Trade-offs in Data-Driven False Data Injection Attacks Against the Power Grid
Paper in proceeding, 2018

We address the problem of constructing false data injection (FDI) attacks that can bypass the bad data detector (BDD) of a power grid. The attacker is assumed to have access to only power flow measurement data traces (collected over a limited period of time) and no other prior knowledge about the grid. Existing related algorithms are formulated under the assumption that the attacker has access to measurements collected over a long (asymptotically infinite) time period, which may not be realistic. We show that these approaches do not perform well when the attacker has a limited number of data samples only. We design an enhanced algorithm to construct FDI attack vectors in the face of limited measurements that can nevertheles bypass the BDD with high probability. Furthermore, we characterize an important trade-off between the attack's BDD-bypass probability and its sparsity, which affects the spatial extent of the attack that must be achieved. Extensive simulations using data traces collected from the MATPOWER simulator and benchmark IEEE bus systems validate our findings.

BDD-bypass probability

sparsity of attack vector

bad data detection

Data-driven FDI attack

Author

Subhash Lakshminarayana

Advanced Digital Sciences Center (ADSC), Singapore

Fuxi Wen

Chalmers, Electrical Engineering, Communication, Antennas and Optical Networks

David K. Y. Yau

Advanced Digital Sciences Center (ADSC), Singapore

Singapore University of Technology and Design

ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings

15206149 (ISSN)

Vol. 2018-April 2022-2026 8461493

IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Calgary, Canada,

Subject Categories

Electrical Engineering, Electronic Engineering, Information Engineering

DOI

10.1109/ICASSP.2018.8461493

More information

Latest update

4/5/2022 7