Skip to main content

Showing 1–19 of 19 results for author: Esnaola, I

Searching in archive eess. Search in all archives.
.
  1. arXiv:2211.02538  [pdf, other

    eess.SY

    An information theoretic vulnerability metric for data integrity attacks on smart grids

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

    Comments: 7 pages, 10 figures, submitted to IET Smart Grid. arXiv admin note: substantial text overlap with arXiv:2207.06973

  2. arXiv:2207.06973  [pdf, ps, other

    eess.SY

    Power Injection Measurements are more Vulnerable to Data Integrity Attacks than Power Flow Measurements

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: A novel metric that describes the vulnerability of the measurements in power system to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of… ▽ More

    Submitted 14 July, 2022; originally announced July 2022.

    Comments: 6 pages, 9 figures, Submitted to IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids

  3. arXiv:2201.00065  [pdf, ps, other

    eess.SY

    Stealth Data Injection Attacks with Sparsity Constraints

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution o… ▽ More

    Submitted 23 July, 2022; v1 submitted 31 December, 2021; originally announced January 2022.

    Comments: 10 pages, 6 figures, submited to IEEE Trans. Smart Grid

  4. arXiv:2112.14698  [pdf, other

    cs.IT eess.SP eess.SY

    Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation

    Authors: Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor

    Abstract: Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distribut… ▽ More

    Submitted 11 January, 2023; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: accepted by IEEE Transactions on Smart Grid

  5. arXiv:2102.01925  [pdf, other

    eess.SY

    Data-Injection Attacks

    Authors: Iñaki Esnaola, Samir M. Perlaza, Ke Sun

    Abstract: In this chapter we review some of the basic attack constructions that exploit a stochastic description of the state variables. We pose the state estimation problem in a Bayesian setting and cast the bad data detection procedure as a Bayesian hypothesis testing problem. This revised detection framework provides the benchmark for the attack detection problem that limits the achievable attack disrupt… ▽ More

    Submitted 3 February, 2021; originally announced February 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1808.04184

    Journal ref: Chapter 9 of: Advanced Data Analytics for Power Systems, A. Tajer, S. M. Perlaza and H. V. Poor, Eds., Cambridge University Press, Cambridge, UK, 2021, pp. 197-229

  6. Covariance Estimation from Compressive Data Partitions using a Projected Gradient-based Algorithm

    Authors: Jonathan Monsalve, Juan Ramirez, Iñaki Esnaola, Henry Arguello

    Abstract: Compressive covariance estimation has arisen as a class of techniques whose aim is to obtain second-order statistics of stochastic processes from compressive measurements. Recently, these methods have been used in various image processing and communications applications, including denoising, spectrum sensing, and compression. Notice that estimating the covariance matrix from compressive samples le… ▽ More

    Submitted 15 February, 2022; v1 submitted 11 January, 2021; originally announced January 2021.

    Comments: submitted to IEEE Transactions on Image Processing

  7. arXiv:2007.02764  [pdf, ps, other

    eess.SY

    Information Theoretic Data Injection Attacks with Sparsity Constraints

    Authors: Xiuzhen Ye, Iñaki Esnaola, Samir M. Perlaza, Robert F. Harrison

    Abstract: Information theoretic sparse attacks that minimize simultaneously the information obtained by the operator and the probability of detection are studied in a Bayesian state estimation setting. The attack construction is formulated as an optimization problem that aims to minimize the mutual information between the state variables and the observations while guaranteeing the stealth of the attack. Ste… ▽ More

    Submitted 15 July, 2022; v1 submitted 6 July, 2020; originally announced July 2020.

    Comments: 6 pages, 3 figures, published in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm)

  8. arXiv:1911.10823  [pdf, other

    eess.SY

    Optimal Model-Based Sensor Placement & Adaptive Monitoring Of An Oil Spill

    Authors: Zak Hodgson, Inaki Esnaola, Bryn Jones

    Abstract: This paper presents a model based adaptive monitoring method for the estimation of flow tracers, with application to map**, prediction and observation of oil spills in the immediate aftermath of an incident. Autonomous agents are guided to optimal sensing locations via the solution of a PDE constrained optimisation problem, obtained using the adjoint method. The proposed method employs a dynamic… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: Pre-print for IFACC 2020

  9. arXiv:1911.08148  [pdf, other

    eess.SY

    Denial of Service Attacks on Control Systems with Packet Loss

    Authors: William Casbolt, Iñaki Esnaola, Bryn Jones

    Abstract: The performance of control systems with packet loss as a result of an attack over the actuation communication channel is analysed. The operator is assumed to monitor the state of the channel by measuring the average number of packet losses and an attack detection criteria is established based on the statistic. The performance of the attacker is measured in terms of the increase of the linear quadr… ▽ More

    Submitted 15 May, 2020; v1 submitted 19 November, 2019; originally announced November 2019.

    Comments: Submitted to IFAC 2020

  10. arXiv:1911.07548  [pdf, other

    eess.SY

    Optimal Control over Multiple Input Lossy Channels

    Authors: William Casbolt, Bryn Jones, Iñaki Esnaola

    Abstract: The performance of control systems with input packet losses on the controller to plant communication channel is analysed. The main contribution of this work is a proof that linear optimal control systems operating with UDP-like communication protocols have a larger quadratic cost than the same systems operating with TCP-like protocols. The proof is derived for the general case of multidimensional… ▽ More

    Submitted 6 May, 2021; v1 submitted 18 November, 2019; originally announced November 2019.

    Comments: To be submitted

  11. arXiv:1910.12658  [pdf, other

    eess.SY physics.ao-ph

    A combined ocean and oil model for model-based adaptive monitoring

    Authors: Zak Hodgson, David Browne, Inaki Esnaola, Bryn Jones

    Abstract: This paper presents a combined ocean and oil model for adaptive placement of sensors in the immediate aftermath of oilspills. A key feature of this model is the ability to correct its predictions of spill location using continual measurement feedback from a low number of deployed sensors. This allows for a model of relatively low complexity compared to existing models, which in turn enables fast p… ▽ More

    Submitted 12 November, 2019; v1 submitted 28 October, 2019; originally announced October 2019.

    Comments: Pre-print

  12. arXiv:1906.00397  [pdf, other

    eess.SP

    Recovery of Missing Data in Correlated Smart Grid Datasets

    Authors: Cristian Genes, Iñaki Esnaola, Samir Perlaza, Daniel Coca

    Abstract: We study the recovery of missing data from multiple smart grid datasets within a matrix completion framework. The datasets contain the electrical magnitudes required for monitoring and control of the electricity distribution system. Each dataset is described by a low rank matrix. Different datasets are correlated as a result of containing measurements of different physical magnitudes generated by… ▽ More

    Submitted 2 June, 2019; originally announced June 2019.

    Comments: Extended version of submission to IEEE Data Science Workshop 2019

  13. arXiv:1902.08222  [pdf, other

    cs.IT eess.SP eess.SY

    Learning requirements for stealth attacks

    Authors: Ke Sun, Iñaki Esnaola, Antonia M. Tulino, H. Vincent Poor

    Abstract: The learning data requirements are analyzed for the construction of stealth attacks in state estimation. In particular, the training data set is used to compute a sample covariance matrix that results in a random matrix with a Wishart distribution. The ergodic attack performance is defined as the average attack performance obtained by taking the expectation with respect to the distribution of the… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: International Conference on Acoustics, Speech, and Signal Processing 2019

    Journal ref: in Proc. IEEE Int. Conf. on Acoust., Speech, and Signal Process., Brighton, UK, May 2019, pp. 8102-8106

  14. arXiv:1808.04184  [pdf, other

    cs.IT eess.SY

    Stealth Attacks on the Smart Grid

    Authors: Ke Sun, Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probabilit… ▽ More

    Submitted 7 April, 2020; v1 submitted 13 August, 2018; originally announced August 2018.

    Comments: IEEE Trans. Smart Grid

    Journal ref: IEEE Trans. Smart Grid, vol. 11 , no. 2, pp. 1276-1285, Mar. 2020

  15. arXiv:1708.07810  [pdf, other

    cs.IT eess.SY

    Information-Theoretic Attacks in the Smart Grid

    Authors: Ke Sun, Inaki Esnaola, Samir M. Perlaza, H. Vincent Poor

    Abstract: Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing th… ▽ More

    Submitted 25 August, 2017; originally announced August 2017.

    Comments: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

    Journal ref: in Proc. IEEE Int. Conf. on Smart Grid Commun., Dresden, Germany, Oct. 2017, pp. 455-460

  16. arXiv:1708.04429  [pdf, other

    cs.IT eess.SY

    Smart Meter Privacy via the Trapdoor Channel

    Authors: Miguel Arrieta, Inaki Esnaola

    Abstract: A battery charging policy that provides privacy guarantees for smart meter systems with finite capacity battery is proposed. For this policy an upper bound on the information leakage rate is provided. The upper bound applies for general random processes modelling the energy consumption of the user. It is shown that the average energy consumption of the user determines the information leakage rate… ▽ More

    Submitted 15 August, 2017; originally announced August 2017.

    Comments: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)

  17. arXiv:1708.01583  [pdf, other

    eess.SY

    Robust Recovery of Missing Data in Electricity Distribution Systems

    Authors: Cristian Genes, Iñaki Esnaola, Samir. M. Perlaza, Luis F. Ochoa, Daniel Coca

    Abstract: The advanced operation of future electricity distribution systems is likely to require significant observability of the different parameters of interest (e.g., demand, voltages, currents, etc.). Ensuring completeness of data is, therefore, paramount. In this context, an algorithm for recovering missing state variable observations in electricity distribution systems is presented. The proposed metho… ▽ More

    Submitted 4 August, 2017; originally announced August 2017.

    Comments: Submitted to IEEE Trans. Smart Grid

  18. arXiv:1503.06468  [pdf, ps, other

    cs.LG cs.CR eess.SY

    Machine Learning Methods for Attack Detection in the Smart Grid

    Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the syste… ▽ More

    Submitted 22 March, 2015; originally announced March 2015.

    Comments: 14 pages, 11 Figures

    Journal ref: A version of the manuscript was published in IEEE Transactions on Neural Networks and Learning Systems, 19 March 2015

  19. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models

    Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that… ▽ More

    Submitted 14 February, 2015; originally announced February 2015.

    Comments: 11 pages, 5 figures

    Journal ref: IEEE JSAC, vol. 31, no. 7, pp. 1306-1318, Jul. 2013