Information-theoretic attacks in the smart grid

Gaussian random attacks that jointly minimize the amount of information obtained by the operator from the grid and the probability of attack detection are presented. The construction of the attack is posed as an optimization problem with a utility function that captures two effects: firstly, minimizing the mutual information between the measurements and the state variables; secondly, minimizing the probability of attack detection via the Kullback-Leibler (KL) divergence between the distribution of the measurements with an attack and the distribution of the measurements without an attack. Additionally, a lower bound on the utility function achieved by the attacks constructed with imperfect knowledge of the second order statistics of the state variables is obtained. The performance of the attack construction using the sample covariance matrix of the state variables is numerically evaluated. The above results are tested in the IEEE 30-Bus test system.

[1]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[2]  Hadi Saadat,et al.  Power System Analysis , 1998 .

[3]  W. Marsden I and J , 2012 .

[4]  George A. F. Seber,et al.  A matrix handbook for statisticians , 2007 .

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Antonia Maria Tulino,et al.  Random Matrix Theory and Wireless Communications , 2004, Found. Trends Commun. Inf. Theory.

[7]  Karl Henrik Johansson,et al.  On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem , 2011, IEEE Transactions on Smart Grid.

[8]  H. Vincent Poor,et al.  Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[9]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[10]  Antonia Maria Tulino,et al.  Linear Analog Coding of Correlated Multivariate Gaussian Sources , 2013, IEEE Transactions on Communications.

[11]  Inaki Esnaola,et al.  Smart meter privacy via the trapdoor channel , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[13]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[14]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[15]  Franz Franchetti,et al.  An Information-Theoretic Approach to PMU Placement in Electric Power Systems , 2012, IEEE Transactions on Smart Grid.

[16]  Oliver Kosut,et al.  Cyber attacks on AC state estimation: Unobservability and physical consequences , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.

[17]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[18]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[19]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[20]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[21]  John V. McCanny,et al.  Progress and Research in Cybersecurity - Supporting a resilient and trustworthy system for the UK , 2016 .

[22]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[23]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[24]  Luis F. Ochoa,et al.  Recovering missing data via matrix completion in electricity distribution systems , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[25]  H. Vincent Poor,et al.  Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.

[26]  H. Vincent Poor,et al.  Maximum Distortion Attacks in Electricity Grids , 2016, IEEE Transactions on Smart Grid.