A Strategic Analysis of Attacker-Defender Repeated Game in Smart Grid Security

被引:7
|
作者
Paul, Shuva [1 ]
Ni, Zhen [1 ]
机构
[1] South Dakota State Univ, Dept Elect Engn & Comp Sci, Brookings, SD 57006 USA
关键词
Repeated game; smart grid security; attacker-defender game; strategic analysis; and budget limitation;
D O I
10.1109/isgt.2019.8791629
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Traditional power grid security schemes are being replaced by highly advanced and efficient smart security schemes due to the advancement in grid structure and inclusion of cyber control and monitoring tools. Smart attackers create physical, cyber, or cyber-physical attacks to gain the access of the power system and manipulate/override system status, measurements and commands. In this paper, we formulate the environment for the attacker-defender interaction in the smart power grid. We provide a strategic analysis of the attacker-defender strategic interaction using a game theoretic approach. We apply repeated game to formulate the problem, implement it in the power system, and investigate for optimal strategic behavior in terms of mixed strategies of the players. In order to define the utility or cost function for the game payoffs calculation, generation power is used. Attack-defense budget is also incorporated with the attacker-defender repeated game to reflect a more realistic scenario. The proposed game model is validated using IEEE 39 bus benchmark system. A comparison between the proposed game model and the all monitoring model is provided to validate the observations.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An Attacker-Defender Game for Honeynets
    Cai, Jin-Yi
    Yegneswaran, Vinod
    Alfeld, Chris
    Barford, Paul
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 7 - +
  • [2] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent
    Grijalva, Santiago
    2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,
  • [3] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    CRYPTOGRAPHY, 2021, 5 (02)
  • [4] A Time Correlated Attacker-Defender Model for Smart Grid Communication Networks
    Bi, Ying
    Jamalipour, Abbas
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 815 - 819
  • [5] An Attacker-Defender Game Model with Constrained Strategies
    Ren, Jiaqi
    Liu, Jin
    Dong, Yibo
    Li, Zhe
    Li, Weili
    ENTROPY, 2024, 26 (08)
  • [6] A Review of Attacker-Defender Games and Cyber Security
    Hausken, Kjell
    Welburn, Jonathan W.
    Zhuang, Jun
    GAMES, 2024, 15 (04):
  • [7] Strategic safeguarding: A game theoretic approach for analyzing attacker-defender behavior in DNN backdoors
    Kassem Kallas
    Quentin Le Roux
    Wassim Hamidouche
    Teddy Furon
    EURASIP Journal on Information Security, 2024 (1)
  • [8] Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game
    Hunt, Kyle
    Agarwal, Puneet
    Zhuang, Jun
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2021, 207
  • [9] Modeling a Multitarget Attacker-Defender Game with Budget Constraints
    Guan, Peiqiu
    He, Meilin
    Zhuang, Jun
    Hora, Stephen C.
    DECISION ANALYSIS, 2017, 14 (02) : 87 - 107
  • [10] Attacker-defender game from a network science perspective
    Li, Ya-Peng
    Tan, Suo-Yi
    Deng, Ye
    Wu, Jun
    CHAOS, 2018, 28 (05)