Xinhao Yan;Guanzhong Zhou;Daniel E. Quevedo;Carlos Murguia;Bo Chen;Hailong Huang
{"title":"Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey","authors":"Xinhao Yan;Guanzhong Zhou;Daniel E. Quevedo;Carlos Murguia;Bo Chen;Hailong Huang","doi":"10.1109/TASE.2024.3440042","DOIUrl":null,"url":null,"abstract":"Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks – and often the first type before launching destructive integrity attacks – are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of the existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research. Note to Practitioners—With the increasing openness and anonymization of the networked estimation systems, privacy concerns require to be paid more attention. The essence of the privacy-preserving approaches is to seek certain tradeoffs among privacy budget and various performance metrics, such as utility and energy. Cryptographic methods are suitable for high-performance processors because they need sufficient computation resources to generate and operate complicated secret keys. By contrast, perturbation methods can be realized faster, but the adverse impact on the legitimate systems should be limited not to violently disrupt the desired operations. In conclusion, the choice of these encryption approaches depends on practical demands. Moreover, general state-space models, which can represent most real-world dynamics, are the basis of the reviewed methods. Thus these approaches can be easily deployed to practical engineering systems to effectively guarantee their privacy, providing significant application values.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"6190-6207"},"PeriodicalIF":6.4000,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10648957/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks – and often the first type before launching destructive integrity attacks – are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of the existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research. Note to Practitioners—With the increasing openness and anonymization of the networked estimation systems, privacy concerns require to be paid more attention. The essence of the privacy-preserving approaches is to seek certain tradeoffs among privacy budget and various performance metrics, such as utility and energy. Cryptographic methods are suitable for high-performance processors because they need sufficient computation resources to generate and operate complicated secret keys. By contrast, perturbation methods can be realized faster, but the adverse impact on the legitimate systems should be limited not to violently disrupt the desired operations. In conclusion, the choice of these encryption approaches depends on practical demands. Moreover, general state-space models, which can represent most real-world dynamics, are the basis of the reviewed methods. Thus these approaches can be easily deployed to practical engineering systems to effectively guarantee their privacy, providing significant application values.
期刊介绍:
The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.