A Comprehensive Survey on Game Theory Applications in Cyber-Physical System Security: Attack Models, Security Analyses, and Machine Learning Classifications

被引:0
|
作者
Mejdi, Hana [1 ]
Elmadssia, Sami [1 ]
Koubaa, Mohamed [1 ]
Ezzedine, Tahar [1 ]
机构
[1] Univ Tunis El Manar, Natl Engn Sch Tunis, Commun Syst Lab SysCom, Tunis 1068, Tunisia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; Games; Game theory; Analytical models; Jamming; Surveys; Cyber-physical systems; Computational modeling; Stochastic processes; Sensor systems; game theory; security; attack model; machine learning; classification; NETWORKED CONTROL-SYSTEMS; REMOTE STATE ESTIMATION; FRAMEWORK;
D O I
10.1109/ACCESS.2024.3491502
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing integration of cyber-physical systems (CPS) in critical infrastructures has heightened the importance of ensuring their security against various cyber threats. Game theory has emerged as a powerful analytical tool to model and analyze the strategic interactions between attackers and defenders in CPS. This survey provides a comprehensive review of the state-of-the-art research on the application of game theory in the security of CPS, with a specific focus on attack models and security analysis. We employ machine learning algorithms to classify existing research papers based on the attack target and the types of attacks they address. Our classification reveals significant trends and gaps in the current literature, offering insights into the effectiveness of different game-theoretic approaches and the prevalence of various attack models. By synthesizing the findings from over 800 research papers, we highlight the strengths and limitations of existing methodologies and propose directions for future research. This survey aims to serve as a valuable resource for researchers and practitioners seeking to enhance the security of CPS through game-theoretic frameworks and machine learning techniques.
引用
收藏
页码:163638 / 163653
页数:16
相关论文
共 50 条
  • [1] A Survey of Attack Models for Cyber-Physical Security Assessment in Electricity Grid
    Chen, Yu-Cheng
    Mooney, Vincent
    Grijalva, Santiago
    2019 IFIP/IEEE 27TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2019, : 242 - 243
  • [2] Application of Machine Learning in Cyber Security of Cyber-Physical Power System
    Peng, Sha
    Sun, Mingyang
    Zhang, Zhenyong
    Deng, Ruilong
    Cheng, Peng
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2022, 46 (09): : 200 - 215
  • [3] Generalization of Deep Learning for Cyber-Physical System Security: A Survey
    Wickramasinghe, Chathurika S.
    Marino, Daniel L.
    Amarasinghe, Kasun
    Manic, Milos
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 745 - 751
  • [4] Analysis of Machine Learning and Deep Learning in Cyber-Physical System Security
    Ankita
    Zaguia, Atef
    Rani, Shalli
    Bashir, Ali Kashif
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION NETWORKS (ICCCN 2021), 2022, 394 : 355 - 363
  • [5] A Hybrid Game Theory and Reinforcement Learning Approach for Cyber-Physical Systems Security
    Khoury, Joseph
    Nassar, Mohamed
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [6] Machine learning security attacks and defense approaches for emerging cyber physical applications: A comprehensive survey
    Singh, Jaskaran
    Wazid, Mohammad
    Das, Ashok Kumar
    Chamola, Vinay
    Guizani, Mohsen
    COMPUTER COMMUNICATIONS, 2022, 192 : 316 - 331
  • [7] A Survey on Machine-Learning Based Security Design for Cyber-Physical Systems
    Kim, Sangjun
    Park, Kyung-Joon
    APPLIED SCIENCES-BASEL, 2021, 11 (12):
  • [8] Evasion Attack and Defense on Machine Learning Models in Cyber-Physical Systems: A Survey
    Wang, Shunyao
    Ko, Ryan K. L.
    Bai, Guangdong
    Dong, Naipeng
    Choi, Taejun
    Zhang, Yanjun
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 930 - 966
  • [9] Security Analysis on Cyber-Physical System Using Attack Tree
    Xie, Feng
    Lu, Tianbo
    Guo, Xiaobo
    Liu, Jingli
    Peng, Yong
    Gao, Yang
    2013 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2013), 2013, : 429 - 432
  • [10] A survey on the security of cyber-physical systems
    Wu G.
    Sun J.
    Chen J.
    Control Theory and Technology, 2016, 14 (1) : 2 - 10