Elsevier

Automatica

Volume 120, October 2020, 109116
Automatica

Brief paper
An encoding mechanism for secrecy of remote state estimation

https://doi.org/10.1016/j.automatica.2020.109116Get rights and content

Abstract

We consider a secure remote state estimation problem where the observations transmitted from the sensors to a remote estimator could be intercepted by an eavesdropper. To prevent the eavesdropper from acquiring the system states, we propose an encoding–decoding mechanism by combining linear transformation and artificial noise to ensure the exact values of observations unavailable to the eavesdropper but available to the estimator. Further, we propose an algorithm by which the eavesdropper may infer the approximate values of the observations and thus to further estimate the system states. We reveal how the amplitude of the artificial noise affects the accuracy of the eavesdropper inference, which helps the designing of the encoding–decoding mechanism. Simulation experiments are conducted to verify the derived results.

Introduction

Recently, the vast development of computing, control, communication and network technology has greatly expanded the scale of the interconnections among the devices and facilities in Cyber–Physical systems (CPSs) (Jin et al., 2014, Lee et al., 2015, Stankovic, 2014). Due to the distributed structure and open physical access of such systems, malicious entities are made easier to join these systems and thus to conduct a series of attacks tailored to the vulnerabilities in the perceptual layer, the network layer and the application layer (Pasqualetti et al., 2013, Qi et al., 2014, Teixeira et al., 2015). Typical attacks include denial-of-service attack, data injection attack, eavesdropping attack, etc. In denial-of-service attacks, the attacker sends a large amount of jamming data or fake requests to occupy the channel bandwidth or exhaust the node response so that the necessary data transmission is blocked or the necessary request is neglected (Ding et al., 2017, Feng and Tesi, 2017, Zhang et al., 2015, Zhang et al., 2018, Zhang and Zheng, 2018). In data injection attacks, the packets transmitted on the channel are modified by the attacker so as to violate the data integrity, which ultimately downgrades the system control performance (Guo et al., 2018, Li et al., 2018, Yang et al., 2019). In eavesdropping attacks, the attacker is a passive adversary that monitors the packets transmitted on the channel without influence on the system performance, but threatening the system security when the information intercepted is confidential (Le Ny and Pappas, 2013, Tsiamis et al., 2017, Tsiamis et al., 2018, Wiese et al., 2019, Zhang et al., 2016, Zhu and Lu, 2015).

To defend a CPS from eavesdropping attacks means to protect the privacy of the data transmitted. Many works have been done in privacy-preserving. Mo et al. in Mo and Murray (2017) proposed an algorithm to guarantee the privacy of the initial states by adding properly conceived random noises while achieving asymptotic consensus in a distributed network. Similar work has been done by Manitara et al. in Manitara and Hadjicostis (2013) where the states are transmitted with pseudo-random sequence added. Kishida in Kishida (2018) used a quantizer to convert the control signal into a discrete form to fit the Paillier cryptosystem. Due to the changing sensitivity of the quantizer, the trade-off between the cipher complexity and the closed-loop control accuracy is balanced. Lu and Zhu in Lu and Zhu (2018) introduced homomorphic encryption into a distributed projected gradient-based algorithm to reach privacy preserving distributed optimization.

In this paper, we inspect remote state estimation in the presence of an eavesdropper. The state estimation, in which the estimator gives the system states by observing the system outputs, is one of the fundamental applications in CPSs (as in Yang et al., 2014, Yang et al., 2017). Particularly, in remote state estimation (Ding et al., 2017, Ding and Shi, 2016, Guo et al., 2018, Li et al., 2018, Zhang et al., 2018), the sensors and the estimator are located apart. Hence, the system observations need to be transmitted through a channel from the sensors to the estimator. Eavesdropping attack could take place when a malicious device builds an extra link to the channel to acquire sensitive information (Wiese et al., 2019). In Wiese et al. (2019), Wiese et al. considered the secrecy of state estimation on a discrete unstable scalar system whose observations are encoded and transmitted through an uncertain wire-tap channel. The channel characteristics vary between the branch to the estimator and the branch to the eavesdropper. Based on the difference of the channel characteristics, the authors proved that there exists an encoding scheme that is both secure and reliable if the uncertain channels of the eavesdropper and the estimator have joint zero-error capacity greater than the logarithm of the system parameter. Tsiamis et al. in Tsiamis et al., 2017, Tsiamis et al., 2018 proposed a coding scheme for a packet-dropping channel where the encoder sends the difference between the current state and its prediction based on the last successful transmission. An acknowledgment (ACK) is returned from the decoder when it successfully receives a packet. In the coding scheme, the eavesdropper’s estimation error accumulates because of the mismatch between its own packet drops and ACKs, while the decoder’s estimation error is bounded.

