Skip to Main content Skip to Navigation
Conference papers

Equilibria in data injection attacks

Iñaki Esnaola 1 Samir M. Perlaza 2 H. Vincent Poor 3
2 SOCRATE - Software and Cognitive radio for telecommunications
CITI - CITI Centre of Innovation in Telecommunications and Integration of services, Inria Grenoble - Rhône-Alpes
Abstract : —Data injection attacks are studied in a game theoretic setting. Assuming that the network operator acquires the state variables via generalized least squares (GLS) estimation, different attack performance metrics are proposed. The scenarios defined by the performance metrics are then analyzed. In particular, closed form expressions for best response functions and Nash equilibria (NEs) are given. First the case in which the attack vector can be constructed without energy constraints is studied. It is shown that for unconstrained attacks infinitely many optimal attack vectors exist and that the construction requires knowledge of the state variables in the grid. Alternatively, when energy constraints are included, the attack vector construction does not depend on the state variables. As a consequence, the optimal energy constrained attack strategy follows a correlated multivariate Gaussian distribution. It is shown that for unconstrained attacks infinitely many NEs exist and that in the constrained case at least one NE exists.
Complete list of metadata

Cited literature [9 references]  Display  Hide  Download
Contributor : Victor Quintero <>
Submitted on : Monday, December 21, 2015 - 4:40:03 PM
Last modification on : Wednesday, July 8, 2020 - 12:43:15 PM
Long-term archiving on: : Saturday, April 29, 2017 - 11:29:59 PM


Files produced by the author(s)




Iñaki Esnaola, Samir M. Perlaza, H. Vincent Poor. Equilibria in data injection attacks. 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP), Dec 2014, Atlanta, Georgia, United States. ⟨10.1109/GlobalSIP.2014.7032225⟩. ⟨hal-01247321⟩



Record views


Files downloads