether the data transmitted through the wireless network are attacked. In [26], the authors investigate the security of distributed filtering under false data injection attacks, and a new protection strategy is proposed. In [27], the authors investigate a distributed secure estimation problem for a nonlinear stochastic system subject to a false data injection attack. In [28], the authors apply sequential attack strategies to wireless mesh networks and conduct a comparative analysis with synchronous strategies. In these studies, the existence of the system state is known and time-invariant, so the dimension of system state is known and time-invariant. This is different from the multitarget tracking problem, where the targets may appear or disappear, i.e., the existence of system state is not known and time-varying, so the dimension of the system state is not known and time-varying. It is necessary to design the FDI detection method that is suitable for the multitarget tracking.
In this paper, we address multisensor multitarget tracking following a Bayesian filtering perspective where the sensor network may be compromised by FDI attacks. The transmitted data between sensors may be modified by the adversary. We propose a multisensor, multitarget tracking algorithm that can detect the possible FDI attacks over the network and provide robust and accurate tracking performance. More specifically, a local estimate is first generated from the measurements of each sensor based on the LMB filter. Then, a detection method for FDI attacks is derived with an information-theoretic criterion, where the KLD between LMB densities is utilized as a metric to quantify the similarity/difference of two local estimates. If the KLD between a local estimate and the reference estimate exceeds a given threshold, the local estimate is decided to be compromised by FDI attacks. Finally, the global estimate is obtained by minimizing the weighted sum of information gains from all secure local estimates to itself. An efficient Gaussian implementation of the proposed algorithm is also presented for the linear Gaussian state evolution and measurement model.
The contributions of this paper can be summarized as follows: (1) a detection method for FDI attacks is derived based on the KLD between LMB densities, and the statistical characteristics of the KLD are analyzed when the measurements are secure or compromised by FDI attacks, from which the value of the threshold is selected; (2) a set of suitable weight parameters are selected for the information fusion of LMB densities.
The rest of this paper is organized as follows. Section 2 describes the system model and the FDI attacks for multisensor multitarget tracking. Section 3 presents the proposed multisensor multitarget tracking algorithm that can detect and defend against the FDI attacks. Extensive numerical experiments are provided in Section 4. The paper is concluded in Section 5.

2. Problem Formulation and Background

In this section, we describe the state evolution model, measurement model, and FDI attacks for the multisensor multitarget tracking problem. This section also briefly recalls the labeled RFS and LMB filters.

2.1. Target State and Evolution Model

Suppose that there are multiple targets in the surveillance area at the time k . The state vector of each target is defined as x k = p x , k , v x , k , p y , k , v y , k , where p x , k , p y , k denotes the position and v x , k , v y , k denotes the velocity of the target. The state could be extended to incorporate more variables if it is required. Both the number of targets and the state of each target are not known and time-variant.
Each target at a time k 1 may continue to exist or disappear at the next time k . We denote the surviving probability that the target with state x k 1 will continue to exist at the next time as p s ( x k 1 ) . If the target x k 1 continues to exist, its state evolves according to the nearly constant velocity model [29] as
x k = A k x k 1 + u k ,
where the transition matrix A k is given by
A k = I 2 1 T 0 1 ,
with the n × n identity matrix I n , the time interval T , and the Kronecker product . The term u k is the additive Gaussian process noise with zero mean and covariance.
Q k = q u I 2 T 3 / 2 T 2 / 2 T 2 / 2 T .
with the process noise intensity q u . Accordingly, the single-target transition density is given by
f ( x k | x k 1 ) N x k ; A k x k 1 , Q k .
Other motion models can also be used in the state space framework. The multiple targets move independently in the surveillance area.
In addition, a set of new targets are born in the surveillance area at each time step. The number of new targets is distributed according to a discrete probability distribution, and the state of each new target is distributed according to a spatial density over the surveillance area.

2.2. Sensor Network and Measurement Model

We consider a set of N sensors V { 1 , , N } , which are geographically dispersed in the surveillance area. Each sensor has sensing, communication, and processing capabilities.
For each target x k at time k , the nth sensor detects the target with probability p d ( x k ) , so the probability of the missed detection is q d ( x k ) = 1 p d ( x k ) . If the target x k is detected by the nth sensor, the measurement is governed by the single-target measurement model.
y n , k = B n , k x k + v n , k ,
where the measurement matrix is B n , k = 1 0 0 0 0 0 1 0 , and v n , k is the Gaussian measurement noise with zero mean and covariance R n , k . Other measurement models can also be used in the state space framework.
Moreover, the nth sensor may detect a set of false alarms in the surveillance area. It is usually assumed that the number of false alarms is distributed according to a discrete Poisson distribution, and each false alarm is generated according to a spatial density κ ( ) over the surveillance area.
At each time k , the sensors n 2 , , N transmit their measurements to the first sensor. The first sensor recursively estimates the multitarget states based on the measurements from all sensors up to time k .

2.3. FDI Attacks

The sensors n 2 , , N transmit their measurements to the first sensor through some wired or wireless transmission. Generally, the sensors, such as the networked radar system [20] and the intelligent transportation networks [21], are spatially deployed in a monitoring region. The data may not be transmitted with proper security protections because of the broadcast nature. The wired or wireless connections between the nth sensor and the first sensor can be maliciously compromised.
If one measurement y n , k from the nth sensor arrives at the first sensor, the received measurement may be compromised by FDI attacks. The attacker hijacks the data packets from the communication channel and injects data packets that are intentionally inaccurate [20]. The compromised measurement under the FDI attack is modified as [20].
z n , k = y n , k + ϑ n , k ,
where ϑ n , k is the FDI data injected by the attacker. A successful FDI attack can cause the state estimation to generate erroneous values. Since the FDI attack does not undermine the integrity of the data, it is stealthy (e.g., fools the popular χ 2 detector) and difficult to be detected. It is important to protect the security of the transmitted data and detect/defend the FDI attacks in the networks.

