Papers
Topics
Authors
Recent
Search
2000 character limit reached

Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey

Published 24 Feb 2024 in cs.CR, cs.SY, and eess.SY | (2402.15738v1)

Abstract: Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks -- and often the first type before launching destructive integrity attacks -- are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (188)
  1. A. Paul, I. Kamwa, and G. Jóos, “Centralized dynamic state estimation using a federation of extended Kalman filters with intermittent PMU data from generator terminals,” IEEE Transactions on Power Systems, vol. 33, no. 6, pp. 6109-6119, 2018.
  2. A. Tsiamis and G. J. Pappas, “Online learning of the Kalman filter with logarithmic regret,” IEEE Transactions on Automatic Control, vol. 68, no. 5, pp. 2774-2789, 2023.
  3. F. F. Rego, A. M. Pascoal, A. P. Aguiar, and C. N. Jones, “Distributed state estimation for discrete-time linear time invariant systems: A survey,” Annual Reviews in Control, vol. 48, pp. 36-56, 2019.
  4. A. Primadianto and C. N. Lu, “A review on distribution system state estimation,” IEEE Transactions on Power Systems, vol. 32, no. 5, pp. 3875-3883, 2017.
  5. X. Ge, Q. Han, X. Zhang, L. Ding, and F. Yang, “Distributed event-triggered estimation over sensor networks: A survey,” IEEE Transactions on Cybernetics, vol. 50, no. 3, pp. 1306-1320, 2020.
  6. D. An, F. Zhang, F. Cui, and Q. Yang, “Toward data integrity attacks against distributed dynamic state estimation in smart grid,” IEEE Transactions on Automation Science and Engineering, vol. 21, no. 1, pp. 881-894, Jan. 2024.
  7. H. Wu, B. Zhou, and C. Zhang, “Secure distributed estimation against data integrity attacks in Internet-of-Things systems,” IEEE Transactions on Automation Science and Engineering, vol. 19, no. 3, pp. 2552-2565, July 2022.
  8. M. Doostmohammadian, A. Taghieh, and H. Zarrabi, “Distributed estimation approach for tracking a mobile target via formation of UAVs,” IEEE Transactions on Automation Science and Engineering, vol. 19, no. 4, pp. 3765-3776, Oct. 2022.
  9. D. Liu, D. Ye, and X. -G. Zhao, “Fully distributed secure state estimation for nonlinear multi-agent systems against DoS attacks: An edge-pinning-based method,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3293844.
  10. X. R. Li avgnd V. P. Jilkov, “Survey of maneuvering target tracking. Part I. Dynamic models,” IEEE Transactions on Aerospace and Electronic Systems, vol. 39, no. 4, pp. 1333-1364, 2003.
  11. D. Smith and S. Singh, “Approaches to multisensor data fusion in target tracking: A survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 18, no. 12, pp. 1696-1710, 2006.
  12. W. Li, Z. Wang, G. Wei, L. Ma, J. Hu, and D. Ding, “A survey on multisensor fusion and consensus filtering for sensor networks,” Discrete Dynamics in Nature and Society, 2015.
  13. J. Qian, Z. Duan, P. Duan, and Z. Li, “Observation of periodic systems: Bridge centralized Kalman filtering and consensus-based distributed filtering,” IEEE Transactions on Automatic Control, 2023, doi: 10.1109/TAC.2023.3290105.
  14. J. Zhou, W. Ding and W. Yang, “A secure encoding mechanism against deception attacks on multisensor remote state estimation,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1959-1969, 2022.
  15. M. Pham, D. Yang, and W. Sheng, “A sensor fusion approach to indoor human localization based on environmental and wearable sensors,” IEEE Transactions on Automation Science and Engineering, vol. 16, no. 1, pp. 339-350, Jan. 2019.
  16. S. Sun, “Distributed optimal linear fusion predictors and filters for systems with random parameter matrices and correlated noises,” IEEE Transactions on Signal Processing, vol. 68, pp. 1064-1074, 2020.
  17. S. Sun, H. Lin, J. Ma, and X. Li, “Multi-sensor distributed fusion estimation with applications in networked systems: A review paper,” Information Fusion, vol. 38, pp. 122-134, 2017.
  18. S. Sun and Z. Deng, “Multi-sensor optimal information fusion Kalman filter,” Automatica, vol. 40, no. 6, pp. 1017-1023, 2004.
  19. L. Li, M. Niu, Y. Xia, and H. Yang, “Stochastic event-triggered distributed fusion estimation under jamming attacks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 7, pp. 309-321, 2021.
  20. B. Chen, G. Hu, D. W. C. Ho, and L. Yu, “A new approach to linear/nonlinear distributed fusion estimation problem,” IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1301-1308, 2019.
  21. G. Michieletto, F. Formaggio, A. Cenedese, and S. Tomasin, “Robust localization for secure navigation of UAV formations under GNSS spoofing attack,” IEEE Transactions on Automation Science and Engineering, vol. 20, no. 4, pp. 2383-2396, Oct. 2023.
  22. B. Chen, W. Zhang, G. Hu, and L. Yu, “Networked fusion kalman filtering with multiple uncertainties,” IEEE Transactions on Aerospace and Electronic Systems, vol. 51, no. 3, pp. 2232-2249, 2015.
  23. D. Ding, Q. Han, Y. Xiang, X. Ge, and X. Zhang, “A survey on security control and attack detection for industrial cyber-physical systems,” Neurocomputing, vol. 275, pp. 1674–1683, 2018.
  24. D. Ding, Q. Han, X. Ge, and J. Wang, “Secure state estimation and control of cyber-physical systems: A survey,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 1, pp. 176-190, 2021.
  25. M. Pajic, J. Weimer, N. Bezzo, O. Sokolsky, G. J. Pappas, and I. Lee, “Design and implementation of attack-resilient cyberphysical systems: With a focus on attack-resilient state estimators,” IEEE Control Systems Magazine, vol. 37, no. 2, pp. 66-81, 2017.
  26. H. Sedjelmaci, M. Hadji, and N. Ansari, “Cyber security game for intelligent transportation systems,” IEEE Network, vol. 33, no. 4, pp. 216-222, 2019.
  27. H. Pirayesh and H. Zeng, “Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 767-809, 2022.
  28. N. Agrawal and S. Tapaswi, “Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 4, pp. 3769-3795, 2019.
  29. X. Zhang, X. Liu, T. Ding, and P. Wang, “On resilience and distributed fixed-time control of MTDC systems under DoS attacks,” IEEE Transactions on Automation Science and Engineering, vol. 20, no. 4, pp. 2569-2580, Oct. 2023.
  30. X. Wang, J. Na, B. Niu, X. Zhao, T. Cheng, and W. Zhou, “Event-triggered adaptive bipartite secure consensus asymptotic tracking control for nonlinear MASs subject to DoS attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3286794.
  31. X. Qi, L. Zhu, X. Li, and R. Gong, “Observer-based event-triggered sliding mode security control for nonlinear cyber-physical systems under DoS attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3343752.
  32. W. Wang, Y. Yi, Q. Wang, M. Shen, G. Zhu, and J. Yang, “Limited information based emergency response control for underwater vehicle systems with disturbances and DoS attacks,” IEEE Transactions on Automation Science and Engineering, 2024, doi: 10.1109/TASE.2024.3352071.
  33. F. Yang, S. Hu, X. Xie, D. Yue, and J. Sun, “Resilient fuzzy control synthesis of nonlinear DC microgrid via a time-constrained DoS attack model,” IEEE Transactions on Automation Science and Engineering, 20223, doi: 10.1109/TASE.2023.3309983.
  34. Y. Jiang, B. Niu, T. Zhao, X. Zhao, X. Wang, and H. Wang, “Intelligent consensus asymptotic tracking control for nonlinear multiagent systems under denial-of-service attacks,” IEEE Transactions on Automation Science and Engineering, 2024, doi: 10.1109/TASE.2024.3354047.
  35. T. Shi, P. Shi, and J. Chambers, “Dynamic event-triggered model predictive control under channel fading and denial-of-service attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3325534.
  36. M. Zhu, A. H. Anwar, Z. Wan, J. -H. Cho, C. A. Kamhoua, and M. P. Singh, “A survey of defensive deception: Approaches using game theory and machine learning,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2460-2493, 2021.
  37. Y. Li, Y. Yang, Z. Zhao, J. Zhou, and D. E. Quevedo, “Deception attacks on remote estimation With disclosure and disruption resources,” IEEE Transactions on Automatic Control, vol. 68, no. 7, pp. 4096-4112, 2023.
  38. T. Li, Z. Wang, L.Zou, B.Chen, and L.Yu, “A dynamic encryption–decryption scheme for replay attack detection in cyber–physical systems,” Automatica, vol. 151, 110926, 2023.
  39. H. Liu, Y. Mo, and K. H. Johansson, “Active detection against replay attack: A survey on watermark design for cyber-physical systems,” Safety, Security, and Privacy for Cyber-Physical Systems, vol. 486, pp. 145–171, 2021.
  40. R. Deng, G. Xiao, R. Lu, H. Liang, and A. V. Vasilakos, “False data injection on state estimation in power systems — Attacks, impacts, and defense: A survey,” IEEE Transactions on Industrial Informatics, vol. 13, no. 2, pp. 411-423, 2017.
  41. F. Miao, Q. Zhu, M. Pajic, and G. J. Pappas, “Coding schemes for securing cyber-physical systems against stealthy data injection attacks,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 106-117, 2017.
  42. S. Gao, H. Zhang, C. Huang, Z. Wang and H. Yan, “Optimal injection attack strategy for nonlinear cyber-physical dystems nased on iterative learning,” IEEE Transactions on Automation Science and Engineering, vol. 21, no. 1, pp. 56-68, Jan. 2024.
  43. D. An, F. Zhang, Q. Yang, and C. Zhang, “Data integrity attack in dynamic state estimation of smart grid: Attack model and countermeasures,” IEEE Transactions on Automation Science and Engineering, vol. 19, no. 3, pp. 1631-1644, July 2022.
  44. P. Zhu, S. Jin, X. Bu, and Z. Hou, “Distributed data-driven control for a connected autonomous vehicle platoon subjected to false data injection attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3345369.
  45. Z. Hu, R. Su, K. -V. Ling, Y. Guo, and R. Ma, “Resilient event-triggered MPC for load frequency regulation with wind turbines under false data injection attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3337006.
  46. Y. -M. Wang, Y. -X. Li, S. Tong, and Z. Hou, “Data-driven-based event-triggered prescribed performance tracking of nonlinear system with FDI attacks,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3310621.
  47. D. Kapetanovic, G. Zheng and F. Rusek, “Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks,” IEEE Communications Magazine, vol. 53, no. 6, pp. 21-27, 2015.
  48. K. Wang, L. Yuan, T. Miyazaki, Y. Chen, and Y. Zhang, “Jamming and eavesdropping defense in green cyber–physical transportation systems using a Stackelberg game,” IEEE Transactions on Industrial Informatics, vol. 14, no. 9, pp. 4232-4242, 2018.
  49. M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde, “Analyzing Android encrypted network traffic to identify user actions,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 1, pp. 114-125, 2016.
  50. H. Zheng and H. Hu, “MISSILE: A system of mobile inertial sensor-based sensitive indoor location eavesdropping,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3137-3151, 2020.
  51. X. Yuan, Z. Feng, W. Ni, R. P. Liu, J. A. Zhang, and W. Xu, “Secrecy performance of terrestrial radio links under collaborative aerial eavesdropping,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 604-619, 2020.
  52. N. Aldaghri and H. Mahdavifar, “Physical layer secret key generation in static environments,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2692-2705, 2020.
  53. P. Xu, J. Yang, G. Chen, Z. Yang, Y. Li, and M. Z. Win, “Physical-layer secret and private key generation in wireless relay networks with correlated eavesdropping channels,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 985-1000, 2024.
  54. M. Zhang, J. Zhou, P. Cong, G. Zhang, C. Zhuo, and S. Hu, “LIAS: A lightweight incentive authentication scheme for forensic services in IoV,” IEEE Transactions on Automation Science and Engineering, vol. 20, no. 2, pp. 805-820, April 2023.
  55. D. K. Sharma, N. C. Singh, D. A. Noola, A. N. Doss, and J. ivakumar, “A review on various cryptographic techniques & algorithms,” Materials Today: Proceedings, vol. 51, pp. 104-109, 2022.
  56. K. A. Shim, “A survey of public-key cryptographic primitives in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 577-601, 2016.
  57. K. A. Shim, “A survey on post-quantum public-key signature schemes for secure vehicular communications,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 9, pp. 14025-14042, 2022.
  58. A. B. Alexandru and G. J. Pappas, “Private Weighted Sum Aggregation,” IEEE Transactions on Control of Network Systems, vol. 9, no. 1, pp. 219-230, 2022.
  59. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” Proc. 3rd Theory Cryptogr. Conf., 2006, pp. 265–284.
  60. C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise generation,” Adv. Cryptol.-EUROCRYPT ’06, 2006, pp. 486-503.
  61. B. Kailkhura, V. S. Siddhardh Nadendla, and P. K. Varshney, “Distributed inference in the presence of eavesdroppers: a survey,” IEEE Communications Magazine, vol. 53, no. 6, pp. 40-46, 2015.
  62. M. U. Hassan, M. H. Rehmani, and J. Chen, “Differential Privacy Techniques for Cyber Physical Systems: A Survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 746-789, 2020.
  63. J. Soria-Comas, J. Domingo-Ferrer, D. Sánchez, and D. Megías, “Individual differential privacy: A utility-preserving formulation of differential privacy guarantees,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 6, pp. 1418-1429, 2017.
  64. L. Wu, C. Qin, Z. Xu, Y. Guan, and R. Lu, “TCPP: Achieving privacy-preserving trajectory correlation with differential privacy,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4006-4020, 2023.
  65. D. Ye, S. Shen, T. Zhu, B. Liu, and W. Zhou, “One parameter defense—defending against data inference attacks via differential privacy,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1466-1480, 2022.
  66. E. Ekenstedt, L. Ong, Y. Liu, S. Johnson, P. L. Yeoh, and J. Kliewer, “When differential privacy implies syntactic privacy,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2110-2124, 2022.
  67. D. E. Quevedo, A. Ahlén, A. S. Leong, and S. Dey, “On Kalman filtering over fading wireless channels with controlled transmission powers,” Automatica, vol. 48, no. 7, pp. 1306-1316, 2012.
  68. A. S. Leong, D. E. Quevedo, D. Dolz, and S. Dey, “Transmission scheduling for remote state estimation over packet dropping links in the presence of an eavesdropper,” IEEE Transactions on Automatic Control, vol. 64, no. 9, pp. 3732-3739, 2019.
  69. M. A. Abbas, H. Song, and J. P. Hong, “Opportunistic scheduling for average secrecy rate enhancement in fading downlink channel With potential eavesdroppers,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 4, pp. 969-980, 2019.
