Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping

In this article, we investigate the privacy issue of the remote state estimation problem in cyber-physical systems. Specifically, in the presence of an eavesdropper, a sensor observes a discrete linear time-invariant process and then sends the measurements to a remote state estimator with arbitrary finite kinds of transmission options through an unreliable wireless channel. The transmission options of the sensor are in silence state or transmitting aided by injection noise with different energy levels. The eavesdropper wiretaps the channel when the sensor transmits packets to the estimator. Aiming at minimizing the remote estimation error and the cost of the sensors transmission energy while maximizing the eavesdropper state estimation error, we theoretically prove that there exist some structural properties for the optimal transmission schedule for both the known and the unknown eavesdropper's estimation errors. Numerical simulation results are provided to validate the theoretical analysis.

[1]  Jun Zhao On secure communication in sensor networks under q-composite key predistribution with unreliable links , 2019, ArXiv.

[2]  Ling Shi,et al.  Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes , 2013, IEEE Transactions on Signal Processing.

[3]  Xiaolin Wang,et al.  Learning-based Attack Schedule against Remote State Estimation in Cyber-Physical Systems , 2019, 2019 American Control Conference (ACC).

[4]  Xianghui Cao,et al.  On Optimal Privacy-Preserving Transmission Schedule for Remote State Estimation in the Presence of an Eavesdropper , 2019, 2019 1st International Conference on Industrial Artificial Intelligence (IAI).

[5]  Yu Cheng,et al.  Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks , 2016, IEEE Internet of Things Journal.

[6]  Renquan Lu,et al.  Finite-Horizon $H_{\infty}$ State Estimation for Periodic Neural Networks Over Fading Channels , 2020, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Yu Cheng,et al.  Joint Scheduling and Channel Allocation for End-to-End Delay Minimization in Industrial WirelessHART Networks , 2019, IEEE Internet of Things Journal.

[8]  Paul Honeine,et al.  ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.

[9]  Xinping Guan,et al.  Antijamming Game Framework for Secure State Estimation in Power Systems , 2019, IEEE Transactions on Industrial Informatics.

[10]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[11]  Avi Ostfeld,et al.  Characterizing Cyber-Physical Attacks on Water Distribution Systems , 2017 .

[12]  Ling Shi,et al.  Deep Reinforcement Learning for Wireless Sensor Scheduling in Cyber-Physical Systems , 2018, Autom..

[13]  Vikram Krishnamurthy,et al.  Structured Threshold Policies for Dynamic Sensor Scheduling—A Partially Observed Markov Decision Process Approach , 2007, IEEE Transactions on Signal Processing.

[14]  Qusay H. Mahmoud,et al.  Cyber physical systems security: Analysis, challenges and solutions , 2017, Comput. Secur..

[15]  Cunqing Hua,et al.  A Learning-Based Pre-Allocation Scheme for Low-Latency Access in Industrial Wireless Networks , 2020, IEEE Transactions on Wireless Communications.

[16]  Sinan Q. Salih,et al.  TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System , 2020, IEEE Transactions on Industrial Informatics.

[17]  Shuang Wu,et al.  Learning Optimal Scheduling Policy for Remote State Estimation Under Uncertain Channel Condition , 2018, IEEE Transactions on Control of Network Systems.

[18]  Daniel E. Quevedo,et al.  Optimal event-triggered transmission scheduling for privacy-preserving wireless state estimation , 2020 .

[19]  Jun Zhao,et al.  Probabilistic Key Predistribution in Mobile Networks Resilient to Node-Capture Attacks , 2017, IEEE Transactions on Information Theory.

[20]  Ling Shi,et al.  Finite Time Encryption Schedule in the Presence of an Eavesdropper with Operation Cost , 2019, 2019 American Control Conference (ACC).

[21]  Yu Cheng,et al.  Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs , 2017, IEEE Transactions on Industrial Informatics.

[22]  João Pedro Hespanha,et al.  A Survey of Recent Results in Networked Control Systems , 2007, Proceedings of the IEEE.

[23]  Daniel E. Quevedo,et al.  Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper , 2017, ArXiv.

[24]  Bruno Sinopoli,et al.  Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence , 2017, IEEE Communications Magazine.

[25]  Cunqing Hua,et al.  Intelligent Latency-Aware Virtual Network Embedding for Industrial Wireless Networks , 2019, IEEE Internet of Things Journal.

[26]  Xianghui Cao,et al.  Event-Driven Joint Mobile Actuators Scheduling and Control in Cyber-Physical Systems , 2019, IEEE Transactions on Industrial Informatics.

[27]  Jun Zhao Analyzing Connectivity of Heterogeneous Secure Sensor Networks , 2018, IEEE Transactions on Control of Network Systems.

[28]  Daniel E. Quevedo,et al.  On the Use of Artificial Noise for Secure State Estimation in the Presence of Eavesdroppers , 2018, 2018 European Control Conference (ECC).

[29]  John A. Stankovic,et al.  Security of Distributed, Ubiquitous, and Embedded Computing Platforms , 2009 .

[30]  Ling Shi,et al.  Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks , 2018, IEEE Transactions on Automatic Control.

[31]  Ling Shi,et al.  Optimal Attack Energy Allocation against Remote State Estimation , 2018, IEEE Transactions on Automatic Control.

[32]  Daniel E. Quevedo,et al.  Transmission scheduling for remote state estimation and control with an energy harvesting sensor , 2018, Autom..

[33]  Xinping Guan,et al.  On-Demand Transmission for Edge-Assisted Remote Control in Industrial Network Systems , 2020, IEEE Transactions on Industrial Informatics.

[34]  Leandros A. Maglaras,et al.  A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.

[35]  Xianghui Cao,et al.  Optimal Transmit Power Allocation for an Energy-Harvesting Sensor in Wireless Cyber-Physical Systems , 2019, IEEE Transactions on Cybernetics.

[36]  Wei Xing Zheng,et al.  Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel , 2018, IEEE Transactions on Automatic Control.

[37]  Canbing Li,et al.  Dynamic Data Injection Attack Detection of Cyber Physical Power Systems With Uncertainties , 2019, IEEE Transactions on Industrial Informatics.