Privacy Preserving via Secure Summation in Distributed Kalman Filtering

被引:21
作者
Ding, Wenjie [1 ]
Yang, Wen [1 ]
Zhou, Jiayu [1 ]
Shi, Ling [2 ]
Chen, Guanrong [3 ]
机构
[1] East China Univ Sci & Technol, Shanghai 200237, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Kowloon, Hong Kong, Peoples R China
[3] City Univ Hong Kong, Ctr Chaos & Complex Networks, Hong Kong, Peoples R China
来源
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS | 2022年 / 9卷 / 03期
基金
中国国家自然科学基金;
关键词
Distributed Kalman filtering; multiparty computation; privacy preserving; NETWORKS; SYSTEMS; AGENTS;
D O I
10.1109/TCNS.2022.3155109
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Average consensus is a major operation in distributed Kalman filtering. It requires neighboring nodes to exchange state information with each other, which may result in undesirable private data leakage. Since distributed Kalman filtering requires that the estimate at each time instant is accurate, it brings more challenges to design privacy-preserving scheme for operation. In this article, we design a privacy-preserving scheme for distributed Kalman filtering without the loss of estimation performance, which is also suitable for average consensus or dynamic average consensus of multiagent systems. We first build a secure multihop communication based on an encryption scheme. We then calculate the sum of the states of neighboring nodes with secure summation, which ensures that the state update will not reveal the state of the node to its neighboring nodes. We employ different methods to calculate the sum of the states of neighboring nodes against noncollusive and collusive adversaries. For the noncollusive case, the privacy of the honest nodes is preserved. For the collusive case, if there are too many adversaries, the privacy of the honest nodes could be exposed when accurate distributed Kalman filtering is accomplished. Therefore, we measure the risk of the global system suffering privacy leakage as the privacy index and improve the ability of the system to defend the collusive adversaries by using a group-based method. Some numerical examples are provided to illustrate the effectiveness of the proposed schemes.
引用
收藏
页码:1481 / 1492
页数:12
相关论文
共 35 条
[1]   A Smart Game for Data Transmission and Energy Consumption in the Internet of Things [J].
Abegunde, Jacob ;
Xiao, Hannan ;
Spring, Joseph .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) :528-543
[2]  
Clifton C., 2002, ACM Sigkdd Explorations Newsletter, V4, P28, DOI DOI 10.1145/772862.772867
[3]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[4]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[5]   Ensuring privacy with constrained additive noise by minimizing Fisher information [J].
Farokhi, Farhad ;
Sandberg, Henrik .
AUTOMATICA, 2019, 99 :275-288
[6]  
Gao H, 2018, IEEE CONF COMM NETW
[7]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[8]  
Gupta N, 2018, ANN ALLERTON CONF, P242, DOI 10.1109/ALLERTON.2018.8635912
[9]   Privacy in Distributed Average Consensus [J].
Gupta, Nirupam ;
Katz, Jonathan ;
Chopra, Nikhil .
IFAC PAPERSONLINE, 2017, 50 (01) :9515-9520
[10]   Privacy-Preserving Distributed Averaging via Homomorphically Encrypted Ratio Consensus [J].
Hadjicostis, Christoforos N. ;
Dominguez-Garcia, Alejandro D. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (09) :3887-3894