-
Remote State Estimation with Privacy Against Active Eavesdroppers
Authors:
Matthew Crimson,
Justin M. Kennedy,
Daniel E. Quevedo
Abstract:
This paper considers a cyber-physical system under an active eavesdrop** attack. A remote legitimate user estimates the state of a linear plant from the state information received from a sensor. Transmissions from the sensor occur via an insecure and unreliable network. An active eavesdropper may perform an attack during system operation. The eavesdropper intercepts transmissions from the sensor…
▽ More
This paper considers a cyber-physical system under an active eavesdrop** attack. A remote legitimate user estimates the state of a linear plant from the state information received from a sensor. Transmissions from the sensor occur via an insecure and unreliable network. An active eavesdropper may perform an attack during system operation. The eavesdropper intercepts transmissions from the sensor, whilst simultaneously sabotaging the data transfer from the sensor to the remote legitimate user to harm its estimation performance. To maintain state confidentiality, we propose an encoding scheme that is activated on the detection of an eavesdropper. Our scheme transmits noise based on a pseudo-random indicator, pre-arranged at the legitimate user and sensor. The transmission of noise harms the eavesdropper's performance, more than that of the legitimate user. Using the proposed encoding scheme, we impair the eavesdropper's expected estimation performance, whilst minimising expected performance degradation at the legitimate user. We explore the trade-off between state confidentiality and legitimate user performance degradation through selecting the probability that the sensor transmits noise. Under certain design choices, the trace of the expected estimation error covariance of the eavesdropper is greater than that of the legitimate user. Numerical examples are provided to illustrate the proposed encoding scheme.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
Exactly Optimal Quickest Change Detection of Markov Chains
Authors:
Jason J. Ford,
Justin M. Kennedy,
Caitlin Tompkins,
Jasmin James,
Aaron McFadyen
Abstract:
This paper establishes that an exactly optimal rule for Bayesian Quickest Change Detection (QCD) of Markov chains is a threshold test on the no change posterior. We also provide a computationally efficient scalar filter for the no change posterior whose effort is independent of the dimension of the chains. We establish that an (undesirable) weak practical super-martingale phenomenon can be exhibit…
▽ More
This paper establishes that an exactly optimal rule for Bayesian Quickest Change Detection (QCD) of Markov chains is a threshold test on the no change posterior. We also provide a computationally efficient scalar filter for the no change posterior whose effort is independent of the dimension of the chains. We establish that an (undesirable) weak practical super-martingale phenomenon can be exhibited by the no change posterior when the before and after chains are too close in a relative entropy rate sense. The proposed detector is examined in simulation studies.
△ Less
Submitted 23 March, 2023;
originally announced March 2023.
-
Innovation-Based Remote State Estimation Secrecy with no Acknowledgments
Authors:
Justin M. Kennedy,
Jason J. Ford,
Daniel E. Quevedo,
Falko Dressler
Abstract:
Secrecy encoding for remote state estimation in the presence of adversarial eavesdroppers is a well studied problem. Typical existing secrecy encoding schemes rely on the transmitter's knowledge of the remote estimator's current performance. This performance measure is often shared via packet receipt acknowledgments. However, in practical situations the acknowledgment channel may be susceptible to…
▽ More
Secrecy encoding for remote state estimation in the presence of adversarial eavesdroppers is a well studied problem. Typical existing secrecy encoding schemes rely on the transmitter's knowledge of the remote estimator's current performance. This performance measure is often shared via packet receipt acknowledgments. However, in practical situations the acknowledgment channel may be susceptible to interference from an active adversary, resulting in the secrecy encoding scheme failing. Aiming to achieve a reliable state estimate for a legitimate estimator while ensuring secrecy, we propose a secrecy encoding scheme without the need for packet receipt acknowledgments. Our encoding scheme uses a pre-arranged scheduling sequence established at the transmitter and legitimate receiver. We transmit a packet containing either the state measurement or encoded information for the legitimate user. The encoding makes the packet appear to be the state but is designed to damage an eavesdropper's estimate. The pre-arranged scheduling sequence and encoding is chosen psuedo-random. We analyze the performance of our encoding scheme against a class of eavesdropper, and show conditions to force the eavesdropper to have an unbounded estimation performance. Further, we provide a numerical illustration and apply our encoding scheme to an application in power systems.
