Encryption scheduling for remote state estimation under an operation constraint
In remote state estimation, data transmitted by a sensor through a wireless communication channel may be overheard by an eavesdropper. One possible way to avoid information leakage is to encrypt the transmitted data all the time. However, this may impose an extra operation energy burden on the senso...
Saved in:
Main Authors: | Huang, Lingying, Ding, Kemi, Leong, Alex S., Quevedo, Daniel E., Shi, Ling |
---|---|
Other Authors: | School of Electrical and Electronic Engineering |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/159355 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Sequence aware functional encryption and its application in searchable encryption
by: PHUONG, Tran Viet Xuan, et al.
Published: (2017) -
Authenticable data analytics over encrypted data in the cloud
by: CHEN, Lanxing, et al.
Published: (2023) -
Encrypted data processing with Homomorphic Re-Encryption
by: DING, Wenxiu, et al.
Published: (2017) -
A survey on searchable symmetric encryption
by: LI, Feng, et al.
Published: (2024) -
A privacy-preserving outsourced functional computation framework across large-scale multiple encrypted domains
by: LIU, Ximeng, et al.
Published: (2016)