Secrecy Codes for State Estimation of General Linear Systems

被引:0
作者
Marelli, Damian [1 ,2 ]
Sui, Tianju [3 ]
Fu, Minyue [4 ]
Cai, Qianqian [1 ]
机构
[1] Guangdong Univ Technol, Sch Automat, Guangdong Prov Key Lab Intelligent Decis & Coopera, Guangzhou 510006, Peoples R China
[2] Natl Sci & Tech Res Council Rosario, French Argentine Int Ctr Informat & Syst Sci, RA-2000 Rosario, Argentina
[3] Dalian Univ Technol, Sch Control Sci & Engn, Dalian 116023, Peoples R China
[4] Southern Univ Sci & Technol, Sch Syst Design & Intelligent Mfg, Shenzhen 518055, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Encoding; Codes; Noise measurement; Law; Eavesdropping; Receivers; Kalman filters; Cyber-physical system security; eavesdropping; secrecy coding; SENSOR;
D O I
10.1109/TAC.2024.3463728
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A typical cyber-physical system setup includes a local system sending measurements of its internal state to a remote state estimator. A form of attack consists of an eavesdropper observing this information exchange. Secrecy coding schemes have been recently proposed to achieve immunity to eavesdropping. The essential idea consists in coding the transmitting information in a way such that a single packet lost by the eavesdropper causes an irrecoverable error of its state estimation. Common limitations of the available methods are the assumptions that the local system can directly measure its internal state and that the system is unstable. In this work, we drop these assumptions and consider the general case in which measurements are noisy linear combinations of an inaccessible internal state and that the system is not necessarily unstable. To design the coding scheme, we introduce the concept of total secrecy, meaning that if the eavesdropper misses a packet that is available at the remote estimator, the former behaves as if no further packets were received. We derive a sufficient condition for total secrecy, as well as the code achieving this property. Also, for the case in which we cannot guarantee total secrecy, we address the problem of designing a code achieving maximum secrecy in some sense. We present numerical examples illustrating our claims.
引用
收藏
页码:1161 / 1168
页数:8
相关论文
共 27 条
[1]   A multi-channel transmission schedule for remote state estimation under DoS attacks [J].
Ding, Kemi ;
Li, Yuzhe ;
Quevedo, Daniel E. ;
Dey, Subhrakanti ;
Shi, Ling .
AUTOMATICA, 2017, 78 :194-201
[2]   Secure state estimation over Markov wireless communication channels [J].
Impicciatore, Anastasia ;
Tsiamis, Anastasios ;
Lun, Yuriy Zacchia ;
D'Innocenzo, Alessandro ;
Pappas, George J. .
2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, :2935-2940
[3]  
Jin Xu, 2018, Cyber Physical Systems, V4, P39, DOI 10.1080/23335777.2018.1484818
[4]   An adaptive control architecture for leader-follower multiagent systems with stochastic disturbances and sensor and actuator attacks [J].
Jin, Xu ;
Haddad, Wassim M. .
INTERNATIONAL JOURNAL OF CONTROL, 2019, 92 (11) :2561-2570
[5]  
Jin X, 2018, P AMER CONTR CONF, P980, DOI 10.23919/ACC.2018.8431914
[6]   An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems [J].
Jin, Xu ;
Haddad, Wassim M. ;
Yucelen, Tansel .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (11) :6058-6064
[7]  
Katz J., 2014, INTRO MODERN CRYPTOG
[8]   The Performance and Limitations of ε-Stealthy Attacks on Higher Order Systems [J].
Kung, Enoch ;
Dey, Subhrakanti ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (02) :941-947
[9]   The price of security in wireless sensor networks [J].
Lee, Jongdeog ;
Kapitanova, Krasimira ;
Son, Sang H. .
COMPUTER NETWORKS, 2010, 54 (17) :2967-2978
[10]   Communication Requirement for Reliable and Secure State Estimation and Control in Smart Grid [J].
Li, Husheng ;
Lai, Lifeng ;
Zhang, Weiyi .
IEEE TRANSACTIONS ON SMART GRID, 2011, 2 (03) :476-486