Optimal Security Parameter for Encrypted Control Systems Against Eavesdropper and Malicious Server

03/23/2023
by   Kaoru Teranishi, et al.
0

A sample identifying complexity and a sample deciphering time have been introduced in a previous study to capture an estimation error and a computation time of system identification by adversaries. The quantities play a crucial role in defining the security of encrypted control systems and designing a security parameter. This study proposes an optimal security parameter for an encrypted control system under a network eavesdropper and a malicious controller server who attempt to identify system parameters using a least squares method. The security parameter design is achieved based on a modification of conventional homomorphic encryption for improving a sample deciphering time and a novel sample identifying complexity, characterized by controllability Gramians and the variance ratio of identification input to system noise. The effectiveness of the proposed design method for a security parameter is demonstrated through numerical simulations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/17/2022

Sample Identifying Complexity of Encrypted Control Systems Under Least Squares Identification

A sample identifying complexity has been introduced in the previous stud...
research
02/23/2023

Optimal Controller and Security Parameter for Encrypted Control Systems Under Least Squares Identification

Encrypted control is a framework for the secure outsourcing of controlle...
research
10/11/2022

Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption

Encrypted control has been introduced to protect controller data by encr...
research
07/07/2023

Encrypted Dynamic Control exploiting Limited Number of Multiplications and a Method using Ring-LWE based Cryptosystem

In this paper, we present a method to encrypt dynamic controllers that c...
research
10/18/2019

Identification of Model Uncertainty via Optimal Design of Experiments applied to a Mechanical Press

In engineering applications almost all processes are described with the ...
research
04/20/2019

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name

An `obfuscation' for encrypted computing is quantified exactly here, lea...
research
04/13/2023

Cryptanalysis of Random Affine Transformations for Encrypted Control

Cloud-based and distributed computations are of growing interest in mode...

Please sign up or login with your details

Forgot password? Click here to reset