△ Less
Submitted 15 December, 2022;
originally announced December 2022.
-
Remote State Estimation with Privacy Against Eavesdroppers
Authors:
Matthew Crimson,
Justin M. Kennedy,
Daniel E. Quevedo
Abstract:
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the challenging network environment of no packet receipt acknowledgments. A remote legitimate user estimates the state of a linear plant from the state information received from a sensor via an insecure and unreliable network. The transmission from the sensor may be intercepted by the eavesdropper. To…
▽ More
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the challenging network environment of no packet receipt acknowledgments. A remote legitimate user estimates the state of a linear plant from the state information received from a sensor via an insecure and unreliable network. The transmission from the sensor may be intercepted by the eavesdropper. To maintain state confidentiality, we propose an encoding scheme. Our scheme transmits noise based on a pseudo-random indicator, pre-arranged at the legitimate user and sensor. The transmission of noise harms the eavesdropper's performance, more than that of the legitimate user. Using the proposed encoding scheme, we impair the eavesdropper's expected estimation performance, whilst minimising expected performance degradation at the legitimate user. We explore the trade-off between state confidentiality and legitimate user performance degradation.
△ Less
Submitted 5 April, 2023; v1 submitted 23 November, 2022;
originally announced November 2022.
-
Bayesian Quickest Change Detection of an Intruder in Acknowledgments for Private Remote State Estimation
Authors:
Justin M. Kennedy,
Jason J. Ford,
Daniel E. Quevedo
Abstract:
For geographically separated cyber-physical systems, state estimation at a remote monitoring or control site is important to ensure stability and reliability of the system. Often for safety or commercial reasons it is necessary to ensure confidentiality of the process state and control information. A current topic of interest is the private transmission of confidential state information. Many tran…
▽ More
For geographically separated cyber-physical systems, state estimation at a remote monitoring or control site is important to ensure stability and reliability of the system. Often for safety or commercial reasons it is necessary to ensure confidentiality of the process state and control information. A current topic of interest is the private transmission of confidential state information. Many transmission encoding schemes rely on acknowledgments, which may be susceptible to interference from an adversary. We consider a stealthy intruder that selectively blocks acknowledgments allowing an eavesdropper to obtain a reliable state estimate defeating an encoding scheme. We utilize Bayesian Quickest Change Detection techniques to quickly detect online the presence of an intruder at both the remote transmitter and receiver.
△ Less
Submitted 15 December, 2022; v1 submitted 17 July, 2022;
originally announced July 2022.
-
Centralized Model-Predictive Control with Human-Driver Interaction for Platooning
Authors:
Justin M. Kennedy,
Julian Heinovski,
Daniel E. Quevedo,
Falko Dressler
Abstract:
Cooperative adaptive cruise control presents an opportunity to improve road transportation through increase in road capacity and reduction in energy use and accidents. Clever design of control algorithms and communication systems is required to ensure that the vehicle platoon is stable and meets desired safety requirements. In this paper, we propose a centralized model predictive controller for a…
▽ More
Cooperative adaptive cruise control presents an opportunity to improve road transportation through increase in road capacity and reduction in energy use and accidents. Clever design of control algorithms and communication systems is required to ensure that the vehicle platoon is stable and meets desired safety requirements. In this paper, we propose a centralized model predictive controller for a heterogeneous platoon of vehicles to reach a desired platoon velocity and individual inter-vehicle distances with driver-selected headway time. As a novel concept, we allow for interruption from a human driver in the platoon that temporarily takes control of their vehicle with the assumption that the driver will, at minimum, obey legal velocity limits and the physical performance constraints of their vehicle. The finite horizon cost function of our proposed platoon controller is inspired from the infinite horizon design. To the best of our knowledge, this is the first platoon controller that integrates human-driven vehicles. We illustrate the performance of our proposed design with a numerical study, demonstrating that the safety distance, velocity, and actuation constraints are obeyed. Additionally, in simulation we illustrate a key property of string stability where the impact of a disturbance is reduced through the platoon.
△ Less
Submitted 18 May, 2023; v1 submitted 18 May, 2022;
originally announced May 2022.