Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the...

28
Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and Communication Theory in Control Systems, TUM, May 2017 Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 1 / 28

Transcript of Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the...

Page 1: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Remote State Estimation in the Presence of anEavesdropper

Alex Leong

Paderborn University

Workshop on Information and Communication Theoryin Control Systems, TUM, May 2017

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 1 / 28

Page 2: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

A lot of data is transmitted wirelessly nowadaysIn wireless transmission, other people in the vicinity can oftenoverhear youThe need to protect data from eavesdroppers has becomeincreasingly important

Alice Bob

Eve

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 2 / 28

Page 3: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Introduction

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 3 / 28

Page 4: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Introduction

Introduction

Information security traditionally studied in the context ofcryptographyHowever:

I Wireless devices have limited computational power, may not beable to implement strong encryption

I Malicious agents have increasingly powerful computationalcapabilities

I Security on some devices poorly implemented

Recent interest in alternative and complementary ways toimplement security using information theoretic and physical layertechniques1

1“Special Issue on Secure Communications via Physical-Layer andInformation-Theoretic Techniques”, Proc. IEEE, Oct. 2015

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 4 / 28

Page 5: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Introduction

Introduction

Information theoretic security – dates back to the work of ClaudeShannon in the 1940sA communication system is regarded as secure in informationtheoretic sense if the mutual information between originalmessage and what eavesdropper receives is either zero or goesto zero as the coding blocklength increasesPhysical layer security – ways to implement information theoreticsecurity using physical layer characteristics of the wirelesschannel,2 e.g. fading, interference, noiseHere interested in security in estimation and control

2Zhou, Song, Zhang, “Physical Layer Security in Wireless Communications”, 2014Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 5 / 28

Page 6: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Introduction

Introduction (Related Work)

Some previous work on estimation problems with eavesdroppersMinimize average mean squared error (MSE) at receiver whilekeeping MSE at eavesdropper above a certain level3 4 5

These works deal with estimation of either constants or i.i.d.sourcesCurrent work – State estimation of dynamical systems in thepresence of an eavesdropper

3Aysal, Barner, IEEE Trans. Inf. Forensics Security, 20084Reboredo, Xavier, Rodrigues, IEEE Trans. Signal Process., 20135Guo, Leong, Dey, IEEE Trans. Aerosp. Electron. Syst., 2017

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 6 / 28

Page 7: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Introduction

Introduction (Related Work)

Our work deals with passive attacks from eavesdroppersEstimation and control problems in the presence of active attacksalso studied6 7 8 9

6Fawzi, Tabuada, Diggavi, IEEE Trans. Autom. Control, 20147Teixeira, Shames, Sandberg, Johansson, Automatica, 20158Mo, Sinopoli, IEEE Trans. Autom. Control, 20159Li, Quevedo, Dey, Shi, IEEE Trans. Control Netw. Syst., 2017

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 7 / 28

Page 8: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

System Model

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 8 / 28

Page 9: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

System Model

System Model

RemoteEstimator

SensorSystem

Eavesdropper

Feedback

Process: xk+1 = Axk + wk

Sensor measurements: yk = Cxk + vk

Sensor runs local Kalman filter to compute local estimates x̂sk |k

Local estimates sent to remote estimatorTransmit decisions: νk = 1 if x̂s

k |k is to be transmitted to remoteestimator at time k , νk = 0 otherwiseνk computed at the remote estimator and fed back to the sensor

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 9 / 28

Page 10: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

System Model

System Model

RemoteEstimator

SensorSystem

Eavesdropper

Feedback

Transmissions occur over random packet dropping linksPacket drops modelled by i.i.d. Bernoulli process {γk}, withpacket reception probability P(γk = 1) = λ.Sensor transmissions can be overheard by eavesdropper overanother packet dropping link: γe,k = 1 if sensor transmissionoverheard by eavesdropper, γe,k = 0 otherwiseAssume {γe,k} is i.i.d. Bernoulli process with eavesdroppingprobability P(γe,k = 1) = λe.

