6,647 research outputs found
A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities
Smart cities must integrate a number of interdependent cyber-physical systems
that operate in a coordinated manner to improve the well-being of the city's
residents. A cyber-physical system (CPS) is a system of computational elements
controlling physical entities. Large-scale CPSs are more vulnerable to attacks
due to the cyber-physical interdependencies that can lead to cascading failures
which can have a significant detrimental effect on a city. In this paper, a
novel approach is proposed for analyzing the problem of allocating security
resources, such as firewalls and anti-malware, over the various cyber
components of an interdependent CPS to protect the system against imminent
attacks. The problem is formulated as a Colonel Blotto game in which the
attacker seeks to allocate its resources to compromise the CPS, while the
defender chooses how to distribute its resources to defend against potential
attacks. To evaluate the effects of defense and attack, various CPS factors are
considered including human-CPS interactions as well as physical and topological
characteristics of a CPS such as flow and capacity of interconnections and
minimum path algorithms. Results show that, for the case in which the attacker
is not aware of the CPS interdependencies, the defender can have a higher
payoff, compared to the case in which the attacker has complete information.
The results also show that, in the case of more symmetric nodes, due to
interdependencies, the defender achieves its highest payoff at the equilibrium
compared to the case with independent, asymmetric nodes
Matrix elements for a generalized spiked harmonic oscillator
Closed-form expressions for the singular-potential integrals
are obtained with respect to the Gol'dman and Krivchenkov eigenfunctions for
the singular potential V(x) = B x^2 + A/x^2, B > 0, A >= 0. These formulas are
generalizations of those found earlier by use of the odd solutions of the
Schroedinger equation with the harmonic oscillator potential [Aguilera-Navarro
et al, J. Math. Phys. 31, 99 (1990)].Comment: 12 pages in plain tex with 1 ps figur
Generalized spiked harmonic oscillator
A variational and perturbative treatment is provided for a family of
generalized spiked harmonic oscillator Hamiltonians H = -(d/dx)^2 + B x^2 +
A/x^2 + lambda/x^alpha, where B > 0, A >= 0, and alpha and lambda denote two
real positive parameters. The method makes use of the function space spanned by
the solutions |n> of Schroedinger's equation for the potential V(x)= B x^2 +
A/x^2. Compact closed-form expressions are obtained for the matrix elements
, and a first-order perturbation series is derived for the wave
function. The results are given in terms of generalized hypergeometric
functions. It is proved that the series for the wave function is absolutely
convergent for alpha <= 2.Comment: 14 page
Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure
A city's critical infrastructure such as gas, water, and power systems, are
largely interdependent since they share energy, computing, and communication
resources. This, in turn, makes it challenging to endow them with fool-proof
security solutions. In this paper, a unified model for interdependent
gas-power-water infrastructure is presented and the security of this model is
studied using a novel game-theoretic framework. In particular, a zero-sum
noncooperative game is formulated between a malicious attacker who seeks to
simultaneously alter the states of the gas-power-water critical infrastructure
to increase the power generation cost and a defender who allocates
communication resources over its attack detection filters in local areas to
monitor the infrastructure. At the mixed strategy Nash equilibrium of this
game, numerical results show that the expected power generation cost deviation
is 35\% lower than the one resulting from an equal allocation of resources over
the local filters. The results also show that, at equilibrium, the
interdependence of the power system on the natural gas and water systems can
motivate the attacker to target the states of the water and natural gas systems
to change the operational states of the power grid. Conversely, the defender
allocates a portion of its resources to the water and natural gas states of the
interdependent system to protect the grid from state deviations.Comment: 7 pages, in proceedings of Resilience Week 201
Load Shifting in the Smart Grid: To Participate or Not?
Demand-side management (DSM) has emerged as an important smart grid feature
that allows utility companies to maintain desirable grid loads. However, the
success of DSM is contingent on active customer participation. Indeed, most
existing DSM studies are based on game-theoretic models that assume customers
will act rationally and will voluntarily participate in DSM. In contrast, in
this paper, the impact of customers' subjective behavior on each other's DSM
decisions is explicitly accounted for. In particular, a noncooperative game is
formulated between grid customers in which each customer can decide on whether
to participate in DSM or not. In this game, customers seek to minimize a cost
function that reflects their total payment for electricity. Unlike classical
game-theoretic DSM studies which assume that customers are rational in their
decision-making, a novel approach is proposed, based on the framework of
prospect theory (PT), to explicitly incorporate the impact of customer behavior
on DSM decisions. To solve the proposed game under both conventional game
theory and PT, a new algorithm based on fictitious player is proposed using
which the game will reach an epsilon-mixed Nash equilibrium. Simulation results
assess the impact of customer behavior on demand-side management. In
particular, the overall participation level and grid load can depend
significantly on the rationality level of the players and their risk aversion
tendency.Comment: 9 pages, 7 figures, journal, accepte
- …