Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation

被引:3
|
作者
Zou, Jiaying [1 ,2 ]
Liu, Hanxiao [1 ,2 ]
Liu, Chun [3 ]
Ren, Xiaoqiang [3 ]
Wang, Xiaofan [3 ]
机构
[1] Shanghai Univ, Sch Future Technol, Shanghai 200444, Peoples R China
[2] Shanghai Univ, Inst Artificial Intelligence, Shanghai 200444, Peoples R China
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Noise; Eavesdropping; Optimal scheduling; Estimation error; State estimation; Schedules; Job shop scheduling; Cyber-physical systems; remote state estimation; eavesdropping attacks; transmission schedule;
D O I
10.1109/LCSYS.2024.3398200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter is concerned with the preservation of privacy in remote state estimation of cyber-physical systems. A privacy-preserving transmission scheduling strategy against eavesdropping is proposed, incorporating three operational modes for sensors: silence, direct transmission, and noise-injected transmission. This strategy is designed to minimize the transmission cost and estimation error covariance for the remote estimator while maximizing the estimation error covariance for eavesdroppers. Threshold structures are demonstrated for optimal transmission schedules in different scenarios. Additionally, a novel correlation between the optimal transmission choice and the magnitude of injection noise is presented, particularly pertinent to scenarios involving direct transmission and transmission with injection noise. This correlation is important in balancing transmission information integrity against privacy concerns. Finally, several numerical examples are presented to demonstrate the effectiveness of the theoretical results.
引用
收藏
页码:538 / 543
页数:6
相关论文
共 50 条
  • [1] On Optimal Privacy-Preserving Transmission Schedule for Remote State Estimation in the Presence of an Eavesdropper
    Wang, Le
    Cao, Xianghui
    2019 1ST INTERNATIONAL CONFERENCE ON INDUSTRIAL ARTIFICIAL INTELLIGENCE (IAI 2019), 2019,
  • [2] A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems
    Liu, Hanxiao
    Zou, Jiaying
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1221 - 1225
  • [3] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    AUTOMATICA, 2022, 137
  • [4] Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
    Wang, Le
    Cao, Xianghui
    Sun, Bowen
    Zhang, Heng
    Sun, Changyin
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) : 1987 - 1997
  • [5] Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks
    Li, Dengke
    Zhou, Han
    Yang, Wen
    ELECTRONICS, 2019, 8 (09)
  • [6] Optimal event-triggered transmission scheduling for privacy-preserving wireless state estimation
    Lu, Jingyi
    Leong, Alex S.
    Quevedo, Daniel E.
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4205 - 4224
  • [7] Optimal Transmission Schedule With Privacy Preservation for Cyber-Physical System Against Eavesdropping Attack
    Jin, Zengwang
    Ma, Menglu
    Wang, Zhen
    Sun, Changyin
    IEEE SIGNAL PROCESSING LETTERS, 2025, 32 : 436 - 440
  • [8] Optimal Offline Privacy Schedule for Remote State Estimation under an Eavesdropper
    Wang, Le
    Cao, Xianghui
    Sun, Changyin
    2019 34RD YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2019, : 676 - 682
  • [9] Privacy-preserving state estimation with unreliable channels
    Huang, Jie
    Gao, Chen
    He, Xiao
    ISA TRANSACTIONS, 2022, 127 : 4 - 12
  • [10] SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems
    Lin, Xiaodong
    Lu, Rongxing
    Shen, Xuemin
    Nemoto, Yoshiaki
    Kato, Nei
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) : 365 - 378