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 10 / 28

Page 11: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

System Model

System ModelAt remote estimator:

x̂k |k =

{Ax̂k−1|k−1 , νkγk = 0

x̂sk |k , νkγk = 1

Pk |k =

{f (Pk−1|k−1) , νkγk = 0

P̄ , νkγk = 1

where f (X ) , AXAT + QAt eavesdropper:

x̂e,k |k =

{Ax̂e,k−1|k−1 , νkγe,k = 0

x̂sk |k , νkγe,k = 1

Pe,k |k =

{f (Pe,k−1|k−1) , νkγe,k = 0

P̄ , νkγe,k = 1

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 11 / 28

Page 12: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Optimal Transmission Scheduling

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 12 / 28

Page 13: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Optimal Transmission Scheduling

Optimal Transmission Scheduling

Approach to security - keep expected error covariance ateavesdropper above a certain levelFormulate a finite horizon problem that minimizes a linearcombination of expected estimation error covariance and negativeof expected eavesdropper error covariance

min{νk}

K∑k=1

E[βtrPk |k − (1− β)trPe,k |k ]

β ∈ (0,1) controls the trade-off between estimation performanceat remote estimator and eavesdropperCan consider cases where transmission decisions νk depend on(Pk−1|k−1,Pe,k−1|k−1), or only on Pk−1|k−1

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 13 / 28

Page 14: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Optimal Transmission Scheduling

Structural Properties of Optimal Schedule

Theorem (νk depends on (Pk−1|k−1,Pe,k−1|k−1))

(i) For fixed Pe,k−1|k−1, the optimal ν∗k is a threshold policy on Pk−1|k−1of the form

ν∗k (Pk−1|k−1,Pe,k−1|k−1) =

{0 , if Pk−1|k−1 ≤ P∗k1 , otherwise

where the threshold P∗k depends on k and Pe,k−1|k−1.(ii) For fixed Pk−1|k−1, the optimal ν∗k is a threshold policy on Pe,k−1|k−1of the form

ν∗k (Pk−1|k−1,Pe,k−1|k−1) =

{0 , if Pe,k−1|k−1 ≥ P∗e,k1 , otherwise

where the threshold P∗e,k depends on k and Pk−1|k−1.

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 14 / 28

Page 15: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Optimal Transmission Scheduling

Structural Properties of Optimal Schedule

0 1 2 3 4 5 6 7 8 9

Pk-1|k-1

0

1

2

3

4

5

6

7

8

9P

e,k

-1|k

-1ν

k

*=1

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 15 / 28

Page 16: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Infinite Horizon

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 16 / 28

Page 17: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Infinite Horizon

Infinite Horizon

For unstable systems, we can drive the expected eavesdroppererror covariance unbounded, while keeping expected estimationerror covariance bounded

Theorem

Suppose that A is unstable, and that λ > 1− 1|σmax(A)|2 . Then for any

λe < 1, there exist transmission policies in the infinite horizon situationsuch that lim supK→∞

1K∑K

k=1 trE[Pk |k ] is bounded andlim infK→∞

1K∑K

k=1 trE[Pe,k |k ] is unbounded.

Similar results obtained:I for sufficiently large coding blocklength10

I for no feedback,11 but need λe < λ

10Wiese, Johansson et al. Proc. CDC, 201611Tsiamis, Gatsis, Pappas, Proc. IFAC World Congress, 2017

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 17 / 28

Page 18: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Infinite Horizon

Infinite Horizon

Idea of proof: Construct a policy with the required properties.Turns out that a threshold policy on P, when the threshold issufficiently large, will work. Specifically, transmit if and only ifPk−1|k−1 ≥ f t (P̄), with t large enough that

λe < 1− 1λ|σmax(A)|2(t+1)

is satisfied, has the required propertiesConstructed policy does not require knowledge of Pe

