Zero-determinant strategy for distributed state estimation against eavesdropping attacks

被引:0
作者
Yu, Yan [1 ]
Yang, Wen [1 ]
Chen, Jialing [1 ]
机构
[1] East China Univ Sci & Technol, Key Lab Smart Mfg Energy Chem Proc, Shanghai 200237, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
TIT-FOR-TAT; TRANSMISSION;
D O I
10.1063/5.0235693
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In distributed networks, the transmission of state estimates via wireless channels between neighbor nodes is susceptible to interception by eavesdroppers, leading to significant risks to data privacy. Given the substantial energy and bandwidth consumption of data encryption, sensors with limited energy must strategically decide when to encrypt data. Simultaneously, eavesdroppers with similar energy constraints must determine when to intercept transmissions. In this paper, we propose a game-theoretic approach to this security dilemma and introduce a defense strategy based on zero-determinant (ZD) policies. Initially, we model the interaction between sensors and malicious eavesdroppers in the distributed state estimation as an iterative game. Subsequently, we apply ZD strategies to protect both channel and node data, respectively. We further explore how, under these strategies, sensors can unilaterally set the expected payoff of eavesdroppers or coerce a positive correlation with the expected payoff of sensors. Moreover, we analyze how sensors can devise optimal strategies by maximizing their own utility while minimizing that of the opponent, regardless of the actions of the opponent. The feasibility and effectiveness of the proposed methods are validated through numerical simulations.
引用
收藏
页数:14
相关论文
共 35 条
[1]   MORE EFFECTIVE CHOICE IN THE PRISONERS-DILEMMA [J].
AXELROD, R .
JOURNAL OF CONFLICT RESOLUTION, 1980, 24 (03) :379-403
[2]   A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks [J].
Chen, Guoxi ;
Sun, Lucheng ;
Zhang, Ya .
JOURNAL OF THE FRANKLIN INSTITUTE, 2022, 359 (18) :10726-10740
[3]   A combat game model with inter-network confrontation and intra-network cooperation [J].
Chen, Hao ;
Wang, Lin ;
Wang, Xiaofan .
CHAOS, 2023, 33 (03)
[4]   Remote State Estimation in the Presence of an Active Eavesdropper [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) :229-244
[5]   Secrecy Constrained Distributed Detection in Sensor Networks [J].
Guo, Jun ;
Rogers, Uri ;
Li, Xia ;
Chen, Hao .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (02) :378-391
[6]   Zero-determinant strategy: An underway revolution in game theory [J].
Hao Dong ;
Rong Zhi-Hai ;
Zhou Tao .
CHINESE PHYSICS B, 2014, 23 (07)
[7]   Memory-n strategies of direct reciprocity [J].
Hilbe, Christian ;
Martinez-Vaquero, Luis A. ;
Chatterjee, Krishnendu ;
Nowak, Martin A. .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2017, 114 (18) :4715-4720
[8]   Partners or rivals? Strategies for the iterated prisoner's dilemma [J].
Hilbe, Christian ;
Traulsen, Arne ;
Sigmund, Karl .
GAMES AND ECONOMIC BEHAVIOR, 2015, 92 :41-52
[9]   Evolutionary performance of zero-determinant strategies in multiplayer games [J].
Hilbe, Christian ;
Wu, Bin ;
Traulsen, Arne ;
Nowak, Martin A. .
JOURNAL OF THEORETICAL BIOLOGY, 2015, 374 :115-124
[10]   Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies [J].
Hu, Qin ;
Wang, Shengling ;
Ma, Peizi ;
Cheng, Xiuzhen ;
Lv, Weifeng ;
Bie, Rongfang .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2020, 32 (05) :998-1009