Book contents
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Statistical Learning
- Part II Data-Driven Anomaly Detection
- Part III Data Quality, Integrity, and Privacy
- 9 Data-Injection Attacks
- 10 Smart Meter Data Privacy
- 11 Data Quality and Privacy Enhancement
- Part IV Signal Processing
- Part V Large-Scale Optimization
- Part VI Game Theory
- Index
9 - Data-Injection Attacks
from Part III - Data Quality, Integrity, and Privacy
Published online by Cambridge University Press: 22 March 2021
- Frontmatter
- Contents
- List of Contributors
- Preface
- Part I Statistical Learning
- Part II Data-Driven Anomaly Detection
- Part III Data Quality, Integrity, and Privacy
- 9 Data-Injection Attacks
- 10 Smart Meter Data Privacy
- 11 Data Quality and Privacy Enhancement
- Part IV Signal Processing
- Part V Large-Scale Optimization
- Part VI Game Theory
- Index
Summary
Data injection attacks serve as the hallmark example of the security concerns posed by the incorporation of advanced sensing and communication capabilities in power systems. Data injection attacks arise when one or several malicious attackers compromise a subset of the meters used by the state estimation procedure with the aim of manipulating the estimate obtained by the network operator. This chapter surveys the main data injection attacks that are formulated under the assumption that the state variables do not posses a probabilistic description and, therefore, the network operator implements unbiased state estimation procedures. Data injection attacks without this assumption are also studied. In particular, when the network operator perform minimum mean square error (MMSE) estimation, a fundamental trade-off is established between the distortion induced by the attacker and the achievable probability of attack detection. Within this setting, optimal attack strategies are described. The chapter also describes stealth attack constructions that simultaneously minimize the amount of information obtained by the network operator and the probability of attack detection.
- Type
- Chapter
- Information
- Advanced Data Analytics for Power Systems , pp. 197 - 229Publisher: Cambridge University PressPrint publication year: 2021
- 2
- Cited by