State Estimation with Secrecy against Eavesdroppers
نویسندگان
چکیده
منابع مشابه
State Estimation with Secrecy against Eavesdroppers
We study the problem of remote state estimation, in the presence of an eavesdropper. An authorized user estimates the state of a linear plant, based on the data received from a sensor, while the data may also be intercepted by the eavesdropper. To maintain confidentiality with respect to state, we introduce a novel control-theoretic definition of perfect secrecy requiring that the user’s expect...
متن کاملRelay Secrecy in Wireless Networks with Eavesdroppers
Anonymous monitoring of transmissions in a wireless network by eavesdroppers can provide critical information about the data flows in the network. It is, therefore, necessary to design network protocols that maintain secrecy of routes from eavesdroppers. In this work, we present a mathematical formulation of route secrecy when eavesdroppers observe transmission epochs of nodes. We propose sched...
متن کاملOn the Effect of Colluding Eavesdroppers on Secrecy Scaling
In a powerful secrecy attack, eavesdroppers can collude, i.e., they can share their observations. Securing information in such a scenario will be an even more challenging task compared to non-colluding case. We here analyze the effect of eavesdropper collusion on the achievable performance in both the path loss and ergodic multi-path fading models. We provide two results: 1) If the legitimate n...
متن کاملProving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate automated verification of a particular type of security protocols, called group protocols, in the presence of an eavesdropper, i.e., a passive attacker. The specificity of group protocols is that the number of partici...
متن کاملAgainst vaccine assay secrecy
Increasing the transparency of the evidence base behind health interventions such as pharmaceuticals, biologics, and medical devices, has become a major point of critique, conflict, and policy focus in recent years. Yet the lack of publicly available information regarding the immunogenicity assays upon which many important, widely used vaccines are based has received no attention to date. In th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC-PapersOnLine
سال: 2017
ISSN: 2405-8963
DOI: 10.1016/j.ifacol.2017.08.1563