Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems
Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures a...
Uloženo v:
| Vydáno v: | IEEE transactions on smart grid Ročník 4; číslo 4; s. 2320 - 2327 |
|---|---|
| Hlavní autoři: | , , , , , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Piscataway
IEEE
01.12.2013
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Témata: | |
| ISSN: | 1949-3053, 1949-3061 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures are complete, and intruding attackers will compromise smart grid devices leading to the attacker and the system operator interacting via the grid and its control systems. The outcome of these machine-mediated human-human interactions will depend on the design of the physical and control systems mediating the interactions. If these outcomes can be predicted via simulation, they can be used as a tool for designing attack-resilient grids and control systems. However, accurate predictions require good models of not just the physical and control systems, but also of the human decision making. In this manuscript, we present an approach to develop such tools, i.e., models of the decisions of the cyber-physical intruder who is attacking the systems and the system operator who is defending it, and demonstrate its usefulness for design. |
|---|---|
| AbstractList | Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures are complete, and intruding attackers will compromise smart grid devices leading to the attacker and the system operator interacting via the grid and its control systems. The outcome of these machine-mediated human-human interactions will depend on the design of the physical and control systems mediating the interactions. If these outcomes can be predicted via simulation, they can be used as a tool for designing attack-resilient grids and control systems. However, accurate predictions require good models of not just the physical and control systems, but also of the human decision making. In this manuscript, we present an approach to develop such tools, i.e., models of the decisions of the cyber-physical intruder who is attacking the systems and the system operator who is defending it, and demonstrate its usefulness for design. |
| Author | Wolpert, David Backhaus, Scott Bono, James Bent, Russell Yildiz, Yildiray Lee, Ritchie Dongping Xie Tracey, Brendan |
| Author_xml | – sequence: 1 givenname: Scott surname: Backhaus fullname: Backhaus, Scott organization: Los Alamos Nat. Lab., Los Alamos, NM, USA – sequence: 2 givenname: Russell surname: Bent fullname: Bent, Russell organization: Los Alamos Nat. Lab., Los Alamos, NM, USA – sequence: 3 givenname: James surname: Bono fullname: Bono, James organization: American Univ., Washington, DC, USA – sequence: 4 givenname: Ritchie surname: Lee fullname: Lee, Ritchie organization: NASA Ames, Mountain View, CA, USA – sequence: 5 givenname: Brendan surname: Tracey fullname: Tracey, Brendan organization: Stanford Univ., Stanford, CA, USA – sequence: 6 givenname: David surname: Wolpert fullname: Wolpert, David organization: Los Alamos Nat. Lab., Los Alamos, NM, USA – sequence: 7 surname: Dongping Xie fullname: Dongping Xie organization: American Univ., Washington, DC, USA – sequence: 8 givenname: Yildiray surname: Yildiz fullname: Yildiz, Yildiray organization: NASA Ames, Mountain View, CA, USA |
| BookMark | eNp9kMFrwjAUxsNwMOe8D3YJ7FyXNCY1u4lsKjgc6NixpOnrjLSNS9JB__tVFA877F3eO3y_7-N9t6hX2xoQuqdkRCmRT9vNfBQTykZxnJBY0ivUp3IsI0YE7V1uzm7Q0Ps96YYxJmLZR5-zNgMXve9ab7Qq8QZ040xon_EUz1UFeLsD61r8ZnMosS3woqlU7fGyDuCUDqb-wusfcHhm6-BsZ9D6AJW_Q9eFKj0Mz3uAPl5ftrNFtFrPl7PpKtJM0BDpiSYgY8WJKAhoziGDJCNUZiqb5JwBhyJJckhIrqBgGVVE07HgOciESTpmA_R48j04-92AD-neNq7uIlOacMkJExPaqchJpZ313kGRHpyplGtTStJjg2nXYHpsMD032CHiD6JNUMEc31Sm_A98OIEGAC45Qgje6dkvl_x_TQ |
| CODEN | ITSGBQ |
