Secure Estimation in the Presence of Integrity Attacks

We consider the estimation of a scalar state based on m measurements that can be potentially manipulated by an adversary. The attacker is assumed to have full knowledge about the true value of the state to be estimated and about the value of all the measurements. However, the attacker has limited resources and can only manipulate up to l of the m measurements. The problem is formulated as a minimax optimization, where one seeks to construct an optimal estimator that minimizes the “worst-case” expected cost against all possible manipulations by the attacker. We show that if the attacker can manipulate at least half the measurements (l ≥ m/2), then the optimal worst-case estimator should ignore all measurements and be based solely on the a-priori information. We provide the explicit form of the optimal estimator when the attacker can manipulate less than half the measurements (l <; m/2), which is based on (m2l) local estimators. We further prove that such an estimator can be reduced into simpler forms for two special cases, i.e., either the estimator is symmetric and monotone or m = 2l + 1. Finally we apply the proposed methodology in the case of Gaussian measurements.

[1]  F. Hampel A General Qualitative Definition of Robustness , 1971 .

[2]  F. Hampel The Influence Curve and Its Role in Robust Estimation , 1974 .

[3]  S.A. Kassam,et al.  Robust techniques for signal processing: A survey , 1985, Proceedings of the IEEE.

[4]  J. Doyle,et al.  Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.

[5]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[6]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[7]  V. Yohai,et al.  Robust Statistics: Theory and Methods , 2006 .

[8]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[9]  T. M. Chen,et al.  Stuxnet, the real start of cyber warfare? [Editor's Note] , 2010, IEEE Netw..

[10]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[11]  David P. Fidler,et al.  Was Stuxnet an Act of War? Decoding a Cyberattack , 2011, IEEE Security & Privacy.

[12]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[13]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[14]  Bruno Sinopoli,et al.  Robust estimation in the presence of integrity attacks , 2013, 52nd IEEE Conference on Decision and Control.

[15]  João P. Hespanha,et al.  Resilient Detection in the Presence of Integrity Attacks , 2014, IEEE Transactions on Signal Processing.

[16]  Mi-Ching Tsai,et al.  Robust and Optimal Control , 2014 .