![Page 1: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/1.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 1/ 21
Communication Capacity Requirement forReliable and Secure State Estimation in Smart
Grid
Authors: Husheng Li, Lifeng Lai, and Robert Qiu
Presenter: Mustafa El-Halabi
Submitted in Partial Fulfillment of the Course Requirements forECEN 689: Cyber Security of the Smart Grid
Instructor: Dr. Deepa Kundur
![Page 2: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/2.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 2/ 21
Main Objective
Establishing fundamentals limits (information-theoretic limits)for secure transmission of State Estimation in the Smart Grid
![Page 3: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/3.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 3/ 21
Outline
1. Confidentiality Techniques
2. Mathematical Background
3. Information-theoretic Security
4. Smart Grid Dynamic Model
5. Security Metric for Smart Grid Dynamic Model
6. Fundamental Limits for Secure Communications
7. Concluding Remarks
![Page 4: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/4.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 4/ 21
Smart Grid :
• Wireless links prone to eavesdropping attacks
1. active eavesdropping
2. passive eavesdropping
![Page 5: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/5.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 4/ 21
Smart Grid :
• Wireless links prone to eavesdropping attacks
1. active eavesdropping
2. passive eavesdropping
• Security issues:
− Confidentiality
− Integrity
− Authentication
− Nonrepudiation
![Page 6: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/6.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 5/ 21
Confidentiality techniques
• Cryptography: Private-key / Public-key cryptosystems
![Page 7: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/7.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 5/ 21
Confidentiality techniques
• Cryptography: Private-key / Public-key cryptosystems
• Information-theoretic security
![Page 8: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/8.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 6/ 21
Mathematical Background
• Entropy
− A measure of uncertainty associated with a random variable− Entropy of a discrete r.v. X with values {x1, ..., xn} :
H(X ) = −n∑
i=1
p(xi ) log p(xi )
− Entropy of a fair coin = 1 bit, entropy of a biased-(1/3, 2/3)coin = 0.81 bits
![Page 9: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/9.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 6/ 21
Mathematical Background
• Entropy
− A measure of uncertainty associated with a random variable− Entropy of a discrete r.v. X with values {x1, ..., xn} :
H(X ) = −n∑
i=1
p(xi ) log p(xi )
− Entropy of a fair coin = 1 bit, entropy of a biased-(1/3, 2/3)coin = 0.81 bits
• Conditional entropy (Equivocation)
− A measure of the remaining uncertainty of a r.v. Y given thatthe value of X is known
− Conditional entropy of Y given X :
H(Y |X ) = −∑x∈X
∑y∈Y
p(x , y) log p(y |x)
![Page 10: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/10.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 7/ 21
Mathematical Background
• Mutual Information
− A measure of how much knowing one r.v. reduces ouruncertainty about another r.v.
− I (X ;Y ) = H(Y )− H(Y |X )
![Page 11: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/11.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 7/ 21
Mathematical Background
• Mutual Information
− A measure of how much knowing one r.v. reduces ouruncertainty about another r.v.
− I (X ;Y ) = H(Y )− H(Y |X )
• Channel Capacity
X YChannel
− Rate (bits/s) of reliable transmission = I (X ;Y )− Channel Capacity
C = maxp(x)
I (X ;Y )
![Page 12: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/12.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 8/ 21
Information-Theoretic Security for the Smart Grid
Goal:
Establish fundamental limits on the rate (bit/s) at which secureand reliable system state estimation in a smart grid could be
communicated (Secrecy Capacity)
![Page 13: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/13.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 9/ 21
A Smart Grid System Model
Encoder DecoderSystemState
Control Center
XN Y N
ZN
N1
N2 (Eavesdropper)
Sk
Y = X + N1
Z = X + N1 + N2
E [|X |2] ≤ P, N1 ∼ N (0, σ21), N2 ∼ N (0, σ2
2)
![Page 14: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/14.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 10/ 21
Security Metric: Normalized Equivocation
Encoder DecoderSystemState
Control Center
XN Y N
ZN
N1
N2 (Eavesdropper)
Sk
∆ =H(Sk |ZN)
H(Sk)
= residual uncertainty about the message at the eavesdropper
=
{0 no secrecy1 perfect secrecy
![Page 15: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/15.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 11/ 21
Secrecy Capacity of the Gaussian Wiretap Channel
Encoder DecoderSystemState
Control Center
XN Y N
ZN
N1
N2 (Eavesdropper)
Sk
• Information source S is ergodic and belongs to finite-lengthalphabet:Secrecy Capacity
Cs =1
2log
(1 +
P
σ21
)− 1
2log
(1 +
P
σ22 + σ2
1
)
![Page 16: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/16.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 12/ 21
Smart Grid Security Meter
Normalized equivocation ∆ needs to be modified:
1. SG is a dynamic system, information might not be ergodic
2. Source alphabet in SG is continuous
Fundamental limits need to be revisited in the context of SG !
