Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems

被引:1
|
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; State estimation; Job shop scheduling; Informatics; Costs; Cyber-physical systems (CPSs); dynamic encryption; eavesdropping attacks; Markov decision process (MDP); optimal encryption scheduling; REMOTE STATE ESTIMATION;
D O I
10.1109/TII.2024.3431096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal encryption scheduling for remote state estimation in cyber-physical systems (CPSs) against eavesdropping attacks. A smart sensor sends packets to a remote estimator based on an encrypted scheme, meanwhile, an eavesdropper overhears and decrypts the data transmitted with a certain probability. In this context, we formulate the optimal encryption problem as a Markov decision process (MDP) to minimize a convex combination of the expected estimation errors of the user and eavesdropper. A necessary and sufficient condition for the optimal encryption policy to be stationary is derived, and the double threshold structure is obtained. Furthermore, we derive the decay rate of the eavesdropper's estimation error with respect to the secret key leakage rate. To enhance the security of systems, a novel encryption approach with dynamic secret keys is proposed using the system dynamics and the feedback channel. Finally, some simulations are provided to illustrate theoretical analyzes.
引用
收藏
页码:13147 / 13157
页数:11
相关论文
共 50 条
  • [31] Optimal design and allocation of stealthy attacks against remote state estimation for cyber-physical systems
    Liu, Xuan
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2024, 676
  • [32] Optimal design and performance analysis of secure estimator for cyber-physical systems against deception attacks
    Han, Zhichen
    Zhang, Shengbing
    Jin, Zengwang
    Hu, Yanyan
    ASIAN JOURNAL OF CONTROL, 2024, 26 (05) : 2539 - 2552
  • [33] Integrity Attacks on Cyber-Physical Systems
    Mo, Yilin
    Sinopoli, Bruno
    HICONS 12: PROCEEDINGS OF THE 1ST ACM INTERNATIONAL CONFERENCE ON HIGH CONFIDENCE NETWORKED SYSTEMS, 2012, : 47 - 54
  • [34] Cryptanalytical Attacks on Cyber-physical Systems
    Novotny, Martin
    2016 5TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2016, : 10 - 10
  • [35] Cryptanalytic attacks on cyber-physical systems
    Novotny, Martin
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 534 - 539
  • [36] Policy Selection and Scheduling of Cyber-Physical Systems with Denial-of-Service Attacks via Reinforcement Learning
    Jin, Zengwang
    Li, Qian
    Zhang, Huixiang
    Liu, Zhiqiang
    Wang, Zhen
    JOURNAL OF ADVANCED COMPUTATIONAL INTELLIGENCE AND INTELLIGENT INFORMATICS, 2024, 28 (04) : 962 - 973
  • [37] Optimal stealthy false data injection attacks in cyber-physical systems
    Li, Yi-Gang
    Yang, Guang-Hong
    INFORMATION SCIENCES, 2019, 481 : 474 - 490
  • [38] Optimal Intermittent Deception Attacks With Energy Constraints for Cyber-Physical Systems
    Liu, Xuan
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (10): : 5889 - 5900
  • [39] Resilient Control of Stochastic Cyber-Physical Systems Against Stealthy Attacks: Complex Dynamical Networks Encryption Strategy
    Wang, Jun-Lan
    Li, Xiao-Jian
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2025, 55 (02): : 1078 - 1091
  • [40] Covert Attacks against Output Tracking Control of Cyber-Physical Systems
    Hou, Fangyuan
    Sun, Jian
    IECON 2017 - 43RD ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2017, : 5743 - 5748