Aggregation-Based Remote State Estimation Secrecy with Pseudo-Random Numbers for Networked Systems

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

This article is concerned with the remote state estimation secrecy problem for networked systems in the presence of eavesdroppers. The majority of current research centers on one kind of eavesdropper that is equipped with predefined estimation structures. To enhance the resistance against eavesdroppers, we simultaneously consider two distinct categories of logical eavesdroppers in this article, namely, smart eavesdroppers, who possess the same level of knowledge as legitimate users, and naive eavesdroppers, who remain oblivious to the encoding process. Moreover, we propose an innovative aggregation-based secrecy code that employs pseudo-random numbers, incorporating both a pseudo-random real-number sequence and a pseudo-random binary scheduler. Also, an α-relative secrecy is proposed by introducing a relax variable, which offers higher flexibility than the traditional relative secrecy. Then, both the classical perfect secrecy and the newly proposed α-relative secrecy are proven under specific conditions. Furthermore, the estimation performance for users and eavesdroppers can be tuned by designing the aggregation structure and the probability distribution of the pseudo-random samples, rather than being solely determined by the communication channel characteristics as in previous work. Finally, the effectiveness of the proposed coding method is verified through numerical experiments conducted on two systems with differing stability characteristics.

Original languageEnglish
JournalIEEE Transactions on Control Systems Technology
DOIs
Publication statusPublished - Jan 2025

Keywords

  • Data aggregation
  • eavesdropping attacks
  • networked systems
  • packet dropping
  • pseudo-random numbers
  • remote state estimation

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Aggregation-Based Remote State Estimation Secrecy with Pseudo-Random Numbers for Networked Systems'. Together they form a unique fingerprint.

Cite this