Sparsity and Coordination Constraints on Stealth Data Injection Attacks