{"title":"Distributed secure estimation for interconnected systems against eavesdropping under energy harvesting constrained encryption.","authors":"Shuqi Chen, Daniel W C Ho, Zhongyao Hu","doi":"10.1016/j.isatra.2025.04.033","DOIUrl":null,"url":null,"abstract":"<p><p>This paper studies the distributed secure estimation problem for interconnected systems, where multiple eavesdroppers intercept transmitted measurement data and collaborate to rebuild states of subsystems. An encryption-decryption model is proposed to achieve resource-efficient privacy protection. In this model, sensors equipped with energy harvesters encrypt measurements before transmission provided that energy is available. The energy-based encryption matrices and estimator parameters are jointly devised to guarantee that estimation error covariances remain bounded for users while deteriorating the estimation performance of eavesdroppers. The influence of the energy level and encryption matrices on the estimation performance of users and eavesdroppers is also reflected. A numerical simulation regarding multi-target tracking is provided to validate the effectiveness of the main results.</p>","PeriodicalId":94059,"journal":{"name":"ISA transactions","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISA transactions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1016/j.isatra.2025.04.033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper studies the distributed secure estimation problem for interconnected systems, where multiple eavesdroppers intercept transmitted measurement data and collaborate to rebuild states of subsystems. An encryption-decryption model is proposed to achieve resource-efficient privacy protection. In this model, sensors equipped with energy harvesters encrypt measurements before transmission provided that energy is available. The energy-based encryption matrices and estimator parameters are jointly devised to guarantee that estimation error covariances remain bounded for users while deteriorating the estimation performance of eavesdroppers. The influence of the energy level and encryption matrices on the estimation performance of users and eavesdroppers is also reflected. A numerical simulation regarding multi-target tracking is provided to validate the effectiveness of the main results.