4.1 Article

Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization

Journal

IEEE CONTROL SYSTEMS LETTERS
Volume 7, Issue -, Pages 395-400

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LCSYS.2022.3188944

Keywords

Formation control; Sensors; Aerospace electronics; Tail; Real-time systems; Quantization (signal); Homomorphic encryption; Networked control systems; quantized systems; agents-based systems

Funding

  1. Project SMARTAGENTS of the Research Programme Smart Industry - Dutch Research Council (NWO) [18024]

Ask authors/readers for more resources

Recent developments in communication technologies and computing paradigms have provided further possibilities for real-time networked control systems. However, privacy and cyber-security concerns arise when sharing private data. This paper presents a secure version of distributed formation control using fully homomorphic encryption and a mixed quantizer, and analyzes its stability.
Recent developments in communication technologies, such as 5G, together with innovative computing paradigms, such as edge computing, provide further possibilities for the implementation of real-time networked control systems. However, privacy and cyber-security concerns arise when sharing private data between sensors, agents and a third-party computing facility. In this letter, a secure version of the distributed formation control is presented, analyzed and simulated, where gradient-based formation control law is implemented in the edge, with sensor and actuator information being secured by fully homomorphic encryption method based on learning with error (FHE-LWE) combined with a proposed mixed uniform-logarithmic quantizer (MULQ). The novel quantizer is shown to be suitable for realizing secure control systems with FHE-LWE where the critical real-time information can be quantized into a prescribed bounded space of plaintext while satisfying a sector bound condition whose lower and upper-bound can be made sufficiently close to an identity. An absolute stability analysis is presented, that shows the asymptotic stability of the closed-loop secure control system.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.1
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available