Loading...

Event-triggered Strategies in Encrypted Control Systems

Ghanei, Hannah | 2023

43 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 56531 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Tavazoei, Mohammad Saleh
  7. Abstract:
  8. Event-triggered control is used in various systems because of its capacity to optimize resources, improve responsiveness, and increase efficiency. Unlike the old time-based approaches, event-based control executes the necessary actions only when certain events or conditions occur, leading to the desired response. This strategy is used in scenarios where events occur irregularly, or are difficult to predict, and allows the system to conserve resources by maintaining the current state until the control signal needs to be updated. An event-triggered control strategy implemented using a secret sharing scheme enhances security across multiple systems; Especially in scenarios where sensitive information is accessed, or actions are implemented based on specific events. In this approach, essential information is shared using a secret sharing scheme, then these shares are distributed among multiple servers. It is also necessary for a predefined number of servers to work together to reconstruct the master secret. This ensures that no single entity has complete information and reduces the risk of unauthorized access or malicious exploitation. In this system, when an event triggers the need to access a secret or perform a controlled action, a certain threshold of participants must cooperate to reconstruct the secret. This approach increases privacy. Additionally, the event-triggered nature of the strategy ensures that access to sensitive information only occurs in response to legitimate triggers, minimizing the likelihood of an attack. By combining event-triggered control with a secret sharing scheme, a secure framework is created that protects essential operations and sensitive data in various applications such as secure communications, access control, and distributed systems
  9. Keywords:
  10. Event-Triggered Control ; Secret Sharing Scheme ; Secure Control ; Encrypted Control Systems ; Resource Optimization

 Digital Object List

 Bookmark

No TOC