Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

Drohne Show image information
Show image information
Labor Show image information
Show image information
Show image information
Labor Show image information
Show image information

Drohne

Photo: Uni Paderborn

Photo: Besim Mazhiqi

Labor

Photo: Marcus Hund

Photo: Uni Paderborn

Photo: Marcus Hund

Labor

Photo: Marcus Hund

Photo: Marcus Hund

Security in cyber-physical systems

Due to the broadcast nature of wireless communications, and with the ever increasing amounts of data being transmitted wirelessly, the issue of security from eavesdroppers and malicious attackers has become increasingly important. Two basic problems can be considered. In the case of an eavesdropper, Alice would like to transmit to Bob, but without revealing much information to the eavesdropper Eve.
In the case of a malicious attacker, Alice would again like to transmit to Bob, but now an attacker Dave can disrupt the communications, e.g. by modifying the data or injecting false data.

Information security has traditionally been studied in the context of cryptography. However, due to increased computational power available to adversaries, alternative and complementary ways of implementing security such as using information theoretic and physical layer techniques, have also recently gained attention.

Our work in this area focuses on cyber-security in the context of remote estimation and control of dynamical systems. Major lines of research include:
1. We have used game theoretic techniques to analyze optimal strategies for remote state estimation in the presence of malicious attackers.
2. In the context of remote state estimation, we have investigated alternative ways to implement security using physical layer security techniques, such as the use of artificial noise and transmission scheduling.
3. We have investigated the application of control in (potentially) insecure environments such as clouds or networked systems, with focus on secure implementations of controllers using techniques from cryptography such as homomorphic encryption.

Selected Publications

Y. Li, D. E. Quevedo, S. Dey and L. Shi, "SINR-based DoS Attack on Remote State Estimation: A Game-theoretic Approach", IEEE Transactions on Control of Network Systems, vol. 4, no. 3, Sep. 2017

K. Ding, Y. Li, D. E. Quevedo, S. Dey and L. Shi, "A Multi-Channel Transmission Schedule for Remote State Estimation under DoS Attacks", Automatica, vol. 78, pp. 194-201, 2017

A. S. Leong, D. E. Quevedo, D. Dolz, and S. Dey, "Transmission Scheduling for Remote State Estimation Over Packet Dropping Links in the Presence of an Eavesdropper", IEEE Transactions on Automatic Control, to be published

A. S. Leong, D. E. Quevedo, D. Dolz, and S. Dey, "Information Bounds for State Estimation in the Presence of an Eavesdropper", IEEE Control Systems Letters, vol. 3, no. 3, pp. 547-552, Jul. 2019

M. Schulze Darup, A. Redder, I. Shames, F. Farokhi, and D. E. Quevedo, "Towards encrypted MPC for linear constrained systems", IEEE Control System Letters, vol. 2, no. 2, pp. 195-200, Apr. 2018

M. Schulze Darup, A. Redder, and D. E. Quevedo, "Encrypted Cooperative Control Based on Structured Feedback", IEEE Control System Letters, vol. 3, no. 1, pp. 37-42, Jan. 2019

 

The University for the Information Society