Privacy-preserving state estimation with unreliable channels

被引:8
作者
Huang, Jie [1 ]
Gao, Chen [1 ]
He, Xiao [1 ]
机构
[1] Tsinghua Univ, Dept Automat, Beijing 100084, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy security; Privacy-preserving encoding; Remote estimation; Co-design;
D O I
10.1016/j.isatra.2022.05.035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A co-design problem of privacy-preserving encoding and filtering is concerned in this paper. A remote legal user estimates states of a dynamic system by the received innovation messages. However, the communication channel is neither reliable nor secure. The messages may be missing during the transmission and have a risk of being intercepted by an eavesdropper. Therefore, in this work, an encoding scheme together with an MMSE estimation algorithm are designed for preserving information privacy and meanwhile guaranteeing estimation performance. We introduce a novel encoding approach using a weighted innovation with a public key to achieve privacy security as well as low computational expense. A filtering algorithm is designed under such an encoding mechanism. And the performance of the filter and the encoding method is analyzed. The feasibility of the encoding approach and the filtering algorithm is illustrated through numerical examples of an unstable system and a stable ballistic roll rate estimation system.(c) 2022 ISA. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:4 / 12
页数:9
相关论文
共 40 条
[1]   The Tobit Kalman Filter: An Estimator for Censored Measurements [J].
Allik, Bethany ;
Miller, Cory ;
Piovoso, Michael J. ;
Zurakowski, Ryan .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2016, 24 (01) :365-371
[2]   Ballistic Roll Estimation using EKF Frequency Tracking and Adaptive Noise Cancellation [J].
Allik, Bethany ;
Ilg, Mark ;
Zurakowski, Ryan .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2013, 49 (04) :2546-2553
[3]   MONOTONICITY AND STABILIZABILITY PROPERTIES OF SOLUTIONS OF THE RICCATI DIFFERENCE EQUATION - PROPOSITIONS, LEMMAS, THEOREMS, FALLACIOUS CONJECTURES AND COUNTEREXAMPLES [J].
BITMEAD, RR ;
GEVERS, MR ;
PETERSEN, IR ;
KAYE, RJ .
SYSTEMS & CONTROL LETTERS, 1985, 5 (05) :309-315
[4]   Practical Privacy Preserving POI Recommendation [J].
Chen, Chaochao ;
Zhou, Jun ;
Wu, Bingzhe ;
Fang, Wenjing ;
Wang, Li ;
Qi, Yuan ;
Zheng, Xiaolin .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2020, 11 (05)
[5]   H∞ Containment Control of Multiagent Systems Under Event-Triggered Communication Scheduling: The Finite-Horizon Case [J].
Chen, Wei ;
Ding, Derui ;
Ge, Xiaohua ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (04) :1372-1382
[6]   Secure State Estimation and Control of Cyber-Physical Systems: A Survey [J].
Ding, Derui ;
Han, Qing-Long ;
Ge, Xiaohua ;
Wang, Jun .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (01) :176-190
[7]   Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks [J].
Ge, Xiaohua ;
Xiao, Shunyuan ;
Han, Qing-Long ;
Zhang, Xian-Ming ;
Ding, Derui .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (01) :31-46
[8]   Dynamic Event-triggered Control and Estimation: A Survey [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhang, Xian-Ming ;
Ding, Derui .
INTERNATIONAL JOURNAL OF AUTOMATION AND COMPUTING, 2021, 18 (06) :857-886
[9]   Dynamic Event-Triggered Distributed Coordination Control and its Applications: A Survey of Trends and Techniques [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Ding, Lei ;
Wang, Yu-Long ;
Zhang, Xian-Ming .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (09) :3112-3125
[10]   Distributed Krein space-based attack detection over sensor networks under deception attacks [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Zhong, Maiying ;
Zhang, Xian-Ming .
AUTOMATICA, 2019, 109