LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

System Identification under Information Security

Photo from wikipedia

Abstract There are important information security problems for system identification, which have not been paid attention to and well studied. In this paper, we discuss the security problem of input… Click to show full abstract

Abstract There are important information security problems for system identification, which have not been paid attention to and well studied. In this paper, we discuss the security problem of input information according to a class of system identification problems, and present security protocols in the sense of cryptography. It is ensured that the input information is not leaked during solving the identification problem, which can deal with passive attacks effectively. In addition, a quantitative relationship between the input information and the number of participants is given in this paper. The simulation results show that, in the range of allowed errors, the identification algorithm with the security protocol achieves the estimation accuracy. Moreover, the corresponding time complexity increases comparing with the original identification algorithm.

Keywords: system identification; information; information security; security

Journal Title: IFAC-PapersOnLine
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.