Encrypted Control for Networked Systems AN ILLUSTRATIVE INTRODUCTION AND CURRENT CHALLENGES

被引:74
作者
Darup, Moritz Schulze [1 ]
Alexandru, Andreea B. [2 ]
Quevedo, Daniel E. [3 ]
Pappas, George J. [4 ]
机构
[1] TU Dortmund Univ, Control & Cyberphys Syst, D-44227 Dortmund, Germany
[2] Univ Maryland, Coll Comp Math & Nat Sci, Dept Com Sci, College Pk, MD 20742 USA
[3] Queensland Univ Technol QUT, Sch Elect Engn & Robot, Cyberphys Syst, Brisbane, Qld 4000, Australia
[4] Univ Penn, Dept Elect & Syst Engn, Philadelphia, PA 19104 USA
来源
IEEE CONTROL SYSTEMS MAGAZINE | 2021年 / 41卷 / 03期
关键词
SECURE; COMPUTATION; STABILITY;
D O I
10.1109/MCS.2021.3062956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control systems are rapidly evolving to utilize modern computation and communication tools, such as cloud computing and geographically distributed networks, to improve performance, coverage, and scalability. However, control loops that outsource the computation of privacysensitive data to third-party platforms via public networks are already the subject of cyberattacks involving eaves-dropping and data manipulation. Encrypted control addresses this security gap and ensures the confidentiality of the processed data in the entire control loop by encrypting the information both at the level of transmission (across the network) and at the level of computation (on corrupted computing platforms). This article presents a tutorial-style introduction to this young but emerging field in the framework of secure control for networked dynamical systems with encrypted data. Its focus is on the steps for deriving the encrypted formulations of some specific control algorithms from the standard formulations and discussing the challenges arising in this process, ranging from privacy-aware conceptualizations to changes in computation flows and quantization issues. In conclusion, a list of open problems and new directions to explore is provided to consolidate the area of encrypted control.
引用
收藏
页码:58 / 78
页数:21
相关论文
共 95 条
  • [31] Encrypted Cooperative Control Based on Structured Feedback
    Darup, Moritz Schulze
    Redder, Adrian
    Quevedo, Daniel E.
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2019, 3 (01): : 37 - 42
  • [32] Towards Encrypted MPC for Linear Constrained Systems
    Darup, Moritz Schulze
    Redder, Adrian
    Shames, Iman
    Farokhi, Farhad
    Quevedo, Daniel
    [J]. IEEE CONTROL SYSTEMS LETTERS, 2018, 2 (02): : 195 - 200
  • [33] CHET: An Optimizing Compiler for Fully-Homomorphic Neural-Network Inferencing
    Dathathri, Roshan
    Saarikivi, Olli
    Chen, Hao
    Laine, Kim
    Lauter, Kristin
    Maleki, Saeed
    Musuvathi, Madanlal
    Mytkowicz, Todd
    [J]. PROCEEDINGS OF THE 40TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '19), 2019, : 142 - 156
  • [34] STABILIZING A LINEAR-SYSTEM WITH QUANTIZED STATE FEEDBACK
    DELCHAMPS, DF
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1990, 35 (08) : 916 - 924
  • [35] Accelerating Fully Homomorphic Encryption in Hardware
    Doroez, Yarkin
    Ozturk, Erdinc
    Sunar, Berk
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (06) : 1509 - 1521
  • [36] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472
  • [37] Evans D., 2018, FOUND TRENDS PRIVACY, V2, P2, DOI 10.1561/3300000019
  • [38] Secure and private control using semi-homomorphic encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. CONTROL ENGINEERING PRACTICE, 2017, 67 : 13 - 20
  • [39] Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption
    Farokhi, Farhad
    Shames, Iman
    Batterham, Nathan
    [J]. IFAC PAPERSONLINE, 2016, 49 (22): : 163 - 168
  • [40] Franzon P, 2010, P IEEE INT 3D SYST I, P1