Title :
Equilibria in data injection attacks
Author :
Esnaola, Inaki ; Perlaza, Samir M. ; Poor, H. Vincent
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., Princeton, NJ, USA
Abstract :
Data injection attacks are studied in a game theoretic setting. Assuming that the network operator acquires the state variables via generalized least squares (GLS) estimation, different attack performance metrics are proposed. The scenarios defined by the performance metrics are then analyzed. In particular, closed form expressions for best response functions and Nash equilibria (NEs) are given. First the case in which the attack vector can be constructed without energy constraints is studied. It is shown that for unconstrained attacks infinitely many optimal attack vectors exist and that the construction requires knowledge of the state variables in the grid. Alternatively, when energy constraints are included, the attack vector construction does not depend on the state variables. As a consequence, the optimal energy constrained attack strategy follows a correlated multivariate Gaussian distribution. It is shown that for unconstrained attacks infinitely many NEs exist and that in the constrained case at least one NE exists.
Keywords :
Gaussian distribution; game theory; least squares approximations; security of data; GLS estimation; NE; Nash equilibria; attack performance metrics; best response functions; closed form expressions; correlated multivariate Gaussian distribution; data injection attacks; game theoretic setting; generalized least squares; optimal attack vectors; optimal energy constrained attack strategy; state variables; unconstrained attacks; Games; Jacobian matrices; Measurement; Smart grids; State estimation; Vectors;
Conference_Titel :
Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on
Conference_Location :
Atlanta, GA
DOI :
10.1109/GlobalSIP.2014.7032225