Sökning: WFRF:(Johansson Karl Henrik 1967 )
> (2023) >
Privacy-preserving ...
Privacy-preserving set-based estimation using partially homomorphic encryption
-
- Alanwar, Amr (författare)
- Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany.
-
- Gassmann, Victor (författare)
- Tech Univ Munich, Dept Comp Engn, Munich, Germany.
-
- He, Xingkang (författare)
- KTH,Reglerteknik
-
visa fler...
-
- Said, Hazem (författare)
- Ain Shams Univ, Dept Comp Engn, Cairo, Egypt.
-
- Sandberg, Henrik (författare)
- KTH,Reglerteknik
-
- Johansson, Karl H., 1967- (författare)
- KTH,Reglerteknik
-
- Althoff, Matthias (författare)
- Tech Univ Munich, Dept Comp Engn, Munich, Germany.
-
visa färre...
-
Constructor Univ, Sch Comp Sci & Engn, Bremen, Germany Tech Univ Munich, Dept Comp Engn, Munich, Germany. (creator_code:org_t)
- Elsevier BV, 2023
- 2023
- Engelska.
-
Ingår i: European Journal of Control. - : Elsevier BV. - 0947-3580 .- 1435-5671. ; 71, s. 100786-
- Relaterad länk:
-
https://urn.kb.se/re...
-
visa fler...
-
https://doi.org/10.1...
-
visa färre...
Abstract
Ämnesord
Stäng
- The set-based estimation has gained a lot of attention due to its ability to guarantee state enclosures for safety-critical systems. However, collecting measurements from distributed sensors often requires out-sourcing the set-based operations to an aggregator node, raising many privacy concerns. To address this problem, we present set-based estimation protocols using partially homomorphic encryption that pre-serve the privacy of the measurements and sets bounding the estimates. We consider a linear discrete-time dynamical system with bounded modeling and measurement uncertainties. Sets are represented by zonotopes and constrained zonotopes as they can compactly represent high-dimensional sets and are closed under linear maps and Minkowski addition. By selectively encrypting parameters of the set repre-sentations, we establish the notion of encrypted sets and intersect sets in the encrypted domain, which enables guaranteed state estimation while ensuring privacy. In particular, we show that our protocols achieve computational privacy using the cryptographic notion of computational indistinguishability. We demonstrate the efficiency of our approach by localizing a real mobile quadcopter using ultra-wideband wireless devices.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik -- Reglerteknik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering -- Control Engineering (hsv//eng)
Nyckelord
- Set-based estimation
- Homomorphic encryption
- Zonotopes
- Constrained zonotopes
Publikations- och innehållstyp
- ref (ämneskategori)
- art (ämneskategori)
Hitta via bibliotek
Till lärosätets databas