Subspace Methods for Data Attack on State Estimation: A Data Driven Approach

Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters. Such information is difficult to acquire in practice. The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. Conditions for the existence of an unobservable subspace attack are obtained under the full and partial measurement models. Using the estimated system subspace, two attack strategies are presented. The first strategy aims to affect the system state directly by hiding the attack vector in the system subspace. The second strategy misleads the bad data detection mechanism so that data not under attack are removed. Performance of these attacks are evaluated using the IEEE 14-bus network and the IEEE 118-bus network.

[1]  Karl Henrik Johansson,et al.  On Security Indices for State Estimators in Power Networks , 2010 .

[2]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[3]  J. Hull,et al.  Staying in control: Cybersecurity and the modern electric grid , 2012, IEEE Power and Energy Magazine.

[4]  Henry Cox,et al.  Eigenvalue Beamforming Using a Multirank MVDR Beamformer and Subspace Selection , 2008, IEEE Transactions on Signal Processing.

[5]  Kameshwar Poolla,et al.  Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[6]  T. W. Anderson ASYMPTOTIC THEORY FOR PRINCIPAL COMPONENT ANALYSIS , 1963 .

[7]  G. Krumpholz,et al.  Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.

[8]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Mats Viberg,et al.  Subspace-based methods for the identification of linear time-invariant systems , 1995, Autom..

[10]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[11]  Yilin Mo,et al.  False Data Injection Attacks in Control Systems , 2010 .

[12]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[13]  A. G. Expósito,et al.  Power system state estimation : theory and implementation , 2004 .

[14]  J. Norris Appendix: probability and measure , 1997 .

[15]  Rong Zheng,et al.  Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[16]  Lang Tong,et al.  Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.

[17]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[18]  Garry Tamlyn,et al.  Music , 1993 .

[19]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[20]  Jing Huang,et al.  State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.

[21]  R. F.,et al.  Mathematical Statistics , 1944, Nature.

[22]  Petre Stoica,et al.  MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.

[23]  H. V. Trees,et al.  Covariance, Subspace, and Intrinsic CramrRao Bounds , 2007 .

[24]  Klara Nahrstedt,et al.  Detecting False Data Injection Attacks on DC State Estimation , 2010 .

[25]  Bruno Sinopoli,et al.  Challenges for Securing Cyber Physical Systems , 2009 .

[26]  Ying Jun Zhang,et al.  Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).

[27]  E. Handschin,et al.  Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.

[28]  Lang Tong,et al.  On phasor measurement unit placement against state and topology attacks , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[29]  S.T. Smith,et al.  Covariance, subspace, and intrinsic Crame/spl acute/r-Rao bounds , 2005, IEEE Transactions on Signal Processing.

[30]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[31]  Anuj Srivastava,et al.  A Bayesian approach to geometric subspace estimation , 2000, IEEE Trans. Signal Process..

[32]  Edward A. Lee Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[33]  Hamed Mohsenian Rad,et al.  False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[34]  Lang Tong,et al.  Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.