| Literature DB >> 32731595 |
Panagiotis Diamantoulakis1, Christos Dalamagkas2, Panagiotis Radoglou-Grammatikis3, Panagiotis Sarigiannidis3, George Karagiannidis1.
Abstract
The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two-way flow of power and data, as well as the use of Internet of Things (IoT) technologies and devices. However, converting the traditional power grids to smart grids poses severe security challenges and makes their components and services prone to cyber attacks. To this end, advanced techniques are required to mitigate the impact of the potential attacks. In this paper, we investigate the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the real devices. More specifically, the interaction of an attacker and a defender is considered, who both optimize the number of attacks and the defending system configuration, i.e., the number of real devices and honeypots, respectively, with the aim to maximize their individual payoffs. To solve this problem, game theoretic tools are used, considering an one-shot game and a repeated game with uncertainty about the payoff of the attacker, where the Nash Equilibrium (NE) and the Bayesian NE are derived, respectively. Finally, simulation results are provided, which illustrate the effectiveness of the proposed framework.Entities:
Keywords: cybersecurity; game theory; honeypots; smart grid
Year: 2020 PMID: 32731595 PMCID: PMC7435919 DOI: 10.3390/s20154199
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Depiction of various threats and possible honeypot deployments in smart grids.
Notation.
| Parameter | Definition |
|---|---|
|
| attacker |
|
| defender |
|
| strategy of the attacker for the |
|
| strategy of the defender for the |
|
| number of real devices |
|
| total number of available hosts |
|
| sum of connected real devices and honeypots |
|
| different terms’ weights of attacker’s payoffs |
|
| different terms’ weights of defender’s payoffs |
|
| portion of the number of hosts ( |
|
| portion of the number of hosts ( |
|
| the maximum portion of the number of hosts ( |
|
| payoff of player |
| functions of | |
|
| set of players |
|
| set of actions for player |
| auxiliary variables | |
|
| expected value of |
|
| probability of the event |
| the two types of attacker | |
|
| attacker of type |
|
| weight’s of attacker’s payoff when he is of type |
|
| weight’s of attacker’s payoff when he is of type |
|
| belief that the attacker is of type |
|
| probability of attacking each host for the attacker of type |
|
| maximum value of the probability of attacking each host for the attacker of type |
|
| states of the nature |
|
| round of the game in a repeated game |
|
| game |
|
| history of the game after |
|
| |
|
| cost of under or over estimating the demand of the |
|
| the probability density function of the actual energy consumption |
|
| the mean energy demand of the |
|
| the maximum energy consumption |
|
| energy price in the unit commitment stage |
|
| energy price in the economic-dispatch stage |
Simulation parameters for the one-shot game.
| Parameter | Value |
|---|---|
|
| 3 |
|
| 10 |
|
| 1 |
|
|
|
|
|
|
| Random solutions for | 2000 |
| Random solutions for | 2000 |
Figure 2Attacker’s payoff for different strategies in the one-shot game.
Figure 3Defender’s payoff for different strategies in the one-shot game.
Simulation parameters for the one-shot game when equilibrium does not exist.
| Parameter | Value |
|---|---|
|
| 3 |
|
| 10 |
|
| 1 |
|
|
|
|
|
|
| Random solutions for | 2000 |
Figure 4Defender’s worst-case payoff when equilibrium does not exist.
Simulation parameters for the repeated game.
| Parameter | Value |
|---|---|
| Number of rounds | 50 |
|
| 6 |
|
| 8 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure 5Attacker’s payoff for different strategies in a single turn of the repeated game.
Figure 6Players’ payoff for different strategies in a single turn of the repeated game.
Figure 7Defender’s belief in the repeated game.
Figure 8Defender’s payoff in the repeated game.