2015 American Control Conference (ACC) 2015
DOI: 10.1109/acc.2015.7170762
|View full text |Cite
|
Sign up to set email alerts
|

On confidentiality preserving monitoring of linear dynamic networks against inference attacks

Abstract: Distributed information sharing in dynamic networks is ubiquitous. It raises the concern that confidential information of dynamic networks could be leaked to malicious entities and further exploited in direct attacks. In this paper, we formulate the problem of competitive confidentiality preserving monitoring of linear dynamic networks against inference attacks. We show that the unstructured 0 minimization is NPhard. We then provide a SDP equivalence for the structured 2 minimization.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…A preliminary version of this paper is presented in (Zhu and Lu, 2015). Compared with (Zhu and Lu, 2015), in the current paper, the privacy definition is refined; a thorough analysis of computational complexity is provided; the relaxation for the 0 minimization problem is developed; the 2 minimization is extended to allow for general rank deficiency constraints; a case study on an HVAC system is provided.…”
Section: Introductionmentioning
confidence: 99%
“…A preliminary version of this paper is presented in (Zhu and Lu, 2015). Compared with (Zhu and Lu, 2015), in the current paper, the privacy definition is refined; a thorough analysis of computational complexity is provided; the relaxation for the 0 minimization problem is developed; the 2 minimization is extended to allow for general rank deficiency constraints; a case study on an HVAC system is provided.…”
Section: Introductionmentioning
confidence: 99%