  70. C. Murguia, I. Shames, F. Farokhi, D. Nesic, and V. Poor, “On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2608-2620, 2021.
  71. J. M. Kennedy, J. Heinovski, D. E. Quevedo, and F. Dressler, “Centralized model predictive control with human-driver interaction for platooning,” IEEE Transactions on Vehicular Technology, vol. 72, no. 10, pp. 12664-12680, 2023.
  72. B. Chen, G. Hu, D. W. C. Ho, and L. Yu, “Distributed estimation and control for discrete time-varying interconnected Systems,” IEEE Transactions on Automatic Control, vol. 67, no. 5, pp. 2192-2207, 2022.
  73. Y. Zhang, B. Chen, L. Yu, and D. W. C. Ho, “Distributed Kalman filtering for interconnected dynamic systems,” IEEE Transactions on Cybernetics, vol. 52, no. 11, pp. 11571-11580, 2022.
  74. R. E. Kalman, “A new approach to linear filtering and prediction problems,” J. Basic Eng., vol. 82, pp. 35–45, 1960.
  75. K. Dehghanpour, Z. Wang, J. Wang, Y. Yuan, and F. Bu, “A survey on state estimation techniques and challenges in smart distribution systems,” IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 2312-2322, 2019.
  76. J. Wang, D. Shi, J. Chen, and C. -C. Liu, “Privacy-preserving hierarchical state estimation in untrustworthy cloud environments,” IEEE Transactions on Smart Grid, vol. 12, no. 2, pp. 1541-1551, 2021.
  77. H. Huang, Z. Shen, C. Huang, Y. Wang, and F. Y. Wang, “Intelligent vehicle carriers to support general civilian purposes,” IEEE Transactions on Intelligent Vehicles, vol. 8, no. 10, pp. 4292-4295, 2023.
  78. R. L. Rivest, L. Adleman, and M. L. Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 1, pp. 169-180, 1978.
  79. R. Geva et al, “Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption,” Proceedings of the National Academy of Sciences, vol. 120, no. 33, e2304415120, 2023.
  80. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, 1999, pp.223-238.
  81. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no.2, 120–126, 1978.
  82. T. Elgamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
  83. Z. Zhang, P. Cheng, J. Wu, and J. Chen, “Secure state estimation using hybrid homomorphic encryption scheme,” IEEE Transactions on Control Systems Technology, vol. 29, no. 4, pp. 1704-1720, 2021.
  84. M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58-78, 2021.
  85. A. B. Alexandru, K. Gatsis, Y. Shoukry, S. A. Seshia, P. Tabuada, and G. J. Pappas, “Cloud-Based quadratic optimization With partially homomorphic encryption,” IEEE Transactions on Automatic Control, vol. 66, no. 5, pp. 2357-2364, 2021.
  86. A. B. Alexandru and George J. Pappas, “Encrypted LQG using labeled homomorphic encryption,” Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS ’19), New York, NY, USA, pp. 129–140, 2019.
  87. N. M. Hijazi, M. Aloqaily, M. Guizani, B. Ouni and F. Karray, “Secure federated learning with fully homomorphic encryption for IoT communications,” IEEE Internet of Things Journal, doi: 10.1109/JIOT.2023.3302065, 2023.
  88. A. Sultan, S. Tahir, H. Tahir, T. Anwer, F. Khan, M. Rajarajan, and Omer Rana, “A novel image-based homomorphic approach for preserving the privacy of autonomous vehicles connected to the cloud,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 1936-1948, 2023.
  89. R. Zhu, M. Li, J. Yin, L. Sun, and H. Liu, “Enhanced federated learning for edge data security in intelligent transportation systems,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 11, pp. 13396-13408, 2023.
  90. C. Marcolla, V. Sucasas, M. Manzano, R. Bassoli, F. H. P. Fitzek, and N. Aaraj, “Survey on fully homomorphic encryption, theory, and applications,” Proceedings of the IEEE, vol. 110, no. 10, pp. 1572-1609, 2022.
  91. A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A survey on homomorphic encryption schemes: Theory and implementation,” ACM Computing Surveys, vol. 51, no. 79, pp 1–35, 2019.
  92. F. J. Gonzalez-Serrano, A. Amor-Martın, and J. Casamayon-Anton, “State estimation using an extended Kalman filter with privacy-protected observed inputs,” 2014 IEEE International Workshop on Information Forensics and Security (WIFS), Atlanta, GA, USA, 2014, pp. 54-59.
  93. S. Ladan and S. Ali Akbar, “Secure centralized Kalman filter for network environments by homomorphic encryption,” 2021 7th International Conference on Control, Instrumentation and Automation (ICCIA), Tabriz, Iran, 2021, pp. 1-5.
  94. M. Aristov, B. Noack, U. D. Hanebeck, and J. Müller-Quade, “Encrypted Multisensor Information Filtering,” 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 1631-1637.
  95. Y. Ni, J. Wu, L. Li, and L. Shi, “Multi-party dynamic state estimation that preserves data and model privacy,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2288-2299, 2021.