Inspired by the works in Tsiamis et al., 2017, Tsiamis et al., 2018 and Wiese et al. (2019), we introduce an encoding–decoding mechanism into remote state estimation. We consider a linear dynamic system whose states are observed by a bunch of sensors. The observation data is uploaded to a channel which is monitored by an eavesdropper. At the other end of the channel, an estimator receives the observations and conducts the state estimation by Kalman filtering. Different from the works in Tsiamis et al., 2017, Tsiamis et al., 2018 and Wiese et al. (2019), we assume that the channel is a noise-free channel without multi-path effects, namely without packet drops, delays or any disturbance. Besides, the encoding mechanism we propose is engaged with artificial noise. The artificial noise method, which adds intentionally generated noise to the original data, has been used in He, Cai, and Guan (2018) and Mo and Murray (2017) for distributed private-preserving. The difference is that He et al. (2018) focus on the probability density function of the error of estimation by the eavesdropper, while Mo and Murray (2017) concentrate on the consensus convergence rate. Note that, the artificial noise aforementioned and to be inspected in this paper is the noise compared with data, which is different with the ‘artificial noise’ in Goel and Negi (2008) where the noise is of physical layer characteristics compared with signals. The main contribution of our work is summarized in the following:

  • (1)

    We propose an encoding mechanism, which is a combination of linear transformation and artificial noise. This mechanism pre-process the sensor observations of a linear dynamic system to prevent the eavesdropper from obtaining the exact value of the observations. The linear transformation only involves the multiplication of a 2 × 2 matrix and the artificial noise is generated by analog devices. Hence, the method does not require high computational cost. Besides, unlike the encryptions in Kishida (2018) and Lu and Zhu (2018), the observations do not have to be quantized from real numbers to integers before encoding, thus the encoding mechanism we propose does not cause any loss in accuracy. The corresponding decoding method is also developed so that the supposed receiver can extract the observations without error.

  • (2)

    We consider a possible situation where the eavesdropper can infer the approximate value of the observations under the encoding mechanism. We show the relationship between the amplitude of the artificial noise and the accuracy of the approximation of the eavesdropper, which can be a guideline when deploying the secrecy state estimation facilities.

This paper is structured as follows. In Section 2, we set up the background of our study, including the system dynamics, the explanations of terminologies concerned, the recursion of the filter used by the estimator, and the topology of communication. In Section 3, we propose the encoding–decoding mechanism and give a modified version of the mechanism to reduce the number of the artificial noise generators used. In Section 4, we calculate the lower bound of the amplitude of the artificial noises satisfying certain signal-to-noise ratio (SNR) requirement. We also present the deduction algorithm by which the eavesdropper can approximate the system observations. We reveal how the amplitude of the artificial noise has an influence on the accuracy of the approximation. Section 5 gives the simulation results to verify our derived results and Section 6 concludes this article.

Notations: Rn is the set of n dimensional vectors. E() denotes the mathematical expectation. AT and A1 refer to the transposition and inverse of matrix A, respectively. The trace of matrix A (i.e., the sum of the diagonal entries) is denoted by tr(A). The eigenvalue with the greatest absolute value among all the eigenvalues of matrix A is called the spectral radius of A, denoted by ρ(A). The double-vertical-line bracket refers to the Euclidean norm of the vector it includes.

Section snippets

Background specification

We inspect the state estimation problem of a dynamic system with a remote estimator. In the presence of an eavesdropper, the system observations are at risk of being exposed to an unauthorized third party. The objective is to design a strategy to protect the information security of the remote estimation network. In this section, we specify the background of the problem by giving the mathematical description about the system model, and by outlining the communication topology in which the nodes

Problem formulation

Fig. 1 shows that, if the sensors directly upload their observations to the channel, the eavesdropper can acquire the observations and further estimate the system states. To prevent the system states from being leaked to a malicious party, in this section, we propose an encoding mechanism that pre-processes the sensor observations before transmission. Based on the encoding mechanism, we modify it into an energy saving one. At the end of this section, we raise two problems about the encoding

Main results

This section aims at finding solutions to the problems raised in Problem 1, Problem 2. We calculate the lower bound of the artificial noise under the given threshold by analyzing the convergence characteristic of the dynamic system observed. And then we propose a possible deduction algorithm by which the eavesdropper might approximate the entries of the encoding matrix.

