This paper is concerned with the encryption-decryption-based state estimation problem for a class of multi-machine power grids with non-Gaussian noises. For the purposes of security enhancement and data privacy protec...
详细信息
This paper is concerned with the encryption-decryption-based state estimation problem for a class of multi-machine power grids with non-Gaussian noises. For the purposes of security enhancement and data privacy protection, the Paillier encryption-decryption scheme is adopted to map the measurement data into the ciphertext space before being transmitted through the communication network. The aim of this paper is to develop a novel secure particle filter algorithm to cope with the nonlinearity/non-Gaussianity from the system plant and the decrypted signals after the measurement transmission. In particular, a modified likelihood function is proposed to obtain the importance weights where the encryption-decryption process of the measurement data is taken into full consideration. The developed algorithm is applied to multi-machine power grids, and it is demonstrated via simulation studies (on three test scenarios of the IEEE 39-bus power system) that our proposed secure state estimation scheme possesses the desired performance index in terms of security and accuracy.
In this article, the fault-tolerant consensus control problem is investigated for multiagent systems with sensor faults. A first-order difference equation is utilized to describe the sensor fault, and an observer is d...
详细信息
In this article, the fault-tolerant consensus control problem is investigated for multiagent systems with sensor faults. A first-order difference equation is utilized to describe the sensor fault, and an observer is designed to estimate the state and the fault simultaneously. For security enhancement and/or congestion mitigation purposes, the estimated state is first encrypted into a series of finite-level codewords by an encryption algorithm and, then, transmitted to other agents through a directed topology. After being received, the codewords are then decrypted by the corresponding decryption algorithm and subsequently utilized to design the consensus controller. By constructing a novel matrix norm along with its compatible vector norm, we obtain a necessary and sufficient condition, which serves as an index in the observer and the controller design. In the end, a simulation example is given to demonstrate the validity of the results in this article.
In this paper, the problem of secure recursive state estimation is addressed for a networked linear system over a relay channel. We consider the scenario where the transmitted signals and the internal state of the rel...
详细信息
In this paper, the problem of secure recursive state estimation is addressed for a networked linear system over a relay channel. We consider the scenario where the transmitted signals and the internal state of the relay node might be intercepted by potential eavesdroppers. To prevent the system states from being inferred by potential eavesdroppers via overheard measurement signals, an encryption-decryption mechanism is adopted to protect the transmitted measurement signals over the communication links. Furthermore, for the purpose of preserving data privacy during the relaying process, a decryption-free relaying protocol is constructed, where a matrix-inequality-based method is proposed for the design of the desired parameters for the relaying protocol. Following this, a recursive state estimator is developed to generate state estimates through a set of recursions. Sufficient conditions are then derived to ensure the ultimate boundedness of the resultant estimation error variance matrix. Finally, the effectiveness of the proposed secure recursive state estimation scheme is demonstrated through a simulation example. (c) 2025 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement s...
详细信息
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential *** avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption *** purpose of the addressed problem is to design an encryptiondecryptionscheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is *** conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state ***,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme. A uniform distributed random ...
详细信息
This paper discusses the encryption-decryption-based state estimation (EDBSE) issue for coupled perturbation complex networks (CPCNs) in the framework of the Kalman-type filtering scheme. A uniform distributed random variable is employed to characterize the coupled perturbation among different network units. A uniform-quantization-dependent encryption-decryption (UQDED) scheme is considered here to orchestrate the transmitted data. A novel EDBSE approach is developed such that the upper bounds of prediction error (PE) covariance (PEC) and estimation error (EE) covariance (EEC) can be derived by resolving Riccati-like difference equations and the estimation parameter (EP) is determined by minimizing the trace of the upper bound of EEC. Furthermore, a uniformly bounded condition is elaborated to evaluate the algorithm performance of EDBSE. Finally, an illustrative example is conducted to verify the validity of the introduced EDBSE method.
作者:
Zou, LeiWang, ZidongShen, BoDong, HongliDonghua Univ
Coll Informat Sci & Technol Engn Res Ctr Digitalized Text & Fash Technol Minist Educ Shanghai 201620 Peoples R China Brunel Univ London
Dept Comp Sci Uxbridge UB8 3PH England Northeast Petr Univ
Artificial Intelligence Energy Res Inst Heilongjiang Prov Key Lab Networking & Intelligent Daqing 163318 Peoples R China Northeast Petr Univ
Sanya Offshore Oil & Gas Res Inst Sanya 572024 Peoples R China
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eaves...
详细信息
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eavesdropper could intercept the transmitted information and generate the state estimates based on the overheard signals. In order to protect the privacy of the system state from information leakage, a novel encryptor is proposed to encrypt the measurement signals into codewords before being transmitted, and a decryptor is then adopted at the user side to decrypt the received codewords into the desired measurement signals, based on which a recursive state estimator is developed whose parameter is calculated by solving several coupled difference equations. Here, the secret key for decryption is available to the user but is unknown to the eavesdropper. The encryptor and the estimator are codesigned such that 1) at the user side, the estimation error covariance has an upper bound that is subsequently minimized in the sense of the matrix trace, where the uniform boundedness of the error covariance is also examined;and 2) at the eavesdropper side, the corresponding state estimation error is divergent. Two simulation examples are provided to demonstrate the effectiveness of our developed secure state estimation scheme.
The paper investigates the problem of distributed vehicular platooning control under the premise of privacy preservation. First, an encryption-decryption scheme is introduced to secure the data transmitted among vehic...
详细信息
ISBN:
(纸本)9798350387780;9798350387797
The paper investigates the problem of distributed vehicular platooning control under the premise of privacy preservation. First, an encryption-decryption scheme is introduced to secure the data transmitted among vehicles, preventing potential external breaches that might compromise the confidentiality of the original vehicular data, thereby enhancing the privacy and security of vehicle interactions. Second, an event-triggered mechanism is utilized to enable data exchanges among vehicles only when specific conditions are met. The employment of such event triggering significantly reduces the utilization of communication resources, thereby improving communication efficiency. Then, a distributed platooning control strategy is proposed to ensure that each vehicle within the platoon achieves the desired tracking performance. Finally, stability analysis of the closed-loop event-triggered encryption-decryption platooning control system is conducted. The feasibility and the efficacy of the control strategy are demonstrated through a specific numerical example.
暂无评论