Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation

被引:34
作者
Wang, Le [1 ]
Cao, Xianghui [1 ]
Zhang, Heng [2 ]
Sun, Changyin [1 ]
Zheng, Wei Xing [3 ]
机构
[1] Southeast Univ, Sch Automat, 2 Sipailou, Nanjing, Peoples R China
[2] Jiangsu Ocean Univ, Sch Sci, Lianyungang, Peoples R China
[3] Western Sydney Univ, Sch Comp Data & Math Sci, Penrith, NSW, Australia
基金
中国国家自然科学基金;
关键词
Cyber physical systems; Remote state estimation; Eavesdropping; Privacy; Encrypted transmission; Optimal schedule; Energy constraint; CYBER-PHYSICAL SYSTEMS; SECURITY ANALYSIS;
D O I
10.1016/j.automatica.2021.110145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In remote state estimation systems, the state being estimated may be wiretapped by eavesdropping communications from the sensor to the remote estimator. A straightforward remedy for protecting the state privacy is to encrypt all the sensory data before transmission, which however may not be affordable for an energy-constrained sensor. In this paper, we address the optimal sensor transmission scheduling problem in order to protect the state privacy in an energy-efficient manner. The sensor can choose either to transmit data in plaintext or encrypted text, or to stay in silence without transmitting. We formulate the problem as the one of maximizing the eavesdropper's estimation error of the system state, while guaranteeing a certain level of the remote estimation performance under a given energy budget for the sensor in the finite time horizon. Then, we transform the problem into an optimal scheduling problem under any fixed transmission times and an energy allocation problem, and propose algorithms to solve each of them. We theoretically prove that, provided that a certain level of remote estimation performance is guaranteed, the optimal sensor schedule is to group instants of encrypted transmissions and silent states as tighter as possible and the optimal energy allocation tends to arrange more energy to transmit encrypted text. Furthermore, we extend our results over finite time horizon to infinite periodic time horizon. We construct a set of monotonic sequences to approximate the estimator's performance constraint. Then, we design an algorithm to obtain the suboptimal schedule Finally, numerical results are presented to demonstrate the performance of the proposed methods. (C) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:15
相关论文
共 46 条
[1]   Encrypted LQG using Labeled Homomorphic Encryption [J].
Alexandru, Andreea B. ;
Pappas, George J. .
ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, :129-140
[2]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[3]   Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs [J].
Cao, Xianghui ;
Liu, Lu ;
Shen, Wenlong ;
Laha, Aurobinda ;
Tang, Jin ;
Cheng, Yu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (01) :186-197
[4]   Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks [J].
Cao, Xianghui ;
Shila, Devu Manikantan ;
Cheng, Yu ;
Yang, Zequ ;
Zhou, Yang ;
Chen, Jiming .
IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (05) :816-829
[5]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[6]   Remote State Estimation in the Presence of an Active Eavesdropper [J].
Ding, Kemi ;
Ren, Xiaoqiang ;
Leong, Alex S. ;
Quevedo, Daniel E. ;
Shi, Ling .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (01) :229-244
[7]  
Giraldo J, 2017, 2017 IEEE CONFERENCE ON CONTROL TECHNOLOGY AND APPLICATIONS (CCTA 2017), P1313, DOI 10.1109/CCTA.2017.8062640
[8]   Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints [J].
Guo, Xiaoxi ;
Leong, Alex S. ;
Dey, Subhrakanti .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2017, 3 (01) :12-28
[9]  
Hale M, 2018, P AMER CONTR CONF, P3386, DOI 10.23919/ACC.2018.8431397
[10]   A survey of recent results in networked control systems [J].
Hespanha, Joao P. ;
Naghshtabrizi, Payam ;
Xu, Yonggang .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :138-162