Skip to main content
Top

2017 | OriginalPaper | Chapter

A Stochastic Game-Theoretic Model for Smart Grid Communication Networks

Authors : Xiaobing He, Hermann de Meer

Published in: Decision and Game Theory for Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The increasing adoption of new information and communication technology assets in smart grids is making smart grids vulnerable to cyber threats, as well as raising numerous concerns about the adequacy of current security approaches. As a single act of penetration is often not sufficient for an attacker to achieve his/her goal, multistage cyber attacks may occur. This paper looks at the stochastic and dynamic nature of multistage cyber attacks in smart grid use cases and develops a stochastic game-theoretic model to capture the interactions between the attacker and the defender in multistage cyber attack scenarios. Due to the information asymmetry of the interactions between the attacker and the defender, neither of both players knows the exact current game state. This paper proposes a belief-updating mechanism for both players to form a common belief about the current game state. In order to assess threats of multistage cyber attacks, it further discusses the computation of Nash equilibria for the designed game model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Chen, L., Leneutre, J.: Fight jamming with jamming – a game theoretic analysis of jamming attack in wireless networks and defense strategy. J. Comput. Netw.: Int. J. Comput. Telecommun. Network. 55(9), 2259–2270 (2011)CrossRef Chen, L., Leneutre, J.: Fight jamming with jamming – a game theoretic analysis of jamming attack in wireless networks and defense strategy. J. Comput. Netw.: Int. J. Comput. Telecommun. Network. 55(9), 2259–2270 (2011)CrossRef
3.
go back to reference European Union Agency for Network and Information Security. ENISA smart grid security recommendations. Technical report, European Union Agency for Network and Information Security (2012) European Union Agency for Network and Information Security. ENISA smart grid security recommendations. Technical report, European Union Agency for Network and Information Security (2012)
5.
go back to reference Filar, J.A., Schultz, T.A., Thuijsman, F., Vrieze, O.J.: Nonlinear programming and stationary equilibria in stochastic games. Math. Program. 50(1), 227–237 (1991)MathSciNetCrossRefMATH Filar, J.A., Schultz, T.A., Thuijsman, F., Vrieze, O.J.: Nonlinear programming and stationary equilibria in stochastic games. Math. Program. 50(1), 227–237 (1991)MathSciNetCrossRefMATH
6.
go back to reference Le Guillarme, N., Mouaddib, A-I., Gatepaille, S., Bellenger, A.: Adversarial intention recognition as inverse game-theoretic plan for threat assessment. In: IEEE 28th International Conference on Tools with Artificial Intelligence, January 2017 Le Guillarme, N., Mouaddib, A-I., Gatepaille, S., Bellenger, A.: Adversarial intention recognition as inverse game-theoretic plan for threat assessment. In: IEEE 28th International Conference on Tools with Artificial Intelligence, January 2017
7.
go back to reference Hamman, S.T., Hopkinson, K.M., McCarty, L.A.: Applying Behavioral game theory to cyber-physical systems protection planning. In: Cyber-Physcial Systems: Foundations, Principles and Applications, pp. 251–264. Elsevier (2017) Hamman, S.T., Hopkinson, K.M., McCarty, L.A.: Applying Behavioral game theory to cyber-physical systems protection planning. In: Cyber-Physcial Systems: Foundations, Principles and Applications, pp. 251–264. Elsevier (2017)
8.
go back to reference He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008) He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)
9.
go back to reference He, X., Sui, Z., de Meer, H.: Game-theoretic risk assessment in communication networks. In: IEEE 16th International Conference on Environment and Electrical Engieering (EEEIC). IEEE, June 2016 He, X., Sui, Z., de Meer, H.: Game-theoretic risk assessment in communication networks. In: IEEE 16th International Conference on Environment and Electrical Engieering (EEEIC). IEEE, June 2016
10.
go back to reference Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A methodology to apply a game theoretic model of security risks interdependencies between ICT and electric infrastructures. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 159–171. Springer, Cham (2016). doi:10.1007/978-3-319-47413-7_10 Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A methodology to apply a game theoretic model of security risks interdependencies between ICT and electric infrastructures. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 159–171. Springer, Cham (2016). doi:10.​1007/​978-3-319-47413-7_​10
11.
go back to reference Jones, M.G.: Asymmetric information games and cyber security. Ph.D. Thesis, Georgia Institute of Technology (2013) Jones, M.G.: Asymmetric information games and cyber security. Ph.D. Thesis, Georgia Institute of Technology (2013)
12.
go back to reference Kuhn, H.W.: Extensive games and the problem of information. Ann. Math. Stud. 28(28), 193–216 (1953)MathSciNetMATH Kuhn, H.W.: Extensive games and the problem of information. Ann. Math. Stud. 28(28), 193–216 (1953)MathSciNetMATH
13.
go back to reference Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutorials 15(1), 472–486 (2013)CrossRef Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutorials 15(1), 472–486 (2013)CrossRef
14.
go back to reference Lye, K.-W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1–2), 71–86 (2005)CrossRef Lye, K.-W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1–2), 71–86 (2005)CrossRef
15.
go back to reference Manshaei, M.H., Zhu, Q., Alpcan, T., Basa̧r, T., Hubaux, J.-P.: Game theory meets network security and privacy. J. ACM Comput. Surv. (CSUR) 45(3), 25:1–25:39 (2013) Manshaei, M.H., Zhu, Q., Alpcan, T., Basa̧r, T., Hubaux, J.-P.: Game theory meets network security and privacy. J. ACM Comput. Surv. (CSUR) 45(3), 25:1–25:39 (2013)
18.
go back to reference Melolidakis, C.: Stochastic games with lack of information on one side and positive stop probabilities. In: Raghavan, T.E.S., Ferguson, T.S., Parthasarathy, T., Vrieze, O.J. (eds.) Stochastic Games and Related Topics. TDLC, vol. 7, pp. 113–126. Springer, Netherlands (1991). doi:10.1007/978-94-011-3760-7_10 CrossRef Melolidakis, C.: Stochastic games with lack of information on one side and positive stop probabilities. In: Raghavan, T.E.S., Ferguson, T.S., Parthasarathy, T., Vrieze, O.J. (eds.) Stochastic Games and Related Topics. TDLC, vol. 7, pp. 113–126. Springer, Netherlands (1991). doi:10.​1007/​978-94-011-3760-7_​10 CrossRef
19.
go back to reference Miura-Ko, R.A., Yolken, B., Bambos, N., Mitchell, J.: Security investment games of interdependent organizations. In: 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE (2009) Miura-Ko, R.A., Yolken, B., Bambos, N., Mitchell, J.: Security investment games of interdependent organizations. In: 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE (2009)
20.
go back to reference Nash, J.: Non-cooperative Games. Ph.D. Thesis, Princeton University (1950) Nash, J.: Non-cooperative Games. Ph.D. Thesis, Princeton University (1950)
21.
go back to reference Nguyen, K.C., Alpcan, T., Basa̧r, T.: Stochastic games for security in networks with interdependent nodes. In: International Conference on Game Theory for Networks. IEEE, June 2009 Nguyen, K.C., Alpcan, T., Basa̧r, T.: Stochastic games for security in networks with interdependent nodes. In: International Conference on Game Theory for Networks. IEEE, June 2009
22.
go back to reference Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)MATH
23.
go back to reference Ouyang, Y.: On the interaction of information and decision in dynamic network systems. Ph.D. Thesis, University of Michigan (2016) Ouyang, Y.: On the interaction of information and decision in dynamic network systems. Ph.D. Thesis, University of Michigan (2016)
24.
go back to reference Rass, S., König, S., Schauer, S.: Defending against advanced persistent threats using game-theory. PLoS ONE 12(1), 1–43 (2017)CrossRef Rass, S., König, S., Schauer, S.: Defending against advanced persistent threats using game-theory. PLoS ONE 12(1), 1–43 (2017)CrossRef
25.
go back to reference Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 314–326. Springer, Cham (2016). doi:10.1007/978-3-319-47413-7_18 Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 314–326. Springer, Cham (2016). doi:10.​1007/​978-3-319-47413-7_​18
26.
go back to reference Rothblum, U.G.: Solving stopping stochastic games by maximizing a linear function subject to quadratic constraints. In: Game Theory and Related Topics, pp. 103–105 (1979) Rothblum, U.G.: Solving stopping stochastic games by maximizing a linear function subject to quadratic constraints. In: Game Theory and Related Topics, pp. 103–105 (1979)
27.
go back to reference Sallhammar, K., Knapskog, S.J.: Using game theory in stochastic models for quantifying security. In: The 9th Nordic Workshop on Secure IT-Systems (2004) Sallhammar, K., Knapskog, S.J.: Using game theory in stochastic models for quantifying security. In: The 9th Nordic Workshop on Secure IT-Systems (2004)
29.
go back to reference Vasal, D.: Dynamic decision problems with cooperative and strategic agents and asymmetric information. Ph.D. Thesis, University of Michigan (2016) Vasal, D.: Dynamic decision problems with cooperative and strategic agents and asymmetric information. Ph.D. Thesis, University of Michigan (2016)
30.
go back to reference Zhang, H., Jiang, W., Tian, Z., Song, X.: A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. In: International Conference on Networking, Sensing and Control (ICNSC), pp. 648–653. IEEE (2008) Zhang, H., Jiang, W., Tian, Z., Song, X.: A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. In: International Conference on Networking, Sensing and Control (ICNSC), pp. 648–653. IEEE (2008)
Metadata
Title
A Stochastic Game-Theoretic Model for Smart Grid Communication Networks
Authors
Xiaobing He
Hermann de Meer
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-68711-7_16

Premium Partner