Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems

被引:1
|
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; State estimation; Job shop scheduling; Informatics; Costs; Cyber-physical systems (CPSs); dynamic encryption; eavesdropping attacks; Markov decision process (MDP); optimal encryption scheduling; REMOTE STATE ESTIMATION;
D O I
10.1109/TII.2024.3431096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal encryption scheduling for remote state estimation in cyber-physical systems (CPSs) against eavesdropping attacks. A smart sensor sends packets to a remote estimator based on an encrypted scheme, meanwhile, an eavesdropper overhears and decrypts the data transmitted with a certain probability. In this context, we formulate the optimal encryption problem as a Markov decision process (MDP) to minimize a convex combination of the expected estimation errors of the user and eavesdropper. A necessary and sufficient condition for the optimal encryption policy to be stationary is derived, and the double threshold structure is obtained. Furthermore, we derive the decay rate of the eavesdropper's estimation error with respect to the secret key leakage rate. To enhance the security of systems, a novel encryption approach with dynamic secret keys is proposed using the system dynamics and the feedback channel. Finally, some simulations are provided to illustrate theoretical analyzes.
引用
收藏
页码:13147 / 13157
页数:11
相关论文
共 50 条
  • [41] Task Scheduling in Cyber-Physical Systems
    Liu, Chunyao
    Zhang, Lichen
    Zhang, Daqiang
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 319 - 324
  • [42] A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks
    Wadhawan, Yatin
    AlMajali, Anas
    Neuman, Clifford
    ELECTRONICS, 2018, 7 (10)
  • [43] Security Analysis for Cyber-Physical Systems against Stealthy Deception Attacks
    Kwon, Cheolhyeon
    Liu, Weiyi
    Hwang, Inseok
    2013 AMERICAN CONTROL CONFERENCE (ACC), 2013, : 3344 - 3349
  • [44] Design of Stealthy Attacks Against Interval Estimation for Cyber-Physical Systems
    Li, Zhi-Hui
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (02): : 2215 - 2222
  • [45] Resilience Against Sensor Deception Attacks on Cyber-Physical Control Systems
    Lafortune, Stephane
    Dotoli, Mariagrazia
    Gregoire, Amphitheatre A.
    2019 6TH INTERNATIONAL CONFERENCE ON CONTROL, DECISION AND INFORMATION TECHNOLOGIES (CODIT 2019), 2019,
  • [46] Security of unmanned aerial vehicle systems against cyber-physical attacks
    Rani, Chaitanya
    Modares, Hamidreza
    Sriram, Raghavendra
    Mikulski, Dariusz
    Lewis, Frank L.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (03): : 331 - 342
  • [47] Defense-in-depth against insider attacks in cyber-physical systems
    Ning X.
    Jiang J.
    Internet of Things and Cyber-Physical Systems, 2022, 2 : 203 - 211
  • [48] Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems
    Desnitsky, Vasily A.
    Kotenko, Igor V.
    Rudavin, Nikolay N.
    PROCEEDINGS OF THE 2019 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2019, : 214 - 219
  • [49] Robust protection scheme against cyber-physical attacks in power systems
    Di Giorgio, Alessandro
    Pietrabissa, Antonio
    Delli Priscoli, Francesco
    Isidori, Alberto
    IET CONTROL THEORY AND APPLICATIONS, 2018, 12 (13): : 1792 - 1801
  • [50] Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6111 - 6136