2022
DOI: 10.1109/tsp.2022.3182590
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Distributed Kalman Filtering

Abstract: Distributed Kalman filtering techniques enable agents of a multiagent network to enhance their ability to track a system and learn from local cooperation with neighbors. Enabling this cooperation, however, requires agents to share information, which raises the question of privacy. This paper proposes a privacy-preserving distributed Kalman filter (PP-DKF) that protects local agent information by restricting and obfuscating the information exchanged. The derived PP-DKF embeds two state-of-the-art average consen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 54 publications
(100 reference statements)
0
2
0
Order By: Relevance
“…Theorem 1. With utilizing the ET mechanism as Equation (6) to schedule transmissions of perturbed local estimates in the differential private distributed fusion estimation shown as Figure 2, the information for the fusion center obtained from sensor i at k instant is…”
Section: Event-triggered Mechanism For Scheduling Data Transmissionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 1. With utilizing the ET mechanism as Equation (6) to schedule transmissions of perturbed local estimates in the differential private distributed fusion estimation shown as Figure 2, the information for the fusion center obtained from sensor i at k instant is…”
Section: Event-triggered Mechanism For Scheduling Data Transmissionsmentioning
confidence: 99%
“…Varieties formal notions of privacy and the corresponding privacy‐preserving fusion estimation methods have been proposed 4–6 . Among these, differential privacy 7,8 has gained more and more attentions.…”
Section: Introductionmentioning
confidence: 99%
“…To further protect the node-sensitive information, at each consensus iteration m, agents share only a perturbed version of their public substate with their neighboring agents. Subsequently, at agent k, the decomposition and noise injection-based privacy-preserving ACF [27], at mth iteration is stated as…”
Section: B Decomposition and Noise Injection Based-acfmentioning
confidence: 99%
“…The HBC agent has access to it own local information {α k,(m) , β k,(m) , S n,(m) } as well as the shared information by its neighbors S n,(m) α l,(m) for l ∈ N − k . We can observe that agent privacy depends on the availability of the interaction and coupling weights for all agents at the HBC adversary [27]. Thus, to investigate the privacy leakage in the worst-case scenario, we also assume that the HBC agent has also access to the coupling and interaction weight matrices Θ and ∆.…”
Section: A Honest-but-curious (Hbc) Agentmentioning
confidence: 99%
See 1 more Smart Citation