2017
DOI: 10.1016/j.ifacol.2017.08.1563
|View full text |Cite
|
Sign up to set email alerts
|

State Estimation with Secrecy against Eavesdroppers

Abstract: Abstract:We study the problem of remote state estimation, in the presence of an eavesdropper. An authorized user estimates the state of a linear plant, based on the data received from a sensor, while the data may also be intercepted by the eavesdropper. To maintain confidentiality with respect to state, we introduce a novel control-theoretic definition of perfect secrecy requiring that the user's expected error remains bounded while the eavesdropper's expected error grows unbounded. We propose a secrecy mechan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

2
36
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 51 publications
(38 citation statements)
references
References 28 publications
2
36
0
Order By: Relevance
“…A control-theoretic approach was recently employed in [21], [22], where the performance metric of both the user and the eavesdropper is minimum mean square error (mmse). This framework does not use any encoding.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A control-theoretic approach was recently employed in [21], [22], where the performance metric of both the user and the eavesdropper is minimum mean square error (mmse). This framework does not use any encoding.…”
Section: Introductionmentioning
confidence: 99%
“…This framework does not use any encoding. Instead, a secrecy mechanism is employed, which withholds information, either randomly [21] or deterministically [22]. In the case of unstable systems, under certain conditions, the eavesdropper's expected error can grow to infinity while the user's expected error remains bounded.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, the user can always decode the packets and has optimal mmse. Related work can be found in [17]- [19], where a noncoding approach is adopted. A simple mechanism which withholds measurements is employed, but with high probability the eavesdropper might have very small estimation error infinitely often.…”
Section: Introductionmentioning
confidence: 99%
“…The confidentiality guarantees for the plant's current state are comparable to the information theoretic ones, overcoming the limitations of[17]-[19]; almost surely the eavesdropper's information matrix converges to the open-loop prediction one. These guarantees do not depend on the computational capabilities of the eavesdropper.…”
mentioning
confidence: 96%