References & Citations
Electrical Engineering and Systems Science > Systems and Control
Title: Stealth Data Injection Attacks with Sparsity Constraints
(Submitted on 31 Dec 2021 (v1), last revised 23 Jul 2022 (this version, v3))
Abstract: Sparse stealth attack constructions that minimize the mutual information between the state variables and the observations are proposed. The attack construction is formulated as the design of a multivariate Gaussian distribution that aims to minimize the mutual information while limiting the Kullback-Leibler divergence between the distribution of the observations under attack and the distribution of the observations without attack. The sparsity constraint is incorporated as a support constraint of the attack distribution. Two heuristic greedy algorithms for the attack construction are proposed. The first algorithm assumes that the attack vector consists of independent entries, and therefore, requires no communication between different attacked locations. The second algorithm considers correlation between the attack vector entries which results in better attack performance at the expense of coordination between different locations. We numerically evaluate the performance of the proposed attack constructions on IEEE test systems and show that it is feasible to construct stealth attacks that generate significant disruption with a low number of compromised sensors.
Submission history
From: Xiuzhen Ye [view email][v1] Fri, 31 Dec 2021 21:57:44 GMT (646kb)
[v2] Fri, 15 Jul 2022 19:26:47 GMT (1022kb)
[v3] Sat, 23 Jul 2022 19:35:39 GMT (1022kb)
Link back to: arXiv, form interface, contact.