当前位置: X-MOL 学术IEEE Trans. Ind. Inform. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Secure real-time control through Fog computation
IEEE Transactions on Industrial Informatics ( IF 12.3 ) Pub Date : 2019-02-01 , DOI: 10.1109/tii.2018.2880745
Kazuhiro Sato , Shun-ichi Azuma

We consider an asymptotic stabilization problem with a specified confidential level for an Internet of Things system composed of the Cloud, Fog, and a controlled device. A sequence of concealed states, that is, a sequence of the sum of the true state of a controlled device and artificial noise, termed the security input, is transferred to the Fog. As the method for concealing the true state is relatively simple, it enables us to achieve rapid real-time communication between a controlled device and the Fog. The level of confidentiality was measured using the mutual information between the true and concealed states. As a solution to our problem, we obtained Gaussian-type security inputs and a convex optimization problem for calculating feedback gains. Moreover, we proved that the main solution becomes all solutions for any scalar cases. Finally, we demonstrated the feasibility of our proposed method by solving the problem of tracking the reference signal of storage batteries in smart grids.

中文翻译:

通过Fog计算实现安全的实时控制

对于由云,雾和受控设备组成的物联网系统,我们考虑具有指定机密级别的渐近稳定问题。一系列隐藏状态,即受控设备的真实状态和人工噪声之和的序列(称为安全输入)被传输到Fog。由于隐藏真实状态的方法相对简单,因此使我们能够在受控设备和Fog之间实现快速的实时通信。保密级别是使用真实状态和隐藏状态之间的相互信息来衡量的。作为我们的问题的解决方案,我们获得了高斯型安全输入和用于计算反馈增益的凸优化问题。此外,我们证明了主要解决方案成为所有标量情况的所有解决方案。最后,
更新日期:2019-02-01
down
wechat
bug