{"title":"网络系统抗窃听的安全递归状态估计:一种部分加解密方法","authors":"Lei Zou;Zidong Wang;Bo Shen;Hongli Dong","doi":"10.1109/TAC.2024.3512413","DOIUrl":null,"url":null,"abstract":"This article addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect information security, an encryption-decryption-based communication scheme can be used, but encrypting all the measurement data from sensors can result in significant computational costs. To address this issue, a partial-encryption-decryption (PED) mechanism is proposed to enhance information security with relatively low computational costs. In this mechanism, only part of the transmitted measurement signals are encrypted, and the remaining signals are transmitted directly to the estimator. A Jordan-canonical-form-based approach is developed to select the appropriate parameter for the PED mechanism, and recursive formulas for the state estimator are designed based on the principle of minimum mean squared error. Sufficient conditions are derived to guarantee the ultimate boundedness of the estimation error variance matrix. Finally, the proposed PED-based recursive state estimation scheme is evaluated through two simulation examples to demonstrate its effectiveness.","PeriodicalId":13201,"journal":{"name":"IEEE Transactions on Automatic Control","volume":"70 6","pages":"3681-3694"},"PeriodicalIF":7.0000,"publicationDate":"2024-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method\",\"authors\":\"Lei Zou;Zidong Wang;Bo Shen;Hongli Dong\",\"doi\":\"10.1109/TAC.2024.3512413\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect information security, an encryption-decryption-based communication scheme can be used, but encrypting all the measurement data from sensors can result in significant computational costs. To address this issue, a partial-encryption-decryption (PED) mechanism is proposed to enhance information security with relatively low computational costs. In this mechanism, only part of the transmitted measurement signals are encrypted, and the remaining signals are transmitted directly to the estimator. A Jordan-canonical-form-based approach is developed to select the appropriate parameter for the PED mechanism, and recursive formulas for the state estimator are designed based on the principle of minimum mean squared error. Sufficient conditions are derived to guarantee the ultimate boundedness of the estimation error variance matrix. Finally, the proposed PED-based recursive state estimation scheme is evaluated through two simulation examples to demonstrate its effectiveness.\",\"PeriodicalId\":13201,\"journal\":{\"name\":\"IEEE Transactions on Automatic Control\",\"volume\":\"70 6\",\"pages\":\"3681-3694\"},\"PeriodicalIF\":7.0000,\"publicationDate\":\"2024-12-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Automatic Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10782997/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automatic Control","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10782997/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method
This article addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect information security, an encryption-decryption-based communication scheme can be used, but encrypting all the measurement data from sensors can result in significant computational costs. To address this issue, a partial-encryption-decryption (PED) mechanism is proposed to enhance information security with relatively low computational costs. In this mechanism, only part of the transmitted measurement signals are encrypted, and the remaining signals are transmitted directly to the estimator. A Jordan-canonical-form-based approach is developed to select the appropriate parameter for the PED mechanism, and recursive formulas for the state estimator are designed based on the principle of minimum mean squared error. Sufficient conditions are derived to guarantee the ultimate boundedness of the estimation error variance matrix. Finally, the proposed PED-based recursive state estimation scheme is evaluated through two simulation examples to demonstrate its effectiveness.
期刊介绍:
In the IEEE Transactions on Automatic Control, the IEEE Control Systems Society publishes high-quality papers on the theory, design, and applications of control engineering. Two types of contributions are regularly considered:
1) Papers: Presentation of significant research, development, or application of control concepts.
2) Technical Notes and Correspondence: Brief technical notes, comments on published areas or established control topics, corrections to papers and notes published in the Transactions.
In addition, special papers (tutorials, surveys, and perspectives on the theory and applications of control systems topics) are solicited.