2.4. Labeled RFS and LMB Filter

In order to distinguish individual targets, a distinct label l L is augmented to each target x Ω [8], where Ω denotes the single-target state space. The target with a label is denoted as x = x , l . Let f : Ω × L L be the projection f ( x , l ) = l . The space of all labels for targets born at time k is denoted by L k . In the RFS formulation, the state of multiple targets with labels at time k can be modeled as a labeled RFS.
X k = x k 1 , , x k | X k | ,
where each target x k i ( i = 1 , , | X k | ) takes values in the state space Ω × L . Then, f X = f x : x X is the set of labels of the RFS X . Each element in X has distinct label, i.e., f X = X (the sets f X and X have the same cardinality). Similarly, the measurement set from the nth sensor can also be described as a RFS
Z n , k = z n , k 1 , , z n , k | Z n , k | ,
where each measurement z n , k j ( j = 1 , , | Z n , k | ) takes values in a single-target measurement space Ξ .
An LMB density can be completely specified by the parameter set [9].
π = r ( l ) , p ( l ) l L ,
where r ( l ) is the existence probability of the target with label l , and p ( l ) ( ) is its spatial density. The multitarget density of LMB RFS with the parameter set π is given by [9].
π X = δ | X | f X ω f X p X ,
where δ | X | f X = 1 if X = f X and 0 otherwise, which is the distinct label indicator, and
ω L = i L ( 1 r ( i ) ) l L r ( l ) 1 r ( l ) ,
p X = ( x , l ) X p ( l ) ( x ) ,
in which L is a set of labels.
The single-sensor LMB filter estimates the multitarget states using the measurements from one sensor. For notation simplicity, we temporarily remove the index ( n , k ) of Z n , k in (8), and use the notation Z to denote the measurements from any one sensor.
At times k , we denote the LMB prior density by
π k 1 = r k 1 ( l ) , p k 1 ( l ) l L ,
The newly born targets at time k is also modeled as an LMB density.
π b = r b ( l ) , p b ( l ) l L k ,
Under the Bayes framework, the LMB filter recursively estimates the multitarget states with the LMB densities, including two steps: prediction and update.
The predicted multi-target density is an LMB density with the parameters [9].
r k | k 1 ( l ) , p k | k 1 ( l ) l L = r S , k | k 1 ( l ) , p S , k | k 1 ( l ) l L r b ( l ) , p b ( l ) l L k ,
where L = L L k , and
r S , k | k 1 ( l ) = η S ( l ) r k 1 ( l ) ,
p S , k | k 1 ( l ) = p S ( l ) ( ) f ( l ) x | , p k 1 ( l ) ( ) η s ( l ) ,
η S ( l ) = p S ( l ) ( ) , p k 1 ( l ) ( ) ,
where p S ( l ) ( ) = p s ( x , l ) is the surviving probability and f ( l ) x | = f ( x , l | , l ) is the transition probability of the labeled target ( x , l ) , and the inner product notation is defined as f , g = f ( x ) g ( x ) d x .
With the measurement Z from any one sensor, the updated multitarget density is approximated as an LMB density with the parameters [9].
r k ( l ) = ( I , θ ) F ( L ) × Θ 1 I ( l ) ω ( I , θ ) ( Z ) ,
p k ( l ) ( x ) = 1 r k ( l ) ( I , θ ) F ( L ) × Θ 1 I ( l ) ω ( I , θ ) ( Z ) p θ ( x , l ) ,
where
ω ( I , θ ) ( Z ) = ω k | k 1 ( I ) [ η Z θ ] I ,
p ( θ ) ( x , l ) = p k | k 1 ( l ) ( x ) φ Z ( x , l ; θ ) η Z ( θ ) ( l ) ,
η Z ( θ ) ( l ) = p k | k 1 ( l ) ( ) , φ Z ( , l ; θ ) ,
φ Z ( x , l ; θ ) = p d ( x , l ) g ( z θ ( l ) | x , l ) κ ( z θ ( l ) ) ,     if     θ ( l ) > 0 1 p d ( x , l ) ,               if     θ ( l ) = 0 ,
and Θ is the space of mapping I { 0 , 1 , , | Z | } such that θ ( i ) = θ ( j ) > 0 if and only if i = j (whose elements represent track-to-measurement association hypotheses) F ( L ) denotes the set of all subsets of L , 1 I ( l ) = 1 if l I and 0 otherwise, p d ( x , l ) is the detection probability, and g ( z | x , l ) is the single-target likelihood function of the measurement z corresponding to the labeled target ( x , l ) .

3. LMB-Based Multitarget Tracking Against FDI Attacks

We derive a detection method for FDI attacks based on the KLD between LMB densities. The secure local estimates are then fused into a global estimate.

3.1. Basic Construction

The sensors n 2 , , N transmit their measurements to the first sensor, then the first sensor estimates the multitarget states based on the measurements of all sensors. The estimation process includes three steps: (1) the first sensor computes a local estimate based on each sensor’s measurements with the LMB filter; (2) the first sensor detects the local estimates that are comprised by FDI attacks; (3) the first sensor fuses all secure local estimates into a global estimate.
At time k 1 , we denote the LMB prior density at the first sensor as that in (13). With the prior density and the LMB born density in (14), the first sensor computes the local estimate from the nth sensor’s measurements, and we denote the parameter set as
π n , k = ( r n , k ( l ) , p n , k ( l ) ) l L .
The corresponding LMB density with the form in (10) is denoted as π n , k . Since all local estimates are computed from the same prior density and born density, the label set L is the same for all local estimates, and the labels corresponding to the same target in different set π n , k are also the same, i.e., there is no label mismatching problem.
Since the wired or wireless connections between the nth sensor and the first sensor may be maliciously compromised by FDI attacks, the compromised measurements will deteriorate the local estimates. It is necessary to detect the attacked sensor as well as the corresponding local estimates before the fusion process. In particular, since the first sensor directly has its measurements, it is not necessary to be transmitted over the wired or wireless connections, so it is assumed that the measurements of the first sensor are secure all the time.
For notation simplicity, we remove the index k in π n , k and π n , k because all operations are executed at time k in the rest of this section.