  96. S. Emad, A. Alanwar, Y. Alkabani, M. W. El–Kharashi, H. Sandberg, and K. H. Johansson, “Privacy guarantees for cloud-based state estimation using partially homomorphic encryption,” 2022 European Control Conference (ECC), London, United Kingdom, 2022, pp. 98-105.
  97. M. Ristic, B. Noack, and U. D. Hanebeck, “Secure fast covariance intersection using partially homomorphic and order revealing encryption schemes,” IEEE Control Systems Letters, vol. 5, no. 1, pp. 217-222, 2021.
  98. Z. Mohsen, S. Ladan, A. S. Ali, and F. Farhad, “Private state estimation for cyber-physical systems using semi-homomorphic encryption”, 23rd International Symposium on Mathematical Theory of Networks and Systems, Hong Kong University of Science and Technology, Hong Kong, July 16-20, 2018.
  99. J. Kim and H. Shim, “Encrypted state estimation in networked control systems,” emph2019 IEEE 58th Conference on Decision and Control (CDC), Nice, France, 2019, pp. 7190-7195.
  100. A. Alanwar, V. Gaßmann, X. He, H. Said, H. Sandberg, K. H. Johansson, and Matthias Althoff, “Privacy-preserving set-based estimation using partially homomorphic encryption,” European Journal of Control, vol. 71, 100786, 2023.
  101. M. T. I. Ziad, A. Alanwar, M. Alzantot, and M. Srivastava, “CryptoImg: Privacy preserving processing over encrypted images” 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 2016, pp. 570-575.
  102. A. C. Yao, “Protocols for secure computations,” 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), Chicago, IL, USA, pp. 160-164, 1982.
  103. T. P. Pedersen, “Non-interactive and information-theoretic secure verifiable secret sharing,” Annual International Cryptology Conference, Santa Barbara, CA, USA, pp. 129–140, 1991.
  104. T. Hofmeister, M. Krause, and H. U.Simon, “Contrast-optimal k out of n secret sharing schemes in visual cryptography,” Theoretical Computer Science, vol. 240, no. 2, pp. 471-485, 2000.
  105. A. Iacovazzi and Y. Elovici, “Network flow watermarking: A survey,” IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 512-530, 2017.
  106. Z. Song, A. Skuric, and K. Ji, “A recursive watermark method for hard real-time industrial control system cyber-resilience enhancement,” IEEE Transactions on Automation Science and Engineering, vol. 17, no. 2, pp. 1030-1043, April 2020.
  107. M. Ristic, B. Noack, and U. D. Hanebeck, “Cryptographically privileged state estimation with Gaussian keystreams,” IEEE Control Systems Letters, vol. 6, pp. 602-607, 2022.
  108. J. Huang, D. W. Ho, F. Li, W. Yang, Y. Tang, “Secure remote state estimation against linear man-in-the-middle attacks using watermarking,” Automatica, vol. 121, 109182, 2020.
  109. J. Zhou, W. Yang, W. Ding, W. X. Zheng, and Y. Xu, “Watermarking-based protection strategy against stealthy integrity attack on distributed state estimation,” IEEE Transactions on Automatic Control, vol. 68, no. 1, pp. 628-635, 2023.
  110. Q. Geng and P. Viswanath, “Optimal noise adding mechanisms for approximate differential privacy,” IEEE Transactions on Information Theory, vol. 62, no. 2, pp. 952-969, Feb. 2016.
  111. F. McSherry and K. Talwar, “Mechanism design via differential privacy,” 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS’07), Providence, RI, USA, 2007, pp. 94-103.
  112. P. Sadeghi and M. Korki, “Offset-symmetric Gaussians for differential privacy,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 2394-2409, 2022.
  113. W. Alghamdi, S. Asoodeh, F. P. Calmon, O. Kosut, L. Sankar, and F. Wei, “Cactus mechanisms: Optimal differential privacy mechanisms in the large-composition regime,” 2022 IEEE International Symposium on Information Theory (ISIT), Espoo, Finland, 2022, pp. 1838-1843.
  114. B. Balle and Y. Wang, “Improving the Gaussian mechanism for differential privacy: Analytical calibration and optimal denoising,” arXiv, 2018, DOI:10.48550/arXiv.1805.06530.
  115. G. Muthukrishnan and S. Kalyani, “Grafting Laplace and Gaussian distributions: A new noise mechanism for differential privacy,” IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5359-5374, 2023.
  116. S. Kadam, A. Scaglione, N. Ravi, S. Peisert, B. Lunghino, and A. Shumavon, “Optimum noise mechanism for probabilistic differentially private queries in discrete finite sets,” 2023 International Conference on Smart Applications, Communications and Networking (SmartNets), Istanbul, Turkiye, 2023, pp. 1-6.
  117. D. Han, K. Liu, Y. Lin, and Y. Xia, “Differentially private distributed online learning over time-varying digraphs via dual averaging,” International Journal of Robust Nonlinear Control, pp.1-15, 2021.
  118. S. Han, U. Topcu, and G. J. Pappas, “Differentially private distributed constrained optimization,” IEEE Transactions on Automatic Control, vol. 62, no. 1, pp. 50-64, 2017.