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 18 / 28

Page 19: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

An Alternative Measure of Security

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 19 / 28

Page 20: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

An Alternative Measure of Security

An Alternative Measure of Security

So far, security considered from viewpoint of trying to keepeavesdropper error covariance above a certain levelAn alternative of measure of security – restrict the amount ofinformation revealed to the eavesdropper, in particular the sum ofconditional mutual informations or directed informationConditional mutual information Ie,k , I(xk ; ze,k |ze,0, . . . , ze,k−1) canbe expressed as

Ie,k =12

log det Pe,k |k−1 −12

log det Pe,k |k

=12

log det f (Pe,k−1|k−1)− 12

log det Pe,k |k

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 20 / 28

Page 21: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

An Alternative Measure of Security

An Alternative Measure of Security

Transmission scheduling problem

min{νk}

K∑k=1

E[βtrPk |k + (1− β)Ie,k ]

Minimize combination of expected estimation error covariance andexpected information revealed to eavesdropperSimilar structural results on optimal transmission schedule can bederived

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 21 / 28

Page 22: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

An Alternative Measure of Security

An Alternative Measure of SecurityFor infinite horizon and unstable systems, expected informationrevealed to eavesdropper cannot be driven to zero

Theorem

Let A be an unstable matrix, and assume that λe > 0. Then, for anytransmission policy satisfying

lim supK→∞

1K

K∑k=1

E[Pk |k ] <∞,

one must have

lim infK→∞

1K

K∑k=1

E[Ie,k ] > ε

for some ε > 0 dependent only on λe,A,Q, P̄.

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 22 / 28

Page 23: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Numerical Studies

Outline

1 Introduction

2 System Model

3 Optimal Transmission Scheduling

4 Infinite Horizon

5 An Alternative Measure of Security

6 Numerical Studies

7 Conclusion

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 23 / 28

Page 24: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Numerical Studies

Numerical Studies

Parameters A =

[1.2 0.20.3 0.8

], C =

[1 1

], Q = I, R = 1

Finite horizon, λ = 0.6, λe = 0.6, K = 10, different values of β

4 6 8 10 12 14 16 18 20 22

tr E[Pk|k

]

0

5

10

15

20

25

30

35

40

45

50

tr E

[Pe,k

|k]

eavesdropper covariance known

eavesdropper covariance unknown

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 24 / 28

Page 25: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Numerical Studies

Numerical Studies

Infinite horizon, λ = 0.6, λe = 0.8, simulation over 100000 time steps

1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6

t

100

101

102

103

104

105

106

107

tr E[Pe,k|k

]

tr E[Pk|k

]

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 25 / 28

Page 26: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Numerical Studies

Numerical Studies

Infinite horizon. Alternative measure of security

0 20 40 60 80 100 120 140 160 180 200

tr E[Pk|k

]

0

0.1

0.2

0.3

0.4

0.5

0.6

E[I

e,k]

eavesdropper covariance knowneavesdropper covariance unknown

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 26 / 28

Page 27: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Conclusion

Conclusion

We have studied remote state estimation problems in thepresence of an eavesdropperDerived structural results on optimal transmission schedulingIn infinite horizon

I Can make eavesdropper error covariance unbounded whileestimation error covariance remains bounded

I Non-zero amount of information revealed to eavesdropper in orderto keep estimation error covariance bounded

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 27 / 28

Page 28: Remote State Estimation in the Presence of an Eavesdropper · Remote State Estimation in the Presence of an Eavesdropper Alex Leong Paderborn University Workshop on Information and

Conclusion

Open Questions

Infinite horizon – find optimal transmission policy which minimizesexpected error covariance s.t. expected eavesdropper covariancebeing unboundedAlternative notions of security, e.g. secrecy outage probabilityControl in the presence of an eavesdropperPerformance improvements using coding and physical layersecurity techniques

Alex Leong (Paderborn University) State Estimation with an Eavesdropper TUM, May 2017 28 / 28