0% Complete
صفحه اصلی
/
سی و یکمین کنفرانس بین المللی مهندسی برق
Secure Control System Using Iterative Secret Sharing
نویسندگان :
Younes Esmaeili
1
Mohammad Haeri
2
Saeed Adelipour
3
1- Sharif university of technology
2- Sharif university of technology
3- Sharif university of technology
کلمات کلیدی :
Secret sharing،Privacy-preserving control systems،Encrypted control،Distributed computations،Measurement noise attenuation
چکیده :
Using the public network for distributed computations compromises the immunity of control loops to cyberattacks such as data manipulation and eavesdropping. These risks have forced control system engineers to find solutions to protect control systems against these dangers. Encrypted control studies these dangers and tries to propose new modified control systems to increase the immunity of the control systems. Secret sharing is one of the tools used in the encrypted control field. In this paper, we modify this tool to propose an algorithm to design a secure control system. This scheme while guarantees the security of the control systems, can attenuate the measurement noise as well. To achieve resilience against measurement noise, we can iteratively use secret sharing while adding white noise with suitable variance to the shares of our data. Increased security, secure distributed computation, and measurement noise attenuation are some of the results of using this control system scheme compared to the conventional control systems.
لیست مقالات
لیست مقالات بایگانی شده
Blind angle and angular range detection in planar and limited-view geometries for photoacoustic tomography
Soheil Hakakzadeh - Zahra Kavehvash
Optimization and Analysis of Transformer Hot Spot Temperature Under Harmonic Conditions with Different Windings
Mehran Nemati - Hamed Karimi - Alireza Siadatan - Maryam Sepehrinour
شبیه سازی یک حسگر با استفاده از یک میکرو تشدیدگر اویلری
مریم دهقانیان - محسن حاتمی
Flexible Generation Expansion Planning Considering Representative Days of Load and Renewable Variations
Peyman Amirian - Zeinab Maleki - Mohammad-Amin Pourmoosavi - Turaj Amraee
ارزیابی عملی قابلیت مکانیابی عیب تخلیه جزئی در ترانسفورماتورهای قدرت با استفاده از روش تابع تبدیل سیم پیچ
حسن رضا میرزائی - علیرضا میرزائی - کریم میرعلیخانی
Transformer-Based Unsupervised Image Registration using SSIM and Homography Loss for Steady Camera and Aerial Videos
Golnoosh Abdollahinejad - Matin Hashemi
Finite-Time Bipartite Time-Varying Formation tracking for Heterogeneous Nonlinear Multi-Agent Systems
Mohammad Reza Mehrabi Koushki - Javad Askari - Marzieh Kamali
Sensitive RSNs to Schizophrenia; A graph parameter approach
Shirin Karimian - Farzaneh Keyvanfard - Abbas Nasiraei Moghaddam
A Simple Method for Continuous Beam-Steering in SIW based Leaky Wave Antenna
Sina Rezaeeahvanouee - AmirHossein Sadough
An Autonomous Multi Agent Q-Learning Approach for Resource Allocation in D2D-Enabled Heterogeneous Networks
Pouya Akhoundzadeh - Ghasem Mirjalily - Mohammad taghi Saadeghi
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.5.3