4.7 Article

Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation

Journal

IEEE TRANSACTIONS ON SMART GRID
Volume 14, Issue 4, Pages 3189-3200

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSG.2023.3236785

Keywords

Data injection attack; information-theoretic stealth attacks; statistical learning; random matrix theory; ergodic performance; variance of performance

Ask authors/readers for more resources

Information-theoretic stealth attacks are data injection attacks that aim to minimize information acquired by the operator and control the probability of detection. For Gaussian distributed state variables, attack construction requires knowledge of second order statistics estimated from past realizations. An analysis of the amount of data required for attack construction and performance is studied within this framework using sample covariance matrices and asymptotic random matrix theory tools. Ergodic performance and variance bounds are evaluated through simulations on IEEE test systems.
Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of attack detection. For Gaussian distributed state variables, attack construction requires knowledge of the second order statistics of the state variables, which is estimated from a finite number of past realizations using a sample covariance matrix. Within this framework, the attack performance is studied for the attack construction with the sample covariance matrix. This results in an analysis of the amount of data required to learn the covariance matrix of the state variables used on the attack construction. The ergodic attack performance is characterized using asymptotic random matrix theory tools and the variance of the attack performance is bounded. The ergodic performance and the variance bounds are assessed with simulations on IEEE test systems.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available