293,200 research outputs found

    Interplay between security providers, consumers, and attackers: a weighted congestion game approach

    Get PDF
    Network users can choose among different security solutions to protect their data. Those solutions are offered by competing providers, with possibly different performance and price levels. In this paper, we model the interactions among users as a noncooperative game, with a negative externality coming from the fact that attackers target popular systems to maximize their expected gain. Using a nonatomic weighted congestion game model for user interactions, we prove the existence and uniqueness of a user equilibrium, compute the corresponding Price of Anarchy, that is the loss of efficiency due to user selfishness, and investigate some consequences for the (higher-level) pricing game played by security providers.Game theory;Weighted games; Security

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page

    Regulating transmission in a spatial oligopoly: a numerical illustration for Belgium

    Get PDF
    This paper introduces strategic behavior of the electricity network operator in a congested network with imperfect competition for generation. It models a two stage Stackelberg game. First, the network operator sets transmission prices, then generators set output and sales. Several scenarios for the generation market structure and the behavior of the network operator are compared numerically. The calibration of the numerical model is based on data of the Belgian electricity market.Regulation, Transmission, Electricity, Cournot, Numerical model, Security constraints, MPEC, loadflow, Belgium

    Advanced Drone Swarm Security by Using Blockchain Governance Game

    Full text link
    This research contributes to the security design of an advanced smart drone swarm network based on a variant of the Blockchain Governance Game (BGG), which is the theoretical game model to predict the moments of security actions before attacks, and the Strategic Alliance for Blockchain Governance Game (SABGG), which is one of the BGG variants which has been adapted to construct the best strategies to take preliminary actions based on strategic alliance for protecting smart drones in a blockchain-based swarm network. Smart drones are artificial intelligence (AI)-enabled drones which are capable of being operated autonomously without having any command center. Analytically tractable solutions from the SABGG allow us to estimate the moments of taking preliminary actions by delivering the optimal accountability of drones for preventing attacks. This advanced secured swarm network within AI-enabled drones is designed by adapting the SABGG model. This research helps users to develop a new network-architecture-level security of a smart drone swarm which is based on a decentralized network.Comment: Song-Kyoo Kim, Advanced Drone Swarm Security by Using Blockchain Governance Game, Mathematics 10:18 (2022), 333
    • …
    corecore