3.2. KLD-Based Detection of FDI Attacks

Because the measurements from the first sensor cannot be compromised by FDI attacks all the time, the local LMB density π 1 will be secure all the time. We consider π 1 as the reference density and utilize some metric for the discrepancy between each density π n ( n 2 , , N ) and the reference density π 1 to detect the possible FDI attacks. We introduce a binary variable b n for the nth sensor such that b n = 1 if the measurements from the nth sensor are compromised by FDI attacks, and b n = 0 otherwise.
There are many ways to quantify the discrepancy of two densities. The KLD is a competitive alternative in many probabilistic detection problems. The KLD of two probabilistic densities p ( x ) and q ( x ) is defined as
D K L p | | q = p ( x ) ln p ( x ) q ( x ) d x ,
where D K L p | | q 0 , and D K L p | | q = 0 if and only if p ( x ) = q ( x ) . The KLD quantifies how close a density is to a reference density. The KLD admits an elegant interpretation from an information-theoretic viewpoint, i.e., it represents the information gain achieved when the density q is revised into the density p [30].
The concept of the KLD can be extended to the multitarget RFS density with the set integral. If p and q are two RFS densities, the discrepancy between p and q can be measured by the KLD.
D K L p | | q = p ( X ) ln p ( X ) q ( X ) δ X ,
where the integral δ X , is a set integral defined by
f ( X ) δ X = f ( ) + n = 1 1 n ! f ( { x 1 , , x n } ) d x 1 d x n .
The KLD is not symmetric, i.e., D K L p | | q D K L q | | p , in general. The J divergence [31] symmetrizes the KLD as
J p , q = 1 2 D K L p | | q + D K L q | | p
where D K L p | | q is usually called forward KLD and D K L q | | p is reverse KLD [32].
By considering the discrepancy metric in (29), the following detection method for FDI attacks is adopted as
b n = 1 ,   if   J ( π n , π 1 ) > τ   0 ,             otherwise   ,
where the scalar τ is a design parameter that is tuned so as to achieve a desired performance. We will discuss the choice of τ in Section 4.2.
Substituting the LMB density π n with the parameter set π n = ( r n ( l ) , p n ( l ) ) l L into the KLD (27) and using the definition of set integral, it can be proved that [33]
D K L ( π n | | π 1 ) = l L D K L ( r n ( l ) | | r 1 ( l ) ) + l L r n ( l ) D K L ( p n ( l ) | | p 1 ( l ) ) ,
where
D K L ( r n ( l ) | | r 1 ( l ) ) = r n ( l ) ln r n ( l ) r 1 ( l ) + ( 1 r n ( l ) ) ln 1 r n ( l ) 1 r 1 ( l ) ,
D K L ( p n ( l ) | | p 1 ( l ) ) = p n ( l ) ( x ) ln p n ( l ) ( x ) p 1 ( l ) ( x ) d x .
Because all local estimates are computed from the same prior density and born density, there is no label mismatching problem, i.e., the term with label l in the local density π n = ( r n ( l ) , p n ( l ) ) l L describes the same target as the term with label l in the local density π 1 = ( r 1 ( l ) , p 1 ( l ) ) l L . The KLD D K L ( π n | | π 1 ) can be computed in a label-wise manner.

3.3. Information Fusion

We denote the index set of secure local estimates after the detection of FDI attacks as
U = { n V : b n = 0 } ,
The local estimates π n in U are not considered to be compromised by FDI attacks. In order to combine all local estimates in U into a global estimate, the first sensor carries out the information fusion step. The goal of the fusion step is to compute the global density that encapsulates all the information provided by the local densities π n in U which can provide better estimation performance.
From a view of information theory, the fusion of the local densities π n in U is to find the density that has minimum divergence gain from all densities π n in U with respect to a suitable metric. The global density can be obtained by minimizing the weighted sum of the information gains from all local densities in U to itself as [13].
π = arg inf π n U w n D ( π , π n ) ,
where D ( π , π n ) denotes the information gain from the density π n to the density π , and the non-negative weights w n reflect the relative information confidence of π n in comparison with the rest terms, which satisfies n U w n = 1 . The KLD D K L ( π n | | π ) between π n and π is one of the popularly adopted metrics for the information gain.
It can be shown that the fusion density computed by the rule (35) with the KLD is given by [34].
π ( X ) = n U π n ( X ) w n n U π n ( X ) w n δ X .
The rule in (36) is also called the GCI fusion rule. It provides a weighted geometric mean in the form of an exponential mixture of the local densities.
Because all local densities π n in U are LMB densities with the parameters π n = ( r n ( l ) , p n ( l ) ) l L , one can check that the global density π in (35) is also an LMB density with the parameters [33].
r ( l ) = n U [ r n ( l ) p n ( l ) ( x ) ] w n d x n U ( 1 r n ( l ) ) w n + n U [ r n ( l ) p n ( l ) ( x ) ] w n d x ,
p ( l ) ( x ) = n U [ p n ( l ) ( x ) ] w n n U [ p n ( l ) ( x ) ] w n d x .
Since the same target is described with the same label in the different parameter sets ( r n ( l ) , p n ( l ) ) l L , the fusion step can be performed in a label-wise manner.

