Secure State Estimation Using Hybrid Homomorphic Encryption Scheme

被引:25
作者
Zhang, Zhenyong [1 ]
Cheng, Peng [1 ]
Wu, Junfeng [1 ]
Chen, Jiming [1 ]
机构
[1] Zhejiang Univ, Coll Control Sci & Engn, Hangzhou 310027, Peoples R China
基金
中国国家自然科学基金;
关键词
State estimation; Encryption; Robot sensing systems; Cyber-physical systems; Cyber-physical system (CPS); data security; encrypted state estimator; homomorphic encryption (HE); stability analysis; SYSTEMS; DEFENSE;
D O I
10.1109/TCST.2020.3019501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the security of state estimation has attracted significant research attention due to the need for trustworthy situation awareness in emerging cyber-physical systems. In this article, we design an encryption-based state estimation (ESE) using partially homomorphically encrypted data. The encryption will enhance the confidentiality not only of data transmitted in the communication network but also critical system information required by the estimator. We adopt a hybrid encryption scheme by jointly using the multiplicatively and additively homomorphic encryption methods. Armed with encryption, ESE is able to conceal comprehensive information (i.e., model parameters, measurements, and estimates) aggregated at the estimator while retaining the correctness of the normal state estimation. Therefore, even if an attacker has gained unauthorized access to the estimator and associated communication channels, he/she will not be able to obtain sufficient knowledge of the system state to guide the attack. Furthermore, due to the encryption-induced quantization error, we give a sufficient stability condition for ESE. Finally, we implement ESE with real-world hardware to illustrate its effectiveness and efficiency.
引用
收藏
页码:1704 / 1720
页数:17
相关论文
共 65 条
  • [1] PrOLoc: Resilient Localization with Private Observers Using Partial Homomorphic Encryption[J]. Alanwar, Amr;Shoukry, Yasser;Chakraborty, Supriyo;Martin, Paul;Tabuada, Paulo;Srivastava, Mani. 2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017
  • [2] Alexandru AB, 2018, IEEE DECIS CONTR P, P5014, DOI 10.1109/CDC.2018.8619835
  • [3] Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks[J]. Amin, Saurabh;Litrico, Xavier;Sastry, Shankar;Bayen, Alexandre M. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2013(05)
  • [4] Anderson B. D. O., 1979, Optimal filtering
  • [5] [Anonymous], 1978, FDN SEC COMPUT
  • [6] Bai CZ, 2014, P AMER CONTR CONF, P3029, DOI 10.1109/ACC.2014.6859155
  • [7] Biham E., 2012, Differential Cryptanalysis of the Data Encryption Standard
  • [8] Bo S., 2011, International Journal of Networking and Computing, V1, P277
  • [9] Nonlinear Control of a Variable-Speed Wind Turbine Using a Two-Mass Model[J]. Boukhezzar, Boubekeur;Siguerdidjane, Houria. IEEE TRANSACTIONS ON ENERGY CONVERSION, 2011(01)
  • [10] Event-Triggered State Estimation: Experimental Performance Assessment and Comparative Study[J]. Chen, Wentao;Shi, Dawei;Wang, Junzheng;Shi, Ling. IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2017(05)