Remote State Estimation over Packet Dropping Links in the Presence of an Eavesdropper

This paper studies transmission scheduling for remote state estimation in the presence of an eavesdropper. A sensor transmits local state estimates over a packet dropping link to a remote estimator, while an eavesdropper can successfully overhear each sensor transmission with a certain probability. The objective is to determine when the sensor should transmit, in order to minimize the estimation error covariance at the remote estimator, while trying to keep the eavesdropper error covariance above a certain level. This is done by solving an optimization problem that minimizes a linear combination of the expected estimation error covariance and the negative of the expected eavesdropper error covariance. Structural results on the optimal transmission policy are derived, and shown to exhibit thresholding behavior in the estimation error covariances. In the infinite horizon situation, it is shown that with unstable systems one can keep the expected estimation error covariance bounded while the expected eavesdropper error covariance becomes unbounded, for all eavesdropping probabilities strictly less than one.

[1]  Daniel E. Quevedo,et al.  Sensor Scheduling in Variance Based Event Triggered Estimation With Packet Drops , 2015, IEEE Transactions on Automatic Control.

[2]  Vikram Krishnamurthy,et al.  Partially Observed Markov Decision Processes: From Filtering to Controlled Sensing , 2016, 1604.08127.

[3]  Haim H. Permuter,et al.  Directed Information, Causal Estimation, and Communication in Continuous Time , 2009, IEEE Transactions on Information Theory.

[4]  Moritz Wiese,et al.  Secure estimation for unstable systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[5]  Charles R. Johnson,et al.  Matrix Analysis, 2nd Ed , 2012 .

[6]  Daniel E. Quevedo,et al.  Transmission scheduling for remote state estimation and control with an energy harvesting sensor , 2018, Autom..

[7]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[8]  B. Anderson,et al.  Optimal Filtering , 1979, IEEE Transactions on Systems, Man, and Cybernetics.

[9]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[10]  Haim H. Permuter,et al.  Directed Information, Causal Estimation, and Communication in Continuous Time , 2013, IEEE Trans. Inf. Theory.

[11]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[12]  Ling Shi,et al.  Event-Based Sensor Data Scheduling: Trade-Off Between Communication Rate and Estimation Quality , 2013, IEEE Transactions on Automatic Control.

[13]  Subhrakanti Dey,et al.  Distortion Outage Minimization in Distributed Estimation With Estimation Secrecy Outage Constraints , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[14]  L. Sennott Stochastic Dynamic Programming and the Control of Queueing Systems , 1998 .

[15]  Mark W. Spong,et al.  The Pendubot: a mechatronic system for control research and education , 1995, Proceedings of 1995 34th IEEE Conference on Decision and Control.

[16]  Mikael Skoglund,et al.  The CEO Problem With Secrecy Constraints , 2014, IEEE Transactions on Information Forensics and Security.

[17]  R. Murray,et al.  Estimation with Information Loss: Asymptotic Analysis and Error Bounds , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[18]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[19]  Luca Schenato,et al.  Optimal Estimation in Networked Control Systems Subject to Random Delay and Packet Drop , 2008, IEEE Transactions on Automatic Control.

[20]  Vijay Gupta,et al.  Security in stochastic control systems: Fundamental limitations and performance bounds , 2015, 2015 American Control Conference (ACC).

[21]  Luigi Lo Iacono Understanding Cryptography , 2018, CCNA® Security Study Guide.

[22]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[23]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[24]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[25]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[26]  Sebastian Trimpe,et al.  Event-based state estimation with variance-based triggering , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[27]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[28]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[29]  Panos J. Antsaklis,et al.  Networked state estimation over a shared communication medium , 2013, 2013 American Control Conference.

[30]  J. Massey CAUSALITY, FEEDBACK AND DIRECTED INFORMATION , 1990 .

[31]  Swen Kortig,et al.  Stochastic Dynamic Programming And The Control Of Queueing Systems , 2016 .

[32]  Ling Shi,et al.  SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.

[33]  Bruno Sinopoli,et al.  Secure Estimation in the Presence of Integrity Attacks , 2013, IEEE Transactions on Automatic Control.

[34]  Dimitri P. Bertsekas,et al.  Dynamic Programming and Optimal Control, Two Volume Set , 1995 .

[35]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[36]  Subhrakanti Dey,et al.  Estimation in Wireless Sensor Networks With Security Constraints , 2017, IEEE Transactions on Aerospace and Electronic Systems.

[37]  K. Loparo,et al.  Optimal state estimation for stochastic systems: an information theoretic approach , 1997, IEEE Trans. Autom. Control..

[38]  Milan S. Derpich,et al.  A Framework for Control System Design Subject to Average Data-Rate Constraints , 2011, IEEE Transactions on Automatic Control.

[39]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[40]  M. Lemmon,et al.  Event-triggered state estimation in vector linear processes , 2010, Proceedings of the 2010 American Control Conference.

[41]  George J. Pappas,et al.  State Estimation with Secrecy against Eavesdroppers , 2016, ArXiv.

[42]  Shlomo Shamai,et al.  Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.

[43]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.

[44]  Sebastian Trimpe,et al.  Event-Based State Estimation With Variance-Based Triggering , 2012, IEEE Transactions on Automatic Control.

[45]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[46]  Daniel E. Quevedo,et al.  State estimation over Markovian packet dropping links in the presence of an eavesdropper , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[47]  J.P. Hespanha,et al.  Estimation under uncontrolled and controlled communications in Networked Control Systems , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[48]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[49]  Daniel E. Quevedo,et al.  On Remote State Estimation in the Presence of an Eavesdropper , 2017 .

[50]  Henrik Sandberg,et al.  SDP-based joint sensor and controller design for information-regularized optimal LQG control , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[51]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[52]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[53]  George J. Pappas,et al.  Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.

[54]  João M. F. Xavier,et al.  Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel , 2013, IEEE Transactions on Signal Processing.

[55]  Lingyang Song,et al.  Physical Layer Security in Wireless Communications , 2013 .

[56]  Mark W. Spong,et al.  Mechanical Design and Control of the Pendubot , 1995 .

[57]  Ling Shi,et al.  Scheduling Two Gauss–Markov Systems: An Optimal Solution for Remote State Estimation Under Bandwidth Constraint , 2012, IEEE Transactions on Signal Processing.