| CitedBy_id | crossref_primary_10_1016_j_comcom_2021_04_034 crossref_primary_10_1109_TCST_2021_3075557 crossref_primary_10_1109_TSG_2016_2561266 crossref_primary_10_1109_JSYST_2019_2911869 crossref_primary_10_3390_s18020674 crossref_primary_10_1016_j_trc_2021_103417 crossref_primary_10_1016_j_ifacol_2019_01_010 crossref_primary_10_1016_j_heliyon_2021_e05936 crossref_primary_10_1016_j_ress_2020_106878 crossref_primary_10_1016_j_trc_2023_104109 crossref_primary_10_1016_j_engappai_2024_108449 crossref_primary_10_1016_j_ress_2018_08_014 crossref_primary_10_1016_j_procir_2016_07_018 crossref_primary_10_1016_j_compind_2017_03_007 crossref_primary_10_3390_en8065266 crossref_primary_10_2514_1_G000426 crossref_primary_10_1111_risa_13382 crossref_primary_10_1016_j_compind_2016_02_004 crossref_primary_10_1007_s11768_017_6186_y crossref_primary_10_1109_TBDATA_2017_2705807 crossref_primary_10_1109_TCST_2017_2723574 crossref_primary_10_1007_BF03391576 crossref_primary_10_3390_g15040028 crossref_primary_10_1016_j_ress_2018_03_005 crossref_primary_10_3390_electronics10080894 crossref_primary_10_32604_EE_2020_012788 crossref_primary_10_1109_TR_2020_3046688 crossref_primary_10_1016_j_cose_2019_101576 crossref_primary_10_1007_s10922_018_9449_0 crossref_primary_10_1080_23335777_2018_1537302 crossref_primary_10_1016_j_arcontrol_2019_10_002 crossref_primary_10_1109_TII_2025_3552699 crossref_primary_10_1109_TSG_2015_2466611 crossref_primary_10_1016_j_epsr_2018_07_015 crossref_primary_10_1109_TSG_2018_2817515 crossref_primary_10_2514_1_G000176 |
| Cites_doi | 10.1145/2480741.2480742 10.1109/61.19266 10.1109/JSAC.2012.121214 10.1613/jair.3662 10.1145/1053283.1053288 10.1007/978-3-642-12079-4_39 10.2139/ssrn.1796382 10.1201/9781439821091 10.1109/DSN.2009.5270307 10.1016/0022-0531(88)90153-6 10.1613/jair.301 10.1109/GAMENETS.2009.5137463 10.1145/1190195.1190198 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2013 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2013 |
| DBID | 97E RIA RIE AAYXX CITATION 7SP 7TB 8FD FR3 KR7 L7M |
| DOI | 10.1109/TSG.2013.2270291 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Civil Engineering Abstracts Advanced Technologies Database with Aerospace |
| DatabaseTitle | CrossRef Civil Engineering Abstracts Engineering Research Database Technology Research Database Mechanical & Transportation Engineering Abstracts Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
| DatabaseTitleList | Civil Engineering Abstracts |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1949-3061 |
| EndPage | 2327 |
| ExternalDocumentID | 3932007321 10_1109_TSG_2013_2270291 6665110 |
| Genre | orig-research |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ IFIPE IPLJI JAVBF M43 O9- OCL P2P RIA RIE RNS AAYXX CITATION 7SP 7TB 8FD FR3 KR7 L7M RIG |
| ID | FETCH-LOGICAL-c361t-c8c0e92a506f0ec55ebe7b019bab8d53e5ef77de70daef3b1a0c1465de9739143 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 50 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000328064100060&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1949-3053 |
| IngestDate | Mon Jun 30 09:44:10 EDT 2025 Sat Nov 29 03:45:42 EST 2025 Tue Nov 18 22:26:35 EST 2025 Tue Aug 26 16:44:51 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c361t-c8c0e92a506f0ec55ebe7b019bab8d53e5ef77de70daef3b1a0c1465de9739143 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 1759503681 |
| PQPubID | 2040408 |
| PageCount | 8 |
| ParticipantIDs | proquest_journals_1759503681 crossref_primary_10_1109_TSG_2013_2270291 ieee_primary_6665110 crossref_citationtrail_10_1109_TSG_2013_2270291 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-12-01 |
| PublicationDateYYYYMMDD | 2013-12-01 |
| PublicationDate_xml | – month: 12 year: 2013 text: 2013-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on smart grid |
| PublicationTitleAbbrev | TSG |
| PublicationYear | 2013 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 c rdenas (ref1) 2008 lye (ref15) 2002 ref14 wolpert (ref9) 2013; 46 ref20 osborne (ref5) 1994 kaelbling (ref22) 1996 ref10 wolpert (ref6) 2011 ref2 ref17 alpcan (ref11) 2011 ref16 ref18 bono (ref8) 2011 ref7 sutton (ref23) 1998 busoniu (ref21) 2010 lee (ref3) 2012; abs 1207 852 mas-colell (ref4) 1995 lacommare (ref19) 0 jaakkola (ref24) 1995 |