![Page 17: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/17.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 13/ 21
Dynamics of a SG
x(t + 1) = F (x(t),w(t))
x(t) = state vector at time slot tw(t) = random factor
F = map previous state to next state
![Page 18: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/18.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 14/ 21
Redefining ”Equivocation” for the SG
∆ = H(Sk |ZN)H(Sk )
= ??
Tools:
1. Topological Entropy
2. Spanning Set
![Page 19: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/19.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 15/ 21
Topological Entropy
x(t + 1) = F (x(t),w(t))
Definition: Topological Entropy
H(F ,X ) = limε→0
limk→∞
1
klog q(k , ε)
H(F ,X ) is the uncertainty of the dynamic systemlog q(k, ε) is the number of bits to describe an approximation (ε)of system’s dynamic behavior during time slot k .
![Page 20: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/20.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 16/ 21
Spanning Set
x(t + 1) = F (x(t),w(t))
Let Xk = set of all possible {x1, ..., xk}
Definition: (k , ε)-Spanning Set
For k > 0, ε > 0, a finite set Q ⊂ Xk is (k , ε)-spanning set if, forany x ∈ Xk , we can always find an x̂ ∈ Q, s.t.‖ x(t)− x̂(t) ‖∞< ε, t = 1, ..., k.
![Page 21: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/21.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 17/ 21
Revisiting Equivocation ∆
• For ergodic finite-length alphabet source: ∆ = H(Sk |ZN)H(Sk )
• Using topological entropy: H(Sk)→ H(F ,X )
• Using (k , ε)-Spanning Set: H(Sk |ZN)→ H(F ,X|Z )
For a SG dynamic system: ∆ = H(F ,X|Z)H(F ,X )
![Page 22: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/22.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 18/ 21
Reliable & Secure Communication: Definitions
Secure System
If communication between sensor and controller satisfies ∆ = 1,the communication is secure.
![Page 23: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/23.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 19/ 21
Secure Communication Requirement for the Smart Grid
Main results:
• If H(F ,X ) ≤ C1 − C2, reliable and secure communication isguaranteed.
• If C1 − C2 < H(F ,X ) ≤ C1, only reliable communication isguaranteed.
• If H(F ,X ) > C1, neither reliable communication nor securityis guaranteed.
where, C1 = 12 log
(1 + P
σ21
), C2 = 1
2 log(
1 + Pσ2
2+σ21
)
![Page 24: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/24.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 20/ 21
Assessment
• First Information-theoretic approach to smart grid security
• The Fundamental limits for secure communication in a smartgrid environment build foundation for more precise problems,with answers that could provide important insights into thenature of secret communication
• The insights may be used to shape development of practicalsystems for encryption in complex settings
• The model considered is far simpler than the practical case
• A multiuser setting needs to be investigated
![Page 25: Communication Capacity Requirement for Reliable and Secure ...dkundur/course_info... · Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 20111](https://reader035.vdocuments.mx/reader035/viewer/2022063003/5f6c9b2b4b7822677b1d4de6/html5/thumbnails/25.jpg)
Class Presentation, Mustafa El-Halabi ECEN 689: Cyber Security of the Smart Grid, Spring 2011 21/ 21
References
Y. Liang, S. K. Yan-Cheong, and M. Hellman, “The GaussianWiretap Channel,” IEEE Trans. Inform. Theory, vol. 24,pp. 451–456, July 1978.
Y. Liang, A. S. Matveev, and A. V. Savkin, “Estimation andControl Over Communication Networks,” Birkhauser, 2009.
C. E. Shannon, “Communication theory of secrecy systems,”Bell Systems Technical Journal, vol. 28, pp. 656–715,Oct. 1949.
Y. Liang, H. V. Poor, and S. Shamai (Shitz), “InformationTheoretic Security,” Foundations and Trends inCommunications and Information Theory, vol. 5, nos. 4-5,pp. 355–580, Now Publishers, Hanover, MA, USA, 2008.