149
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Cyber-Physical Security: A Game Theory Model of Humans Interacting over Control Systems

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Recent years have seen increased interest in the design and deployment of smart grid devices and control algorithms. Each of these smart communicating devices represents a potential access point for an intruder spurring research into intruder prevention and detection. However, no security measures are complete, and intruding attackers will compromise smart grid devices leading to the attacker and the system operator interacting via the grid and its control systems. The outcome of these machine-mediated human-human interactions will depend on the design of the physical and control systems mediating the interactions. If these outcomes can be predicted via simulation, they can be used as a tool for designing attack-resilient grids and control systems. However, accurate predictions require good models of not just the physical and control systems, but also of the human decision making. In this manuscript, we present an approach to develop such tools, i.e. models of the decisions of the cyber-physical intruder who is attacking the systems and the system operator who is defending it, and demonstrate its usefulness for design.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          Optimal sizing of capacitors placed on a radial distribution system

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Game theory meets network security and privacy

              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              Reinforcement Learning and Dynamic Programming Using Function Approximators

                Bookmark

                Author and article information

                Comments

                Comment on this article