-
An information theoretic vulnerability metric for data integrity attacks on smart grids
Authors:
Xiuzhen Ye,
Iñaki Esnaola,
Samir M. Perlaza,
Robert F. Harrison
Abstract:
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of…
▽ More
A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of their vulnerability based on the level of exposure to data integrity attacks. This new framework is used to assess the measurement vulnerability of IEEE 9-bus and 30-bus test systems and it is observed that power injection measurements are overwhelmingly more vulnerable to data integrity attacks than power flow measurements. A detailed numerical evaluation of the VuIx values for IEEE test systems is provided.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Power Injection Measurements are more Vulnerable to Data Integrity Attacks than Power Flow Measurements
Authors:
Xiuzhen Ye,
Iñaki Esnaola,
Samir M. Perlaza,
Robert F. Harrison
Abstract:
A novel metric that describes the vulnerability of the measurements in power system to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of…
▽ More
A novel metric that describes the vulnerability of the measurements in power system to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effect on the fundamental limits of the disruption and detection tradeoff. The result of computing the VuIx of the measurements in the system yields an ordering of the measurements vulnerability based on the level of exposure to data integrity attacks. This new framework is used to assess the measurements vulnerability of IEEE test systems and it is observed that power injection measurements are overwhelmingly more vulnerable to data integrity attacks than power flow measurements. A detailed numerical evaluation of the VuIx values for IEEE test systems is provided.
△ Less
Submitted 14 July, 2022;
originally announced July 2022.
-
Stealth Data Injection Attacks with Sparsity Constraints
Authors:
Xiuzhen Ye,
Iñaki Esnaola,
Samir M. Perlaza,
Robert F. Harrison
Abstract:
Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution o…
▽ More
Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution of the observations without attack. The sparsity constraint is incorporated as a support constraint of the attack distribution. Two heuristic greedy algorithms for the attack construction are proposed. The first algorithm assumes that the attack vector consists of independent entries, and therefore, requires no communication between different attacked locations. The second algorithm considers correlation between the attack vector entries which results in better attack performance at the expense of coordination between different locations. We numerically evaluate the performance of the proposed attack constructions on IEEE test systems and show that it is feasible to construct stealth attacks that generate significant disruption with a low number of compromised sensors.
△ Less
Submitted 23 July, 2022; v1 submitted 31 December, 2021;
originally announced January 2022.
-
Asymptotic Learning Requirements for Stealth Attacks on Linearized State Estimation
Authors:
Ke Sun,
Iñaki Esnaola,
Antonia M. Tulino,
H. Vincent Poor
Abstract:
Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distribut…
▽ More
Information-theoretic stealth attacks are data injection attacks that minimize the amount of information acquired by the operator about the state variables, while simultaneously limiting the Kullback-Leibler divergence between the distribution of the measurements under attack and the distribution under normal operation with the aim of controling the probability of detection. For Gaussian distributed state variables, attack construction requires knowledge of the second order statistics of the state variables, which is estimated from a finite number of past realizations using a sample covariance matrix. Within this framework, the attack performance is studied for the attack construction with the sample covariance matrix. This results in an analysis of the amount of data required to learn the covariance matrix of the state variables used on the attack construction. The ergodic attack performance is characterized using asymptotic random matrix theory tools, and the variance of the attack performance is bounded. The ergodic performance and the variance bounds are assessed with simulations on IEEE test systems.
△ Less
Submitted 11 January, 2023; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Data-Injection Attacks
Authors:
Iñaki Esnaola,
Samir M. Perlaza,
Ke Sun
Abstract:
In this chapter we review some of the basic attack constructions that exploit a stochastic description of the state variables. We pose the state estimation problem in a Bayesian setting and cast the bad data detection procedure as a Bayesian hypothesis testing problem. This revised detection framework provides the benchmark for the attack detection problem that limits the achievable attack disrupt…
▽ More
In this chapter we review some of the basic attack constructions that exploit a stochastic description of the state variables. We pose the state estimation problem in a Bayesian setting and cast the bad data detection procedure as a Bayesian hypothesis testing problem. This revised detection framework provides the benchmark for the attack detection problem that limits the achievable attack disruption. Indeed, the trade-off between the impact of the attack, in terms of disruption to the state estimator, and the probability of attack detection is analytically characterized within this Bayesian attack setting. We then generalize the attack construction by considering information-theoretic measures that place fundamental limits to a broad class of detection, estimation, and learning techniques. Because the attack constructions proposed in this chapter rely on the attacker having access to the statistical structure of the random process describing the state variables, we conclude by studying the impact of imperfect statistics on the attack performance. Specifically, we study the attack performance as a function of the size of the training data set that is available to the attacker to estimate the second-order statistics of the state variables.
△ Less
Submitted 3 February, 2021;
originally announced February 2021.
-
Covariance Estimation from Compressive Data Partitions using a Projected Gradient-based Algorithm
Authors:
Jonathan Monsalve,
Juan Ramirez,
Iñaki Esnaola,
Henry Arguello
Abstract:
Compressive covariance estimation has arisen as a class of techniques whose aim is to obtain second-order statistics of stochastic processes from compressive measurements. Recently, these methods have been used in various image processing and communications applications, including denoising, spectrum sensing, and compression. Notice that estimating the covariance matrix from compressive samples le…
▽ More
Compressive covariance estimation has arisen as a class of techniques whose aim is to obtain second-order statistics of stochastic processes from compressive measurements. Recently, these methods have been used in various image processing and communications applications, including denoising, spectrum sensing, and compression. Notice that estimating the covariance matrix from compressive samples leads to ill-posed minimizations with severe performance loss at high compression rates. In this regard, a regularization term is typically aggregated to the cost function to consider prior information about a particular property of the covariance matrix. Hence, this paper proposes an algorithm based on the projected gradient method to recover low-rank or Toeplitz approximations of the covariance matrix from compressive measurements. The algorithm divides the compressive measurements into data subsets projected onto different subspaces and accurately estimates the covariance matrix by solving a single optimization problem assuming that each data subset contains an approximation of the signal statistics. Furthermore, gradient filtering is included at every iteration of the proposed algorithm to minimize the estimation error. The error induced by the proposed splitting approach is analytically derived along with the convergence guarantees of the proposed method. The algorithm estimates the covariance matrix of hyperspectral images from synthetic and real compressive samples. Extensive simulations show that the proposed algorithm can effectively recover the covariance matrix of hyperspectral images from compressive measurements (8-15% approx). Moreover, simulations and theoretical results show that the filtering step reduces the recovery error up to twice the number of eigenvectors. Finally, an optical implementation is proposed, and real measurements are used to validate the theoretical findings.
△ Less
Submitted 15 February, 2022; v1 submitted 11 January, 2021;
originally announced January 2021.
-
Information Theoretic Data Injection Attacks with Sparsity Constraints
Authors:
Xiuzhen Ye,
Iñaki Esnaola,
Samir M. Perlaza,
Robert F. Harrison
Abstract:
Information theoretic sparse attacks that minimize simultaneously the information obtained by the operator and the probability of detection are studied in a Bayesian state estimation setting. The attack construction is formulated as an optimization problem that aims to minimize the mutual information between the state variables and the observations while guaranteeing the stealth of the attack. Ste…
▽ More
Information theoretic sparse attacks that minimize simultaneously the information obtained by the operator and the probability of detection are studied in a Bayesian state estimation setting. The attack construction is formulated as an optimization problem that aims to minimize the mutual information between the state variables and the observations while guaranteeing the stealth of the attack. Stealth is described in terms of the Kullback-Leibler (KL) divergence between the distributions of the observations under attack and without attack. To overcome the difficulty posed by the combinatorial nature of a sparse attack construction, the attack case in which only one sensor is compromised is analytically solved first. The insight generated in this case is then used to propose a greedy algorithm that constructs random sparse attacks. The performance of the proposed attack is evaluated in the IEEE 30 Bus Test Case.
△ Less
Submitted 15 July, 2022; v1 submitted 6 July, 2020;
originally announced July 2020.
-
Optimal Model-Based Sensor Placement & Adaptive Monitoring Of An Oil Spill
Authors:
Zak Hodgson,
Inaki Esnaola,
Bryn Jones
Abstract:
This paper presents a model based adaptive monitoring method for the estimation of flow tracers, with application to map**, prediction and observation of oil spills in the immediate aftermath of an incident. Autonomous agents are guided to optimal sensing locations via the solution of a PDE constrained optimisation problem, obtained using the adjoint method. The proposed method employs a dynamic…
▽ More
This paper presents a model based adaptive monitoring method for the estimation of flow tracers, with application to map**, prediction and observation of oil spills in the immediate aftermath of an incident. Autonomous agents are guided to optimal sensing locations via the solution of a PDE constrained optimisation problem, obtained using the adjoint method. The proposed method employs a dynamic model of the combined ocean and oil dynamics, with states that are updated in real-time using a Kalman filter that fuses agent-based measurements with a reduced-order model of the ocean circulation dynamics. In turn, the updated predictions from the fluid model are used to identify and update the reduced order model, in a process of continuous feedback. The proposed method exhibits a 30% oil presence map** and prediction improvement compared to standard industrial oil observation sensor guidance and model use.
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Denial of Service Attacks on Control Systems with Packet Loss
Authors:
William Casbolt,
Iñaki Esnaola,
Bryn Jones
Abstract:
The performance of control systems with packet loss as a result of an attack over the actuation communication channel is analysed. The operator is assumed to monitor the state of the channel by measuring the average number of packet losses and an attack detection criteria is established based on the statistic. The performance of the attacker is measured in terms of the increase of the linear quadr…
▽ More
The performance of control systems with packet loss as a result of an attack over the actuation communication channel is analysed. The operator is assumed to monitor the state of the channel by measuring the average number of packet losses and an attack detection criteria is established based on the statistic. The performance of the attacker is measured in terms of the increase of the linear quadratic cost function of the operator subject to a given detection constraint. Within that setting, the optimal denial of service (DoS) attack strategy is formulated for UDP-like and TCP-like communication protocols. {For both communication protocols,} DoS attack constructions that are independent and identically distributed (IID) are compared to those that are non-stationary. The main contributions of this paper are (i) explicit characterisation of the expected cost increase of the optimal attack constructions and the associated packet loss parameter for the IID case, (ii) proof, by example, that non-stationary random attacks outperform IID attacks in the presence of detection constraints.
△ Less
Submitted 15 May, 2020; v1 submitted 19 November, 2019;
originally announced November 2019.
-
Optimal Control over Multiple Input Lossy Channels
Authors:
William Casbolt,
Bryn Jones,
Iñaki Esnaola
Abstract:
The performance of control systems with input packet losses on the controller to plant communication channel is analysed. The main contribution of this work is a proof that linear optimal control systems operating with UDP-like communication protocols have a larger quadratic cost than the same systems operating with TCP-like protocols. The proof is derived for the general case of multidimensional…
▽ More
The performance of control systems with input packet losses on the controller to plant communication channel is analysed. The main contribution of this work is a proof that linear optimal control systems operating with UDP-like communication protocols have a larger quadratic cost than the same systems operating with TCP-like protocols. The proof is derived for the general case of multidimensional and independent actuation communication channels. In doing so, our results extend previous work to systems with multiple distributed actuators. The difference in cost between two communication protocols is analysed, enabling the maximal difference between the two protocols to be quantified. Numerical examples are presented to highlight the difference in costs induced by the choice of communication protocol.
△ Less
Submitted 6 May, 2021; v1 submitted 18 November, 2019;
originally announced November 2019.
-
A combined ocean and oil model for model-based adaptive monitoring
Authors:
Zak Hodgson,
David Browne,
Inaki Esnaola,
Bryn Jones
Abstract:
This paper presents a combined ocean and oil model for adaptive placement of sensors in the immediate aftermath of oilspills. A key feature of this model is the ability to correct its predictions of spill location using continual measurement feedback from a low number of deployed sensors. This allows for a model of relatively low complexity compared to existing models, which in turn enables fast p…
▽ More
This paper presents a combined ocean and oil model for adaptive placement of sensors in the immediate aftermath of oilspills. A key feature of this model is the ability to correct its predictions of spill location using continual measurement feedback from a low number of deployed sensors. This allows for a model of relatively low complexity compared to existing models, which in turn enables fast predictions. The focus of this paper is upon the modelling aspects and in-particular the trade-off between complexity and numerical efficiency. The presented model contains relevant ocean, wind and wave dynamics for short-term spill predictions. The model is used to simulate the 2019 Grande America spill, with results compared to satellite imagery. The predictions show good agreement, even after several days from the initial incident. As a precursor to future work, results are also presented that demonstrate how sensor feedback mitigates the effects of model inaccuracy.
