Subspace Methods for Data Attack on State Estimation: A Data Driven Approach Public Deposited

http://ir.library.oregonstate.edu/concern/articles/8336h3900

©2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

This is an author's peer-reviewed final manuscript, as accepted by the publisher. The published article is copyrighted by IEEE-Institute of Electrical and Electronics Engineers and can be found at:  http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=78

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters. Such information is difficult to acquire in practice. The subspace methods presented in this paper, on the other hand, learn the system operating subspace from measurements and launch attacks accordingly. Conditions for the existence of an unobservable subspace attack are obtained under the full and partial measurement models. Using the estimated system subspace, two attack strategies are presented. The first strategy aims to affect the system state directly by hiding the attack vector in the system subspace. The second strategy misleads the bad data detection mechanism so that data not under attack are removed. Performance of these attacks are evaluated using the IEEE 14- bus network and the IEEE 118-bus network.
Resource Type
DOI
Date Available
Date Issued
Citation
  • Kim, J., Tong, L., & Thomas, R. J. (2015). Subspace Methods for Data Attack on State Estimation: A Data Driven Approach. IEEE Transactions on Signal Processing, 63(5), 1102-1114. doi:10.1109/TSP.2014.2385670
Series
Keyword
Rights Statement
Funding Statement (additional comments about funding)
Publisher
Peer Reviewed
Language
Replaces
Additional Information
  • description.provenance : Made available in DSpace on 2015-06-26T21:56:14Z (GMT). No. of bitstreams: 1 KimJinsubElectEngnComputSciSubspaceMethodsDataAttackOnStateEstimation.pdf: 484101 bytes, checksum: 40ddebcdfdd06dadae4bfb6424094def (MD5) Previous issue date: 2015-03-01
  • description.provenance : Approved for entry into archive by Deanne Bruner(deanne.bruner@oregonstate.edu) on 2015-06-26T21:56:14Z (GMT) No. of bitstreams: 1 KimJinsubElectEngnComputSciSubspaceMethodsDataAttackOnStateEstimation.pdf: 484101 bytes, checksum: 40ddebcdfdd06dadae4bfb6424094def (MD5)
  • description.provenance : Submitted by Deanne Bruner (deanne.bruner@oregonstate.edu) on 2015-06-26T21:55:23Z No. of bitstreams: 1 KimJinsubElectEngnComputSciSubspaceMethodsDataAttackOnStateEstimation.pdf: 484101 bytes, checksum: 40ddebcdfdd06dadae4bfb6424094def (MD5)

Relationships

In Administrative Set:
Last modified: 07/26/2017

Downloadable Content

Download PDF
Citations:

EndNote | Zotero | Mendeley

Items