TY - GEN
T1 - Decentralized MMSE attacks in electricity grids
AU - Esnaola, Inaki
AU - Perlaza, Samir M.
AU - Poor, H. Vincent
AU - Kosut, Oliver
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/8/24
Y1 - 2016/8/24
N2 - Decentralized data-injection attack construction with minimum mean-square-error state estimation is studied in a game-theoretic setting. Within this framework, the interaction between the network operator and the set of attackers, as well as the interactions among the attackers, are modeled by a game in normal form. A novel utility function that captures the trade-off between the maximum distortion that an attack can introduce and the probability of the attack being detected by the network operator is proposed. Under the assumption that the state variables can be modeled as a multivariate Gaussian random process, it is shown that the resulting game is a potential game. The cardinality of the corresponding set of Nash Equilibria (NEs) of the game is analyzed. It is shown that attackers can agree on a data-injection vector construction that achieves the best trade-off between distortion and detection probability by sharing only a limited number of bits offline. Interestingly, this vector construction is also shown to be an NE of the resulting game.
AB - Decentralized data-injection attack construction with minimum mean-square-error state estimation is studied in a game-theoretic setting. Within this framework, the interaction between the network operator and the set of attackers, as well as the interactions among the attackers, are modeled by a game in normal form. A novel utility function that captures the trade-off between the maximum distortion that an attack can introduce and the probability of the attack being detected by the network operator is proposed. Under the assumption that the state variables can be modeled as a multivariate Gaussian random process, it is shown that the resulting game is a potential game. The cardinality of the corresponding set of Nash Equilibria (NEs) of the game is analyzed. It is shown that attackers can agree on a data-injection vector construction that achieves the best trade-off between distortion and detection probability by sharing only a limited number of bits offline. Interestingly, this vector construction is also shown to be an NE of the resulting game.
KW - Data-injection attacks
KW - decentralized attacks
KW - game theory
KW - state estimation
UR - http://www.scopus.com/inward/record.url?scp=84987901632&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84987901632&partnerID=8YFLogxK
U2 - 10.1109/SSP.2016.7551823
DO - 10.1109/SSP.2016.7551823
M3 - Conference contribution
AN - SCOPUS:84987901632
T3 - IEEE Workshop on Statistical Signal Processing Proceedings
BT - 2016 19th IEEE Statistical Signal Processing Workshop, SSP 2016
PB - IEEE Computer Society
T2 - 19th IEEE Statistical Signal Processing Workshop, SSP 2016
Y2 - 25 June 2016 through 29 June 2016
ER -