△ Less
Submitted 12 November, 2019; v1 submitted 28 October, 2019;
originally announced October 2019.
-
Recovery of Missing Data in Correlated Smart Grid Datasets
Authors:
Cristian Genes,
Iñaki Esnaola,
Samir Perlaza,
Daniel Coca
Abstract:
We study the recovery of missing data from multiple smart grid datasets within a matrix completion framework. The datasets contain the electrical magnitudes required for monitoring and control of the electricity distribution system. Each dataset is described by a low rank matrix. Different datasets are correlated as a result of containing measurements of different physical magnitudes generated by…
▽ More
We study the recovery of missing data from multiple smart grid datasets within a matrix completion framework. The datasets contain the electrical magnitudes required for monitoring and control of the electricity distribution system. Each dataset is described by a low rank matrix. Different datasets are correlated as a result of containing measurements of different physical magnitudes generated by the same distribution system. To assess the validity of matrix completion techniques in the recovery of missing data, we characterize the fundamental limits when two correlated datasets are jointly recovered. We then proceed to evaluate the performance of Singular Value Thresholding (SVT) and Bayesian SVT (BSVT) in this setting. We show that BSVT outperforms SVT by simulating the recovery for different correlated datasets. The performance of BSVT displays the tradeoff behaviour described by the fundamental limit, which suggests that BSVT exploits the correlation between the datasets in an efficient manner.
△ Less
Submitted 2 June, 2019;
originally announced June 2019.
-
Learning requirements for stealth attacks
Authors:
Ke Sun,
Iñaki Esnaola,
Antonia M. Tulino,
H. Vincent Poor
Abstract:
The learning data requirements are analyzed for the construction of stealth attacks in state estimation. In particular, the training data set is used to compute a sample covariance matrix that results in a random matrix with a Wishart distribution. The ergodic attack performance is defined as the average attack performance obtained by taking the expectation with respect to the distribution of the…
▽ More
The learning data requirements are analyzed for the construction of stealth attacks in state estimation. In particular, the training data set is used to compute a sample covariance matrix that results in a random matrix with a Wishart distribution. The ergodic attack performance is defined as the average attack performance obtained by taking the expectation with respect to the distribution of the training data set. The impact of the training data size on the ergodic attack performance is characterized by proposing an upper bound for the performance. Simulations on the IEEE 30-Bus test system show that the proposed bound is tight in practical settings.
△ Less
Submitted 21 February, 2019;
originally announced February 2019.
-
Stealth Attacks on the Smart Grid
Authors:
Ke Sun,
Iñaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probabilit…
▽ More
Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probability of attack detection by minimizing the Kullback-Leibler (KL) divergence between the distribution when the attack is present and the distribution under normal operation. The resulting cost function is the weighted sum of the mutual information and the KL divergence mentioned above. The tradeoff between the probability of attack detection and the reduction of mutual information is governed by the weighting parameter on the KL divergence term in the cost function. The probability of attack detection is evaluated as a function of the weighting parameter. A sufficient condition on the weighting parameter is given for achieving an arbitrarily small probability of attack detection. The attack performance is numerically assessed on the IEEE 30-Bus and 118-Bus test systems.
△ Less
Submitted 7 April, 2020; v1 submitted 13 August, 2018;
originally announced August 2018.
-
Information-Theoretic Attacks in the Smart Grid
Authors:
Ke Sun,
Inaki Esnaola,
Samir M. Perlaza,
H. Vincent Poor
Abstract:
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing th…
▽ More
Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing the probability of attack detection via the Kullback-Leibler divergence between the distribution of the measurements with an attack and the distribution of the measurements without an attack. Additionally, a lower bound on the utility function achieved by the attacks constructed with imperfect knowledge of the second order statistics of the state variables is obtained. The performance of the attack construction using the sample covariance matrix of the state variables is numerically evaluated. The above results are tested in the IEEE 30-Bus test system.