| References_xml | – ident: ref10 doi: 10.1145/2480741.2480742 – ident: ref18 doi: 10.1109/61.19266 – ident: ref12 doi: 10.1109/JSAC.2012.121214 – year: 1998 ident: ref23 publication-title: Reinforcement Learning An Introduction – volume: 46 year: 2013 ident: ref9 article-title: Predicting behavior in unstructured bargaining with a probability distribution publication-title: J Artif Intell Res doi: 10.1613/jair.3662 – ident: ref13 doi: 10.1145/1053283.1053288 – year: 2002 ident: ref15 article-title: Game strategies in network security publication-title: Proc 16th IEEE Computer Security Foundations Workshop (CSFW) – ident: ref7 doi: 10.1007/978-3-642-12079-4_39 – ident: ref2 doi: 10.2139/ssrn.1796382 – year: 2010 ident: ref21 publication-title: Reinforcement Learning and Dynamic Programming Using Function Approximators doi: 10.1201/9781439821091 – year: 2011 ident: ref11 publication-title: Network Security A Decision and Game Theoretic Approach – ident: ref17 doi: 10.1109/DSN.2009.5270307 – ident: ref20 doi: 10.1016/0022-0531(88)90153-6 – year: 1996 ident: ref22 article-title: Reinforcement learning: A survey publication-title: J Artif Intell Res doi: 10.1613/jair.301 – ident: ref16 doi: 10.1109/GAMENETS.2009.5137463 – year: 1995 ident: ref4 publication-title: Microeconomic Theory – start-page: 345 year: 1995 ident: ref24 publication-title: Advances in Neural Information Processing Systems 7 – volume: abs 1207 852 year: 2012 ident: ref3 article-title: Counter-factual reinforcement learning: How to model decision-makers that anticipate the future publication-title: CoRR – year: 2011 ident: ref6 publication-title: ?Distribution-valued solution concepts ? – year: 1994 ident: ref5 publication-title: A Course in Game Theory – year: 0 ident: ref19 – year: 2011 ident: ref8 publication-title: ?Decision-theoretic prediction and policy design of gdp slot auctions? – ident: ref14 doi: 10.1145/1190195.1190198 – start-page: 6:1 year: 2008 ident: ref1 article-title: Research challenges for the security of control systems publication-title: Proc 3rd Conf Hot Topics Security |
| SSID | ssj0000333629 |
| Score | 2.335022 |
| Snippet | Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2320 |
| SubjectTerms | Computational modeling Control algorithms Control systems Games Integrated circuit modeling Mathematical model Power system security Predictive models SCADA system Security voltage control |
| Title | Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems |
| URI | https://ieeexplore.ieee.org/document/6665110 https://www.proquest.com/docview/1759503681 |
| Volume | 4 |
| WOSCitedRecordID | wos000328064100060&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1949-3061 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000333629 issn: 1949-3053 databaseCode: RIE dateStart: 20100101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFA9zeNCDX1OcTsnBi2C3rGmaxtsYbh5kDjZ1t9KkryLMTvYh-N-bpFlRFMFbD0kp-aXv_d43QheaorJIhoFHRCq8QDHpCcUiTwWRnwFTobAthR7v-GAQTSZiWEFXZS0MANjkM2iaRxvLT2dqZVxlLU21NT_QBvoG57yo1Sr9KYRSLYuFDSIHJpzP6DoqSURrPOqbNC7a9E39lWh_00J2rMoPWWwVTG_3f5-2h3YckcSdAvl9VIH8AG1_aS9YQ0_dDwlzb-igwCM3q-4ad3A_eQVcFOZjMw9timcZth79BbZeQlPwkD_je33VcbfIZ8euvfkheujdjLu3nhuk4CkatpeeihQB4SeMhBkBxZhGjktN7mQio5RRYJBxngInaQIZle2EKC1BWQqCU6EZ1RGq5rMcjhFWqdIkI1HCl0FAAGTiU8F8LkLQtpjiddRaH2ysXJdxM-xiGltrg4hYQxEbKGIHRR1dljveig4bf6ytmaMv17lTr6PGGrvY_YKLWPMiwbR-jtonv-86RVvm3UVuSgNVl_MVnKFN9b58WczP7e36BMuoy6A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS8MwFD6ICuqDtynOax58EeyWNk3b-CbDG84pbOreSpOeijA32abgvzdJs6Eogm99SGjJl57znTvAoaaoPJFR6FGRCy9UXHpC8cRTYRIUyFUkbEuhh2bcaiXdrribgeNpLQwi2uQzrJlHG8vPB-rNuMrqmmprfqAN9DkehoFfVmtNPSqUMS2NhQ0jhyagz9kkLklFvdO-MIlcrBaYCizhf9NDdrDKD2lsVcz5yv8-bhWWHZUkpyX2azCD_XVY-tJgsAKPjQ-JQ-_OgUHablrdCTklF9kLkrI0n5iJaD0yKIj16Y-I9ROakof-E7nVl500yox24hqcb8D9-Vmncem5UQqeYpE_9lSiKIog4zQqKCrONXax1PROZjLJOUOORRznGNM8w4JJP6NKy1Ceo4iZ0JxqE2b7gz5uAVG50jQjUyKQYUgRZRYwwYNYRKitMRVXoT452FS5PuNm3EUvtfYGFamGIjVQpA6KKhxNd7yWPTb-WFsxRz9d5069CrsT7FL3E45SzYwE1xo68bd_33UAC5edm2bavGpd78CieU-ZqbILs-PhG-7BvHofP4-G-_amfQKNgc7n |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber-Physical+Security%3A+A+Game+Theory+Model+of+Humans+Interacting+Over+Control+Systems&rft.jtitle=IEEE+transactions+on+smart+grid&rft.au=Backhaus%2C+Scott&rft.au=Bent%2C+Russell&rft.au=Bono%2C+James&rft.au=Lee%2C+Ritchie&rft.date=2013-12-01&rft.pub=IEEE&rft.issn=1949-3053&rft.volume=4&rft.issue=4&rft.spage=2320&rft.epage=2327&rft_id=info:doi/10.1109%2FTSG.2013.2270291&rft.externalDocID=6665110 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1949-3053&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1949-3053&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1949-3053&client=summon |