Jamming aided Generalized Data Attacks: Exposing Vulnerabilities in Secure Estimation

被引:10
作者
Deka, Deepjyoti [1 ]
Baldick, Ross [1 ]
Vishwanath, Sriram [1 ]
机构
[1] Univ Texas Austin, Dept Elect & Comp Engn, Austin, TX 78712 USA
来源
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016) | 2016年
关键词
D O I
10.1109/HICSS.2016.319
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Jamming refers to the deletion, corruption or damage of meter measurements that prevents their further usage. This is distinct from adversarial data injection that changes meter readings while preserving their utility in state estimation. This paper presents a generalized attack regime that uses jamming of secure and insecure measurements to greatly expand the scope of common 'hidden' and 'detectable' data injection attacks in literature. For 'hidden' attacks, it is shown that with jamming, the optimal attack is given by the minimum feasible cut in a specific weighted graph. More importantly, for 'detectable' data attacks, this paper shows that the entire range of relative costs for adversarial jamming and data injection can be divided into three separate regions, with distinct graph-cut based constructions for the optimal attack. Approximate algorithms for attack design are developed and their performances are demonstrated by simulations on IEEE test cases. Further, it is proved that prevention of such attacks require security of all grid measurements. This work comprehensively quantifies the dual adversarial benefits of jamming: (a) reduced attack cost and (b) increased resilience to secure measurements, that strengthen the potency of data attacks.
引用
收藏
页码:2556 / U1000
页数:11
相关论文
共 27 条
[1]  
ABUR A, 2000, POWER SYSTEM STATE E
[2]  
[Anonymous], 2013, IEEE T AUTOMATIC CON
[3]  
[Anonymous], P ACM C COMP COMM SE
[4]  
[Anonymous], 2012, INT J CRITICAL INFRA
[5]  
[Anonymous], 2010, 44 ANN C INF SCI SYS
[6]  
[Anonymous], 1979, Computers and Intractablity: A Guide to the Theory of NP-Completeness
[7]  
[Anonymous], 2007, STAGED CYBER ATTACK
[8]  
[Anonymous], STATE ESTIMATION ELE
[9]  
Boyd S, 2004, CONVEX OPTIMIZATION
[10]  
Christie R., 1999, POWER SYSTEM TEST AR