△ Less
Submitted 25 August, 2017;
originally announced August 2017.
-
Smart Meter Privacy via the Trapdoor Channel
Authors:
Miguel Arrieta,
Inaki Esnaola
Abstract:
A battery charging policy that provides privacy guarantees for smart meter systems with finite capacity battery is proposed. For this policy an upper bound on the information leakage rate is provided. The upper bound applies for general random processes modelling the energy consumption of the user. It is shown that the average energy consumption of the user determines the information leakage rate…
▽ More
A battery charging policy that provides privacy guarantees for smart meter systems with finite capacity battery is proposed. For this policy an upper bound on the information leakage rate is provided. The upper bound applies for general random processes modelling the energy consumption of the user. It is shown that the average energy consumption of the user determines the information leakage rate to the utility provider. The upper bound is shown to be tight by deriving the probability law of a random process achieving the bound.
△ Less
Submitted 15 August, 2017;
originally announced August 2017.
-
Robust Recovery of Missing Data in Electricity Distribution Systems
Authors:
Cristian Genes,
Iñaki Esnaola,
Samir. M. Perlaza,
Luis F. Ochoa,
Daniel Coca
Abstract:
The advanced operation of future electricity distribution systems is likely to require significant observability of the different parameters of interest (e.g., demand, voltages, currents, etc.). Ensuring completeness of data is, therefore, paramount. In this context, an algorithm for recovering missing state variable observations in electricity distribution systems is presented. The proposed metho…
▽ More
The advanced operation of future electricity distribution systems is likely to require significant observability of the different parameters of interest (e.g., demand, voltages, currents, etc.). Ensuring completeness of data is, therefore, paramount. In this context, an algorithm for recovering missing state variable observations in electricity distribution systems is presented. The proposed method exploits the low rank structure of the state variables via a matrix completion approach while incorporating prior knowledge in the form of second order statistics. Specifically, the recovery method combines nuclear norm minimization with Bayesian estimation. The performance of the new algorithm is compared to the information-theoretic limits and tested trough simulations using real data of an urban low voltage distribution system. The impact of the prior knowledge is analyzed when a mismatched covariance is used and for a Markovian sampling that introduces structure in the observation pattern. Numerical results demonstrate that the proposed algorithm is robust and outperforms existing state of the art algorithms.
△ Less
Submitted 4 August, 2017;
originally announced August 2017.
-
Machine Learning Methods for Attack Detection in the Smart Grid
Authors:
Mete Ozay,
Inaki Esnaola,
Fatos T. Yarman Vural,
Sanjeev R. Kulkarni,
H. Vincent Poor
Abstract:
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the syste…
▽ More
Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semi-supervised) are employed with decision and feature level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than the attack detection algorithms which employ state vector estimation methods in the proposed attack detection framework.
△ Less
Submitted 22 March, 2015;
originally announced March 2015.
-
Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models
Authors:
Mete Ozay,
Inaki Esnaola,
Fatos T. Yarman Vural,
Sanjeev R. Kulkarni,
H. Vincent Poor
Abstract:
New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that…
▽ More
New methods that exploit sparse structures arising in smart grid networks are proposed for the state estimation problem when data injection attacks are present. First, construction strategies for unobservable sparse data injection attacks on power grids are proposed for an attacker with access to all network information and nodes. Specifically, novel formulations for the optimization problem that provide a flexible design of the trade-off between performance and false alarm are proposed. In addition, the centralized case is extended to a distributed framework for both the estimation and attack problems. Different distributed scenarios are proposed depending on assumptions that lead to the spreading of the resources, network nodes and players. Consequently, for each of the presented frameworks a corresponding optimization problem is introduced jointly with an algorithm to solve it. The validity of the presented procedures in real settings is studied through extensive simulations in the IEEE test systems.
△ Less
Submitted 14 February, 2015;
originally announced February 2015.