  119. X. Liu, J. Zhang, and J. Wang, “Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems,” Automatica, vol. 122, 109283, 2020.
  120. M. Ye, G. Hu, L. Xie, and S. Xu, “Differentially private distributed Nash equilibrium seeking for aggregative games,” IEEE Transactions on Automatic Control, vol. 67, no. 5, pp. 2451-2458, 2022.
  121. Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Differential privacy in linear distributed control systems: Entropy minimizing mechanisms and performance tradeoffs,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 118-130, March 2017.
  122. Y. Kawano and M. Cao, “Design of privacy-preserving dynamic controllers,” IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3863-3878, 2020.
  123. K. H. Degue and J. Le Ny, “Cooperative differentially private LQG control with measurement aggregation,” IEEE Control Systems Letters, vol. 7, pp. 1093-1098, 2023.
  124. J. Le Ny and G. J. Pappas, “Differentially private Kalman filtering,” Proc. 50th Annu. Allerton Conf. Commun., Control, Comput., Oct. 2012, pp. 1618–1625.
  125. J. Le Ny and G. J. Pappas, “Differentially private filtering,” Proc. Conf. Decision Control, Maui, HI, USA, 2012.
  126. J. Le Ny and G. J. Pappas, “Differentially private filtering,” IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341-354, 2014.
  127. X. Yan, B. Chen, Y. Zhang, and L. Yu. “Guaranteeing differential privacy in distributed fusion estimation,” IEEE Transactions on Aerospace and Electronic Systems, vol. 59, no. 3, pp. 3416-3423, 2023.
  128. K. Yazdani and M. Hale, “Error bounds and guidelines for privacy calibration in differentially private Kalman filtering,” 2020 American Control Conference (ACC), Denver, CO, USA, 2020, pp. 4423-4428.
  129. K. H. Degue and J. Le Ny, “On differentially private Kalman filtering,” 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, QC, Canada, 2017, pp. 487-491.
  130. K. H. Degue and J. L. Ny, “Differentially private Kalman filtering with signal aggregation,” IEEE Transactions on Automatic Control, doi: 10.1109/TAC.2022.3230735.
  131. X. Yan, B. Chen, Y. Zhang, and L. Yu, “Distributed encryption fusion estimation against full eavesdropping,” Automatica, vol. 153, 111025, 2023.
  132. X. Yan and C. Yang, “State estimation with differential privacy under scale enlargement of the sensor network,” 2022 13th Asian Control Conference (ASCC), Jeju, Korea, Republic of, 2022, pp. 971-978.
  133. J. Le Ny and M. Mohammady, “Differentially private MIMO filtering for event streams,” IEEE Transactions on Automatic Control, vol. 63, no. 1, pp. 145-157, Jan. 2018.
  134. K. H. Degue and J. Le Ny, “Differentially private interval observer design with bounded input perturbation,” 2020 American Control Conference (ACC), Denver, CO, USA, 2020, pp. 1465-1470.
  135. M. M. Dawoud, C. Liu, A. Alanwar, and K. H. Johansson, “Differentially private set-based estimation using zonotopes,” 2023 European Control Conference (ECC), Bucharest, Romania, 2023, pp. 1-8.
  136. J. Wang, R. Zhu, and S. Liu, “A differentially private unscented Kalman filter for streaming data in IoT,” IEEE Access, vol. 6, pp. 6487-6495, 2018.
  137. H. Andre and J. Le Ny, “A differentially private ensemble Kalman filter for road traffic estimation,” 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA, pp. 6409-6413, 2017.
  138. J. Le Ny, “Differentially private nonlinear observer design using contraction analysis,” International Journal of Robust and Nonlinear Control, vol. 30, pp. 4225-4243, 2020.
  139. S. C. Vishnoi, A. F. Taha, S. A. Nugroho, and C. G. Claudel, “On differential privacy and traffic state estimation problem for connected vehicles,” 2022 IEEE 61st Conference on Decision and Control (CDC), Cancun, Mexico, 2022, pp. 1162-1167.
  140. N. Das and R. Bhattacharya, “Privacy and utility aware data sharing for space situational awareness from ensemble and unscented Kalman filtering perspective,” IEEE Transactions on Aerospace and Electronic Systems, vol. 57, no. 2, pp. 1162-1176, 2021.
  141. G. Chen, L. Sun, and Y. Zhang, “A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks,” Journal of the Franklin Institute, vol. 359, no. 18, pp. 10726-10740, 2022.
  142. A. Moradi, N. K. D. Venkategowda, S. P. Talebi, and S. Werner, “Privacy-preserving distributed Kalman filtering,” IEEE Transactions on Signal Processing, vol. 70, pp. 3074-3089, 2022.
  143. X. Yan, Y. Zhang, D. Xu, and B. Chen, “Distributed confidentiality fusion estimation against eavesdroppers,” IEEE Transactions on Aerospace and Electronic Systems, vol. 58, no. 4, pp. 3633-3642, 2022.
