Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/32451Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Zou, L | - |
| dc.contributor.author | Wang, Z | - |
| dc.contributor.author | Shen, B | - |
| dc.contributor.author | Dong, H | - |
| dc.date.accessioned | 2025-12-04T16:52:06Z | - |
| dc.date.available | 2025-12-04T16:52:06Z | - |
| dc.date.issued | 2025-10-14 | - |
| dc.identifier | ORCiD: Lei Zou https://orcid.org/0000-0002-0409-7941 | - |
| dc.identifier | ORCiD: Zidong Wang https://orcid.org/0000-0002-9576-7401 | - |
| dc.identifier | ORCiD: Hongli Dong https://orcid.org/0000-0001-8531-6757 | - |
| dc.identifier | Article number: 112652 | - |
| dc.identifier.citation | Zou, L. et al. (2026) 'Anti-eavesdropping set-membership state estimation for networked systems: An encryption–decryption scheme', Automatica, 183, 112652, pp. 1 - 12. doi: 10.1016/j.automatica.2025.112652. | en_US |
| dc.identifier.issn | 0005-1098 | - |
| dc.identifier.uri | https://bura.brunel.ac.uk/handle/2438/32451 | - |
| dc.description | The material in this paper was not presented at any conference. | en_US |
| dc.description.abstract | In this paper, the secure set-membership state estimation problem is investigated for a class of networked linear systems, where the measurement data might be intercepted by potential eavesdroppers. To protect the privacy of system state from information leakage, an artificial-noise-assisted encryptor is dedicatedly designed to transform the measurement data into the ciphertext (i.e., the encrypted data) before being transmitted, and a decryptor is then employed at the state estimator side to decrypt the received ciphertext. Under the proposed encryption–decryption mechanism, the concept of secrecy capacity is introduced to quantify the information security of the signal transmission process. A parameter-dependent state estimator is constructed to confine the estimation error into a time-varying ellipsoidal set. The desired parameters for the state estimator and the encryptor are co-designed by resorting to a set of recursions. Furthermore, sufficient conditions are derived to guarantee the ultimate boundedness of the time-varying ellipsoidal set. Finally, two simulation examples are provided to demonstrate the effectiveness of our developed secure set-membership state estimation scheme. | en_US |
| dc.description.sponsorship | This work was supported in part by the National Natural Science Foundation of China under Grants 62273087, 61933007, 62273088 and U21A2019, the Royal Society of the UK, and the Alexander von Humboldt Foundation of Germany | en_US |
| dc.format.extent | 1 - 12 | - |
| dc.format.medium | Print-Electronic | - |
| dc.language | English | - |
| dc.language.iso | en_US | en_US |
| dc.publisher | Elsevier | en_US |
| dc.rights | Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International | - |
| dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | - |
| dc.subject | eavesdropping | en_US |
| dc.subject | encryption–decryption scheme | en_US |
| dc.subject | set-membership state estimation | en_US |
| dc.subject | artificial-noise-assisted technique | en_US |
| dc.subject | ultimate boundedness analysis | en_US |
| dc.title | Anti-eavesdropping set-membership state estimation for networked systems: An encryption–decryption scheme | en_US |
| dc.type | Article | en_US |
| dc.date.dateAccepted | 2025-09-17 | - |
| dc.identifier.doi | https://doi.org/10.1016/j.automatica.2025.112652 | - |
| dc.relation.isPartOf | Automatica | - |
| pubs.issue | January 2026 | - |
| pubs.publication-status | Published | - |
| pubs.volume | 183 | - |
| dc.identifier.eissn | 1873-2836 | - |
| dc.rights.license | https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode.en | - |
| dcterms.dateAccepted | 2025-09-17 | - |
| dc.rights.holder | Elsevier Ltd. | - |
| Appears in Collections: | Dept of Computer Science Embargoed Research Papers | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| FulText.pdf | Embargoed until 14 October 2026. Copyright © 2025 Elsevier Ltd. All rights reserved. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ (see: https://www.elsevier.com/about/policies/sharing). | 356.78 kB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License