3.4. Implementation Issues

Each term of the LMB density in (14) of the newly born targets is commonly modeled as a Gaussian density.
p b ( l ) ( x ) = N ( x ; μ b ( l ) , Σ b ( l ) ) .
where the model parameters μ b ( l ) and Σ b ( l ) indicate the highest local concentrations of spontaneous birth, which can represent, for example, the airports where the target is mostly likely to appear [35].
The computation of D K L ( r n ( l ) | | r 1 ( l ) ) in (32) is direct. In order to develop a computationally feasible implementation of D K L ( p n ( l ) | | p 1 ( l ) ) in (33), we approximate the spatial density p n ( l ) ( x ) as a Gaussian density.
p n ( l ) ( x ) = N ( x ; μ n ( l ) , Σ n ( l ) ) .
This result can be obtained by the commonly used Gaussian mixture implementation of the LMB filter and suitable pruning/merging operations. Because each term ( r n ( l ) , p n ( l ) ) in π n describes only one target with the existence probability r n ( l ) and the spatial density p n ( l ) ( x ) , the Gaussian approximation has enough accuracy.
Substituting the Gaussian form of p n ( l ) ( x ) into (33), it will have
D K L ( p n ( l ) | | p 1 ( l ) ) = 1 2 Trace ( Σ 1 ( l ) ) 1 Σ n ( l ) M + ln Σ 1 ( l ) Σ n ( l )            + ( μ 1 ( l ) μ n ( l ) ) T ( Σ 1 ( l ) ) 1 ( μ 1 ( l ) μ n ( l ) ) ,
where M denotes the dimension of the variable x , and Trace Σ means the trace of the matrix Σ .
Moreover, substituting the Gaussian form of p n ( l ) ( x ) into (38), it will have
p ( l ) ( x ) = N ( x ; μ ( l ) , Σ ( l ) ) ,
Σ ( l ) = n U w n Σ n ( l ) 1 1 ,
μ ( l ) = Σ ( l ) n U w n Σ n ( l ) 1 μ n ( l ) ,
and n U [ p n ( l ) ( x ) ] w n d x in (37) and (38) has the form
n U [ p n ( l ) ( x ) ] w n d x = det ( 2 π Σ ( l ) ) 1 2 n U det ( 2 π Σ n ( l ) ) w n 2       × exp 1 2 n U μ n ( l ) Σ n ( l ) 1 μ n ( l ) μ ( l ) Σ ( l ) 1 μ ( l ) .
If the n sensor is not compromised by FDI attacks, the value of r n ( l ) will be closely approximate to the value of r 1 ( l ) , both of which are the existence probability of the same target with label l . Similarly, the value of Σ n ( l ) is also closely approximate to Σ 1 ( l ) with the assumptions of the shared prior and the uniform Kalman gains. So the values of D K L ( r n ( l ) | | r 1 ( l ) ) in (32) and Trace ( Σ 1 ( l ) ) 1 Σ n ( l ) M + ln Σ 1 ( l ) Σ n ( l ) in (41) are much smaller than the value of ( μ 1 ( l ) μ n ( l ) ) T ( Σ 1 ( l ) ) 1 ( μ 1 ( l ) μ n ( l ) ) in (41). The main part of D K L ( π n | | π 1 ) will be decided by the quadratic form ( μ 1 ( l ) μ n ( l ) ) T ( Σ 1 ( l ) ) 1 ( μ 1 ( l ) μ n ( l ) ) . The distribution of the quadratic form can be approximated with a general χ 2 distribution.

3.5. Choice of Weighting Parameters

Substituting (31) into the weighted sum of the information gains (35), it will be
π = arg inf π n U w n l L D K L r n ( l ) | | r 1 ( l ) + r n ( l ) D K L p n ( l ) | | p 1 ( l ) ,
where the same weight w n is used for all l L . We revise the information gains as
π = arg inf π l L n U w n ( l ) D K L r n ( l ) | | r 1 ( l ) + r n ( l ) D K L p n ( l ) | | p 1 ( l ) ,
i.e., the different weight w n ( l ) is used for different l L .
From the fused covariance Σ ( l ) in (43), the optimality in the mean square error sense is as follows [36]
min w n ( l ) Trace Σ ( l ) = min w n ( l ) Trace n U w n ( l ) Σ n ( l ) 1 1 .
For each l L , a suboptimal solution is then given by
w n ( l ) = 1 / Trace Σ n ( l ) m U 1 / Trace Σ m ( l ) .
The suboptimal solution is calculated for each track l .
The proposed algorithm is summarized in Algorithm 1. The computational burden at the first sensor mainly includes two parts: (1) The first sensor computes the KLDs D K L ( π n | | π 1 ) in (31) for each n with D K L ( r n ( l ) | | r 1 ( l ) ) in (32) and D K L ( p n ( l ) | | p 1 ( l ) ) in (41); (2) The first sensor computes the fused parameters Σ ( l ) in (43) and μ ( l ) in (44).
Algorithm 1: Multisensor Multitarget Tracking Against FDI Attacks
Input: The prior density π k 1 = r k 1 ( l ) , p k 1 ( l ) l L .
Output: The posterior density π k = r k ( l ) , p k ( l ) l L .
1. The first sensor receives the measurements Z n , k in (8) from the nth sensor ( n = 2 , , N ).
2. The first sensor computes the predicted density r k | k 1 ( l ) , p k | k 1 ( l ) l L in (15).
3. For each measurement Z n , k   ( n = 1 , , N ) , the first sensor computes the local updated density π n , k = ( r n , k ( l ) , p n , k ( l ) ) l L in (25) with (19) and (20), where p n , k ( l ) is approximated as a Gaussian density in (40).
4. The first sensor detects the FDI attacks with (30), where D K L ( π n | | π 1 ) is computed with (31)–(33) and (41).
5. The first sensor computes the fused density π k = ( r k ( l ) , p k ( l ) ) l L with (37), (38), and (42)–(45).

