Eavesdropping Strategies for Remote State Estimation Under Communication Constraints

被引:3
|
作者
Zhou, Jiayu [1 ]
Luo, Yue [1 ]
Liu, Yun [1 ]
Yang, Wen [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Shanghai 200237, Peoples R China
基金
中国国家自然科学基金;
关键词
Eavesdropping; Protocols; Probabilistic logic; Estimation error; Job shop scheduling; State estimation; Quantization (signal); Confidentiality; state estimation; communication constraints; deciphering scheduling; recursive reset; SYSTEMS; CONSENSUS; ATTACKS; UNIFORM;
D O I
10.1109/TIFS.2023.3265343
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper studies the confidentiality issue of wireless sensor networks under communication constraints from the perspective of an eavesdropper. The considered communication constraints include both medium access constraint and bandwidth limitation. Specifically, the former results in only one sink node gaining access to the shared network at each time step, while the latter requires data to be quantized by a probabilistic quantizer before being transmitted. The task of the eavesdropper is to develop eavesdropping strategies for the constrained network to infer the state of the system as accurately as possible. Since the data is generally unreadable to unauthorized third parties in terms of secure transmission, an eavesdropper with limited power must decide which sink nodes' data needs to be decrypted. By analyzing the impact of different decryption strategies on the eavesdropping performance, a deciphering scheduling is proposed, which minimizes the expected estimation error without exceeding the energy budget. Besides, a recursive reset algorithm is put forward based on the properties of the probabilistic quantizer, which reflects that an eavesdropper can infer whether its own estimate is accurate enough from the decoded data. Moreover, a sufficient condition is established in which the eavesdropping performance is improved under the proposed algorithm. A numerical example is provided to demonstrate the validity of the developed approaches.
引用
收藏
页码:2250 / 2261
页数:12
相关论文
共 50 条
  • [1] Transmission Strategies for Remote Estimation under Energy Harvesting Constraints
    Ozcelikkale, Ayca
    McKelvey, Tomas
    Viberg, Mats
    [J]. 2016 24TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2016, : 572 - 576
  • [2] Linear Encryption Against Eavesdropping on Remote State Estimation
    Shang, Jun
    Chen, Tongwen
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (07) : 4413 - 4419
  • [3] State estimation with communication constraints
    Li, X
    Wong, WS
    [J]. SYSTEMS & CONTROL LETTERS, 1996, 28 (01) : 49 - 54
  • [4] State estimation with a remote sensor under limited communication rate
    Battistelli, Giorgio
    Benavoli, Alessio
    Chisci, Luigi
    [J]. 2008 3RD INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS, CONTROL AND SIGNAL PROCESSING, VOLS 1-3, 2008, : 654 - +
  • [5] Fundamental Limits of Remote Estimation of Autoregressive Markov Processes Under Communication Constraints
    Chakravorty, Jhelum
    Mahajan, Aditya
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (03) : 1109 - 1124
  • [6] Fundamental limits of remote estimation of autoregressive Markov processes under communication constraints
    Chakravorty, Jhelum
    Mahajan, Aditya
    [J]. 2016 INFORMATION THEORY AND APPLICATIONS WORKSHOP (ITA), 2016,
  • [7] Synchronization and State Estimation of Nonlinear Physical Systems Under Communication Constraints
    Andrievsky, Boris
    [J]. 2016 IEEE CONFERENCE ON NORBERT WIENER IN THE 21ST CENTURY (21CW), 2016, : 1 - 6
  • [8] Distributed Anti-Eavesdropping Fusion Estimation Under Energy Constraints
    Xu, Daxing
    Chen, Bo
    Zhang, Yuchen
    Yu, Li
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2023, 68 (12) : 7795 - 7802
  • [9] Allocation of Eavesdropping Attacks for Multi-System Remote State Estimation
    Chang, Xiaoyan
    Peng, Lianghong
    Zhang, Suzhen
    [J]. SENSORS, 2024, 24 (03)
  • [10] Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping
    Wang, Le
    Cao, Xianghui
    Sun, Bowen
    Zhang, Heng
    Sun, Changyin
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (03) : 1987 - 1997