26,462 research outputs found
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure
A city's critical infrastructure such as gas, water, and power systems, are
largely interdependent since they share energy, computing, and communication
resources. This, in turn, makes it challenging to endow them with fool-proof
security solutions. In this paper, a unified model for interdependent
gas-power-water infrastructure is presented and the security of this model is
studied using a novel game-theoretic framework. In particular, a zero-sum
noncooperative game is formulated between a malicious attacker who seeks to
simultaneously alter the states of the gas-power-water critical infrastructure
to increase the power generation cost and a defender who allocates
communication resources over its attack detection filters in local areas to
monitor the infrastructure. At the mixed strategy Nash equilibrium of this
game, numerical results show that the expected power generation cost deviation
is 35\% lower than the one resulting from an equal allocation of resources over
the local filters. The results also show that, at equilibrium, the
interdependence of the power system on the natural gas and water systems can
motivate the attacker to target the states of the water and natural gas systems
to change the operational states of the power grid. Conversely, the defender
allocates a portion of its resources to the water and natural gas states of the
interdependent system to protect the grid from state deviations.Comment: 7 pages, in proceedings of Resilience Week 201
A Game-Theoretic Approach to Energy Trading in the Smart Grid
Electric storage units constitute a key element in the emerging smart grid
system. In this paper, the interactions and energy trading decisions of a
number of geographically distributed storage units are studied using a novel
framework based on game theory. In particular, a noncooperative game is
formulated between storage units, such as PHEVs, or an array of batteries that
are trading their stored energy. Here, each storage unit's owner can decide on
the maximum amount of energy to sell in a local market so as to maximize a
utility that reflects the tradeoff between the revenues from energy trading and
the accompanying costs. Then in this energy exchange market between the storage
units and the smart grid elements, the price at which energy is traded is
determined via an auction mechanism. The game is shown to admit at least one
Nash equilibrium and a novel proposed algorithm that is guaranteed to reach
such an equilibrium point is proposed. Simulation results show that the
proposed approach yields significant performance improvements, in terms of the
average utility per storage unit, reaching up to 130.2% compared to a
conventional greedy approach.Comment: 11 pages, 11 figures, journa
Load Shifting in the Smart Grid: To Participate or Not?
Demand-side management (DSM) has emerged as an important smart grid feature
that allows utility companies to maintain desirable grid loads. However, the
success of DSM is contingent on active customer participation. Indeed, most
existing DSM studies are based on game-theoretic models that assume customers
will act rationally and will voluntarily participate in DSM. In contrast, in
this paper, the impact of customers' subjective behavior on each other's DSM
decisions is explicitly accounted for. In particular, a noncooperative game is
formulated between grid customers in which each customer can decide on whether
to participate in DSM or not. In this game, customers seek to minimize a cost
function that reflects their total payment for electricity. Unlike classical
game-theoretic DSM studies which assume that customers are rational in their
decision-making, a novel approach is proposed, based on the framework of
prospect theory (PT), to explicitly incorporate the impact of customer behavior
on DSM decisions. To solve the proposed game under both conventional game
theory and PT, a new algorithm based on fictitious player is proposed using
which the game will reach an epsilon-mixed Nash equilibrium. Simulation results
assess the impact of customer behavior on demand-side management. In
particular, the overall participation level and grid load can depend
significantly on the rationality level of the players and their risk aversion
tendency.Comment: 9 pages, 7 figures, journal, accepte
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Quantum Cryptography Beyond Quantum Key Distribution
Quantum cryptography is the art and science of exploiting quantum mechanical
effects in order to perform cryptographic tasks. While the most well-known
example of this discipline is quantum key distribution (QKD), there exist many
other applications such as quantum money, randomness generation, secure two-
and multi-party computation and delegated quantum computation. Quantum
cryptography also studies the limitations and challenges resulting from quantum
adversaries---including the impossibility of quantum bit commitment, the
difficulty of quantum rewinding and the definition of quantum security models
for classical primitives. In this review article, aimed primarily at
cryptographers unfamiliar with the quantum world, we survey the area of
theoretical quantum cryptography, with an emphasis on the constructions and
limitations beyond the realm of QKD.Comment: 45 pages, over 245 reference
Transforming Energy Networks via Peer to Peer Energy Trading: Potential of Game Theoretic Approaches
Peer-to-peer (P2P) energy trading has emerged as a next-generation energy
management mechanism for the smart grid that enables each prosumer of the
network to participate in energy trading with one another and the grid. This
poses a significant challenge in terms of modeling the decision-making process
of each participant with conflicting interest and motivating prosumers to
participate in energy trading and to cooperate, if necessary, for achieving
different energy management goals. Therefore, such decision-making process
needs to be built on solid mathematical and signal processing tools that can
ensure an efficient operation of the smart grid. This paper provides an
overview of the use of game theoretic approaches for P2P energy trading as a
feasible and effective means of energy management. As such, we discuss various
games and auction theoretic approaches by following a systematic classification
to provide information on the importance of game theory for smart energy
research. Then, the paper focuses on the P2P energy trading describing its key
features and giving an introduction to an existing P2P testbed. Further, the
paper zooms into the detail of some specific game and auction theoretic models
that have recently been used in P2P energy trading and discusses some important
finding of these schemes.Comment: 38 pages, single column, double spac
- …