谷歌浏览器插件
订阅小程序
在清言上使用

Eavesdropping Strategies for Remote State Estimation under Communication Constraints.

IEEE Transactions on Information Forensics and Security(2023)

引用 3|浏览8
暂无评分
摘要
This paper studies the confidentiality issue of wireless sensor networks under communication constraints from the perspective of an eavesdropper. The considered communication constraints include both medium access constraint and bandwidth limitation. Specifically, the former results in only one sink node gaining access to the shared network at each time step, while the latter requires data to be quantized by a probabilistic quantizer before being transmitted. The task of the eavesdropper is to develop eavesdropping strategies for the constrained network to infer the state of the system as accurately as possible. Since the data is generally unreadable to unauthorized third parties in terms of secure transmission, an eavesdropper with limited power must decide which sink nodes' data needs to be decrypted. By analyzing the impact of different decryption strategies on the eavesdropping performance, a deciphering scheduling is proposed, which minimizes the expected estimation error without exceeding the energy budget. Besides, a recursive reset algorithm is put forward based on the properties of the probabilistic quantizer, which reflects that an eavesdropper can infer whether its own estimate is accurate enough from the decoded data. Moreover, a sufficient condition is established in which the eavesdropping performance is improved under the proposed algorithm. A numerical example is provided to demonstrate the validity of the developed approaches.
更多
查看译文
关键词
Eavesdropping,Protocols,Probabilistic logic,Estimation error,Job shop scheduling,State estimation,Quantization (signal),Confidentiality,state estimation,communication constraints,deciphering scheduling,recursive reset
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要