2020
DOI: 10.3390/info11120582
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids

Abstract: We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks and defenses in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modeled as a tree structure where each node aggregates the information of its children before encrypting it and passing it on to its parent. As a part of the model, we developed a discretization scheme for solving the replicator equations. The aim of this work was to explore the… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 46 publications
0
3
0
Order By: Relevance
“…Furthermore, researchers have used the theoretical framework of the Nash equilibrium [41] to identify optimal techniques for distributing resources in intrusion detection [42,43]. In addition, evolutionary game theory has been used to analyze the concurrent development of methods employed by attackers and defenders in IoT systems [44,45]. These significant findings emphasize the significance of game theory as a vital tool in advancing IoT-based IDS.…”
Section: Game-theoretical Perspective On Ids For Iotmentioning
confidence: 99%
“…Furthermore, researchers have used the theoretical framework of the Nash equilibrium [41] to identify optimal techniques for distributing resources in intrusion detection [42,43]. In addition, evolutionary game theory has been used to analyze the concurrent development of methods employed by attackers and defenders in IoT systems [44,45]. These significant findings emphasize the significance of game theory as a vital tool in advancing IoT-based IDS.…”
Section: Game-theoretical Perspective On Ids For Iotmentioning
confidence: 99%
“…Smart Grid Interoperability Standards [4] Interconnection between heterogeneous cyber-physical systems [5] Blockchain technology for smart grids [6] ML models for Electricity Theft Detection [7] Load frequency control of smart grids [8] Confidentiality in Smart Grids [9] Metering and data access infrastructures in smart grid [10] Policy enforcement in smart grid [11] Access control for smart grid services based on publish/subscribe [12] Blockchain-based authorization system [13] Proposed work…”
Section: Data Integrity Interoperabilitymentioning
confidence: 99%
“…[8] improves the security of existing SCADA systems within smart grids using a cyber-physical digital signature scheme. In [9], Advanced Metering Infrastructure (AMI), which is an important component of an IoT based Smart Grid is analyzed separately and secured based on evolutionary game theory. Ref.…”
Section: Security Authorization Approachesmentioning
confidence: 99%