{"title":"Distributed secure estimation for interconnected systems against eavesdropping under energy harvesting constrained encryption","authors":"Shuqi Chen , Daniel W.C. Ho , Zhongyao Hu","doi":"10.1016/j.isatra.2025.04.033","DOIUrl":null,"url":null,"abstract":"<div><div>This paper studies the distributed secure estimation problem for interconnected systems, where multiple eavesdroppers intercept transmitted measurement data and collaborate to rebuild states of subsystems. An encryption–decryption model is proposed to achieve resource-efficient privacy protection. In this model, sensors equipped with energy harvesters encrypt measurements before transmission provided that energy is available. The energy-based encryption matrices and estimator parameters are jointly devised to guarantee that estimation error covariances remain bounded for users while deteriorating the estimation performance of eavesdroppers. The influence of the energy level and encryption matrices on the estimation performance of users and eavesdroppers is also reflected. A numerical simulation regarding multi-target tracking is provided to validate the effectiveness of the main results.</div></div>","PeriodicalId":14660,"journal":{"name":"ISA transactions","volume":"163 ","pages":"Pages 184-194"},"PeriodicalIF":6.3000,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0019057825002216","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This paper studies the distributed secure estimation problem for interconnected systems, where multiple eavesdroppers intercept transmitted measurement data and collaborate to rebuild states of subsystems. An encryption–decryption model is proposed to achieve resource-efficient privacy protection. In this model, sensors equipped with energy harvesters encrypt measurements before transmission provided that energy is available. The energy-based encryption matrices and estimator parameters are jointly devised to guarantee that estimation error covariances remain bounded for users while deteriorating the estimation performance of eavesdroppers. The influence of the energy level and encryption matrices on the estimation performance of users and eavesdroppers is also reflected. A numerical simulation regarding multi-target tracking is provided to validate the effectiveness of the main results.
期刊介绍:
ISA Transactions serves as a platform for showcasing advancements in measurement and automation, catering to both industrial practitioners and applied researchers. It covers a wide array of topics within measurement, including sensors, signal processing, data analysis, and fault detection, supported by techniques such as artificial intelligence and communication systems. Automation topics encompass control strategies, modelling, system reliability, and maintenance, alongside optimization and human-machine interaction. The journal targets research and development professionals in control systems, process instrumentation, and automation from academia and industry.