Simulation results

In this section, we present simulation experiments to illustrate the privacy-preserving performance of the encoding–decoding mechanism and the deduction accuracy of the eavesdropper. We consider the case where two sensors S1 and S2 are deployed to observe the dynamic system in (1). The two sensors are grouped and allocated with a noise generator G1 whose output is ξ1(k).

The overall system parameters are set as below and the following numerical experiments are conducted based on these parameters.

Conclusion and future works

In this paper, we have proposed an encoding mechanism that combines invertible linear transformation and artificial noises for remote state estimation in order to prevent the eavesdropper from obtaining the states of the observed system. We have calculated the lower bound of the artificial noise under certain SNR threshold. A deduction algorithm for the eavesdropper to infer the encoding matrix has also been developed. We have examined how the variances of the artificial noises influence the

Acknowledgments

The authors would like to thank the associate editor and the reviewers for their comments and suggestions which helped to improve the presentation and quality of the paper.

This work was supported in part by the National Natural Science Foundation of China under Grant 61973123, the projects sponsored by the development fund for Shanghai talents, the Shanghai Natural Science Foundation under Grant 18ZR1409700, and the Programme of Introducing Talents of Discipline to Universities (the 111 Project

Wen Yang is a Professor at East China University of Science and Technology(ECUST). She received her BSc degree in Mineral Engineering in 2002 and MSc degree in Control Theory and Control Engineering from Central South University in 2005, Hunan, China, and Ph.D. degree in Control Theory and Control Engineering from Shanghai Jiao Tong University, Shanghai, China, in 2009. She was a Visiting Student with the University of California, Los Angeles, from 2007 to 2008. Her research interests include

References (35)

  • BernsteinDaniel J. et al.

    Factoring RSA keys from certified smart cards: Coppersmith in the Wild

    (2014)
  • BickelPeter J. et al.

    Mathematical statistics: Basic ideas and selected topics, volumes i-ii package

    (2015)
  • DingKemi et al.

    A data-driven power schedule for privacy protection in remote state estimation

  • FarmerJ. Doyne et al.

    Predicting chaotic time series

    Physical Review Letters

    (1987)
  • FischerViktor et al.

    True random number generator embedded in reconfigurable hardware

  • GoelSatashu et al.

    Guaranteeing secrecy using artificial noise

    IEEE Transactions on Wireless Communication

    (2008)
  • HeJianping et al.

    Preserving data-privacy with added noises: Optimal estimation and privacy analysis

    IEEE Transactions on Information Theory

    (2018)
  • Cited by (26)

    • A stealthy artificial noise strategy against eavesdropping for remote estimation sensor networks

      2022, Journal of the Franklin Institute
      Citation Excerpt :

      In the above works, no matter what kind of AN design method is likely to be penetrated, eavesdroppers may crack all or part of the AN design methods to invalidate AN [5]. To solve this problem, employing random values [12,18,20–22,24] and/or controlling of the amplitude of AN [5] are mainly adopted, which are also at risk of being deciphered. The injection of AN will make the information obtained by the eavesdroppers abnormal, which will alert the eavesdroppers.

    • Detection against randomly occurring complex attacks on distributed state estimation

      2021, Information Sciences
      Citation Excerpt :

      The FDI attack is implemented by corrupting the data integrity, which is widely used in smart power grids. Till now, there are various ways to resist the data integrity attack [17–21], Yu et al. [22] resisted the strong attacks with an anomaly-based detection and resisted the more stealthy attacks with a watermarking-based detection scheme. Yang et al. [23] detected the data integrity attacks with a detection mechanism which based on the Gaussian-mixture model.

    View all citing articles on Scopus

    Wen Yang is a Professor at East China University of Science and Technology(ECUST). She received her BSc degree in Mineral Engineering in 2002 and MSc degree in Control Theory and Control Engineering from Central South University in 2005, Hunan, China, and Ph.D. degree in Control Theory and Control Engineering from Shanghai Jiao Tong University, Shanghai, China, in 2009. She was a Visiting Student with the University of California, Los Angeles, from 2007 to 2008. Her research interests include information fusion, state estimation, network security, coordinated control, complex networks and reinforcement learning.