4. Performance Evaluation

In this section, we present the performance evaluation of the proposed algorithm via simulation experiments.

4.1. Simulation Setup

The considered scenario is to track multiple targets that move inside the [ 1000 , 1000 ] m × [ 1000 , 1000 ] m surveillance area. The target’s state is represented by a 4-D vector, with 2-D position and 2-D velocity components. The survival probability of the target with state x k is set to a constant p s x k = 0.99 . The target dynamics of the survival targets are described by the constant velocity model in (1), with the sampling interval T = 1 ( s ) in (2) and (3). The process noise intensity in (3) is set to q u = 1 ( m ) . The LMB density in (14) and (39) of the newly born targets includes 4 terms, which is denoted as L k = { 1 , 2 , 3 , 4 } . Each term has the following form:
μ b ( 1 ) = ( 600 , 10 , 600 , 10 ) T , Σ b ( 1 ) = 100 I 4 ;
μ b ( 2 ) = ( 800 , 10 , 200 , 10 ) T , Σ b ( 2 ) = 100 I 4 ;
μ b ( 3 ) = ( 400 , 10 , 600 , 10 ) T , Σ b ( 3 ) = 100 I 4 ;
μ b ( 4 ) = ( 200 , 10 , 800 , 10 ) T , Σ b ( 4 ) = 100 I 4 .
The birth probability of each term in (14) is r b ( l ) = 0.03 , l = 1 , 2 , 3 , 4 .
During the simulations, the total time steps are set to K = 100 . It is assumed that no target exists at the initial time k = 0 . Two new targets appear at time k = 1 , k = 21 , k = 41 and k = 81 respectively, and two existing targets disappear at time k = 60 . The starting and ending times of the trajectories of eight targets are depicted in Figure 1.
The surveillance area is monitored by a sensor network with N sensors that N = 5 , 7 , , 15 will be considered respectively. The detection probability of each sensor is set to a constant. p d ( x k ) = 0.98 . The variance of measurement noise in (5) is set to
R n , k = σ v 2 I 2 ,
where σ v 2 = 5 m and σ v 2 = 10 m will be considered later. The number of false alarms received by each sensor is distributed by a Poisson distribution with mean μ f = 10 . The spatial density κ ( ) that describes each false alarm is a uniform distribution over the surveillance area.
We evaluate the tracking performance in terms of the optimal subpattern assignment (OSPA) metric [37]. Denote the actual multitarget state at time k as X = { x 1 , , x n } and the estimated multitarget state as Y = { y 1 , , y m } (we remove the time index k for briefly), where n and m are the number of actual and estimated targets, respectively. The OSPA metric is defined as
d ¯ p ( c ) X , Y 1 n min π Π n i = 1 m d ( c ) x i , y π ( i ) p + c p ( n m ) 1 p ,
if m n , and d ¯ p ( c ) X , Y d ¯ p ( c ) Y , X if m > n, where Π n is the set of permutations on { 1 , , n } , d ( c ) ( x , y ) min c , d ( x , y ) is the distance between x and y cut off at c > 0 , and 1 p < + . The OSPA metric can capture the cardinality errors and state errors meaningfully. The parameters for the OSPA metric are set to p = 1 and the cutoff parameter c = 50 in the simulations.

4.2. Choice of Parameter τ

We consider that the FDI data ϑ n , k in (6) has the form
ϑ n , k = ρ σ v 2 ( 1 , 1 ) T ,
where σ v 2 is the measurement variance in (54), and different values of ρ will be considered in the experiments.
To choose the parameter τ in (29), we first investigate the distributions of J ( π n , π 1 ) when the sensor is secure or it is compromised by FDI attacks. With the simulation results, Figure 2 (where σ v 2 = 5 ) presents the distributions of J ( π n , π 1 ) when the sensor is secure, i.e., ρ = 0 , and when the sensor is compromised by FDI attacks with ρ = 1 , 1.5 , 2 , 2.5 , 3 . Figure 3 presents the distributions of J ( π n , π 1 ) with σ v 2 = 10 and ρ = 0 , 1 , 1.5 , 2 , 2.5 , 3 .
Let J s be the random variable that describes the distribution of J ( π n , π 1 ) when the sensor is secure, and J f be the random variable that describes the distribution of J ( π n , π 1 ) when the sensor is compromised by FDI attacks. We choose the parameter τ as
τ = arg min τ max P J s > τ , P J f < τ ,
where P J s > τ is the probability that the secure sensor is misjudged as a compromised sensor, and P J f < τ is the probability that the compromised sensor is misjudged as a secure sensor. On the other hand, if we do not have the knowledge of ϑ n , k , we choose the parameter τ as
τ = arg τ P J s > τ = P ˜ ,
where P ˜ is a suitable probability.

