Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost

被引:8
作者
Huang, Lingying [1 ]
Leong, Alex S. [2 ]
Quevedo, Daniel E. [2 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect Engn, Kowloon, Clear Water Bay, Hong Kong, Peoples R China
[2] Paderborn Univ, Dept Elect Engn EIM E, Paderborn, Germany
来源
2019 AMERICAN CONTROL CONFERENCE (ACC) | 2019年
关键词
D O I
10.23919/acc.2019.8815291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider a remote state estimation problem in the presence of an eavesdropper. A smart sensor takes measurement of a discrete linear time-invariant (LTI) process and sends its local state estimate through a wireless network to a remote estimator. An eavesdropper can overhear the sensor transmissions with a certain probability. To enhance the system privacy level, we propose a novel encryption strategy to minimize a linear combination of the expected error covariance at the remote estimator and the negative of the expected error covariance at the eavesdropper, taking into account the cost of the encryption process. We prove the existence of an optimal deterministic and Markovian policy for such an encryption strategy over a finite time horizon. Two situations, namely, with or without knowledge of the eavesdropper estimation error covariance are studied and the optimal schedule is shown to satisfy the threshold-like structure in both cases. Numerical examples are given to illustrate the results.
引用
收藏
页码:4063 / 4068
页数:6
相关论文
共 15 条
[1]  
Anderson B. D. O., 1979, Optimal filtering
[2]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289
[3]  
Bertsekas D. P., 2005, Dynamic Programming and Optimal Control, V1
[4]  
Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
[5]   Opportunistic encryption: A trade-off between security and throughput in wireless networks [J].
Haleem, Mohamed A. ;
Mathur, Chetan N. ;
Chandramouli, R. ;
Subbalakshmi, K. P. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (04) :313-324
[6]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[7]  
Leong A. S., 2018, IEEE T AUTOMATIC CON
[8]   Special Issue on Cyber-Physical Systems [J].
Poovendran, Radha ;
Sampigethaya, Krishna ;
Gupta, Sandeep Kumar S. ;
Lee, Insup ;
Prasad, K. Venkatesh ;
Corman, David ;
Paunicka, James L. .
PROCEEDINGS OF THE IEEE, 2012, 100 (01) :6-12
[9]  
Puterman Martin L, 1994, Markov Decision Processes: Discrete Stochastic Dynamic Programming
[10]  
Reason J.M., 2001, End-to-end confidentiality for continuous-media applications in wireless systems