Linear Encryption Against Eavesdropping on Remote State Estimation

被引:9
|
作者
Shang, Jun [1 ]
Chen, Tongwen [1 ]
机构
[1] Univ Alberta, Dept Elect & Comp Engn, Edmonton, AB T6G 1H9, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Eavesdropping; encryption; remote state estima-tion;
D O I
10.1109/TAC.2022.3205548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article considers the problem of eavesdropping on remote state estimation. Linear encryption strategies are used to protect the transmitted data. Two types of data transmission are considered: raw measurements generated by traditional sensors as well as innovations generated by smart sensors. For these two transmission scenarios, the encryption coefficients are obtained by formulating different optimization problems, with the target of maximizing the eavesdropper's estimation error covariance. For stable systems, the designed encryption strategies can effectively impair the eavesdropper's estimation performance. For unstable systems, the encryption can be designed to make the eavesdropper's estimation error covariance divergent. The encryption performance is evaluated through numerical simulations on both stable and unstable systems.
引用
收藏
页码:4413 / 4419
页数:7
相关论文
共 50 条
  • [21] Optimal DoS Attack Policy Against Remote State Estimation
    Zhang, Heng
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    [J]. 2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 5444 - 5449
  • [22] Optimal Attack Energy Allocation against Remote State Estimation
    Peng, Lianghong
    Shi, Ling
    Cao, Xianghui
    Sun, Changyin
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (07) : 2199 - 2205
  • [23] Optimal Jamming Power Allocation Against Remote State Estimation
    Zhang, Heng
    Qi, Yifei
    Wu, Junfeng
    [J]. 2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 1660 - 1665
  • [24] Event-based Attack Against Remote State Estimation
    Qi, Yifei
    Cheng, Peng
    Shi, Ling
    Chen, Jiming
    [J]. 2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 6844 - 6849
  • [25] DoS Attack Energy Management Against Remote State Estimation
    Zhang, Heng
    Qi, Yifei
    Wu, Junfeng
    Fu, Lingkun
    He, Lidong
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (01): : 383 - 394
  • [26] A Watermarking Strategy Against Linear Deception Attacks on Remote State Estimation Under K-L Divergence
    Wang, Di
    Huang, Jiahao
    Tang, Yang
    Li, Fangfei
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (05) : 3273 - 3281
  • [27] Protecting NFC Data Exchange against Eavesdropping with Encryption Record Type Definition
    Hameed, Sufian
    Jainali, Usman Murad
    Samad, Adnan
    [J]. NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 577 - 583
  • [28] Optimal Stealthy Linear Attack on Remote State Estimation With Side Information
    Ye, Dan
    Yang, Bing
    Zhang, Tian-Yu
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1499 - 1507
  • [29] Optimal Stealthy Linear-Attack Schedules on Remote State Estimation
    Zhang, Junhui
    Sun, Jitao
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 2807 - 2817
  • [30] Optimal Stealthy Attacks With Energy Constraint Against Remote State Estimation
    Liu, Xuan
    Yang, Guang-Hong
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2024, 54 (06) : 3577 - 3587