4.3. Experimental Results

We investigate and compare the following algorithms:
  • The proposed algorithm (PA1) where the parameter τ is computed with (57).
  • The proposed algorithm (PA2) where the parameter τ is computed with (58).
  • The comparison algorithm (CA1) that has the exact knowledge of the secure sensors and fuses the secure local estimates into a global estimate.
  • The comparison algorithm (CA2) that fuses all local estimates into a global estimate.
  • The comparison algorithm (CA3) that estimates the state only with the measurements from the first sensor.
First, we consider a sensor network with N = 5 sensors. The first sensor is secure during whole the time interval. The second and third sensors are compromised by FDI attacks from time k = 21 to k = 60 . The fourth and fifth sensors are comprised by FDI attacks from time k = 61 to k = 100 . We repeat independent Monte Carlo runs to evaluate and compare the performance of these algorithms. The measurement noise variance is set to σ v 2 = 10 . Three cases of the parameter ρ are considered. Case 1: the parameter ρ in (56) is a constant ρ = 2 . The parameter τ in (57) is then computed as τ = 6.07 with (57) and the results in Figure 3. We present the average OSPA performance of the algorithms at each time step in Figure 4. Case 2: the parameter ρ in (56) is a constant as ρ = 1 , 1.5 , 2 , 2.5 , 3 . The parameter τ in (30) is computed with (57) and the results in Figure 3. We present the time-average OSPA performance of the algorithms at these values of ρ in Figure 5. Case 3: ρ is not a constant and a new value of ρ is generated as ρ = | γ | where γ N ( 0 , 4 ) at the time k = 21 , 31 , , 91 . The parameter τ in (30) is computed with (58), where the probability P ˜ is set to P ˜ = 0.16 and the result τ is τ = 6.07 . We present the average OSPA performance of the algorithms at each time step in Figure 6. From Figure 4, Figure 5 and Figure 6, the proposed algorithm can detect/defend the FDI attacks and provide the estimation performance that is close to the CA1, which has the exact knowledge of the secure sensors.
Second, we consider a sensor network with N = 5 , 7 , , 15 sensors. The first sensor is secure during whole the time interval. The sensors n { 2 , , ( N + 1 ) / 2 } are compromised by FDI attacks from time k = 21 to k = 60 . The sensors n { ( N + 1 ) / 2 + 1 , , N } are compromised by FDI attacks from time k = 61 to k = 100 . The number of attacked sensors is ( N 1 ) / 2 at each time from k = 21 to k = 100 . The measurement noise variance is set to σ v 2 = 10 . Figure 7 presents the average OSPA performance of the algorithms when the parameter ρ in (56) is a constant ρ = 2 and the number of sensors is N = 9 . Figure 8 presents the time-average OSPA performance of the algorithms when the parameter ρ in (56) is a constant ρ = 2 and the number of sensors is N = 5 , 7 , , 15 . Figure 9 presents the time-average OSPA performance of the algorithms when the parameter ρ is generated as ρ = | γ | where γ N ( 0 , 4 ) at the time k = 21 , 31 , , 91 , and the number of sensors is N = 5 , 7 , , 15 . From Figure 7, Figure 8 and Figure 9, as the number N of sensors increases, the proposed algorithm can provide better estimation performance, while the performance of CA2 becomes worse.

5. Conclusions

We proposed a multisensor multitarget tracking algorithm that can detect the possible FDI attacks over the sensor networks. With a successful FDI attack, an adversary can manipulate the estimated values of the state variables and disrupt the system’s operation. A local estimate is first generated from the measurements of each sensor based on the LMB filter. A detection method for FDI attacks is then derived based on the KLD between LMB densities. Finally, the global estimate is produced by GCI fusion from all secure local estimates. To select the value of the threshold parameter, the statistical characteristics of the KLD are also analyzed when the sensor is secure or compromised by FDI attacks. A set of suitable weight parameters is selected for the information fusion of all secure local estimates. An efficient Gaussian implementation is also presented for the linear state-space model. Extensive experimental results illustrate that the proposed algorithm can efficiently detect/defend the FDI attacks and provide reliable tracking performance.

Author Contributions

Conceptualization, Y.Y. and Y.L.; methodology, Y.Y. and Y.L.; software, Y.Y.; validation, Y.Y.; formal analysis, Y.Y. and Y.L.; investigation, Y.Y. and Y.L.; resources, Y.L.; data curation, Y.L.; writing—original draft preparation, Y.Y.; writing—review and editing, Y.L.; visualization, Y.L.; supervision, Y.L.; project administration, Y.L.; funding acquisition, Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CPHDCardinalized Probability Hypothesis Density
FDIFalse Data Injection
GCIGeneralized Covariance Intersection
GLMBGeneralized Labeled Multi-Bernoulli
KLDKullback–Leibler Divergence
LMBLabeled Multi-Bernoulli
MBMulti-Bernoulli
OSPAOptimal SubPattern Assignment
PHDProbability Hypothesis Density
RFSRandom Finite Set

