Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey

IF 6.4 2区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Automation Science and Engineering Pub Date : 2024-08-26 DOI:10.1109/TASE.2024.3440042
Xinhao Yan;Guanzhong Zhou;Daniel E. Quevedo;Carlos Murguia;Bo Chen;Hailong Huang
{"title":"Privacy-Preserving State Estimation in the Presence of Eavesdroppers: A Survey","authors":"Xinhao Yan;Guanzhong Zhou;Daniel E. Quevedo;Carlos Murguia;Bo Chen;Hailong Huang","doi":"10.1109/TASE.2024.3440042","DOIUrl":null,"url":null,"abstract":"Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks – and often the first type before launching destructive integrity attacks – are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of the existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research. Note to Practitioners—With the increasing openness and anonymization of the networked estimation systems, privacy concerns require to be paid more attention. The essence of the privacy-preserving approaches is to seek certain tradeoffs among privacy budget and various performance metrics, such as utility and energy. Cryptographic methods are suitable for high-performance processors because they need sufficient computation resources to generate and operate complicated secret keys. By contrast, perturbation methods can be realized faster, but the adverse impact on the legitimate systems should be limited not to violently disrupt the desired operations. In conclusion, the choice of these encryption approaches depends on practical demands. Moreover, general state-space models, which can represent most real-world dynamics, are the basis of the reviewed methods. Thus these approaches can be easily deployed to practical engineering systems to effectively guarantee their privacy, providing significant application values.","PeriodicalId":51060,"journal":{"name":"IEEE Transactions on Automation Science and Engineering","volume":"22 ","pages":"6190-6207"},"PeriodicalIF":6.4000,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Automation Science and Engineering","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10648957/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Networked systems are increasingly the target of cyberattacks that exploit vulnerabilities within digital communications, embedded hardware, and software. Arguably, the simplest class of attacks – and often the first type before launching destructive integrity attacks – are eavesdropping attacks, which aim to infer information by collecting system data and exploiting it for malicious purposes. A key technology of networked systems is state estimation, which leverages sensing and actuation data and first-principles models to enable trajectory planning, real-time monitoring, and control. However, state estimation can also be exploited by eavesdroppers to identify models and reconstruct states with the aim of, e.g., launching integrity (stealthy) attacks and inferring sensitive information. It is therefore crucial to protect disclosed system data to avoid an accurate state estimation by eavesdroppers. This survey presents a comprehensive review of the existing literature on privacy-preserving state estimation methods, while also identifying potential limitations and research gaps. Our primary focus revolves around three types of methods: cryptography, data perturbation, and transmission scheduling, with particular emphasis on Kalman-like filters. Within these categories, we delve into the concepts of homomorphic encryption and differential privacy, which have been extensively investigated in recent years in the context of privacy-preserving state estimation. Finally, we shed light on several technical and fundamental challenges surrounding current methods and propose potential directions for future research. Note to Practitioners—With the increasing openness and anonymization of the networked estimation systems, privacy concerns require to be paid more attention. The essence of the privacy-preserving approaches is to seek certain tradeoffs among privacy budget and various performance metrics, such as utility and energy. Cryptographic methods are suitable for high-performance processors because they need sufficient computation resources to generate and operate complicated secret keys. By contrast, perturbation methods can be realized faster, but the adverse impact on the legitimate systems should be limited not to violently disrupt the desired operations. In conclusion, the choice of these encryption approaches depends on practical demands. Moreover, general state-space models, which can represent most real-world dynamics, are the basis of the reviewed methods. Thus these approaches can be easily deployed to practical engineering systems to effectively guarantee their privacy, providing significant application values.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
存在窃听者时的隐私保护状态估计:调查
网络系统越来越成为网络攻击的目标,这些攻击利用了数字通信、嵌入式硬件和软件中的漏洞。可以说,最简单的一类攻击——通常是破坏性完整性攻击之前的第一种攻击——是窃听攻击,其目的是通过收集系统数据来推断信息,并利用它来达到恶意目的。网络系统的一项关键技术是状态估计,它利用传感和驱动数据以及第一性原理模型来实现轨迹规划、实时监测和控制。然而,状态估计也可以被窃听者利用来识别模型和重建状态,目的是发起完整性(隐身)攻击和推断敏感信息。因此,保护公开的系统数据以避免被窃听者进行准确的状态估计是至关重要的。本研究对现有关于隐私保护状态估计方法的文献进行了全面回顾,同时也指出了潜在的局限性和研究空白。我们主要关注三种类型的方法:密码学,数据扰动和传输调度,特别强调卡尔曼滤波器。在这些类别中,我们深入研究了同态加密和差分隐私的概念,这些概念近年来在隐私保护状态估计的背景下得到了广泛的研究。最后,我们阐明了围绕当前方法的几个技术和基本挑战,并提出了未来研究的潜在方向。从业人员注意事项——随着网络评估系统的日益开放和匿名化,隐私问题需要得到更多的关注。隐私保护方法的本质是在隐私预算和各种性能指标(如效用和能源)之间寻求某种折衷。加密方法适用于高性能处理器,因为它们需要足够的计算资源来生成和操作复杂的密钥。相比之下,摄动方法可以更快地实现,但对合法系统的不利影响应限制在不暴力破坏预期操作的范围内。总之,这些加密方法的选择取决于实际需求。此外,可以表示大多数现实世界动态的一般状态空间模型是所述方法的基础。因此,这些方法可以很容易地部署到实际工程系统中,有效地保证其隐私,具有重要的应用价值。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Automation Science and Engineering
IEEE Transactions on Automation Science and Engineering 工程技术-自动化与控制系统
CiteScore
12.50
自引率
14.30%
发文量
404
审稿时长
3.0 months
期刊介绍: The IEEE Transactions on Automation Science and Engineering (T-ASE) publishes fundamental papers on Automation, emphasizing scientific results that advance efficiency, quality, productivity, and reliability. T-ASE encourages interdisciplinary approaches from computer science, control systems, electrical engineering, mathematics, mechanical engineering, operations research, and other fields. T-ASE welcomes results relevant to industries such as agriculture, biotechnology, healthcare, home automation, maintenance, manufacturing, pharmaceuticals, retail, security, service, supply chains, and transportation. T-ASE addresses a research community willing to integrate knowledge across disciplines and industries. For this purpose, each paper includes a Note to Practitioners that summarizes how its results can be applied or how they might be extended to apply in practice.
期刊最新文献
Guest Editorial: Special Issue on the 2024 IEEE International Conference on Automation Science and Engineering Optimizing Timetable Scheduling: A Smart Local Search Approach with Aspiration and Random Moves Strategies Meta-AWARE: Meta-Learning-based Automatic Weighted Augmentation for Regression Enhancement in Soft Sensor Applications Observer-based predefined-time adaptive robust control of nonlinear time-delay systems with different power Hamiltonian functions Intelligent Connected Vehicles Platoon Control Under a Zero-Trust Framework: An Event-triggered Intermittent Control Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1