Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Estimation for Unstable Systems
KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Automatic Control. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Information Science and Engineering. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
KTH, School of Electrical Engineering (EES), Network and Systems engineering. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
Show others and affiliations
2016 (English)In: 2016 IEEE 55th Conference on Decision and Control, CDC 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016, 5059-5064 p., 7799043Conference paper (Refereed)
Abstract [en]

We assume that the states of an unstable dynamical system are encoded and sent to an estimator through an uncertain channel, which is a channel disturbing its inputs in a nonstochastic manner. The encoder's codeword is also fed into another uncertain channel, at whose output an eavesdropper is listening. The estimator should obtain a uniformly bounded system state estimation error, whereas the eavesdropper's information about the system states should be subject to a security constraint. We find a condition on the relation between the uncertain channel from encoder to estimator and the uncertain channel from encoder to eavesdropper which if satisfied allows for at least one of the two following security criteria to hold: The volume of the set of states possible acccording to the eavesdropper's information tends to infinity at exponential speed-by itself (strong security) or if divided by the volume of the set of states possible according to the estimator's information (weak security).

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2016. 5059-5064 p., 7799043
Series
IEEE Conference on Decision and Control, ISSN 0743-1546
National Category
Signal Processing Control Engineering
Identifiers
URN: urn:nbn:se:kth:diva-208568DOI: 10.1109/CDC.2016.7799043ISI: 000400048105042ScopusID: 2-s2.0-85010720908ISBN: 978-1-5090-1837-6 OAI: oai:DiVA.org:kth-208568DiVA: diva2:1109706
Conference
55th IEEE Conference on Decision and Control, CDC 2016, ARIA Resort and Casino, Las Vegas, United States, 12 December 2016 through 14 December 2016
Note

QC 20170614

Available from: 2017-06-14 Created: 2017-06-14 Last updated: 2017-06-14Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Wiese, MoritzJohansson, Karl HenrikOechtering, Tobias J.Papadimitratos, PanosSandberg, HenrikSkoglund, Mikael
By organisation
ACCESS Linnaeus CentreAutomatic ControlInformation Science and EngineeringNetwork and Systems engineering
Signal ProcessingControl Engineering

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 1 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf