Linear Encryption Against Eavesdropping on Remote State Estimation

被引:9
|
作者
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Eavesdropping; encryption; remote state estima-tion;
D O I
10.1109/TAC.2022.3205548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article considers the problem of eavesdropping on remote state estimation. Linear encryption strategies are used to protect the transmitted data. Two types of data transmission are considered: raw measurements generated by traditional sensors as well as innovations generated by smart sensors. For these two transmission scenarios, the encryption coefficients are obtained by formulating different optimization problems, with the target of maximizing the eavesdropper's estimation error covariance. For stable systems, the designed encryption strategies can effectively impair the eavesdropper's estimation performance. For unstable systems, the encryption can be designed to make the eavesdropper's estimation error covariance divergent. The encryption performance is evaluated through numerical simulations on both stable and unstable systems.
引用
收藏
页码:4413 / 4419
页数:7
相关论文
共 50 条
  • [1] Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
    Wang, Le
    Cao, Xianghui
    Zhang, Heng
    Sun, Changyin
    Zheng, Wei Xing
    [J]. AUTOMATICA, 2022, 137
  • [2] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [3] Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
    Wang, Le
    Cao, Xianghui
    Sun, Bowen
    Zhang, Heng
    Sun, Changyin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) : 1987 - 1997
  • [4] Distributed encryption fusion estimation against full eavesdropping
    Yan, Xinhao
    Chen, Bo
    Zhang, Yuchen
    Yu, Li
    [J]. AUTOMATICA, 2023, 153
  • [5] Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation
    Zou, Jiaying
    Liu, Hanxiao
    Liu, Chun
    Ren, Xiaoqiang
    Wang, Xiaofan
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2024, 8 : 538 - 543
  • [6] Eavesdropping Strategies for Remote State Estimation Under Communication Constraints
    Zhou, Jiayu
    Luo, Yue
    Liu, Yun
    Yang, Wen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2250 - 2261
  • [7] Stochastic Detector Against Linear Deception Attacks on Remote State Estimation
    Li, Yuzhe
    Chen, Tongwen
    [J]. 2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6291 - 6296
  • [8] Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation
    Chang, Xiaoyan
    Peng, Lianghong
    Zhang, Suzhen
    [J]. SENSORS, 2024, 24 (03)
  • [9] A Privacy-Preserving Approach Against Eavesdropping Attacks on Remote State Estimation for Cyber-Physical Systems
    Liu, Hanxiao
    Zou, Jiaying
    Ren, Xiaoqiang
    Wang, Xiaofan
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2024, 71 (03) : 1221 - 1225
  • [10] A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks
    Chen, Guoxi
    Sun, Lucheng
    Zhang, Ya
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2022, 359 (18): : 10726 - 10740