Equilibria in data injection attacks

Inaki Esnaola, Samir M. Perlaza, H. Vincent Poor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Data injection attacks are studied in a game theoretic setting. Assuming that the network operator acquires the state variables via generalized least squares (GLS) estimation, different attack performance metrics are proposed. The scenarios defined by the performance metrics are then analyzed. In particular, closed form expressions for best response functions and Nash equilibria (NEs) are given. First the case in which the attack vector can be constructed without energy constraints is studied. It is shown that for unconstrained attacks infinitely many optimal attack vectors exist and that the construction requires knowledge of the state variables in the grid. Alternatively, when energy constraints are included, the attack vector construction does not depend on the state variables. As a consequence, the optimal energy constrained attack strategy follows a correlated multivariate Gaussian distribution. It is shown that for unconstrained attacks infinitely many NEs exist and that in the constrained case at least one NE exists.

Original languageEnglish (US)
Title of host publication2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages779-783
Number of pages5
ISBN (Electronic)9781479970889
DOIs
StatePublished - Feb 5 2014
Event2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014 - Atlanta, United States
Duration: Dec 3 2014Dec 5 2014

Publication series

Name2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014

Other

Other2014 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2014
CountryUnited States
CityAtlanta
Period12/3/1412/5/14

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems

Fingerprint Dive into the research topics of 'Equilibria in data injection attacks'. Together they form a unique fingerprint.

Cite this