Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/30950
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zou, L | - |
dc.contributor.author | Wang, Z | - |
dc.contributor.author | Shen, B | - |
dc.contributor.author | Dong, H | - |
dc.date.accessioned | 2025-03-21T17:40:00Z | - |
dc.date.available | 2025-03-21T17:40:00Z | - |
dc.date.issued | 2024-12-09 | - |
dc.identifier | ORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941 | - |
dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
dc.identifier | ORCiD: Bo Shen https://orcid.org/0000-0003-3482-5783 | - |
dc.identifier | ORCiD: Hongli Dong https://orcid.org/0000-0001-8531-6757 | - |
dc.identifier.citation | Zou, L. et al. (2024) 'Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method', IEEE Transactions on Automatic Control, 0 (early access), pp. 1 - 14. doi: 10.1109/TAC.2024.3512413. | en_US |
dc.identifier.issn | 0018-9286 | - |
dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/30950 | - |
dc.description.abstract | This paper addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect information security, an encryption-decryption-based communication scheme can be used, but encrypting all the measurement data from sensors can result in significant computational costs. To address this issue, a partial-encryption-decryption (PED) mechanism is proposed to enhance information security with relatively low computational costs. In this mechanism, only part of the transmitted measurement signals are encrypted, and the remaining signals are transmitted directly to the estimator. A Jordan-canonical-form-based approach is developed to select the appropriate parameter for the PED mechanism, and recursive formulas for the state estimator are designed based on the principle of minimum mean squared error. Sufficient conditions are derived to guarantee the ultimate boundedness of the estimation error variance matrix. Finally, the proposed PED-based recursive state estimation scheme is evaluated through two simulation examples to demonstrate its effectiveness. | en_US |
dc.description.sponsorship | 10.13039/501100001809-National Natural Science Foundation of China (Grant Number: 62273087, 61933007, 62273088 and U21A2019) | en_US |
dc.format.extent | 1 - 14 | - |
dc.format.medium | Print-Electronic | - |
dc.language | English | - |
dc.language.iso | en_US | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.rights | Copyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | - |
dc.rights.uri | https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | - |
dc.subject | eavesdropping | en_US |
dc.subject | encryption-decryption scheme | en_US |
dc.subject | minimum mean squared error | en_US |
dc.subject | recursive state estimation | en_US |
dc.subject | ultimate boundedness analysis | en_US |
dc.title | Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method | en_US |
dc.type | Article | en_US |
dc.identifier.doi | https://doi.org/10.1109/TAC.2024.3512413 | - |
dc.relation.isPartOf | IEEE Transactions on Automatic Control | - |
pubs.issue | early access | - |
pubs.publication-status | Published | - |
pubs.volume | 0 | - |
dc.identifier.eissn | 1558-2523 | - |
dc.rights.holder | Institute of Electrical and Electronics Engineers (IEEE) | - |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2024 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. See: https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ | 987.35 kB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.