{"title":"多策略注入攻击下传感器网络的隐私保护分布式估计:一种混沌加密方案","authors":"Lijuan Zha;Jinzhao Miao;Jinliang Liu;Engang Tian;Chen Peng","doi":"10.1109/TSMC.2025.3560404","DOIUrl":null,"url":null,"abstract":"This article explores the distributed set-membership state estimation problem over sensor networks (SNs) with chaotic encrypted privacy-preserving scheme and multistrategy injection attacks (MIAs). Since potential eavesdroppers in communication networks may intercept the transmitted measurement signals, chaotic encryption is adopted as a privacy-preserving scheme to protect the system state information from being revealed. The measurement signals are encrypted before transmission and decrypted upon reception by the remote estimator. A newly devised attack model is developed to characterize the injection attacks, which occur randomly and involve a combination of multiple attack strategies. By employing matrix inequality techniques, a unified set-membership estimation scheme is developed when both the privacy-preserving scheme and the MIAs coexist. Subsequently, based on the sufficient condition of constraining the estimation error within an ellipsoidal range, an optimization problem is formulated to achieve the optimal estimation performance at each time step, along with the development of a recursive algorithm for computing the required estimator parameters. Finally, simulation is provided to verify the set-membership estimation approach under the chaotic encryption scheme.","PeriodicalId":48915,"journal":{"name":"IEEE Transactions on Systems Man Cybernetics-Systems","volume":"55 7","pages":"4969-4978"},"PeriodicalIF":8.6000,"publicationDate":"2025-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Privacy-Preserving Distributed Estimation Over Sensor Networks With Multistrategy Injection Attacks: A Chaotic Encryption Scheme\",\"authors\":\"Lijuan Zha;Jinzhao Miao;Jinliang Liu;Engang Tian;Chen Peng\",\"doi\":\"10.1109/TSMC.2025.3560404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article explores the distributed set-membership state estimation problem over sensor networks (SNs) with chaotic encrypted privacy-preserving scheme and multistrategy injection attacks (MIAs). Since potential eavesdroppers in communication networks may intercept the transmitted measurement signals, chaotic encryption is adopted as a privacy-preserving scheme to protect the system state information from being revealed. The measurement signals are encrypted before transmission and decrypted upon reception by the remote estimator. A newly devised attack model is developed to characterize the injection attacks, which occur randomly and involve a combination of multiple attack strategies. By employing matrix inequality techniques, a unified set-membership estimation scheme is developed when both the privacy-preserving scheme and the MIAs coexist. Subsequently, based on the sufficient condition of constraining the estimation error within an ellipsoidal range, an optimization problem is formulated to achieve the optimal estimation performance at each time step, along with the development of a recursive algorithm for computing the required estimator parameters. Finally, simulation is provided to verify the set-membership estimation approach under the chaotic encryption scheme.\",\"PeriodicalId\":48915,\"journal\":{\"name\":\"IEEE Transactions on Systems Man Cybernetics-Systems\",\"volume\":\"55 7\",\"pages\":\"4969-4978\"},\"PeriodicalIF\":8.6000,\"publicationDate\":\"2025-04-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Systems Man Cybernetics-Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10977662/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Systems Man Cybernetics-Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10977662/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Privacy-Preserving Distributed Estimation Over Sensor Networks With Multistrategy Injection Attacks: A Chaotic Encryption Scheme
This article explores the distributed set-membership state estimation problem over sensor networks (SNs) with chaotic encrypted privacy-preserving scheme and multistrategy injection attacks (MIAs). Since potential eavesdroppers in communication networks may intercept the transmitted measurement signals, chaotic encryption is adopted as a privacy-preserving scheme to protect the system state information from being revealed. The measurement signals are encrypted before transmission and decrypted upon reception by the remote estimator. A newly devised attack model is developed to characterize the injection attacks, which occur randomly and involve a combination of multiple attack strategies. By employing matrix inequality techniques, a unified set-membership estimation scheme is developed when both the privacy-preserving scheme and the MIAs coexist. Subsequently, based on the sufficient condition of constraining the estimation error within an ellipsoidal range, an optimization problem is formulated to achieve the optimal estimation performance at each time step, along with the development of a recursive algorithm for computing the required estimator parameters. Finally, simulation is provided to verify the set-membership estimation approach under the chaotic encryption scheme.
期刊介绍:
The IEEE Transactions on Systems, Man, and Cybernetics: Systems encompasses the fields of systems engineering, covering issue formulation, analysis, and modeling throughout the systems engineering lifecycle phases. It addresses decision-making, issue interpretation, systems management, processes, and various methods such as optimization, modeling, and simulation in the development and deployment of large systems.