基于贝叶斯序贯博弈模型的智能电网信息物理安全分析
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Cyber-physical Security Analysis of Smart Grids With Bayesian Sequential Game Models
  • 作者:李军 ; 李韬
  • 英文作者:LI Jun;LI Tao;School of Mechatronic Engineering and Automation,Shanghai University;Key Laboratory of Pure Mathematics and Mathematical Practice,School of Mathematical Sciences,East China Normal University;
  • 关键词:信息物理系统 ; 智能电网安全 ; 网络攻击 ; 物理攻击 ; 贝叶斯序贯博弈
  • 英文关键词:Cyber-physical system(CPS);;smart grid security;;cyber attack;;physical attack;;Bayesian sequential game
  • 中文刊名:MOTO
  • 英文刊名:Acta Automatica Sinica
  • 机构:上海大学机电工程与自动化学院;华东师范大学数学科学学院,上海市核心数学与实践重点实验室;
  • 出版日期:2018-11-21 09:52
  • 出版单位:自动化学报
  • 年:2019
  • 期:v.45
  • 基金:国家自然科学基金(61522310)资助~~
  • 语种:中文;
  • 页:MOTO201901008
  • 页数:12
  • CN:01
  • ISSN:11-2109/TP
  • 分类号:100-111
摘要
智能电网是利用信息技术优化从供应者到消费者的电力传输和配电网络.作为一种信息物理系统(Cyber-physical system, CPS),智能电网由物理设备和负责数据计算与通信的网络组成.智能电网的诸多安全问题会出现在通信网络和物理设备这两个层面,例如注入坏数据和收集客户隐私信息的网络攻击,攻击电网物理设备的物理攻击等.本文主要研究了智能电网的系统管理员(防护者)如何确定攻击者类型,从而选择最优防护策略的问题.提出了一种贝叶斯序贯博弈模型以确定攻击者的类型,根据序贯博弈树得到博弈双方的均衡策略.首先,对类型不确定的攻击者和防护者构建静态贝叶斯博弈模型,通过海萨尼转换将不完全信息博弈转换成完全信息博弈,得到贝叶斯纳什均衡解,进而确定攻击者的类型.其次,考虑攻击者和防护者之间的序贯博弈模型,它能够有效地帮助防护者进行决策分析.通过逆向归纳法分别对两种类型的攻击者和防护者之间的博弈树进行分析,得到博弈树的均衡路径,进而得到攻击者的最优攻击策略和防护者的最优防护策略.分析表明,贝叶斯序贯博弈模型能够使防护者确定攻击者的类型,并且选择最优防护策略,从而为涉及智能电网信息安全的相关研究提供参考.
        A smart grid is a network which uses communication and information technologies to optimize the transmission and distribution of power from suppliers to consumers. As a kind of cyber-physical system(CPS), a smart grid consists of the network part of data computing and communication and the physical part of all devices. Many security issues arise in both components of the grid, such as injecting bad data, collecting customer privacy information(cyber attacks) and attacking the grid physical devices(physical attacks). In this paper, we study how the system administrator(defender)can determine the type of attack and make optimal protection strategy. We propose a Bayesian sequential game model to defermine the type of attack, and analyze the equilibrium strategy of both game sides according to the sequential game tree. Firstly, we construct a static Bayesian game model between the attacker of an indeterminate type and the defender.We transform the incomplete information game into a complete information game through Harsanyi transformation, and analyze the Bayesian Nash equilibrium to determine the type of attacker. Secondly, we consider the sequential game model between attackers and defenders, which can effectively help defender to make decision in dynamic networks. Through the backward induction, the game tree is analyzed between two types of attackers and defenders, respectively. Then we obtain the equilibrium path of the game tree and make the optimal strategies for both players. It is shown that the defender can determine the type of attacker and make the optimal strategy by the Bayesian sequential game model, which provides a reference for the security research on smart grids.
引文
1 Derler P,Lee E A,Vincentelli A S.Modeling cyber-physical systems.Proceedings of the IEEE,2012,100(1):13-28
    2 Mitchell R,Chen I R.Effect of intrusion detection and response on reliability of cyber physical systems.IEEE Transactions on Reliability,2013,62(1):199-210
    3 Cao X H,Cheng P,Chen J M,Sam Ge S,Cheng Y,Sun YX.Cognitive radio based state estimation in cyber-physical systems.IEEE Journal on Selected Areas in Communications,2014,32(3):489-502
    4 Baheti R,Gill H.Cyber-physical systems.The Impact of Control Technology.Washington D.C.,USA:IEEE,2011.161-166
    5 Cintuglu M H,Mohammed O A,Akkaya K,Uluagac A S.Asurvey on smart grid cyber-physical system testbeds.IEEECommunications Surveys and Tutorials,2017,19(1):446-464
    6 Liu Y,Peng Y,Wang B L,Yao S R,Liu Z H.Review on cyber-physical systems.IEEE/CAA Journal of Automatica Sinica,2017,4(1):27-40
    7 Wen Jing-Rong,Wu Mu-Qing,Su Jing-Fang.Cyberphysical system.Acta Automatica Sinica,2012,38(4):507-517(温景容,武穆清,宿景芳.信息物理融合系统.自动化学报,2012,38(4):507-517)
    8 Liu E D,Cheng P.Achieving privacy protection using distributed load scheduling:a randomized approach.IEEETransactions on Smart Grid,2017,8(5):2460-2473
    9 Dai W B,Dubinin V N,Christensen J H,Vyatkin V,Guan X P.Toward self-manageable and adaptive industrial cyberphysical systems with knowledge-driven autonomic service management.IEEE Transactions on Industrial Informatics,2017,13(2):725-736
    10 Deng R L,Zhuang P,Liang H.CCPA:coordinated cyberphysical attacks and countermeasures in smart grid.IEEETransactions on Smart Grid,2017,8(5):2420-2430
    11 Humayed A,Lin J Q,Li F J,Luo B.Cyber-physical systems security-a survey.IEEE Internet of Things Journal,2017,4(6):1802-1831
    12 Tian J,Tan R,Guan X H,Liu T.Enhanced hidden moving target defense in smart grids.IEEE Transactions on Smart Grid,DOI:10.1109/TSG.2018.2791512,2018.
