{"title":"Privacy-preserving scheme of distributed sensor networks with dynamic code","authors":"Peipei Chen, Yun Liu, Wen Yang","doi":"10.1002/itl2.414","DOIUrl":null,"url":null,"abstract":"<p>In this letter, we consider the privacy-preserving strategy of the distributed state estimator over wireless sensor networks. Aiming at an eavesdropper who can intercept the data transmitted on the communication channel, we design a simple preserving scheme to encode the transmitted data by using system dynamics and history estimates. To analyze the privacy-preserving performance, we use the gap between the values deciphered by the eavesdropper and decoded by the sensor as the privacy index to evaluate the degree of robust privacy protection. Finally, we provide some simulations to illustrate the effectiveness of the proposed preserving schemes.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 3","pages":""},"PeriodicalIF":0.9000,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet Technology Letters","FirstCategoryId":"1085","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/itl2.414","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
In this letter, we consider the privacy-preserving strategy of the distributed state estimator over wireless sensor networks. Aiming at an eavesdropper who can intercept the data transmitted on the communication channel, we design a simple preserving scheme to encode the transmitted data by using system dynamics and history estimates. To analyze the privacy-preserving performance, we use the gap between the values deciphered by the eavesdropper and decoded by the sensor as the privacy index to evaluate the degree of robust privacy protection. Finally, we provide some simulations to illustrate the effectiveness of the proposed preserving schemes.