Skip to main content

A Stochastic Game-Theoretic Model for Smart Grid Communication Networks

  • Conference paper
  • First Online:
Decision and Game Theory for Security (GameSec 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10575))

Included in the following conference series:

  • 2071 Accesses

Abstract

The increasing adoption of new information and communication technology assets in smart grids is making smart grids vulnerable to cyber threats, as well as raising numerous concerns about the adequacy of current security approaches. As a single act of penetration is often not sufficient for an attacker to achieve his/her goal, multistage cyber attacks may occur. This paper looks at the stochastic and dynamic nature of multistage cyber attacks in smart grid use cases and develops a stochastic game-theoretic model to capture the interactions between the attacker and the defender in multistage cyber attack scenarios. Due to the information asymmetry of the interactions between the attacker and the defender, neither of both players knows the exact current game state. This paper proposes a belief-updating mechanism for both players to form a common belief about the current game state. In order to assess threats of multistage cyber attacks, it further discusses the computation of Nash equilibria for the designed game model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barron, E.N.: Game Theory: An Introduction. Wiley, Hoboken (2007)

    Book  MATH  Google Scholar 

  2. Chen, L., Leneutre, J.: Fight jamming with jamming – a game theoretic analysis of jamming attack in wireless networks and defense strategy. J. Comput. Netw.: Int. J. Comput. Telecommun. Network. 55(9), 2259–2270 (2011)

    Article  Google Scholar 

  3. European Union Agency for Network and Information Security. ENISA smart grid security recommendations. Technical report, European Union Agency for Network and Information Security (2012)

    Google Scholar 

  4. Feinberg, E.A., Shwartz, A. (eds.): Handbook of Markov Decision Processes: Methods and Applications, vol. 40. Springer US, New York (2002). doi:10.1007/978-1-4615-0805-2

    MATH  Google Scholar 

  5. Filar, J.A., Schultz, T.A., Thuijsman, F., Vrieze, O.J.: Nonlinear programming and stationary equilibria in stochastic games. Math. Program. 50(1), 227–237 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  6. Le Guillarme, N., Mouaddib, A-I., Gatepaille, S., Bellenger, A.: Adversarial intention recognition as inverse game-theoretic plan for threat assessment. In: IEEE 28th International Conference on Tools with Artificial Intelligence, January 2017

    Google Scholar 

  7. Hamman, S.T., Hopkinson, K.M., McCarty, L.A.: Applying Behavioral game theory to cyber-physical systems protection planning. In: Cyber-Physcial Systems: Foundations, Principles and Applications, pp. 251–264. Elsevier (2017)

    Google Scholar 

  8. He, W., Xia, C., Wang, H., Zhang, C., Ji, Y.: A game theoretical attack-defense model oriented to network security risk assessment. In: 2008 International Conference on Computer Science and Software Engineering. IEEE (2008)

    Google Scholar 

  9. He, X., Sui, Z., de Meer, H.: Game-theoretic risk assessment in communication networks. In: IEEE 16th International Conference on Environment and Electrical Engieering (EEEIC). IEEE, June 2016

    Google Scholar 

  10. Ismail, Z., Leneutre, J., Bateman, D., Chen, L.: A methodology to apply a game theoretic model of security risks interdependencies between ICT and electric infrastructures. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 159–171. Springer, Cham (2016). doi:10.1007/978-3-319-47413-7_10

    Google Scholar 

  11. Jones, M.G.: Asymmetric information games and cyber security. Ph.D. Thesis, Georgia Institute of Technology (2013)

    Google Scholar 

  12. Kuhn, H.W.: Extensive games and the problem of information. Ann. Math. Stud. 28(28), 193–216 (1953)

    MathSciNet  MATH  Google Scholar 

  13. Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutorials 15(1), 472–486 (2013)

    Article  Google Scholar 

  14. Lye, K.-W., Wing, J.M.: Game strategies in network security. Int. J. Inf. Secur. 4(1–2), 71–86 (2005)

    Article  Google Scholar 

  15. Manshaei, M.H., Zhu, Q., Alpcan, T., Basa̧r, T., Hubaux, J.-P.: Game theory meets network security and privacy. J. ACM Comput. Surv. (CSUR) 45(3), 25:1–25:39 (2013)

    Google Scholar 

  16. Mckelvey, R.D., McLennan, A.M., Turocy, T.L.: Gambit: software tools for game theory, Version 14.1.0 (2014). http://www.gambit-project.org. Accessed 04 June 2017

  17. Melolidakis, C.: On stochastic games with lack of information on one side. Int. J. Game Theory 18(1), 1–29 (1989)

    Article  MathSciNet  MATH  Google Scholar 

  18. Melolidakis, C.: Stochastic games with lack of information on one side and positive stop probabilities. In: Raghavan, T.E.S., Ferguson, T.S., Parthasarathy, T., Vrieze, O.J. (eds.) Stochastic Games and Related Topics. TDLC, vol. 7, pp. 113–126. Springer, Netherlands (1991). doi:10.1007/978-94-011-3760-7_10

    Chapter  Google Scholar 

  19. Miura-Ko, R.A., Yolken, B., Bambos, N., Mitchell, J.: Security investment games of interdependent organizations. In: 46th Annual Allerton Conference on Communication, Control, and Computing. IEEE (2009)

    Google Scholar 

  20. Nash, J.: Non-cooperative Games. Ph.D. Thesis, Princeton University (1950)

    Google Scholar 

  21. Nguyen, K.C., Alpcan, T., Basa̧r, T.: Stochastic games for security in networks with interdependent nodes. In: International Conference on Game Theory for Networks. IEEE, June 2009

    Google Scholar 

  22. Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)

    MATH  Google Scholar 

  23. Ouyang, Y.: On the interaction of information and decision in dynamic network systems. Ph.D. Thesis, University of Michigan (2016)

    Google Scholar 

  24. Rass, S., König, S., Schauer, S.: Defending against advanced persistent threats using game-theory. PLoS ONE 12(1), 1–43 (2017)

    Article  Google Scholar 

  25. Rass, S., Zhu, Q.: GADAPT: a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats. In: Zhu, Q., Alpcan, T., Panaousis, E., Tambe, M., Casey, W. (eds.) GameSec 2016. LNCS, vol. 9996, pp. 314–326. Springer, Cham (2016). doi:10.1007/978-3-319-47413-7_18

    Google Scholar 

  26. Rothblum, U.G.: Solving stopping stochastic games by maximizing a linear function subject to quadratic constraints. In: Game Theory and Related Topics, pp. 103–105 (1979)

    Google Scholar 

  27. Sallhammar, K., Knapskog, S.J.: Using game theory in stochastic models for quantifying security. In: The 9th Nordic Workshop on Secure IT-Systems (2004)

    Google Scholar 

  28. Shapley, S.L.: Stochastic games. Proc. Natl. Acad. Sci. U.S.A. 39(10), 1095–1100 (1953)

    Article  MathSciNet  MATH  Google Scholar 

  29. Vasal, D.: Dynamic decision problems with cooperative and strategic agents and asymmetric information. Ph.D. Thesis, University of Michigan (2016)

    Google Scholar 

  30. Zhang, H., Jiang, W., Tian, Z., Song, X.: A stochastic game theoretic approach to attack prediction and optimal active defense strategy decision. In: International Conference on Networking, Sensing and Control (ICNSC), pp. 648–653. IEEE (2008)

    Google Scholar 

Download references

Acknowledgments

The research leading to the results presented in this paper was supported by the European Commission’s Project No. 608090, HyRiM (Hybrid Risk Management for Utility Networks) under the 7th Framework Programme (FP7-SEC-2013-1). The authors acknowledge Stefan Rass from Alpen-Adria-Universität Klagenfurt for his invaluable discussions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaobing He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

He, X., de Meer, H. (2017). A Stochastic Game-Theoretic Model for Smart Grid Communication Networks. In: Rass, S., An, B., Kiekintveld, C., Fang, F., Schauer, S. (eds) Decision and Game Theory for Security. GameSec 2017. Lecture Notes in Computer Science(), vol 10575. Springer, Cham. https://doi.org/10.1007/978-3-319-68711-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68711-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68710-0

  • Online ISBN: 978-3-319-68711-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics