TY - JOUR
T1 - Distributed Anti-Eavesdropping Fusion Estimation
T2 - A Linear Encryption-Decryption Scheme
AU - Niu, Mu
AU - Fu, Xingquan
AU - Zhou, Jialing
AU - Wen, Guanghui
N1 - Publisher Copyright:
© 2025 John Wiley & Sons Ltd.
PY - 2025
Y1 - 2025
N2 - This paper addresses the issue of privacy protection in distributed fusion estimation. Due to the inherent vulnerabilities of wireless transmission, malicious eavesdropping may enable unauthorized access to data transmitted from local sensors to legitimate users, consequently leading to the potential leakage of sensitive information. To mitigate this risk, a new kind of distributed fusion estimator design method is proposed, which incorporates privacy protection through a linear encryption mechanism. Within the design, the optimal fusion estimator is derived based on the minimum mean square error criterion. By strategically designing the encryption parameters, the estimation error covariance matrix for legitimate users is guaranteed to remain bounded, while the error metrics for eavesdroppers diverge, thereby effectively mitigating the risk of eavesdropping attacks. Finally, a trajectory-tracking simulation is conducted to illustrate the effectiveness of the proposed distributed fusion estimator.
AB - This paper addresses the issue of privacy protection in distributed fusion estimation. Due to the inherent vulnerabilities of wireless transmission, malicious eavesdropping may enable unauthorized access to data transmitted from local sensors to legitimate users, consequently leading to the potential leakage of sensitive information. To mitigate this risk, a new kind of distributed fusion estimator design method is proposed, which incorporates privacy protection through a linear encryption mechanism. Within the design, the optimal fusion estimator is derived based on the minimum mean square error criterion. By strategically designing the encryption parameters, the estimation error covariance matrix for legitimate users is guaranteed to remain bounded, while the error metrics for eavesdroppers diverge, thereby effectively mitigating the risk of eavesdropping attacks. Finally, a trajectory-tracking simulation is conducted to illustrate the effectiveness of the proposed distributed fusion estimator.
KW - distributed fusion estimation
KW - eavesdropping attack
KW - encryption-decryption scheme
KW - privacy protection
UR - https://www.scopus.com/pages/publications/105012969189
U2 - 10.1002/rnc.70145
DO - 10.1002/rnc.70145
M3 - Article
AN - SCOPUS:105012969189
SN - 1049-8923
JO - International Journal of Robust and Nonlinear Control
JF - International Journal of Robust and Nonlinear Control
ER -