The problem of remote state estimation in the presence of eavesdroppers has recently been investigated in the literature. For unstable systems it has been shown that one can keep the expected estimation error covariance bounded, while the expected eavesdropper error covariance becomes unbounded in the infinite horizon, using schemes based on transmission scheduling. In this paper we consider an alternative approach to achieve security, namely injecting noise into sensor transmissions, similar to the artificial noise technique used in physical layer security for wireless communications. Numerical results demonstrate significant performance improvements using this approach, with respect to the trade-off between the expected estimati...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
In this article, a new relay-aided secure communication system is investigated, where a transmitter ...
The problem of remote state estimation in the presence of eavesdroppers has recently been investiga...
In this chapter, we study a remote state estimation problem in the presence of an eavesdropper. A se...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesd...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies a remote state estimation problem in the presence of an eavesdropper. A sensor tr...
We consider a secure remote state estimation problem where the observations transmitted from the sen...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
Remote state estimation problems in the presence of an eavesdropper have recently been studied. In ...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
In this article, a new relay-aided secure communication system is investigated, where a transmitter ...
The problem of remote state estimation in the presence of eavesdroppers has recently been investiga...
In this chapter, we study a remote state estimation problem in the presence of an eavesdropper. A se...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
Remote state estimation problems in the presence of eavesdroppers have recently been investigated in...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesd...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
This paper studies a remote state estimation problem in the presence of an eavesdropper. A sensor tr...
We consider a secure remote state estimation problem where the observations transmitted from the sen...
We study the problem of remote state estimation in the presence of an eavesdropper. A sensor transmi...
Remote state estimation problems in the presence of an eavesdropper have recently been studied. In ...
This paper studies transmission scheduling for remote state estimation in the presence of an eavesdr...
We study the problem of remote state estimation in the presence of a passive eavesdropper, under the...
We study the maximum information gain that an adversary may obtain through hacking without being det...
We consider remote state estimation in the presence of an active eavesdropper. A sensor forward loca...
In this article, a new relay-aided secure communication system is investigated, where a transmitter ...