Secure Control of Linear Controllers Using Fully Homomorphic Encryption

被引:2
作者
Pan, Jingshan [1 ,2 ,3 ,4 ,5 ]
Sui, Tongtong [4 ]
Liu, Wen [3 ,5 ]
Wang, Jizhi [2 ,4 ,5 ]
Kong, Lingrui [4 ]
Zhao, Yue [4 ]
Wei, Zhiqiang [1 ]
机构
[1] Ocean Univ China, Coll Informat Sci & Engn, Qingdao 266100, Peoples R China
[2] Natl Supercomp Ctr Jinan, Shandong Comp Sci Ctr, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
[3] Jinan Inst Supercomp Technol, Jinan 250301, Peoples R China
[4] Qilu Univ Technol, Fac Comp Sci & Technol, Shandong Acad Sci, Jinan 250353, Peoples R China
[5] Quancheng Lab, Jinan 250100, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 24期
关键词
encrypted controller; networked control system; fully homomorphic; BFV encryption; CRYPTOSYSTEM; SYSTEMS; MPC;
D O I
10.3390/app132413071
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we propose a scheme for encrypting linear controllers using fully homomorphic encryption, which effectively removes these security risks and substantially improves the security of networked control systems. Meanwhile, this paper uses precomputation to handle data encryption, which eliminates the encryption time and solves the drawback of fully homomorphic encryption that it is difficult to apply due to the efficiency problem. Compared to previous schemes with precomputation, for the first time, we propose two methods to mitigate the problem of the slight security degradation caused by precomputation, which makes our scheme more secure. Finally, we provide numerical simulation results to support our scheme, and the data show that the encrypted controller achieves normal control and improves safety and efficiency.
引用
收藏
页数:15
相关论文
共 35 条
[21]   Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption [J].
Murguia, Carlos ;
Farokhi, Farhad ;
Shames, Iman .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3950-3957
[22]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[23]  
Pan J., 2023, SECUR COMMUN NETW, V2023, P6473497, DOI [10.1155/2023/6473497, DOI 10.1155/2023/6473497]
[24]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[25]  
Rivest RL, 1978, Foundations of secure computation, V4, P169
[26]  
Shoukry Y, 2016, IEEE DECIS CONTR P, P5053, DOI 10.1109/CDC.2016.7799042
[27]   Secure Convolution Neural Network Inference Based on Homomorphic Encryption [J].
Song, Chen ;
Huang, Ruwei .
APPLIED SCIENCES-BASEL, 2023, 13 (10)
[28]   Stability-guaranteed dynamic ElGamal cryptosystem for encrypted control systems [J].
Teranishi, Kaoru ;
Shimada, Naoki ;
Kogiso, Kiminao .
IET CONTROL THEORY AND APPLICATIONS, 2020, 14 (16) :2242-2252
[29]   Implementing homomorphic encryption based secure feedback control [J].
Tran, Julian ;
Farokhi, Farhad ;
Cantoni, Michael ;
Shames, Iman .
CONTROL ENGINEERING PRACTICE, 2020, 97
[30]  
Wall D.S., 2010, HDB INTERNET CRIME, P255