Game theory in network security for digital twins in industry

被引:2
|
作者
Feng, Hailin [1 ]
Chen, Dongliang [2 ]
Lv, Haibin [3 ]
Lv, Zhihan [4 ]
机构
[1] Zhejiang A&F Univ, Sch Informat Engn, Hangzhou 311300, Peoples R China
[2] Qingdao Univ, Sch Data Sci & Software Engn, Qingdao 266000, Peoples R China
[3] Minist Nat Resources North Sea Bur, North China Sea Offshore Engn Survey Inst, Qingdao 266000, Peoples R China
[4] Uppsala Univ, Fac Arts, Dept Game Design, Uppsala, Sweden
关键词
Digital twins; Industrial internet of things; Network security; Game theory; Attack and defense; INTERNET; FUTURE; CYBERSECURITY; OPTIMIZATION; ENVIRONMENT; MODEL;
D O I
10.1016/j.dcan.2023.01.004
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x(0)) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y(0)) of white hat 2 choosing the knowledge sharing policy initially. When y(0) = 0.9, X converges rapidly in a relatively short time. When y(0) is constant and x(0) is small, the probability curve of the "cooperative development" strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.
引用
收藏
页码:1068 / 1078
页数:11
相关论文
共 50 条
  • [1] Game theory in network security for digital twins in industry
    Hailin Feng
    Dongliang Chen
    Haibin Lv
    Zhihan Lv
    Digital Communications and Networks, 2024, 10 (04) : 1068 - 1078
  • [2] Game Theory for Network Security
    Liang, Xiannuan
    Xiao, Yang
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 472 - 486
  • [3] Game Theory Meets Network Security
    Zhu, Quanyan
    Rass, Stefan
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2163 - 2165
  • [4] Network Security Validation Using Game Theory
    Papadopoulou, Vicky
    Gregoriades, Andreas
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 259 - 266
  • [5] A Survey of Game Theory as Applied to Network Security
    Roy, Sankardas
    Ellis, Charles
    Shiva, Sajjan
    Dasgupta, Dipankar
    Shandilya, Vivek
    Wu, Qishi
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 880 - 889
  • [6] Game Theory Meets Network Security and Privacy
    Manshaei, Mohammad Hossein
    Zhu, Quanyan
    Alpcan, Tansu
    Basar, Tamer
    Hubaux, Jean-Pierre
    ACM COMPUTING SURVEYS, 2013, 45 (03)
  • [7] Deep Learning Driven Security in Digital Twins of Drone Network
    Wu, Jingyi
    Guo, Jinkang
    Lv, Zhihan
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022,
  • [9] Digital twins as a security risk?
    Guikema, Seth
    Flage, Roger
    RISK ANALYSIS, 2024,
  • [10] Enabling Security and Safety Evaluation in Industry 4.0 Use Cases with Digital Twins
    Tauber, Markus
    Schmittner, Christoph
    ERCIM NEWS, 2018, (115): : 23 - 24