Proceedings of the 12th European Conference on Software Architecture: Companion Proceedings 2018
DOI: 10.1145/3241403.3241463
|View full text |Cite
|
Sign up to set email alerts
|

An evolutionary game for integrity attacks and defences for advanced metering infrastructure

Abstract: Smart grids are complex cyber-physical systems that face many security challenges. Advanced Metering Infrastructure (AMI), which is one of the main components of the smart grid, represents an important branch of services with increasing deployments that also introduce new security risks. The nodes of AMIs are featured as resource-constrained. Therefore, security attacks including data integrity attacks on AMIs are of serious concern and require efficient selection of protective strategies. In this paper, we pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 31 publications
0
8
0
Order By: Relevance
“…We can combine Equations ( 11)-( 14) with the evolutionary replicator dynamic with noise [43] to model the evolution of any set of strategies. For any subset of attacking strategies S ⊂ S, the evolutionary replicator dynamic with noise [43] takes the form of dP s dτ ( S) = S(π A (s , P t ) − π A (P s , P t ))P s (ds ) + δ S ( S), (15) for some time scale τ and a stochastic term δ s ( S). Similarly, the evolution of a subset of defending strategies T ⊂ T is given by…”
Section: Evolutionary Game Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…We can combine Equations ( 11)-( 14) with the evolutionary replicator dynamic with noise [43] to model the evolution of any set of strategies. For any subset of attacking strategies S ⊂ S, the evolutionary replicator dynamic with noise [43] takes the form of dP s dτ ( S) = S(π A (s , P t ) − π A (P s , P t ))P s (ds ) + δ S ( S), (15) for some time scale τ and a stochastic term δ s ( S). Similarly, the evolution of a subset of defending strategies T ⊂ T is given by…”
Section: Evolutionary Game Formulationmentioning
confidence: 99%
“…Previously, we have introduced an evolutionary game framework [15] that models evolving attacks and defenses in connection with data integrity for smart grid systems. The novel contributions of this paper are:…”
Section: Introductionmentioning
confidence: 99%
“…e evolutionary process of the attack and defense strategies in the continuous confrontation process was also analyzed. Reference [18] took aim at the security problems faced by intelligent networks and proposed a network attack and defense framework based on an evolutionary game model using a replicative dynamic learning mechanism and also investigated how to maximize defense return with limited node resources.…”
Section: Introductionmentioning
confidence: 99%
“…Previously, we have introduced an evolutionary game framework [14] that models evolving attacks and defenses in connection with data integrity for smart grid systems. The novel contributions of this paper are:…”
Section: Introductionmentioning
confidence: 99%