References

  1. Guo, D.; Li, Z.; Shuai, H.; Zhou, F. Multi-Target Vehicle Tracking Algorithm Based on Improved DeepSORT. Sensors 2024, 24, 7014. [Google Scholar] [CrossRef] [PubMed]
  2. Hao, Y.; Wang, Z.; Niño-Mora, J.; Fu, J.; Pan, Q.; Yang, M. Non-Myopic Beam Scheduling for Multiple Smart-Target Tracking in Phased Array Radar Networks. Sensors 2024, 24, 7755. [Google Scholar] [CrossRef] [PubMed]
  3. Liu, C.; Zhang, B.; Bo, C.; Wang, D. Query-Based Object Visual Tracking with Parallel Sequence Generation. Sensors 2024, 24, 4802. [Google Scholar] [CrossRef] [PubMed]
  4. Hou, R.; Yin, J.; Liu, Y.; Lu, H. Research on Multi-Hole Localization Tracking Based on a Combination of Machine Vision and Deep Learning. Sensors 2024, 24, 984. [Google Scholar] [CrossRef]
  5. Mahler, R. Multi-Target Bayes Filtering via First-Order Multi-Target Moments. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 1152–1178. [Google Scholar] [CrossRef]
  6. Mahler, R. PHD Filters of Higher Order in Target Number. IEEE Trans. Aerosp. Electron. Syst. 2007, 43, 1523–1543. [Google Scholar] [CrossRef]
  7. Vo, B.-T.; Vo, B.-N.; Cantoni, A. The Cardinality Balanced Multi-Target Multi-Bernoulli Filter and Its Implementations. IEEE Trans. Signal Process. 2009, 57, 409–423. [Google Scholar]
  8. Vo, B.-T.; Vo, B.-N. Labeled Random Finite Sets and Multi-Object Conjugate Priors. IEEE Trans. Signal Process. 2013, 61, 3460–3475. [Google Scholar] [CrossRef]
  9. Reuter, S.; Vo, B.-T.; Vo, B.-N.; Dietmayer, K. The Labeled Multi-Bernoulli Filter. IEEE Trans. Signal Process. 2014, 62, 3246–3260. [Google Scholar] [CrossRef]
  10. Cao, C.; Zhao, Y. Multi-Sensor Multi-Target Tracking with Generalized Labeled Multi-Bernoulli Filter Based on Track-Before-Detect Observation Model Using Gaussian Belief Propagation. Digit. Signal Process. 2024, 153, 104618. [Google Scholar] [CrossRef]
  11. Shan, X.; Cabani, A.; Chafouk, H. Interval Split Covariance Intersection Filter: Theory and Its Application to Cooperative Localization in a Multi-Sensor Multi-Vehicle System. Sensors 2024, 24, 3124. [Google Scholar] [CrossRef] [PubMed]
  12. Üney, M.; Clark, D.E.; Julier, S.J. Distributed Fusion of PHD Filters via Exponential Mixture Densities. IEEE J. Sel. Top. Signal Process. 2013, 7, 521–531. [Google Scholar] [CrossRef]
  13. Battistelli, G.; Chisci, L.; Fantacci, C.; Farina, A.; Graziano, A. Consensus CPHD Filter for Distributed Multitarget Tracking. IEEE J. Sel. Top. Signal Process. 2013, 7, 508–520. [Google Scholar] [CrossRef]
  14. Al Hage, J.; El Najjar, M.E.; Pomorski, D. Multi-Sensor Fusion Approach with Fault Detection and Exclusion Based on the Kullback-Leibler Divergence: Application on Collaborative Multi-Robot System. Inf. Fusion 2017, 37, 61–76. [Google Scholar] [CrossRef]
  15. Yi, W.; Li, G.; Battistelli, G. Distributed Multi-Sensor Fusion of PHD Filters with Different Sensor Fields of View. IEEE Trans. Signal Process. 2020, 68, 5204–5218. [Google Scholar] [CrossRef]
  16. Jin, Y.; Li, J. A Discrepant Information Selection Mechanism for Cooperative Sensors. Signal Process. 2023, 203, 108772. [Google Scholar] [CrossRef]
  17. Battistelli, G.; Chisci, L.; Selvi, D. A Distributed Kalman Filter with Event-Triggered Communication and Guaranteed Stability. Automatica 2018, 93, 75–82. [Google Scholar] [CrossRef]
  18. Gao, L.; Battistelli, G.; Chisci, L. Event-Triggered Distributed Multitarget Tracking. IEEE Trans. Signal Inf. Process. Netw. 2019, 5, 570–584. [Google Scholar] [CrossRef]
  19. Shen, K.; Zhang, C.; Dong, P.; Jing, Z.; Leung, H. Consensus-Based Labeled Multi-Bernoulli Filter with Event-Triggered Communication. IEEE Trans. Signal Process. 2022, 70, 1185–1196. [Google Scholar] [CrossRef]
  20. Yang, C.; Feng, L.; Zhang, H.; He, S.; Shi, Z. A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems. IEEE Trans. Signal Inf. Process. Netw. 2018, 4, 125–136. [Google Scholar] [CrossRef]
  21. Biron, Z.A.; Dey, S.; Pisu, P. Real-Time Detection and Estimation of Denial of Service Attack in Connected Vehicle Systems. IEEE Trans. Intell. Transp. Syst. 2018, 19, 3893–3902. [Google Scholar] [CrossRef]
  22. Hu, J.; Yang, X.; Yang, L. A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. Sensors 2024, 24, 1643. [Google Scholar] [CrossRef] [PubMed]
  23. Cheng, Z.; Yang, L.; Yuan, Q.; Long, Y.; Ren, H. Distributed Consensus Estimation for Networked Multi-Sensor Systems Under Hybrid Attacks and Missing Measurements. Sensors 2024, 24, 4071. [Google Scholar] [CrossRef] [PubMed]
  24. Liu, X.; Ngai, E.C.-H.; Liu, J. Secure Information Fusion Using Local Posterior for Distributed Cyber-Physical Systems. IEEE Trans. Mobile Comput. 2021, 20, 2–14. [Google Scholar] [CrossRef]
  25. Liu, H.; Niu, B.; Li, Y. False-Data-Injection Attacks on Remote Distributed Consensus Estimation. IEEE Trans. Cybern. 2022, 52, 433–443. [Google Scholar] [CrossRef]
  26. Zhou, J.; Yang, W.; Zhang, H.; Zheng, W.X.; Xu, Y.; Tang, Y. Security Analysis and Defense Strategy of Distributed Filtering Under False Data Injection Attacks. Automatica 2022, 138, 110151. [Google Scholar] [CrossRef]