  144. S. Y. Kung, “Compressive privacy: From information estimation theory to machine learning,” IEEE Signal Process. Mag., vol. 34, no. 1, pp. 94–112, 2017.
  145. Y. Song, C. X. Wang, and W. P. Tay, “Compressive privacy for a linear dynamical system,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 895-910, 2020.
  146. J. Shang, M. Chen, and T. Chen, “Optimal linear encryption against stealthy attacks on remote state estimation,” IEEE Transactions on Automatic Control, vol. 66, no. 8, pp. 3592-3607, 2021.
  147. Z. Guo, D. Shi, K. H. Johansson, and L. Shi, “Optimal linear cyberattack on remote state estimation,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 4-13, 2017.
  148. J. Shang and T. Chen, “Linear encryption against eavesdropping on remote state estimation,” IEEE Transactions on Automatic Control, vol. 68, no. 7, pp. 4413-4419, 2023.
  149. E. Nekouei, T. Tanaka, M. Skoglund, and K. H. Johansson, “Information-theoretic approaches to privacy in estimation and control,” Annu. Rev. Control, vol. 47, pp. 412–422, 2019.
  150. E. Nekouei, M. Skoglund, and K. H. Johansson, “Privacy of information sharing schemes in a cloud-based multi-sensor estimation problem,” 2018 Annual American Control Conference (ACC), Milwaukee, WI, USA, pp. 998-1002, 2018.
  151. E. Nekouei, H. Sandberg, M. Skoglund, and K. H. Johansson, “Optimal privacy-aware estimation,” IEEE Transactions on Automatic Control, vol. 67, no. 5, pp. 2253-2266, 2022.
  152. T. Tanaka, M. Skoglund, H. Sandberg, and K. H. Johansson, “Directed information and privacy loss in cloud-based control,” 2017 American Control Conference (ACC), Seattle, WA, USA, 2017, pp. 1666-1672.
  153. H. Liu, J. Zou, X. Ren, and X. Wang, “A privacy-preserving approach against eavesdropping attacks on remote state estimation for cyber-physical systems,” IEEE Transactions on Circuits and Systems II: Express Briefs, 2023, doi: 10.1109/TCSII.2023.3326734.
  154. E. Nekouei, H. Sandberg, M. Skoglund, and K. H. Johansson, “A model randomization approach to statistical parameter privacy,” IEEE Transactions on Automatic Control, vol. 68, no. 2, pp. 839-850, 2023.
  155. H. Hayati, N. van de Wouw, and C. Murguia, “Immersion and Invariance-based Coding for Privacy in Remote Anomaly Detection,” IFAC-PapersOnLine, 22nd IFAC World Congress, vol. 56, no. 2, pp. 11191-11196, 2023.
  156. H. Hayati, N. van de Wouw, and C. Murguia, “Privacy-Preserving Anomaly Detection in Stochastic Dynamical Systems: Synthesis of Optimal Gaussian Mechanisms,” arXiv:2211.03698v2, 2023.
  157. H. Hayati, N. van de Wouw, and C. Murguia, “Infinite Horizon Privacy in Networked Control Systems: Utility/Privacy Tradeoffs and Design Tools,” arXiv:2303.17519v2, 2023.
  158. L. Schenato, B. Sinopoli, M. Franceschetti, K. Poolla, and S. S. Sastry, “Foundations of control and estimation over lossy networks,” Proc. IEEE, vol. 95, no. 1, pp. 163–187, 2007.
  159. T. C. Aysal and K. E. Barner, “Sensor data cryptography in wireless sensor networks,” IEEE Trans. Inf. Forensics Secur., vol. 3, no. 2, pp. 273–289, 2008.
  160. H. Reboredo, J. Xavier, and M. R. D. Rodrigues, “Filter design with secrecy constraints: The MIMO Gaussian wiretap channel,” IEEE Trans. Signal Process., vol. 61, no. 15, pp. 3799–3814, 2013.
  161. L. Yuan, K. Wang, T. Miyazaki, S. Guo, and M. Wu, “Optimal transmission strategy for sensors to defend against eavesdropping and jamming attacks,” 2017 IEEE International Conference on Communications (ICC), Paris, France, 2017, pp. 1-6.
  162. A. S. Leong, D. E. Quevedo, D. Dolz, and S. Dey, “Information bounds for state estimation in the presence of an eavesdropper,” IEEE Control Systems Letters, vol. 3, no. 3, pp. 547-552, 2019.
  163. A. S. Leong, D. E. Quevedo, D. Dolz, and S. Dey, “Remote state estimation over packet dropping links in the presence of an eavesdropper,” arXiv, 2017, arXiv:1702.02785.
  164. A. S. Leong, D. E. Quevedo, and S. Dey, “State estimation over Markovian packet dropping links in the presence of an eavesdropper,” Proc. 56th Annu. IEEE Conf. Decis. Control, Melbourne, Australia, Dec. 2017, pp. 6616–6621.
  165. A. Tsiamis, K. Gatsis, and G. J. Pappas, “State estimation with secrecy against eavesdroppers,” IFAC-PapersOnLine, vol. 50, no. 1, pp. 8385-8392, 2017.
