Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

False Data Injection and Detection in LQG Systems: A Game Theoretic Approach

Journal Article · · IEEE Transactions on Control of Network Systems
 [1];  [2]
  1. Lehigh Univ., Bethlehem, PA (United States); Lehigh Univ., Bethlehem, PA (United States)
  2. Lehigh Univ., Bethlehem, PA (United States)
Cyber-physical systems are vulnerable to false data injection by adversaries who compromise cyber communication links. In this paper, an infinite horizon linear quadratic Gaussian (LQG) system is considered wherein the control inputs transmitted over cyber links are vulnerable to compromise and false data injection by adversaries. The adversarial cyber-attack is driven to minimize the performance of the LQG system, and the controller is equipped with an intrusion detection system that monitors the sequence of internal physical states to detect adversarial input modification. The problem is formulated as a two-player zero-sum game with the false alarm probability as the reward, wherein the attacker aims to achieve a target increase in controller cost while maximizing the false alarm probability, and a detector who wishes to minimize the false alarm probability while remaining consistent. It is shown that in such a game, an ε-equilibrium exists. The equilibrium attacker strategy is the one that minimizes the Kullback-Leibler distance between legitimate and falsified state dynamics, and the equilibrium detector strategy is the corresponding likelihood-ratio test. Numerical simulations are presented that showcase the equilibrium strategy pair and the intuitive strategies comparisons.
Research Organization:
Univ. of Arkansas, Fayetteville, AR (United States)
Sponsoring Organization:
USDOE Office of Electricity Delivery and Energy Reliability (OE)
Grant/Contract Number:
OE0000779
OSTI ID:
1801312
Journal Information:
IEEE Transactions on Control of Network Systems, Journal Name: IEEE Transactions on Control of Network Systems Journal Issue: 1 Vol. 7; ISSN 2325-5870
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

References (21)

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements journal February 2017
Stealthy control signal attacks in vector LQG systems conference July 2016
A game theoretic approach to decision and analysis in network intrusion detection conference January 2003
Optimal control in the presence of an intelligent jammer with limited actions conference December 2010
A game theoretic approach to analyze false data injection and detection in LQG system conference October 2017
False data injection attacks with incomplete information against smart power grids conference December 2012
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid conference April 2012
A Chi-square test for fault-detection in Kalman filters journal June 1987
Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks journal June 2014
On Kalman Filtering with Compromised Sensors: Attack Stealthiness and Performance Bounds journal December 2017
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks journal March 2017
Optimal DoS Attack Scheduling in Wireless Networked Control System journal May 2016
Two-Channel False Data Injection Attacks Against Output Tracking Control of Networked Systems journal May 2016
Stealthy Attacks in Dynamical Systems: Tradeoffs Between Utility and Detectability With Application in Anonymous Systems journal April 2017
Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff journal July 2017
Integrity Data Attacks in Power Market Operations journal December 2011
Malicious Data Attacks on the Smart Grid journal December 2011
Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study journal March 2013
False data injection attacks against state estimation in electric power grids journal May 2011
Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches journal September 2004
On von Neumann’s minimax theorem journal January 1954

Similar Records

Trust-Based Detection and Mitigation of Cyber Attacks in Distributed Cooperative Control of Islanded AC Microgrids
Journal Article · Sat Aug 31 20:00:00 EDT 2024 · Electronics · OSTI ID:2580297

Discrete game-theoretic analysis of defense in correlated cyber-physical systems
Journal Article · Fri Sep 20 20:00:00 EDT 2019 · Annals of Operations Research · OSTI ID:1649008

Related Subjects