Innovation-Based Remote State Estimation Secrecy with no Acknowledgments

12/16/2022
by   Justin M. Kennedy, et al.
0

Secrecy encoding for remote state estimation in the presence of adversarial eavesdroppers is a well studied problem. Typical existing secrecy encoding schemes rely on the transmitter's knowledge of the remote estimator's current performance. This performance measure is often shared via packet receipt acknowledgments. However, in practical situations the acknowledgment channel may be susceptible to interference from an active adversary, resulting in the secrecy encoding scheme failing. Aiming to achieve a reliable state estimate for a legitimate estimator while ensuring secrecy, we propose a secrecy encoding scheme without the need for packet receipt acknowledgments. Our encoding scheme uses a pre-arranged scheduling sequence established at the transmitter and legitimate receiver. We transmit a packet containing either the state measurement or encoded information for the legitimate user. The encoding makes the packet appear to be the state but is designed to damage an eavesdropper's estimate. The pre-arranged scheduling sequence and encoding is chosen psuedo-random. We analyze the performance of our encoding scheme against a class of eavesdropper, and show conditions to force the eavesdropper to have an unbounded estimation performance. Further, we provide a numerical illustration and apply our encoding scheme to an application in power systems.

READ FULL TEXT
research
05/19/2021

On the Secrecy Capacity of 2-user Gaussian Z-Interference Channel with Shared Key

In this paper, the role of secret key with finite rate is studied to enh...
research
07/18/2022

Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation

For geographically separated cyber-physical systems, state estimation at...
research
12/03/2017

Arbitrarily Varying Wiretap Channel with State Sequence Known or Unknown at the Receiver

The secrecy capacity problems over the general arbitrarily varying wiret...
research
12/03/2018

Adding a Helper Can Totally Remove the Secrecy Constraints in Interference Channel

In many communication channels, secrecy constraints usually incur a pena...
research
01/09/2023

One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel

In this paper, we want to derive achievable secrecy rate regions for qua...
research
06/01/2022

K-Receiver Wiretap Channel: Optimal Encoding Order and Signaling Design

The K-receiver wiretap channel is a channel model where a transmitter br...
research
04/23/2020

Developing Concurrent Coding: An unconventional encoding scheme applied to visible light communications

An unconventional encoding scheme called concurrent coding, has recently...

Please sign up or login with your details

Forgot password? Click here to reset