Optimal Privacy-Preserving Transmission Schedule Against Eavesdropping Attacks on Remote State Estimation

被引:4
作者
Zou, Jiaying [1 ,2 ]
Liu, Hanxiao [1 ,2 ]
Liu, Chun [3 ]
Ren, Xiaoqiang [3 ]
Wang, Xiaofan [3 ]
机构
[1] Shanghai Univ, Sch Future Technol, Shanghai 200444, Peoples R China
[2] Shanghai Univ, Inst Artificial Intelligence, Shanghai 200444, Peoples R China
[3] Shanghai Univ, Sch Mechatron Engn & Automat, Shanghai 200444, Peoples R China
来源
IEEE CONTROL SYSTEMS LETTERS | 2024年 / 8卷
基金
中国国家自然科学基金;
关键词
Noise; Eavesdropping; Optimal scheduling; Estimation error; State estimation; Schedules; Job shop scheduling; Cyber-physical systems; remote state estimation; eavesdropping attacks; transmission schedule;
D O I
10.1109/LCSYS.2024.3398200
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This letter is concerned with the preservation of privacy in remote state estimation of cyber-physical systems. A privacy-preserving transmission scheduling strategy against eavesdropping is proposed, incorporating three operational modes for sensors: silence, direct transmission, and noise-injected transmission. This strategy is designed to minimize the transmission cost and estimation error covariance for the remote estimator while maximizing the estimation error covariance for eavesdroppers. Threshold structures are demonstrated for optimal transmission schedules in different scenarios. Additionally, a novel correlation between the optimal transmission choice and the magnitude of injection noise is presented, particularly pertinent to scenarios involving direct transmission and transmission with injection noise. This correlation is important in balancing transmission information integrity against privacy concerns. Finally, several numerical examples are presented to demonstrate the effectiveness of the theoretical results.
引用
收藏
页码:538 / 543
页数:6
相关论文
共 21 条
[1]  
Anderson BD., 2012, OPTIMAL FILTERING
[2]  
Chong MS, 2019, 2019 18TH EUROPEAN CONTROL CONFERENCE (ECC), P968, DOI [10.23919/ecc.2019.8795652, 10.23919/ECC.2019.8795652]
[3]  
Dibaji Seyed Mehran, 2022, Security and Resilience of Control Systems: Theory and Applications. Lecture Notes in Control and Information Sciences (489), P121, DOI 10.1007/978-3-030-83236-0_5
[4]   A systems and control perspective of CPS security [J].
Dibaji, Seyed Mehran ;
Pirani, Mohammad ;
Flamholz, David Bezalel ;
Annaswamy, Anuradha M. ;
Johansson, Karl Henrik ;
Chakrabortty, Aranya .
ANNUAL REVIEWS IN CONTROL, 2019, 47 :394-411
[5]   Remote State Estimation in the Presence of an Active Eavesdropper [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) :229-244
[6]   Sensor fault detection and isolation via networked estimation: rank-deficient dynamical systems [J].
Doostmohammadian, M. ;
Zarrabi, H. ;
Charalambous, T. .
INTERNATIONAL JOURNAL OF CONTROL, 2023, 96 (11) :2853-2870
[7]   Distributed Detection and Mitigation of Biasing Attacks Over Multi-Agent Networks [J].
Doostmohammadian, Mohammadreza ;
Zarrabi, Houman ;
Rabiee, Hamid R. ;
Khan, Usman A. ;
Charalambous, Themistoklis .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (04) :3465-3477
[8]   Secure and private control using semi-homomorphic encryption [J].
Farokhi, Farhad ;
Shames, Iman ;
Batterham, Nathan .
CONTROL ENGINEERING PRACTICE, 2017, 67 :13-20
[9]   Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks [J].
Gan, Ruimeng ;
Shao, Jinliang ;
Xiao, Yue ;
Zhang, Heng ;
Zheng, Wei Xing .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3832-3846
[10]   Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost [J].
Huang, Lingying ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :4063-4068