Secure State Estimation for Cyber-Physical Systems Against Active Eavesdropping Attacks: A Stochastic Encryption-Based Method

被引:0
|
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; Intelligent sensors; Channel estimation; State estimation; Sensor phenomena and characterization; Cyber-physical systems; state estimation; active eavesdropping attacks; stochastic encryption-decryption; COMMUNICATION;
D O I
10.1109/TASE.2024.3457903
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article is concerned with the problem of remote state estimation for cyber-physical systems (CPSs) in the presence of an active eavesdropper. To prevent information leakage, a novel stochastic encryption scheme is proposed to protect the data transmitted via packet loss channel. The scheme can guarantee the user's privacy and force the estimation error of the eavesdropper to diverge by using a predefined scheduling sequence to transmit raw data or an encrypted version randomly. In this case, two types of data are considered: raw measurements and local estimates. Aiming at these two transmission scenarios, the expected estimation error recursions with respect to encryption mechanisms, channel parameters, and the system dynamics are derived in the minimum mean error estimation sense. Further, we show the conditions that require the expected estimation error covariance of the user to be bounded, while the active eavesdropper's expected estimation error grows unbounded by mathematical induction and matrix theory methods. Finally, an application example is illustrated to verify the performance of the encryption scheme.
引用
收藏
页码:6998 / 7007
页数:10
相关论文
共 50 条
  • [41] Joint attack detection and secure state estimation of cyber-physical systems
    Forti, Nicola
    Battistelli, Giorgio
    Chisci, Luigi
    Sinopoli, Bruno
    INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) : 4303 - 4330
  • [42] Stochastic Stealthy False Data Injection Attacks Against Cyber-Physical Systems
    Liu, Ruirui
    Yu, Hao
    Hao, Fei
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6009 - 6020
  • [43] Probability-Based Stochastic Stealthy Attacks in Cyber-Physical Systems
    Ye, Dan
    Liu, Xiaoke
    Li, Pengyu
    IEEE SYSTEMS JOURNAL, 2024, 18 (02): : 1288 - 1295
  • [44] Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks
    Guan, Yanpeng
    Ge, Xiaohua
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01): : 48 - 59
  • [45] A Multigain-Switching-Mechanism-Based Secure Estimation Scheme Against DoS Attacks for Nonlinear Industrial Cyber-Physical Systems
    Yan, Jing-Jing
    Yang, Guang-Hong
    Liu, Xiao-Xu
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2023, 70 (05) : 5094 - 5103
  • [46] Measurement protection to prevent cyber-physical attacks against power State Estimation
    Margossian, Harag
    Kfouri, Ronald
    Saliba, Rita
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2023, 43
  • [47] Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks
    Chen, Bo
    Ho, Daniel W. C.
    Hu, Guoqiang
    Yu, Li
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) : 1862 - 1876
  • [48] Event-based secure control for cyber-physical systems against false data injection attacks
    Li, Jinyan
    Li, Xiao-Meng
    Cheng, Zhijian
    Ren, Hongru
    Li, Hongyi
    INFORMATION SCIENCES, 2024, 679
  • [49] Output feedback secure control for cyber-physical systems against sparse sensor attacks
    Liu, Cheng-Qian
    Li, Xiao-Jian
    Long, Yue
    Sun, Jie
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 384 (384)
  • [50] LQ Secure Control for Cyber-Physical Systems Against Sparse Sensor and Actuator Attacks
    An, Liwei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (02): : 833 - 841