Stealth Attacks on the Smart Grid

Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probability of attack detection by minimizing the Kullback-Leibler (KL) divergence between the distribution when the attack is present and the distribution under normal operation. The resulting cost function is the weighted sum of the mutual information and the KL divergence mentioned above. The trade-off between the probability of attack detection and the reduction of mutual information is governed by the weighting parameter on the KL divergence term in the cost function. The probability of attack detection is evaluated as a function of the weighting parameter. A sufficient condition on the weighting parameter is given for achieving an arbitrarily small probability of attack detection. The attack performance is numerically assessed on the IEEE 14-Bus, 30-Bus, and 118-Bus test systems.

[1]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[2]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[3]  Franz Franchetti,et al.  An Information-Theoretic Approach to PMU Placement in Electric Power Systems , 2012, IEEE Transactions on Smart Grid.

[4]  Joe H. Chow,et al.  Likelihood Analysis of Cyber Data Attacks to Power Systems With Markov Decision Processes , 2016, IEEE Transactions on Smart Grid.

[5]  Gerhard Kramer,et al.  Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.

[6]  Siddharth Sridhar,et al.  Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.

[7]  Karl Henrik Johansson,et al.  On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem , 2011, IEEE Transactions on Smart Grid.

[8]  R D Zimmerman,et al.  MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.

[9]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[10]  Ramin Moslemi,et al.  A Fast, Decentralized Covariance Selection-Based Approach to Detect Cyber Attacks in Smart Grids , 2018, IEEE Transactions on Smart Grid.

[11]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[12]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[13]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[14]  Henrik Sandberg,et al.  Network-layer protection schemes against stealth attacks on state estimators in power systems , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[15]  H. Vincent Poor,et al.  Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.

[16]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[17]  P. Massart,et al.  Adaptive estimation of a quadratic functional by model selection , 2000 .

[18]  Niall M. Adams,et al.  A comparison of efficient approximations for a weighted sum of chi-squared random variables , 2016, Stat. Comput..

[19]  John V. McCanny,et al.  Progress and Research in Cybersecurity - Supporting a resilient and trustworthy system for the UK , 2016 .

[20]  Luis F. Ochoa,et al.  Recovering missing data via matrix completion in electricity distribution systems , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[21]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[22]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[23]  E. S. Pearson,et al.  On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .

[24]  Rong Zheng,et al.  Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.

[25]  David P. Varodayan,et al.  Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[26]  Sham M. Kakade,et al.  A tail inequality for quadratic forms of subgaussian random vectors , 2011, ArXiv.

[27]  Inaki Esnaola,et al.  Smart meter privacy via the trapdoor channel , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[28]  Zuyi Li,et al.  Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme , 2019, IEEE Transactions on Smart Grid.

[29]  H. Vincent Poor,et al.  Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[30]  Aditya Ashok,et al.  Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.

[31]  Ilan Shomorony,et al.  Worst-Case Additive Noise in Wireless Networks , 2012, IEEE Transactions on Information Theory.

[32]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[33]  H. Vincent Poor,et al.  Maximum Distortion Attacks in Electricity Grids , 2016, IEEE Transactions on Smart Grid.

[34]  H. Vincent Poor,et al.  Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.

[35]  Bruce G. Lindsay,et al.  Moment-Based Approximations of Distributions Using Mixtures: Theory and Applications , 2000 .

[36]  H. Vincent Poor,et al.  Information-theoretic attacks in the smart grid , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[37]  Hao Liang,et al.  False Data Injection Attacks Against State Estimation in Power Distribution Systems , 2019, IEEE Transactions on Smart Grid.