Yan Yu;Chao Yang;Wenjie Ding;Wen Yang;Xiaofan Wang
{"title":"分布式状态估计防窃听双保护方法","authors":"Yan Yu;Chao Yang;Wenjie Ding;Wen Yang;Xiaofan Wang","doi":"10.1109/TSIPN.2025.3563774","DOIUrl":null,"url":null,"abstract":"This paper examines a security issue for state estimation over a wireless sensor network. The state estimates are transmitted among neighboring nodes through wireless channels in a distributed network, wherein the transmission of the data are vulnerable to the intercept from eavesdroppers, leading to important data privacy leakage. To prevent eavesdroppers from obtaining state estimates, we propose a dual-protection method that combines dynamic transformation with lightweight encryption, which aims to protect the privacy without raising suspicion from eavesdroppers. Furthermore, we consider the scenarios where eavesdroppers utilize side-channel information to gather data and attempt to deduce the encryption mechanism, subsequently inferring the real state estimate. We also provide the analysis to show that the eavesdropper with inference capabilities could not influence the estimation performance of sensors. Finally, the numerical examples are provided to illustrate the effectiveness of the privacy-preserving method.","PeriodicalId":56268,"journal":{"name":"IEEE Transactions on Signal and Information Processing over Networks","volume":"11 ","pages":"427-438"},"PeriodicalIF":3.0000,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dual-Protection Method Against Eavesdroppers for Distributed State Estimation\",\"authors\":\"Yan Yu;Chao Yang;Wenjie Ding;Wen Yang;Xiaofan Wang\",\"doi\":\"10.1109/TSIPN.2025.3563774\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper examines a security issue for state estimation over a wireless sensor network. The state estimates are transmitted among neighboring nodes through wireless channels in a distributed network, wherein the transmission of the data are vulnerable to the intercept from eavesdroppers, leading to important data privacy leakage. To prevent eavesdroppers from obtaining state estimates, we propose a dual-protection method that combines dynamic transformation with lightweight encryption, which aims to protect the privacy without raising suspicion from eavesdroppers. Furthermore, we consider the scenarios where eavesdroppers utilize side-channel information to gather data and attempt to deduce the encryption mechanism, subsequently inferring the real state estimate. We also provide the analysis to show that the eavesdropper with inference capabilities could not influence the estimation performance of sensors. Finally, the numerical examples are provided to illustrate the effectiveness of the privacy-preserving method.\",\"PeriodicalId\":56268,\"journal\":{\"name\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"volume\":\"11 \",\"pages\":\"427-438\"},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2025-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10974630/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Signal and Information Processing over Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10974630/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Dual-Protection Method Against Eavesdroppers for Distributed State Estimation
This paper examines a security issue for state estimation over a wireless sensor network. The state estimates are transmitted among neighboring nodes through wireless channels in a distributed network, wherein the transmission of the data are vulnerable to the intercept from eavesdroppers, leading to important data privacy leakage. To prevent eavesdroppers from obtaining state estimates, we propose a dual-protection method that combines dynamic transformation with lightweight encryption, which aims to protect the privacy without raising suspicion from eavesdroppers. Furthermore, we consider the scenarios where eavesdroppers utilize side-channel information to gather data and attempt to deduce the encryption mechanism, subsequently inferring the real state estimate. We also provide the analysis to show that the eavesdropper with inference capabilities could not influence the estimation performance of sensors. Finally, the numerical examples are provided to illustrate the effectiveness of the privacy-preserving method.
期刊介绍:
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.