Optimal space-time attacks on system state estimation under a sparsity constraint

System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary’s perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary’s goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary’s limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

[1]  Erik Blasch,et al.  Performance Measures of Covariance and Information Matrices in Resource Management for Target State Estimation , 2012, IEEE Transactions on Aerospace and Electronic Systems.

[2]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[3]  Thia Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation: Theory, Algorithms and Software , 2001 .

[4]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[5]  Peter B. Luh,et al.  The MIMO Radar and Jammer Games , 2012, IEEE Transactions on Signal Processing.

[6]  L. Tong,et al.  Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[7]  Ruixin Niu,et al.  A state estimation and malicious attack game in multi-sensor dynamic systems , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[8]  Claire J. Tomlin,et al.  Sensor Placement for Improved Robotic Navigation , 2010, Robotics: Science and Systems.

[9]  Ruixin Niu,et al.  Malicious attacks on state estimation in multi-sensor dynamic systems , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[10]  Lang Tong,et al.  Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[11]  Ruixin Niu,et al.  System state estimation in the presence of false information injection , 2012, 2012 IEEE Statistical Signal Processing Workshop (SSP).

[12]  Ruixin Niu,et al.  False information detection with minimum mean squared errors for Bayesian estimation , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).

[13]  L.M. Kaplan,et al.  Global node selection for localization in a distributed sensor network , 2006, IEEE Transactions on Aerospace and Electronic Systems.

[14]  Chun Yang,et al.  Optimal Placement of Heterogeneous Sensors for Targets with Gaussian Priors , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[15]  Josef Kittler,et al.  Floating search methods in feature selection , 1994, Pattern Recognit. Lett..

[16]  Ruixin Niu,et al.  False information injection attack on dynamic state estimation in multi-sensor systems , 2014, 17th International Conference on Information Fusion (FUSION).

[17]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[18]  Liyan Jia,et al.  On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.