Optimal Encryption Scheduling Policy Against Eavesdropping Attacks in Cyber-Physical Systems

被引:2
作者
Tao, Fei [1 ]
Ye, Dan [1 ,2 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Eavesdropping; Estimation error; State estimation; Job shop scheduling; Informatics; Costs; Cyber-physical systems (CPSs); dynamic encryption; eavesdropping attacks; Markov decision process (MDP); optimal encryption scheduling; REMOTE STATE ESTIMATION;
D O I
10.1109/TII.2024.3431096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the optimal encryption scheduling for remote state estimation in cyber-physical systems (CPSs) against eavesdropping attacks. A smart sensor sends packets to a remote estimator based on an encrypted scheme, meanwhile, an eavesdropper overhears and decrypts the data transmitted with a certain probability. In this context, we formulate the optimal encryption problem as a Markov decision process (MDP) to minimize a convex combination of the expected estimation errors of the user and eavesdropper. A necessary and sufficient condition for the optimal encryption policy to be stationary is derived, and the double threshold structure is obtained. Furthermore, we derive the decay rate of the eavesdropper's estimation error with respect to the secret key leakage rate. To enhance the security of systems, a novel encryption approach with dynamic secret keys is proposed using the system dynamics and the feedback channel. Finally, some simulations are provided to illustrate theoretical analyzes.
引用
收藏
页码:13147 / 13157
页数:11
相关论文
共 29 条
[1]   A Counter-Eavesdropping Technique for Optimized Privacy of Wireless Industrial IoT Communications [J].
Anajemba, Joseph Henry ;
Iwendi, Celestine ;
Razzak, Imran ;
Ansere, James Adu ;
Okpalaoguchi, Izuchukwu Michael .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) :6445-6454
[2]   Remote State Estimation in the Presence of an Active Eavesdropper [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) :229-244
[3]   Encryption scheduling for remote state estimation under an operation constraint [J].
Huang, Lingying ;
Ding, Kemi ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
AUTOMATICA, 2021, 127
[4]   Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost [J].
Huang, Lingying ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
2019 AMERICAN CONTROL CONFERENCE (ACC), 2019, :4063-4068
[5]   Monitoring and Defense of Industrial Cyber-Physical Systems Under Typical Attacks: From a Systems and Control Perspective [J].
Jiang, Yuchen ;
Wu, Shimeng ;
Ma, Renjie ;
Liu, Ming ;
Luo, Hao ;
Kaynak, Okyay .
IEEE TRANSACTIONS ON INDUSTRIAL CYBER-PHYSICAL SYSTEMS, 2023, 1 :192-207
[6]  
Katz Y., 2020, Introduction to modern cryptography
[7]  
Kennedy J., 2024, EARLY ACCESS, DOI [10.1109/TAC.2024.3385315.24, DOI 10.1109/TAC.2024.3385315.24]
[8]   Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper [J].
Leong, Alex S. ;
Quevedo, Daniel E. ;
Dolz, Daniel ;
Dey, Subhrakanti .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) :3732-3739
[9]   Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops [J].
Leong, Alex S. ;
Dey, Subhrakanti ;
Quevedo, Daniel E. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (04) :1880-1895
[10]   Optimal event-triggered transmission scheduling for privacy-preserving wireless state estimation [J].
Lu, Jingyi ;
Leong, Alex S. ;
Quevedo, Daniel E. .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (11) :4205-4224