  27. Li, L.; Yang, H.; Xia, Y.; Dai, L. Distributed Filtering for Nonlinear Systems Under False Data Injection Attack. Automatica 2022, 145, 110521. [Google Scholar] [CrossRef]
  28. Dui, H.; Zhai, J.; Fu, X. Attack strategies and reliability analysis of Wireless Mesh Networks considering cascading failures. Reliab. Eng. Syst. Saf. 2025, 257, 110832. [Google Scholar] [CrossRef]
  29. Li, X.R.; Jilkov, V.P. Survey of Maneuvering Target Tracking. Part I: Dynamic Models. IEEE Trans. Aerosp. Electron. Syst. 2003, 39, 1333–1364. [Google Scholar]
  30. Särkkä, S. Bayesian Filter and Smoothing; Cambridge University Press: New York, NY, USA, 2013. [Google Scholar]
  31. Naghshvar, M.; Javidi, T.; Wigger, M. Extrinsic Jensen-Shannon Divergence: Applications to Variable-Length Coding. IEEE Trans. Inf. Theory 2015, 61, 2148–2164. [Google Scholar] [CrossRef]
  32. He, S.; Shin, H.; Tsourdos, A. Information-Theoretic Joint Probabilistic Data Association Filter. IEEE Trans. Autom. Control 2021, 66, 1262–1269. [Google Scholar] [CrossRef]
  33. Gao, L.; Battistelli, G.; Chisci, L. Fusion of Labeled RFS Densities with Minimum Information Loss. IEEE Trans. Signal Process. 2020, 68, 5855–5868. [Google Scholar] [CrossRef]
  34. Fantacci, C.; Vo, B.-N.; Battistelli, G.; Chisci, L. Robust Fusion for Multisensor Multiobject Tracking. IEEE Signal Process. Lett. 2018, 25, 640–644. [Google Scholar] [CrossRef]
  35. Vo, B.-N.; Ma, W.-K. The Gaussian Mixture Probability Hypothesis Density Filter. IEEE Trans. Signal Process. 2006, 54, 4091–4104. [Google Scholar] [CrossRef]
  36. Niehsen, W. Information Fusion Based on Fast Covariance Intersection Filtering. In Proceedings of the 5th International Conference on Information Fusion, Annapolis, MD, USA, 8–11 July 2002; pp. 901–904. [Google Scholar]
  37. Schuhmacher, D.; Vo, B.-T.; Vo, B.-N. A Consistent Metric for Performance Evaluation of Multi-Object Filters. IEEE Trans. Signal Process. 2008, 56, 3447–3457. [Google Scholar] [CrossRef]
Figure 1. The starting and ending times of the trajectories of eight targets T 1 , , T 8 , e.g., T 2 [ 1 , 60 ] denote that the 2nd target appears at k = 1 and disappears at k = 60 .
Figure 1. The starting and ending times of the trajectories of eight targets T 1 , , T 8 , e.g., T 2 [ 1 , 60 ] denote that the 2nd target appears at k = 1 and disappears at k = 60 .
Sensors 25 03526 g001
Figure 2. The distribution of J ( π n , π 1 ) with different values of ρ and σ v 2 = 5 .
Figure 2. The distribution of J ( π n , π 1 ) with different values of ρ and σ v 2 = 5 .
Sensors 25 03526 g002
Figure 3. The distribution of J ( π n , π 1 ) with different values of ρ and σ v 2 = 10 .
Figure 3. The distribution of J ( π n , π 1 ) with different values of ρ and σ v 2 = 10 .
Sensors 25 03526 g003
Figure 4. OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and N = 5 .
Figure 4. OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and N = 5 .
Sensors 25 03526 g004
Figure 5. Time-average OSPA performance of the algorithms with different values of ρ , σ v 2 = 10 and N = 5 .
Figure 5. Time-average OSPA performance of the algorithms with different values of ρ , σ v 2 = 10 and N = 5 .
Sensors 25 03526 g005
Figure 6. OSPA performance of the algorithms with ρ = | γ | where γ N ( 0 , 4 ) , σ v 2 = 10 and N = 5 .
Figure 6. OSPA performance of the algorithms with ρ = | γ | where γ N ( 0 , 4 ) , σ v 2 = 10 and N = 5 .
Sensors 25 03526 g006
Figure 7. OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and N = 9 .
Figure 7. OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and N = 9 .
Sensors 25 03526 g007
Figure 8. Time-average OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and different number N .
Figure 8. Time-average OSPA performance of the algorithms with ρ = 2 , σ v 2 = 10 and different number N .
Sensors 25 03526 g008
Figure 9. Time-average OSPA performance of the algorithms with ρ = | γ | where γ N ( 0 , 4 ) , σ v 2 = 10 and different number N of sensors.
Figure 9. Time-average OSPA performance of the algorithms with ρ = | γ | where γ N ( 0 , 4 ) , σ v 2 = 10 and different number N of sensors.
Sensors 25 03526 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, Y.; Liang, Y. Secure Fusion with Labeled Multi-Bernoulli Filter for Multisensor Multitarget Tracking Against False Data Injection Attacks. Sensors 2025, 25, 3526. https://doi.org/10.3390/s25113526

AMA Style

Yu Y, Liang Y. Secure Fusion with Labeled Multi-Bernoulli Filter for Multisensor Multitarget Tracking Against False Data Injection Attacks. Sensors. 2025; 25(11):3526. https://doi.org/10.3390/s25113526

Chicago/Turabian Style

Yu, Yihua, and Yuan Liang. 2025. "Secure Fusion with Labeled Multi-Bernoulli Filter for Multisensor Multitarget Tracking Against False Data Injection Attacks" Sensors 25, no. 11: 3526. https://doi.org/10.3390/s25113526

APA Style

Yu, Y., & Liang, Y. (2025). Secure Fusion with Labeled Multi-Bernoulli Filter for Multisensor Multitarget Tracking Against False Data Injection Attacks. Sensors, 25(11), 3526. https://doi.org/10.3390/s25113526

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop