Secure and private control using semi-homomorphic encryption

被引:123
作者
Farokhi, Farhad [1 ]
Shames, Iman [1 ]
Batterham, Nathan [1 ]
机构
[1] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic 3010, Australia
关键词
Networked control system; Privacy; Security; Semi-homomorphic encryption; Paillier method; CONTROL-SYSTEMS; MANAGEMENT; SCHEME;
D O I
10.1016/j.conengprac.2017.07.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networked control systems with encrypted sensors measurements is considered. Semi-homomorphic encryption, specifically the Paillier encryption, is used so that the controller can perform the required computation on the encrypted data. Conditions on the parameters of the encryption technique are provided that guarantee the stability and the performance of the closed-loop system. The results are subsequently extended Laplacian based distributed systems, such as formation-seeking algorithms. It is shown that the problem of figuring out the state measurements of the neighbouring agents of a compromised agent upon using the proposed algorithm is numerically intractable. (C) 2017 Elsevier Ltd. All rights reserved.
引用
收藏
页码:13 / 20
页数:8
相关论文
共 25 条
[1]   GAME-THEORETIC MODELS OF ELECTRICITY THEFT DETECTION IN SMART UTILITY NETWORKS PROVIDING NEW CAPABILITIES WITH ADVANCED METERING INFRASTRUCTURE [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Cardenas, Alvaro A. ;
Sastry, S. Shankar .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :66-81
[2]   ALGEBRAIC CHARACTERIZATION OF FIXED MODES IN DECENTRALIZED CONTROL [J].
ANDERSON, BDO ;
CLEMENTS, DJ .
AUTOMATICA, 1981, 17 (05) :703-712
[3]  
[Anonymous], 2012, ASIACCS
[4]  
[Anonymous], COMPUTATIONAL COMPLE
[5]  
[Anonymous], 2006, Planning algorithms
[6]  
[Anonymous], 1998, COMBINATORIAL OPTIMI
[7]  
Brenner Michael, 2011, 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST 2011), P114, DOI 10.1109/DEST.2011.5936608
[8]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[9]  
Farokhi F., 2016, P 6 IFAC WORKSH DIST
[10]   Information flow and cooperative control of vehicle formations [J].
Fax, JA ;
Murray, RM .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2004, 49 (09) :1465-1476