Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
From MaRDI portal
Publication:4579762
DOI10.1109/TSP.2014.2385670zbMATH Open1394.94276arXiv1406.0866OpenAlexW1998285730MaRDI QIDQ4579762FDOQ4579762
Authors: Jinsub Kim, Lang Tong, Robert J. Thomas
Publication date: 22 August 2018
Published in: IEEE Transactions on Signal Processing (Search for Journal in Brave)
Abstract: Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters. Such information is difficult to acquire in practice. The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. Conditions for the existence of an unobservable subspace attack are obtained under the full and partial measurement models. Using the estimated system subspace, two attack strategies are presented. The first strategy aims to affect the system state directly by hiding the attack vector in the system subspace. The second strategy misleads the bad data detection mechanism so that data not under attack are removed. Performance of these attacks are evaluated using the IEEE 14-bus network and the IEEE 118-bus network.
Full work available at URL: https://arxiv.org/abs/1406.0866
Cited In (6)
- Data-driven attacks and data recovery with noise on state estimation of smart grid
- Optimal switching integrity attacks on sensors in Industrial control systems
- The sensor-actuators stealthy cyber-attacks framework on networked control systems: a data-driven approach
- Complete stealthiness false data injection attacks against dynamic state estimation in cyber-physical systems
- Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements
- Attack detection/isolation via a secure multisensor fusion framework for cyberphysical systems
This page was built for publication: Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4579762)