Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems

被引:1
|
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; State estimation; Job shop scheduling; Informatics; Costs; Cyber-physical systems (CPSs); dynamic encryption; eavesdropping attacks; Markov decision process (MDP); optimal encryption scheduling; REMOTE STATE ESTIMATION;
D O I
10.1109/TII.2024.3431096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal encryption scheduling for remote state estimation in cyber-physical systems (CPSs) against eavesdropping attacks. A smart sensor sends packets to a remote estimator based on an encrypted scheme, meanwhile, an eavesdropper overhears and decrypts the data transmitted with a certain probability. In this context, we formulate the optimal encryption problem as a Markov decision process (MDP) to minimize a convex combination of the expected estimation errors of the user and eavesdropper. A necessary and sufficient condition for the optimal encryption policy to be stationary is derived, and the double threshold structure is obtained. Furthermore, we derive the decay rate of the eavesdropper's estimation error with respect to the secret key leakage rate. To enhance the security of systems, a novel encryption approach with dynamic secret keys is proposed using the system dynamics and the feedback channel. Finally, some simulations are provided to illustrate theoretical analyzes.
引用
收藏
页码:13147 / 13157
页数:11
相关论文
共 50 条
  • [1] Secure State Estimation for Cyber-Physical Systems Against Active Eavesdropping Attacks: A Stochastic Encryption-Based Method
    Tao, Fei
    Ye, Dan
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2025, 22 : 6998 - 7007
  • [2] Optimal encryption strategy for cyber-physical systems against stealthy attacks with energy constraints: A Stackelberg game approach
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 610 : 674 - 693
  • [3] Active Eavesdropping Attack Scheduling for Cyber-Physical Systems With Operation Constraints
    Tao, Fei
    Ye, Dan
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 3067 - 3075
  • [4] Optimal completely stealthy attacks against remote estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2022, 590 : 15 - 28
  • [5] Optimal deception attacks against remote state estimation in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2020, 357 (03): : 1832 - 1852
  • [6] A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems
    Liu, Hanxiao
    Zou, Jiaying
    Ren, Xiaoqiang
    Wang, Xiaofan
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1221 - 1225
  • [7] Optimal Switching Integrity Attacks in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    2017 32ND YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2017, : 709 - 714
  • [8] Optimal Switching Attacks and Countermeasures in Cyber-Physical Systems
    Wu, Guangyu
    Wang, Gang
    Sun, Jian
    Xiong, Lu
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (08): : 4825 - 4835
  • [9] Optimal Data Injection Attacks in Cyber-Physical Systems
    Wu, Guangyu
    Sun, Jian
    Chen, Jie
    IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (12) : 3302 - 3312
  • [10] Defending Cyber-Physical Systems against DoS Attacks
    Nur, Abdullah Yasin
    Tozal, Mehmet Engin
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP), 2016, : 334 - 336