Please use this identifier to cite or link to this item: http://bura.brunel.ac.uk/handle/2438/30950
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZou, L-
dc.contributor.authorWang, Z-
dc.contributor.authorShen, B-
dc.contributor.authorDong, H-
dc.date.accessioned2025-03-21T17:40:00Z-
dc.date.available2025-03-21T17:40:00Z-
dc.date.issued2024-12-09-
dc.identifierORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941-
dc.identifierORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401-
dc.identifierORCiD: Bo Shen https://orcid.org/0000-0003-3482-5783-
dc.identifierORCiD: Hongli Dong https://orcid.org/0000-0001-8531-6757-
dc.identifier.citationZou, L. et al. (2024) 'Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method', IEEE Transactions on Automatic Control, 0 (early access), pp. 1 - 14. doi: 10.1109/TAC.2024.3512413.en_US
dc.identifier.issn0018-9286-
dc.identifier.urihttps://bura.brunel.ac.uk/handle/2438/30950-
dc.description.abstractThis paper addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect information security, an encryption-decryption-based communication scheme can be used, but encrypting all the measurement data from sensors can result in significant computational costs. To address this issue, a partial-encryption-decryption (PED) mechanism is proposed to enhance information security with relatively low computational costs. In this mechanism, only part of the transmitted measurement signals are encrypted, and the remaining signals are transmitted directly to the estimator. A Jordan-canonical-form-based approach is developed to select the appropriate parameter for the PED mechanism, and recursive formulas for the state estimator are designed based on the principle of minimum mean squared error. Sufficient conditions are derived to guarantee the ultimate boundedness of the estimation error variance matrix. Finally, the proposed PED-based recursive state estimation scheme is evaluated through two simulation examples to demonstrate its effectiveness.en_US
dc.description.sponsorship10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 62273087, 61933007, 62273088 and U21A2019)en_US
dc.format.extent1 - 14-
dc.format.mediumPrint-Electronic-
dc.languageEnglish-
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.rightsCopyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.rights.urihttps://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/-
dc.subjecteavesdroppingen_US
dc.subjectencryption-decryption schemeen_US
dc.subjectminimum mean squared erroren_US
dc.subjectrecursive state estimationen_US
dc.subjectultimate boundedness analysisen_US
dc.titleSecure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Methoden_US
dc.typeArticleen_US
dc.identifier.doihttps://doi.org/10.1109/TAC.2024.3512413-
dc.relation.isPartOfIEEE Transactions on Automatic Control-
pubs.issueearly access-
pubs.publication-statusPublished-
pubs.volume0-
dc.identifier.eissn1558-2523-
dc.rights.holderInstitute of Electrical and Electronics Engineers (IEEE)-
Appears in Collections:Dept of Computer Science Research Papers

Files in This Item:
File Description SizeFormat 
FullText.pdfCopyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/987.35 kBAdobe PDFView/Open


Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.