Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation

被引:3
|
作者
Zou, Jiaying [1 ,2 ]
Liu, Hanxiao [1 ,2 ]
Liu, Chun [3 ]
Ren, Xiaoqiang [3 ]
Wang, Xiaofan [3 ]
机构
[1] Shanghai Univ, Sch Future Technol, Shanghai 200444, Peoples R China
[2] Shanghai Univ, Inst Artificial Intelligence, Shanghai 200444, Peoples R China
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Noise; Eavesdropping; Optimal scheduling; Estimation error; State estimation; Schedules; Job shop scheduling; Cyber-physical systems; remote state estimation; eavesdropping attacks; transmission schedule;
D O I
10.1109/LCSYS.2024.3398200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter is concerned with the preservation of privacy in remote state estimation of cyber-physical systems. A privacy-preserving transmission scheduling strategy against eavesdropping is proposed, incorporating three operational modes for sensors: silence, direct transmission, and noise-injected transmission. This strategy is designed to minimize the transmission cost and estimation error covariance for the remote estimator while maximizing the estimation error covariance for eavesdroppers. Threshold structures are demonstrated for optimal transmission schedules in different scenarios. Additionally, a novel correlation between the optimal transmission choice and the magnitude of injection noise is presented, particularly pertinent to scenarios involving direct transmission and transmission with injection noise. This correlation is important in balancing transmission information integrity against privacy concerns. Finally, several numerical examples are presented to demonstrate the effectiveness of the theoretical results.
引用
收藏
页码:538 / 543
页数:6
相关论文
共 50 条
  • [11] Privacy-Preserving Trajectory Publication Against Parking Point Attacks
    Sui, Peipei
    Wo, Tianyu
    Wen, Zhangle
    Li, Xianxian
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 569 - 574
  • [12] A survey on privacy-preserving federated learning against poisoning attacks
    Xia, Feng
    Cheng, Wenhao
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13565 - 13582
  • [13] A Privacy-Preserving Defense Mechanism Against Request Forgery Attacks
    Fung, Ben S. Y.
    Lee, Patrick P. C.
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 45 - 52
  • [14] Privacy-Preserving Remote Diagnostics
    Brickell, Justin
    Porter, Donald E.
    Shmatikov, Vitaly
    Witchel, Emmett
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 498 - 507
  • [15] A multi-channel transmission schedule for remote state estimation under DoS attacks
    Ding, Kemi
    Li, Yuzhe
    Quevedo, Daniel E.
    Dey, Subhrakanti
    Shi, Ling
    AUTOMATICA, 2017, 78 : 194 - 201
  • [16] Privacy-preserving distributed state estimation in smart grid
    Dai, Xueying
    Yang, Hao
    Gu, Haoli
    Wang, Lei
    Chen, Bo
    Guo, Fanghong
    ELECTRIC POWER SYSTEMS RESEARCH, 2024, 229
  • [17] A Privacy-Preserving State Estimation Scheme for Smart Grids
    Tran, Hong-Yen
    Hu, Jiankun
    Pota, Hemanshu R.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3940 - 3956
  • [18] Linear Encryption Against Eavesdropping on Remote State Estimation
    Shang, Jun
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4413 - 4419
  • [19] Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey
    Yan, Xinhao
    Zhou, Guanzhong
    Quevedo, Daniel E.
    Murguia, Carlos
    Chen, Bo
    Huang, Hailong
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 6190 - 6207
  • [20] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587