Next Article in Journal
Control Plane Optimisation for an SDN-Based WBAN Framework to Support Healthcare Applications
Next Article in Special Issue
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
Previous Article in Journal
Pavement Crack Detection from Mobile Laser Scanning Point Clouds Using a Time Grid
Open AccessArticle

Game Theoretic Honeypot Deployment in Smart Grid

1
Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece
2
Testing, Research and Standards Centre, Public Power Corporation S.A., 15351 Athens, Greece
3
Department of Electrical and Computer Engineering, University of Western Macedonia, 50100 Kozani, Greece
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(15), 4199; https://doi.org/10.3390/s20154199
Received: 21 June 2020 / Revised: 21 July 2020 / Accepted: 24 July 2020 / Published: 28 July 2020
(This article belongs to the Special Issue Cybersecurity and Privacy-Preserving in Modern Smart Grid)
The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two-way flow of power and data, as well as the use of Internet of Things (IoT) technologies and devices. However, converting the traditional power grids to smart grids poses severe security challenges and makes their components and services prone to cyber attacks. To this end, advanced techniques are required to mitigate the impact of the potential attacks. In this paper, we investigate the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the real devices. More specifically, the interaction of an attacker and a defender is considered, who both optimize the number of attacks and the defending system configuration, i.e., the number of real devices and honeypots, respectively, with the aim to maximize their individual payoffs. To solve this problem, game theoretic tools are used, considering an one-shot game and a repeated game with uncertainty about the payoff of the attacker, where the Nash Equilibrium (NE) and the Bayesian NE are derived, respectively. Finally, simulation results are provided, which illustrate the effectiveness of the proposed framework. View Full-Text
Keywords: smart grid; cybersecurity; honeypots; game theory smart grid; cybersecurity; honeypots; game theory
Show Figures

Figure 1

MDPI and ACS Style

Diamantoulakis, P.; Dalamagkas, C.; Radoglou-Grammatikis, P.; Sarigiannidis, P.; Karagiannidis, G. Game Theoretic Honeypot Deployment in Smart Grid. Sensors 2020, 20, 4199.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop