Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey
Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks - and often the first type before launching destructive integrity attacks - are eavesdropping attacks, wh...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on automation science and engineering 2024-08, p.1-18 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks - and often the first type before launching destructive integrity attacks - are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of the existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research. Note to Practitioners -With the increasing openness and anonymization of the networked estimation systems, privacy concerns require to be paid more attention. The essence of the privacy-preserving approaches is to seek certain tradeoffs among privacy budget and various performance metrics, such as utility and energy. Cryptographic methods are suitable for high-performance processors because they need sufficient computation resources to generate and operate complicated secret keys. By contrast, perturbation methods can be realized faster, but the adverse impact on the legitimate systems should be limited not to violently disrupt the desired operations. In conclusion, the choice of these encryption approaches depends on practical demands. Moreover, general state-space models, which can represent most real-world dynamics, are the basis of the reviewed method |
---|---|
ISSN: | 1545-5955 1558-3783 |
DOI: | 10.1109/TASE.2024.3440042 |