    13 Yang Q Y,Li D H,Yu W,Liu Y K,An D,Yang X Y,et al.Toward data integrity attacks against optimal power flow in smart grid.IEEE Internet of Things Journal,2017,4(5):1726-1738
    14 Sun Qiu-Ye,Teng Fei,Zhang Hua-Guang.Energy internet and its key control issues.Acta Automatica Sinica,2017,43(2):176-194(孙秋野,滕菲,张化光.能源互联网及其关键控制问题.自动化学报,2017,43(2):176-194)
    15 Luo X Y,Yao Q,Wang X Y,Guan X P.Observer-based cyber attack detection and isolation in smart grids.International Journal of Electrical Power and Energy Systems,2018,101:127-138
    16 Yan Y,Qian Y,Sharif H,Tipper D.A survey on cyber security for smart grid communications.IEEE Communications Surveys and Tutorials,2012,14(4):998-1010
    17 Hasan M M,Mouftah H T.A study of resource-constrained cyber security planning for smart grid networks.In:Proceedings of the 2016 IEEE Electrical Power and Energy Conference.Ottawa,Canada:IEEE,2016.1-6
    18 Mo Y L,Kim T H J,Brancik K,Dickinson D,Lee H,Perrig A,et al.Cyber-physical security of a smart grid infrastructure.Proceedings of the IEEE,2012,100(1):195-209
    19 Osborne M J,Rubinstein A.A Course in Game Theory.Cambridge:MIT Press,1994.
    20 Hewett R,Rudrapattana S,Kijsanayothin P.Cyber-security analysis of smart grid SCADA systems with game models.In:Proceedings of the 9th Annual Cyber and Information Security Research Conference.Oak Ridge,Tennessee,USA:ACM,2014.109-112
    21 Maharjan S,Zhu Q Y,Zhang Y,Gjessing S,Basar T.Dependable demand response management in the smart grid:a Stackelberg game approach.IEEE Transactions on Smart Grid,2013,4(1):120-132
    22 Ma J H,Liu Y T,Song L Y,Han Z.Multiact dynamic game strategy for jamming attack in electricity market.IEEETransactions on Smart Grid,2015,6(5):2273-2282
    23 Sanjab A,Saad W.Data injection attacks on smart grids with multiple adversaries:a game-theoretic perspective.IEEE Transactions on Smart Grid,2016,7(4):2038-2049
    24 Roy S,Ellis C,Shiva S,Dasgupta D,Shandilya V,Wu Q S.A survey of game theory as applied to network security.In:Proceedings of the 43rd Hawaii International Conference on System Sciences.Honolulu,HI,USA:IEEE,2010.1-10
    25 Yuan Yong,Wang Fei-Yue.Sequential equilibrium analysis and computational experiments of a bargaining game with incomplete information.Acta Automatica Sinica,2016,42(5):724-734(袁勇,王飞跃.不完全信息议价博弈的序贯均衡分析与计算实验.自动化学报,2016,42(5):724-734)
    26 Wang K,Du M,Maharjan S,Sun Y F.Strategic honeypot game model for distributed denial of service attacks in the smart grid.IEEE Transactions on Smart Grid,2017,8(5):2474-2482
    27 Zhang Wei-Ying.Game Theory Information Economics.Shanghai:Truth and Wisdom Press,Shanghai Joint Publishing,Shanghai People s Publishing House,2012.(张维迎.博弈论与信息经济学.上海:格致出版社,上海三联书店,上海人民出版社,2012.)
    28 Lakshmanan K,de Niz D,Rajkumar R,Moreno G.Resource allocation in distributed mixed-criticality cyber-physical systems.In:Proceedings of the 30th International Conference on Distributed Computing Systems.Genova,Italy:IEEE,2010.169-178
    29 Nash J[Author],Zhang Liang-Qiao,Wang Xiao-Gang[Translator].Essays on Game Theory.Beijing:Capital University of Economics and Business Press,2015.(约翰·纳什[著],张良桥,王晓刚[译].纳什博弈论论文集.北京:首都经济贸易大学出版社,2015.)
    30 Ross S M[Author],Gong Guang-Lu[Translator].Stochastic Processes(2nd edition).Beijing:China Machine Press,2013.(罗斯[著],龚光鲁[译].随机过程.第2版.北京:机械工业出版社,2013.)
    31 Li Y Z,Shi L,Cheng P,Chen J M,Quevedo D E.Jamming attacks on remote state estimation in cyber-physical systems:a game-theoretic approach.IEEE Transactions on Automatic Control,2015,60(10):2831-2836
    32 Xie L,Mo Y L,Sinopoli B.False data injection attacks in electricity markets.In:Proceedings of the 1st IEEEInternational Conference on Smart Grid Communications.Gaithersburg,MD,USA:IEEE,2010.226-231
    33 Smith R.Assault on California power station raises alarm on potential for terrorism.Wall Street Journal,2014,1-7
    34 Tsang R.Cyberthreats,vulnerabilities and attacks on SCADA networks.University of California,Berkeley,USA,2010.
    35 Lee A.Guidelines for Smart Grid Cyber Security,NIST Interagency/Internal Report(NISTIR)-7628,2010.