Innovation-Based Remote State Estimation Secrecy With No Acknowledgments

被引:4
|
作者
Kennedy, Justin M. [1 ]
Ford, Jason J. [1 ]
Quevedo, Daniel E. [1 ]
Dressler, Falko [2 ]
机构
[1] Queensland Univ Technol, Sch Elect Engn & Robot, Brisbane, Qld 4000, Australia
[2] TU Berlin, Sch Elect Engn & Comp Sci, D-10587 Berlin, Germany
关键词
Eavesdropping; privacy; remote state estimation; state-secrecy codes; MICROGRIDS;
D O I
10.1109/TAC.2024.3385315
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secrecy encoding for remote state estimation in the presence of adversarial eavesdroppers is a well studied problem. Typical existing secrecy encoding schemes rely on the transmitter's knowledge of the remote estimator's current performance. This performance measure is often shared via packet receipt acknowledgments. However, in practical situations the acknowledgment channel may be susceptible to interference from an active adversary, resulting in the secrecy encoding scheme failing. Aiming to achieve a reliable state estimate for a legitimate estimator while ensuring secrecy, we propose a secrecy encoding scheme without the need for packet receipt acknowledgments. Our encoding scheme uses a prearranged scheduling sequence established at the transmitter and legitimate receiver. We transmit a packet containing either the state measurement or encoded information for the sestimate legitimate user. The encoding makes the packet appear to be the state but is designed to damage an eavesdropper's estimate. The prearranged scheduling sequence and encoding is chosen psuedorandom. We analyze the performance of our encoding scheme against a class of eavesdropper, and show conditions to force the eavesdropper to have an unbounded estimation performance. Further, we provide a numerical illustration and apply our encoding scheme to an application in power systems.
引用
收藏
页码:7433 / 7448
页数:16
相关论文
共 50 条
  • [1] Optimal Innovation-Based Deception Attack on Remote State Estimation
    Wu, Shuang
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 3017 - 3022
  • [2] Consequence Analysis of Innovation-based Integrity Attacks with Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IFAC PAPERSONLINE, 2017, 50 (01): : 8399 - 8404
  • [3] Worst-case stealthy innovation-based linear attack on remote state estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    AUTOMATICA, 2018, 89 : 117 - 124
  • [4] How vulnerable is innovation-based remote state estimation: Fundamental limits under linear attacks
    Liu, Hanxiao
    Ni, Yuqing
    Xie, Lihua
    Johansson, Karl Henrik
    AUTOMATICA, 2022, 136
  • [5] Single-dimensional encryption against innovation-based stealthy attacks on remote state estimation
    Shang, Jun
    Zhou, Jing
    Chen, Tongwen
    AUTOMATICA, 2022, 136
  • [6] Optimal innovation-based attacks against remote state estimation with side information and historical data
    Shan, Hua-Sheng
    Li, Yi-Gang
    An, Liwei
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2025, 56 (03) : 544 - 560
  • [7] Worst-Case Innovation-Based Integrity Attacks With Side Information on Remote State Estimation
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2019, 6 (01): : 48 - 59
  • [8] Optimal Stealthy Attack With Side Information Against Remote State Estimation: A Corrupted Innovation-Based Strategy
    Mao, Li-Wei
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2025, 55 (02) : 897 - 904
  • [9] Worst-case Analysis of Innovation-based Linear Attack on Remote State Estimation with Resource Constraint
    Guo, Ziyang
    Shi, Dawei
    Johansson, Karl Henrik
    Shi, Ling
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6303 - 6308
  • [10] Clustering-based detection algorithm of remote state estimation under stealthy innovation-based attacks with historical data
    Chen, Shan
    Ni, Yuqing
    Huang, Lingying
    Luan, Xiaoli
    Liu, Fei
    NEUROCOMPUTING, 2025, 616