Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper

被引:78
作者
Leong, Alex S. [1 ]
Quevedo, Daniel E. [1 ]
Dolz, Daniel [2 ]
Dey, Subhrakanti [3 ]
机构
[1] Paderborn Univ, Dept Elect Engn EIM E, D-33098 Paderborn, Germany
[2] Procter & Gamble, D-53879 Euskirchen, Germany
[3] Uppsala Univ, Dept Engn Sci, S-75236 Uppsala, Sweden
关键词
Eavesdropping; packet drops; state estimation; COMMUNICATION; SYSTEMS; SECURITY;
D O I
10.1109/TAC.2018.2883246
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdropper. A sensor transmits local state estimates over a packet dropping link to a remote estimator, while an eavesdropper can successfully overhear each sensor transmission with a certain probability. The objective is to determine when the sensor should transmit, in order to minimize the estimation error covariance at the remote estimator, while trying to keep the eavesdropper error covariance above a certain level. This is done by solving an optimization problem that minimizes a linear combination of the expected estimation error covariance and the negative of the expected eavesdropper error covariance. Structural results on the optimal transmission policy are derived, and shown to exhibit thresholding behavior in the estimation error covariances. In the infinite horizon situation, it is shown that with unstable systems one can keep the expected estimation error covariance bounded while the expected eavesdropper error covariance becomes unbounded, for all eavesdropping probabilities strictly less than one.
引用
收藏
页码:3732 / 3739
页数:8
相关论文
共 39 条
[1]  
[Anonymous], 2005, FUNDAMENTALS WIRELES
[2]  
[Anonymous], 2010, UNDERSTANDING CRYPTO
[3]  
[Anonymous], 2016, DYNAMIC PROGRAMMING
[4]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289
[5]  
Bai CZ, 2015, P AMER CONTR CONF, P195, DOI 10.1109/ACC.2015.7170734
[6]  
Block D. J., 1996, THESIS
[7]  
Cortes J, 2016, IEEE DECIS CONTR P, P4252, DOI 10.1109/CDC.2016.7798915
[8]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[9]   Estimation in Wireless Sensor Networks With Security Constraints [J].
Guo, Xiaoxi ;
Leong, Alex S. ;
Dey, Subhrakanti .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2017, 53 (02) :544-561
[10]   Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints [J].
Guo, Xiaoxi ;
Leong, Alex S. ;
Dey, Subhrakanti .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2017, 3 (01) :12-28