    Dengke Li received his B.Sc degree in Automation from East China University of Science and Technology, Shanghai, China in July 2017. He is currently a master degree candidate and will receive his M.Sc. degree in Control Science and Engineering also from East China University of Science and Technology, Shanghai, China in June 2020. His research interests include information fusion, state estimation and network security.

    Heng Zhang is with the School of Science, Jiangsu Ocean University, Lianyungang, Jiangsu, 222005, China, and is also with State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China. He received the Ph.D. degree in control science and engineering from Zhejiang University in 2015. He is with the School of Science, Jiangsu Ocean University, Lianyungang, Jiangsu, 222005, China, and is also with State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China. He was a research fellow at Western Sydney University during 2017 and 2018. His research interests include security and privacy in cyber–physical systems, control and optimization theory. He is an editorial board member of several academic journals, including IET Wireless Sensor Systems, EURASIP Journal on Wireless Communications and Networking, KSII Transactions on Internet and Information Systems, etc. He also serves as a guest editor of Journal of The Franklin Institute, Peer-to-Peer Networking and Applications. He is an active reviewer of IEEE TAC, IEEE TCNS, IEEE TIFS, and IEEE TWC, etc.

    Yang Tang received the B.S. and Ph.D. degrees in electrical engineering from Donghua University, Shanghai, China, in 2006 and 2010, respectively. From 2008 to 2010, he was a Research Associate with The Hong Kong Polytechnic University, Hong Kong. From 2011 to 2015, he was a Post-Doctoral Researcher with the Humboldt University of Berlin, Berlin, Germany, and with the Potsdam Institute for Climate Impact Research, Potsdam, Germany. Since 2015, he has been a Professor with the East China University of Science and Technology, Shanghai. His current research interests include distributed estimation/control/optimization, cyber–physical systems, hybrid dynamical systems, computer vision, reinforcement learning and their applications.

    Prof. Tang was a recipient of the Alexander von Humboldt Fellowship and the ISI Highly Cited Researchers Award by Clarivate Analytics from 2017 to 2019. He is a Senior Board Member of Scientific reports, an Associate Editor of IEEE Transactions on Neural Networks and Learning Systems, IEEE Transactions on Emerging Topics in Computational Intelligence, the Journal of the Franklin Institute, Neurocomputing, etc., and a Leading Guest Editor of the Journal of the Franklin Institute and CHAOS.

    Wei Xing Zheng received the B.Sc. degree in Applied Mathematics in 1982, the M.Sc. degree in Electrical Engineering in 1984, and the Ph.D. degree in Electrical Engineering in 1989, all from Southeast University, Nanjing, China. He is currently a Distinguished Professor at Western Sydney University, Sydney, Australia. Over the years he has also held various faculty/research/visiting positions at Southeast University, Nanjing, China; Imperial College of Science, Technology and Medicine, London, UK; University of Western Australia, Perth, Australia; Curtin University of Technology, Perth, Australia; Munich University of Technology, Munich, Germany; University of Virginia, Charlottesville, VA, USA; and University of California-Davis, Davis, CA, USA. His research interests are in the areas of systems and controls, signal processing, and communications.

    Prof. Zheng is a Fellow of IEEE. He received the 2017 ViceChancellor’s Award for Excellence in Research (Researcher of the Year) at Western Sydney University. Previously, he served as an Associate Editor for IEEE Transactions on Circuits and Systems-I: Fundamental Theory and Applications, IEEE Transactions on Automatic Control, IEEE Signal Processing Letters, IEEE Transactions on Circuits and Systems-II: Express Briefs, and IEEE Transactions on Fuzzy Systems, and as a Guest Editor for IEEE Transactions on Circuits and Systems-I: Regular Papers. Currently, he is an Associate Editor for Automatica, IEEE Transactions on Cybernetics, IEEE Transactions on Neural Networks and Learning Systems, IEEE Transactions on Control of Network Systems, IEEE Transactions on Circuits and Systems-I: Regular Papers, and other scholarly journals. He is also an Associate Editor of IEEE Control Systems Society’s Conference Editorial Board. He was the Publication Co-Chair of the 56th IEEE Conference on Decision and Control in Melbourne, Australia in December 2017. He is currently the Chair of IEEE Control Systems Society’s Standing Committee on Chapter Activities and a Distinguished Lecturer of IEEE Control Systems Society.

    The material in this paper was not presented at any conference. This paper was recommended for publication in revised form by Associate Editor Er-Wei Bai under the direction of Editor Torsten Söderström.

    View full text