Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/159355
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Huang, Lingying | en_US |
dc.contributor.author | Ding, Kemi | en_US |
dc.contributor.author | Leong, Alex S. | en_US |
dc.contributor.author | Quevedo, Daniel E. | en_US |
dc.contributor.author | Shi, Ling | en_US |
dc.date.accessioned | 2022-06-16T02:41:13Z | - |
dc.date.available | 2022-06-16T02:41:13Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Huang, L., Ding, K., Leong, A. S., Quevedo, D. E. & Shi, L. (2021). Encryption scheduling for remote state estimation under an operation constraint. Automatica, 127, 109537-. https://dx.doi.org/10.1016/j.automatica.2021.109537 | en_US |
dc.identifier.issn | 0005-1098 | en_US |
dc.identifier.uri | https://hdl.handle.net/10356/159355 | - |
dc.description.abstract | In remote state estimation, data transmitted by a sensor through a wireless communication channel may be overheard by an eavesdropper. One possible way to avoid information leakage is to encrypt the transmitted data all the time. However, this may impose an extra operation energy burden on the sensor. In this paper, we investigate the optimal encryption scheduling in order to protect data privacy and ensure estimation accuracy under an energy constraint. Specifically, the sensor computes its local state estimate and then quantizes it using a non-subtractively dithered quantizer. Before each transmission, the sensor determines whether encrypting the data or not in order to strike a balance between data privacy and estimation accuracy. As the information about eavesdropper is unknown to the estimator, we introduce the concept of eavesdropper-invariant schedules and derive associated structural results. In addition, we propose a practical algorithm that compares a finite number of points to obtain an ε-optimal encryption schedule. Numerical examples are provided to illustrate performance benefits of the proposed methods. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Automatica | en_US |
dc.rights | © 2021 Elsevier Ltd. All rights reserved. | en_US |
dc.subject | Engineering::Electrical and electronic engineering | en_US |
dc.title | Encryption scheduling for remote state estimation under an operation constraint | en_US |
dc.type | Journal Article | en |
dc.contributor.school | School of Electrical and Electronic Engineering | en_US |
dc.identifier.doi | 10.1016/j.automatica.2021.109537 | - |
dc.identifier.scopus | 2-s2.0-85102045707 | - |
dc.identifier.volume | 127 | en_US |
dc.identifier.spage | 109537 | en_US |
dc.subject.keywords | Privacy | en_US |
dc.subject.keywords | Encryption Scheduling | en_US |
dc.description.acknowledgement | The work by L. Huang and L. Shi is supported by a Hong Kong RGC General Research Fund 16204218. | en_US |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
Appears in Collections: | EEE Journal Articles |
SCOPUSTM
Citations
20
11
Updated on Mar 26, 2024
Web of ScienceTM
Citations
20
10
Updated on Oct 28, 2023
Page view(s)
90
Updated on Mar 28, 2024
Google ScholarTM
Check
Altmetric
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.