An Evolutionary Game for Integrity Attacks and Defences for Advanced Metering Infrastructure

被引:4
作者
Boudko, Svetlana [1 ]
Abie, Habtamu [1 ]
机构
[1] Norsk Regnesentral, Oslo, Norway
来源
ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS | 2018年
关键词
Security; Data Integrity; Game Theory; Evolutionary Game Theory; Advanced Metering Infrastructure; Smart Meters; SYSTEMS;
D O I
10.1145/3241403.3241463
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart grids are complex cyber-physical systems that face many security challenges. Advanced Metering Infrastructure (AMI), which is one of the main components of the smart grid, represents an important branch of services with increasing deployments that also introduce new security risks. The nodes of AMIs are featured as resource-constrained. Therefore, security attacks including data integrity attacks on AMIs are of serious concern and require efficient selection of protective strategies. In this paper, we propose an evolutionary game framework that models integrity attacks and defenses in an AMI. The aim of this framework is to study possible behaviors of adversaries and to define how the AMI nodes can adaptively select their strategies with maximum payoffs of the nodes. We present a case study and illustrate how the framework can be applied to investigate the integrity threats in AMI systems. We show the evolution process, based on the replicator dynamic.
引用
收藏
页数:7
相关论文
共 38 条
[1]   Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage [J].
Abass, Ahmed A. Alabdel ;
Xiao, Liang ;
Mandayam, Narayan B. ;
Gajic, Zoran .
IEEE ACCESS, 2017, 5 :8482-8491
[2]  
Abdalzaher Mohamed S., 2016, SENSORS
[3]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[4]   Evolutionary Game-Based Defense Mechanism in the MANETs [J].
Bouhaddi, Myria ;
Adi, Kamel ;
Radjef, Mohammed Said .
SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, :88-95
[5]  
Cárdenas AA, 2012, ANN ALLERTON CONF, P1830, DOI 10.1109/Allerton.2012.6483444
[6]   False Data Injection on State Estimation in Power Systems-Attacks, Impacts, and Defense: A Survey [J].
Deng, Ruilong ;
Xiao, Gaoxi ;
Lu, Rongxing ;
Liang, Hao ;
Vasilakos, Athanasios V. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2017, 13 (02) :411-423
[7]   Game Theory for Cyber Security and Privacy [J].
Do, Cuong T. ;
Tran, Nguyen H. ;
Hong, Choongseon ;
Kamhoua, Charles A. ;
Kwiat, Kevin A. ;
Blasch, Erik ;
Ren, Shaolei ;
Pissinou, Niki ;
Iyengar, Sundaraja Sitharama .
ACM COMPUTING SURVEYS, 2017, 50 (02) :30-37
[8]  
Ericsson, 2017, ERICSSON MOBILITY RE
[9]  
Fadlullah Z.M., 2011, P INT C WIRELESS COM, P1, DOI [10.1109/WCSP.2011.6096962, DOI 10.1109/WCSP.2011.6096962]
[10]  
Ficici S.G., 2000, Proceedings of the 2nd Annual Conference on Genetic and Evolutionary Computation, P927