Skip to main content

Performance of Target Tracking in Radar Network System Under Deception Attack

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9204))

Abstract

This paper studies security issue of target tracking in radar network system. We first derive the analytical result for the attackā€™s effect on the performance of target tracking when one radar station is under deception attack. Based on this, by extending to radar network system, we find the relationship between the performance of target tracking and attack parameter. Simulation is presented to demonstrate the effectiveness of our results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zheng, Y., Shi, Z., Lu, R., Hong, S., Shen, X.: An efficient data-driven particle PHD filter for multitarget tracking. IEEE Trans. Ind. Inf. 9(4), 2318ā€“2326 (2013)

    ArticleĀ  Google ScholarĀ 

  2. Pannetier, B., Dezert, J., Sella, G.: Multiple targets tracking with wireless sensor network for ground battlefield surveillance. In: Proceedings of International Conference on Radar, pp. 1ā€“8 (2014)

    Google ScholarĀ 

  3. Lee, S., Cho, Y., Hwang-Bo, M.: A stable target-tracking control for unicycle mobile robots. In: Proceedings of International Conference on Intelligent Robots and Systems, pp. 1822ā€“1827 (2000)

    Google ScholarĀ 

  4. Hong, S., Wang, L., Shi, Z., Chen, K.: Simplified particle PHD filter for multiple-target tracking: algorithm and architecture. Prog. Electromagnet. Res. 120, 481ā€“498 (2011)

    ArticleĀ  Google ScholarĀ 

  5. Zheng, G., Zheng, Y.: Radar netting technology and its development. In: IEEE CIE International Conference on Radar, pp. 933ā€“937 (2011)

    Google ScholarĀ 

  6. Oracevic, A., Akbas, S., Ozdemir, S.: Secure target detection and tracking in mission critical wireless sensor networks. In: Proceedings of International Conference on Anti-counterfeiting, Security, and Identification, pp. 1ā€“5 (2014)

    Google ScholarĀ 

  7. Chang, G., Snyder, W.E., Wang, C.: Secure tracking in sensor networks. In: Proceedings of International Conference on Communications, pp. 3082ā€“3087 (2007)

    Google ScholarĀ 

  8. Pozzobon, O., Wullems, C., Kubik, K.: Secure tracking using trusted GNSS receivers and galileo authentication services. J. Glob. Position. Syst. Position. 1(08), 200ā€“207 (2004)

    ArticleĀ  Google ScholarĀ 

  9. Lee, E., Musicki, D., Song, T.: Multi-sensor distributed fusion based on integrated probabilistic data association. In: Proceedings of International Conference on Information Fusion, pp. 1ā€“7(2014)

    Google ScholarĀ 

  10. Mo, Y., Sinopoli, B.: Secure control against replay attacks. In: Proceedings of Annual Allerton Conference on Communication, Control, and Computing, pp. 911ā€“918 (2009)

    Google ScholarĀ 

  11. Zhang, H., Cheng, P., Shi, L., Chen, J.: Optimal DoS attack policy against remote state estimation. In: Proceedings of IEEE CDC (2013)

    Google ScholarĀ 

  12. Zhang, H., Cheng, P., Shi, L., Chen ,J.: Optimal DoS attack policy with energy constraint. IEEE Trans. Autom. Control (2015)

    Google ScholarĀ 

  13. Guo, H.D., Zhang, X.H.: Distributed fusion of multisensory data based on probabilistic data fusion. Control and Decision 19(12), 1359ā€“1363 (2004)

    Google ScholarĀ 

  14. He, Y.: Radar Data Processing With Application, 3rd edn. Electronics Industry Press, Beijing (2013)

    Google ScholarĀ 

  15. Zhang, H., Cheng, P., Wu, J., Shi, L., Chen, J.: Online deception attack against remote state estimation. In: Proceedings of World Congress of the International Federation of Automatic Control (2014)

    Google ScholarĀ 

Download references

Acknowledgment

This paper is supported by NSFC (61171149,71401060), Zhejiang Province Commonware Technology Projects (2014C33103), Huaihai Institute of Technology Doctoral Research Funding (KQ15007), Lianyungang Science and Technology Projects (CK1331, SH1310).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhiguo Shi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yang, C., Zhang, H., Qu, F., Shi, Z. (2015). Performance of Target Tracking in Radar Network System Under Deception Attack. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21837-3_65

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21836-6

  • Online ISBN: 978-3-319-21837-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics