×

An encoding mechanism for secrecy of remote state estimation. (English) Zbl 1448.93322

Summary: We consider a secure remote state estimation problem where the observations transmitted from the sensors to a remote estimator could be intercepted by an eavesdropper. To prevent the eavesdropper from acquiring the system states, we propose an encoding-decoding mechanism by combining linear transformation and artificial noise to ensure the exact values of observations unavailable to the eavesdropper but available to the estimator. Further, we propose an algorithm by which the eavesdropper may infer the approximate values of the observations and thus to further estimate the system states. We reveal how the amplitude of the artificial noise affects the accuracy of the eavesdropper inference, which helps the designing of the encoding-decoding mechanism. Simulation experiments are conducted to verify the derived results.

MSC:

93E10 Estimation and detection in stochastic control theory
93B70 Networked control
93C55 Discrete-time control/observation systems
93C05 Linear systems in control theory
Full Text: DOI

References:

[1] Bernstein, Daniel J.; Chang, Yun An; Cheng, Chen Mou; Chou, Li Ping; Heninger, Nadia; Lange, Tanja, Factoring RSA keys from certified smart cards: Coppersmith in the Wild (2014), Springer: Springer Berlin, Heidelberg · Zbl 1326.94075
[2] Bickel, Peter J.; Doksum, Kjell A., Mathematical statistics: Basic ideas and selected topics, volumes i-ii package (2015), Chapman and Hall/CRC · Zbl 1380.62002
[3] Ding, Kemi; Li, Yuzhe; Quevedo, Daniel E.; Dey, Subhrakanti; Shi, Ling, A multi-channel transmission schedule for remote state estimation under dos attacks, Automatica, 78, 194-201 (2017) · Zbl 1357.93097
[4] Ding, Kemi; Shi, Ling, A data-driven power schedule for privacy protection in remote state estimation, (2016 35th Chinese control conference (CCC) (2016), IEEE), 7261-7266
[5] Farmer, J. Doyne; Sidorowich, John J., Predicting chaotic time series, Physical Review Letters, 59, 8, 845 (1987)
[6] Feng, Shuai; Tesi, Pietro, Resilient control under denial-of-service: Robust design, Automatica, 79, 42-51 (2017) · Zbl 1371.93124
[7] Fischer, Viktor; Drutarovský, Milos̃, True random number generator embedded in reconfigurable hardware, (Cryptographic hardware, embedded systems-ches, international workshop, Redwood Shores, Ca, Usa, August, revised papers (2002)) · Zbl 1019.65501
[8] Goel, Satashu; Negi, Rohit, Guaranteeing secrecy using artificial noise, IEEE Transactions on Wireless Communication, 7, 6, 2180-2189 (2008)
[9] Guo, Ziyang; Shi, Dawei; Johansson, Karl Henrik; Shi, Ling, Worst-case stealthy innovation-based linear attack on remote state estimation, Automatica, 89, 117-124 (2018) · Zbl 1387.93143
[10] He, Jianping; Cai, Lin; Guan, Xinping, Preserving data-privacy with added noises: Optimal estimation and privacy analysis, IEEE Transactions on Information Theory, 64, 8, 5677-5690 (2018) · Zbl 1401.94159
[11] Jin, Jiong; Gubbi, Jayavardhana; Marusic, Slaven; Palaniswami, Marimuthu, An information framework for creating a smart city through internet of things, IEEE Internet of Things Journal, 1, 2, 112-121 (2014)
[12] Kalman, Rudolph Emil, A new approach to linear filtering and prediction problems, Journal of Basic Engineering, 82, 1, 35-45 (1960)
[13] Kishida, Masako, Encrypted control system with quantiser, IET Control Theory & Applications, 13, 1, 146-151 (2018) · Zbl 1434.93021
[14] Le Ny, Jerome; Pappas, George J., Differentially private filtering, IEEE Transactions on Automatic Control, 59, 2, 341-354 (2013) · Zbl 1360.93701
[15] Lee, Jay; Bagheri, Behrad; Kao, Hung An, A cyber-physical systems architecture for industry 4.0-based manufacturing systems, Manufacturing Letters, 3, 18-23 (2015)
