Article
Version 1
Preserved in Portico This version is not peer-reviewed
Evolutionary Game for Confidentiality in IoT-enabled Smart Grids
Version 1
: Received: 30 October 2020 / Approved: 2 November 2020 / Online: 2 November 2020 (08:08:12 CET)
A peer-reviewed article of this Preprint also exists.
Boudko, S.; Aursand, P.; Abie, H. Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. Information 2020, 11, 582. Boudko, S.; Aursand, P.; Abie, H. Evolutionary Game for Confidentiality in IoT-Enabled Smart Grids. Information 2020, 11, 582.
Abstract
We applied evolutionary game theory to extend a resource constrained security game model for confidentiality attacks in an Advanced Metering Infrastructure (AMI), which is a component of IoT-enabled Smart Grids. The AMI is modelled as a tree structure where each node aggregates the information of its children before encrypting it and passing it on to its parent. As a part of the model, we developed a discretization scheme for solving the replicator equations. The aim of this work is to explore the space of possible behaviours of attackers and to develop a framework where the AMI nodes adaptively select the most profitable strategies. Using this model, we simulated the evolution of a population of attackers and defenders on various cases resembling the real life implementation of AMI. We discuss in depth how to enhance security in AMI using evolutionary game theory either by a priori analysis or as a tool to run dynamic and adaptive infrastructure defence.
Keywords
adaptive security; evolutionary game; Internet of Things; Smart grid; advanced metering infrastructure; smart home
Subject
Computer Science and Mathematics, Algebra and Number Theory
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment