Watermarking-Aided dimensionality reduction encryption for distributed fusion estimation against eavesdropping

IF 3.7 3区 计算机科学 Q2 AUTOMATION & CONTROL SYSTEMS
Yuhang Yang, Shenmin Song
{"title":"Watermarking-Aided dimensionality reduction encryption for distributed fusion estimation against eavesdropping","authors":"Yuhang Yang,&nbsp;Shenmin Song","doi":"10.1016/j.jfranklin.2025.107594","DOIUrl":null,"url":null,"abstract":"<div><div>The existing defense strategies offer robust protection against eavesdropping attacks. However, in practical engineering scenarios, the system must navigate numerous challenges, particularly when communication resources are limited. Under such constraints, the estimator performance can suffer significantly, especially when faced with both eavesdropping attacks and resource limitations. This decline is due to the lack of effective adaptation mechanisms. To remedy this issue, we propose an encryption method that incorporates watermarking signals and dimensionality reduction techniques. The core principle of this method aims to find a balanced compromise between the performance demands and the resource constraints. Specifically, dimensionality reduction strategy is applied to reduce the information density of the transmitted signal, which alleviates the burden on network bandwidth. Additionally, the incorporation of the watermarking signal not only enhances the complexity of the signal but also maximizes the estimation error for potential eavesdroppers, which ensures the secure transmission of information. A compensation mechanism, which incorporates techniques for watermarking removal and prediction, has been specifically developed for users at the fusion center. This mechanism undergoes rigorous feasibility and boundedness analyses to ensure the robustness of the encryption strategy and estimator. Extensive simulation experiments conduct to validate the effectiveness and superiority of the developed algorithm.</div></div>","PeriodicalId":17283,"journal":{"name":"Journal of The Franklin Institute-engineering and Applied Mathematics","volume":"362 5","pages":"Article 107594"},"PeriodicalIF":3.7000,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of The Franklin Institute-engineering and Applied Mathematics","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0016003225000882","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The existing defense strategies offer robust protection against eavesdropping attacks. However, in practical engineering scenarios, the system must navigate numerous challenges, particularly when communication resources are limited. Under such constraints, the estimator performance can suffer significantly, especially when faced with both eavesdropping attacks and resource limitations. This decline is due to the lack of effective adaptation mechanisms. To remedy this issue, we propose an encryption method that incorporates watermarking signals and dimensionality reduction techniques. The core principle of this method aims to find a balanced compromise between the performance demands and the resource constraints. Specifically, dimensionality reduction strategy is applied to reduce the information density of the transmitted signal, which alleviates the burden on network bandwidth. Additionally, the incorporation of the watermarking signal not only enhances the complexity of the signal but also maximizes the estimation error for potential eavesdroppers, which ensures the secure transmission of information. A compensation mechanism, which incorporates techniques for watermarking removal and prediction, has been specifically developed for users at the fusion center. This mechanism undergoes rigorous feasibility and boundedness analyses to ensure the robustness of the encryption strategy and estimator. Extensive simulation experiments conduct to validate the effectiveness and superiority of the developed algorithm.
针对窃听的分布式融合估计的水印辅助降维加密
现有的防御策略对窃听攻击提供了强大的保护。然而,在实际工程场景中,系统必须应对许多挑战,特别是在通信资源有限的情况下。在这样的约束下,估计器的性能可能会受到严重影响,尤其是在面临窃听攻击和资源限制的情况下。这种下降是由于缺乏有效的适应机制。为了解决这个问题,我们提出了一种结合了水印信号和降维技术的加密方法。该方法的核心原则是在性能需求和资源约束之间找到一个平衡的折衷方案。具体而言,采用降维策略降低传输信号的信息密度,减轻网络带宽负担。此外,水印信号的加入不仅提高了信号的复杂性,而且最大限度地降低了潜在窃听者的估计误差,保证了信息的安全传输。为融合中心的用户专门开发了一种补偿机制,该机制结合了水印去除和预测技术。该机制经过严格的可行性和有界性分析,以确保加密策略和估计器的鲁棒性。大量的仿真实验验证了所开发算法的有效性和优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
7.30
自引率
14.60%
发文量
586
审稿时长
6.9 months
期刊介绍: The Journal of The Franklin Institute has an established reputation for publishing high-quality papers in the field of engineering and applied mathematics. Its current focus is on control systems, complex networks and dynamic systems, signal processing and communications and their applications. All submitted papers are peer-reviewed. The Journal will publish original research papers and research review papers of substance. Papers and special focus issues are judged upon possible lasting value, which has been and continues to be the strength of the Journal of The Franklin Institute.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信