State Estimation with Secrecy against Eavesdroppers

نویسندگان

  • Anastasios Tsiamis
  • Konstantinos Gatsis
  • George J. Pappas
چکیده

We study the problem of remote state estimation, in the presence of an eavesdropper. An authorized user estimates the state of a linear plant, based on the data received from a sensor, while the data may also be intercepted by the eavesdropper. To maintain confidentiality with respect to state, we introduce a novel control-theoretic definition of perfect secrecy requiring that the user’s expected error remains bounded while the eavesdropper’s expected error grows unbounded. We propose a secrecy mechanism which guarantees perfect secrecy by randomly withholding sensor information, under the condition that the user’s packet reception rate is larger than the eavesdropper’s interception rate. Given this mechanism, we also explore the tradeoff between user’s utility and confidentiality with respect to the eavesdropper, via an optimization problem. Finally, some examples are studied to provide insights about this tradeoff.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exploiting Inter-User Interference for Secure Massive Non-Orthogonal Multiple Access

This paper considers the security issue of the fifth-generation (5G) wireless networks with massive connections, where multiple eavesdroppers aim to intercept the confidential messages through active eavesdropping. To realize secure massive access, non-orthogonal channel estimation (NOCE) and nonorthogonal multiple access (NOMA) techniques are combined to enhance the signal quality at legitimat...

متن کامل

Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers

Millimeter wave offers a sensible solution to the capacity crunch faced by 5G wireless communications. This paper comprehensively studies physical layer security in a multi-input single-output (MISO) millimeter wave system where multiple single-antenna eavesdroppers are randomly located. Concerning the specific propagation characteristics of millimeter wave, we investigate two secure transmissi...

متن کامل

Physical layer security for multi-user MIMO systems

T his thesis studies physical layer security for multi-user multiple-input multiple-output (MIMO) wireless systems. Due to the broadcast nature of the physical medium, wireless multi-user communications are very susceptible to eavesdropping, and it is critical to protect the transmitted information. Security of wireless communications has traditionally been achieved at the network layer with cr...

متن کامل

Relay Secrecy in Wireless Networks with Eavesdroppers

Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose sched...

متن کامل

MIMO DF Relay Beamforming for Secrecy with Artificial Noise, Imperfect CSI, and Finite-Alphabet

In this paper, we consider decode-and-forward (DF) relay beamforming with imperfect channel state information (CSI), cooperative artificial noise (AN) injection, and finitealphabet input in the presence of an user and J non-colluding eavesdroppers. The communication between the source and the user is aided by a multiple-input-multiple-output (MIMO) DF relay. We use the fact that a wiretap code ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1612.04942  شماره 

صفحات  -

تاریخ انتشار 2016