[16] Li, Yuzhe; Shi, Ling; Chen, Tongwen, Detection against linear deception attacks on multi-sensor remote state estimation, IEEE Transactions on Control of Network Systems, 5, 3, 846-856 (2018) · Zbl 1511.68046
[17] Linsay, Paul S., An efficient method of forecasting chaotic time series using linear interpolation, Physics Letters. A, 153, 6-7, 353-356 (1991)
[18] Lu, Yang; Zhu, Minghui, Privacy preserving distributed optimization using homomorphic encryption, Automatica, 96, 314-325 (2018) · Zbl 1408.94947
[19] Manitara, Nicolaos E.; Hadjicostis, Christoforos N., Privacy-preserving asymptotic average consensus, (2013 European control conference (ECC) (2013), IEEE), 760-765
[20] Mo, Yilin; Murray, Richard M., Privacy preserving average consensus, IEEE Transactions on Automatic Control, 62, 2, 753-765 (2017) · Zbl 1364.91048
[21] Pasqualetti, Fabio; Dorfler, Florian; Bullo, Francesco, Attack detection and identification in cyber-physical systems, IEEE Transactions on Automatic Control, 58, 11, 2715-2729 (2013) · Zbl 1369.93675
[22] Qi, Jing; Vasilakos, Athanasios V.; Wan, Jiafu; Lu, Jingwei; Qiu, Dechao, Security of the internet of things: perspectives and challenges, Wireless Networks, 20, 8, 2481-2501 (2014)
[23] Stankovic, John A., Research directions for the internet of things, IEEE Internet of Things Journal, 1, 1, 3-9 (2014)
[24] Teixeira, André; Shames, Iman; Sandberg, Henrik; Johansson, Karl Henrik, A secure control framework for resource-limited adversaries, Automatica, 51, C, 135-148 (2015) · Zbl 1309.93020
[25] Tsiamis, Anastasios; Gatsis, Konstantinos; Pappas, George J., State estimation codes for perfect secrecy, (2017 IEEE 56th annual conference on decision and control (CDC) (2017), IEEE), 176-181
[26] Tsiamis, Anastasios; Gatsis, Konstantinos; Pappas, George J., State-secrecy codes for stable systems, (2018 annual American control conference (ACC) (2018), IEEE), 171-177
[27] Wiese, Moritz; Oechtering, Tobias J.; Johansson, Karl Henrik; Papadimitratos, Panagiotis; Sandberg, Henrik; Skoglund, Mikael, Secure estimation and zero-error secrecy capacity, IEEE Transactions on Automatic Control, 64, 3, 1047-1062 (2019) · Zbl 1482.94061
[28] Yang, Wen; Chen, Guanrong; Wang, Xiaofan; Shi, Ling, Stochastic sensor activation for distributed state estimation over a sensor network, Automatica, 50, 8, 2070-2076 (2014) · Zbl 1297.93160
[29] Yang, Wen; Yang, Chao; Shi, Hongbo; Shi, Ling; Chen, Guanrong, Stochastic link activation for distributed filtering under sensor power constraint, Automatica, 75, 109-118 (2017) · Zbl 1351.93148
[30] Yang, Wen; Zhang, Yu; Chen, Guanrong; Yang, Chao; Shi, Ling, Distributed filtering under false data injection attacks, Automatica, 102, 34-44 (2019) · Zbl 1415.93271
[31] Zhang, Heng; Cheng, Peng; Shi, Ling; Chen, Jiming, Optimal dos attack scheduling in wireless networked control system, IEEE Transactions on Control Systems Technology, 24, 3, 843-852 (2015)
[32] Zhang, Heng; Qi, Yifei; Wu, Junfeng; Fu, Lingkun; He, Lidong, Dos attack energy management against remote state estimation, IEEE Transactions on Control of Network Systems, 5, 1, 383-394 (2018) · Zbl 1507.93242
[33] Zhang, Heng; Shu, Yuanchao; Cheng, Peng; Chen, Jiming, Privacy and performance trade-off in cyber-physical systems, IEEE Network, 30, 2, 62-66 (2016)
[34] Zhang, Heng; Zheng, Wei Xing, Denial-of-service power dispatch against linear quadratic control via a fading channel, IEEE Transactions on Automatic Control, 63, 9, 3032-3039 (2018) · Zbl 1423.90164
[35] Zhu, Minghui; Lu, Yang, On confidentiality preserving monitoring of linear dynamic networks against inference attacks, (2015 American control conference (ACC) (2015), IEEE), 359-364
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.