Stealthy Hacking and Secrecy of Controlled State Estimation Systems With Random Dropouts

نویسندگان

چکیده

We study the maximum information gain that an adversary may obtain through hacking without being detected. Consider a dynamical process observed by sensor transmits local estimate of system state to remote estimator according some reference transmission policy across packet-dropping wireless channel equipped with acknowledgments (ACK). An overhears transmissions and proactively hijacks reprogram its policy. define perfect secrecy as keeping averaged expected error covariance bounded at legitimate unbounded adversary. By analyzing stationary distribution covariance, we show can be attained for unstable systems only if ACK has no packet dropouts. In other situations, prove independent detection methods, is not attainable. For this scenario, devise Stackelberg game derive optimal defensive present branch-and-bound algorithm global optimality solve proposed game.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

State Estimation with Secrecy against Eavesdroppers

We study the problem of remote state estimation, in the presence of an eavesdropper. An authorized user estimates the state of a linear plant, based on the data received from a sensor, while the data may also be intercepted by the eavesdropper. To maintain confidentiality with respect to state, we introduce a novel control-theoretic definition of perfect secrecy requiring that the user’s expect...

متن کامل

Networked Estimation for Event-Based Sampling Systems with Packet Dropouts

This paper is concerned with a networked estimation problem in which sensor data are transmitted over the network. In the event-based sampling scheme known as level-crossing or send-on-delta (SOD), sensor data are transmitted to the estimator node if the difference between the current sensor value and the last transmitted one is greater than a given threshold. Event-based sampling has been show...

متن کامل

State-Secrecy Codes for Networked Linear Systems

In this paper, we study the problem of remote state estimation, in the presence of a passive eavesdropper. An authorized user estimates the state of an unstable linear plant, based on the packets received from a sensor, while the packets may also be intercepted by the eavesdropper. Our goal is to design a coding scheme at the sensor, which encodes the state information, in order to impair the e...

متن کامل

channel estimation for mimo-ofdm systems

تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با ‏خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز ‏الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی ‏محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Automatic Control

سال: 2023

ISSN: ['0018-9286', '1558-2523', '2334-3303']

DOI: https://doi.org/10.1109/tac.2021.3131434