Game theory in network security for digital twins in industry

被引:9
作者
Feng, Hailin [1 ]
Chen, Dongliang [2 ]
Lv, Haibin [3 ]
Lv, Zhihan [4 ]
机构
[1] Zhejiang A&F Univ, Sch Informat Engn, Hangzhou 311300, Peoples R China
[2] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266000, Peoples R China
[3] Minist Nat Resources North Sea Bur, North China Sea Offshore Engn Survey Inst, Qingdao 266000, Peoples R China
[4] Uppsala Univ, Fac Arts, Dept Game Design, Uppsala, Sweden
关键词
Digital twins; Industrial internet of things; Network security; Game theory; Attack and defense; INTERNET; FUTURE; CYBERSECURITY; OPTIMIZATION; ENVIRONMENT; MODEL;
D O I
10.1016/j.dcan.2023.01.004
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x(0)) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y(0)) of white hat 2 choosing the knowledge sharing policy initially. When y(0) = 0.9, X converges rapidly in a relatively short time. When y(0) is constant and x(0) is small, the probability curve of the "cooperative development" strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.
引用
收藏
页码:1068 / 1078
页数:11
相关论文
共 50 条
  • [21] A Digital Twins Approach to Smart Grid Security Testing and Standardization
    Atalay, Manolya
    Angin, Pelin
    2020 IEEE INTERNATIONAL WORKSHOP ON METROLOGY FOR INDUSTRY 4.0 & IOT (METROIND4.0&IOT), 2020, : 435 - 440
  • [22] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [23] Digital twins: Transforming the chemical process industry-A review
    Pal, Pratyush Kumar
    Hens, Abhiram
    Behera, Narottam
    Lahiri, Sandip Kumar
    CANADIAN JOURNAL OF CHEMICAL ENGINEERING, 2025,
  • [24] Towards the Development of Digital Twins for the Bio-manufacturing Industry
    Gargalo, Carina L.
    de las Heras, Simoneta Cano
    Jones, Mark Nicholas
    Udugama, Isuru
    Mansouri, Seyed Soheil
    Kruhne, Ulrich
    Gernaey, Krist V.
    DIGITAL TWINS: TOOLS AND CONCEPTS FOR SMART BIOMANUFACTURING, 2021, 176 : 1 - 34
  • [25] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [26] Privacy and Security Issues for Human Digital Twins
    Sirigu, Giorgia
    Carminati, Barbara
    Ferrari, Elena
    2022 IEEE 4TH INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS, AND APPLICATIONS, TPS-ISA, 2022, : 1 - 9
  • [27] ELEGANT: Security of Critical Infrastructures With Digital Twins
    Sousa, Bruno
    Arieiro, Miguel
    Pereira, Vasco
    Correia, Joao
    Lourenco, Nuno
    Cruz, Tiago
    IEEE ACCESS, 2021, 9 : 107574 - 107588
  • [28] Game strategies in network security
    Lye K.-W.
    Wing J.M.
    International Journal of Information Security, 2005, 4 (1-2) : 71 - 86
  • [29] Analysis on Server Marketplace in the Network Game Industry Based on the View of Game Theory and Hotelling Model
    Ming, Li
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 8896 - 8899
  • [30] Security in IoT-Enabled Digital Twins of Maritime Transportation Systems
    Liu, Jun
    Li, Chunlin
    Bai, Jingpan
    Luo, Youlong
    Lv, Haibin
    Lv, Zhihan
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (02) : 2359 - 2367