  166. L. Wang, X. Cao, H. Zhang, C. Sun, W. X. Zheng, “Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation,” Automatica, 137, 110145, 2022.
  167. J. Lu, D. E. Quevedo, V. Gupta, and S. Dey, “Stealthy hacking and secrecy of controlled state estimation systems With random dropouts,” IEEE Transactions on Automatic Control, vol. 68, no. 1, pp. 31-46, 2023.
  168. K. Ding, X. Ren, A. S. Leong, D. E. Quevedo, and L. Shi, “Remote state estimation in the presence of an active eavesdropper,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 229-244, 2021.
  169. L. Huang, K. Ding, A. S. Leong, D. E. Quevedo, and L.Shi, “Encryption scheduling for remote state estimation under an operation constraint,” Automatica, vol. 127, 109537, 2021.
  170. A. Tsiamis, K. Gatsis, and G. J. Pappas, “State estimation codes for perfect secrecy,” Proc. IEEE 56th Conf. Decis. Control, 2017, pp. 176–181.
  171. A. Tsiamis, K. Gatsis, and G. J. Pappas, “State-secrecy codes for stable systems,” 2018 Annual American Control Conference (ACC), 2018, pp. 171-177.
  172. A. Tsiamis, K. Gatsis, and G. J. Pappas, “State-secrecy codes for networked linear systems,” IEEE Transactions on Automatic Control, vol. 65, no. 5, pp. 2001-2015, 2020.
  173. P. Chen, W. Yang, Y. Liu, H. Zhang, and Z. Zhao, “Dynamic encoding scheme for state estimation over wireless sensor networks,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 70, no. 11, pp. 4098-4102, 2023.
  174. S. Knorn and S. Dey, “Optimal energy allocation for linear control with packet loss under energy harvesting constraints,” Automatica, vol. 77, pp. 259–267, 2017.
  175. Y. Li, D. E. Quevedo, S. Dey, and L. Shi, “A game-theoretic approach to fake-acknowledgment attack on cyber-physical systems,” Transactions on Signal and Information Processing over Networks, vol. 3, no. 1, pp. 1–11, 2017.
  176. M. Lücke, J. Lu, and D. E. Quevedo, “Coding for secrecy in remote state estimation with an adversary,” IEEE Transactions on Automatic Control, vol. 67, no. 9, pp. 4955-4962, Sept. 2022.
  177. J. M. Kennedy, J. J. Ford, D. E. Quevedo, and F. Dressler, “Innovation-based remote state estimation secrecy with no acknowledgments,” ArXiv, 2212.08234, 2022.
  178. S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE Transactions on Wireless Communications, vol. 7, pp. 2180-2189, 2008.
  179. A. Leong, A. Redder, E. Danie, and S. Dey, “On the use of artificial noise for secure state estimation in the presence of eavesdroppers,” Proc. Eur. Control Conf., 2018, pp. 325–330.
  180. D. Xu, B. Chen, L. Yu, and W. Zhang, “Secure dimensionality reduction fusion estimation against eavesdroppers in cyber–physical systems,” ISA Transactions, vol. 104, pp. 154-161, 2020.
  181. D. Xu, X. Yan, B. Chen, and L. Yu, “Energy-constrained confidentiality fusion estimation against eavesdroppers,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 69, no. 2, pp. 624-628, 2022.
  182. D. Xu, B. Chen, Y. Zhang, and L. Yu, “Distributed anti-eavesdropping fusion estimation under energy constraints,” IEEE Transactions on Automatic Control, 2023, doi: 10.1109/TAC.2023.3250094.
  183. X. Guo, A. S. Leong, and S. Dey, “Distortion outage minimization in distributed estimation with estimation secrecy outage constraints,” IEEE Trans. Signal Inf. Process. Netw., vol. 3, no. 1, pp. 12–28, 2017.
  184. X. Guo, A. S. Leong, and S. Dey, “Estimation in wireless sensor networks with security constraints,” IEEE Trans. Aerosp. Electron. Syst., vol. 53, no. 2, pp. 544–561, 2017.
  185. W. Yang, D. Li, H. Zhang, Y. Tang, and W. X. Zheng, “An encoding mechanism for secrecy of remote state estimation,” Automatica, vol. 120, 109116, 2020.
  186. D. Li, Q. Yang, F. Zhang, Y. Wang, Y. Qian, and D. An, “Research on privacy issues in smart metering system: An improved TCN-based NILM attack method and practical DRL-based rechargeable battery assisted privacy preserving method,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3270543.
  187. L. Yao, X. Huang, Z. Wang, and H. Shen, “Memory-based event-triggered control of Markov jump systems under hybrid cyber attacks: A switching-like adaptive law,” IEEE Transactions on Automation Science and Engineering, 2023, doi: 10.1109/TASE.2023.3324649.
  188. F. Farivar, M. S. Haghighi, A. Jolfaei and M. Alazab, “Artificial intelligence for detection, estimation, and compensation of malicious attacks in nonlinear cyber-physical systems and industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 4, pp. 2716-2725, 2020.
Citations (1)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.