Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation
DOI10.1016/J.AUTOMATICA.2021.110145zbMath1482.93236OpenAlexW4205657322WikidataQ120812699 ScholiaQ120812699MaRDI QIDQ2071987
Publication date: 31 January 2022
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2021.110145
privacyoptimal scheduleeavesdroppingenergy constraintremote state estimationcyber physical systemsencrypted transmission
Control/observation systems involving computers (process control, etc.) (93C83) Cryptography (94A60) Computer security (68M25) Networked control (93B70)
Related Items (1)
Cites Work
- Unnamed Item
- Sensor data scheduling for optimal state estimation with communication energy constraint
- Encryption scheduling for remote state estimation under an operation constraint
- Optimal Denial-of-Service Attack Scheduling With Energy Constraint
- Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach
- Optimal Periodic Transmission Power Schedules for Remote Estimation of ARMA Processes
- Optimal Attack Energy Allocation against Remote State Estimation
- Optimal event‐triggered transmission scheduling for privacy‐preserving wireless state estimation
- State-Secrecy Codes for Networked Linear Systems
- Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper
- Remote State Estimation in the Presence of an Active Eavesdropper
This page was built for publication: Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation