Next Article in Journal
Control Plane Optimisation for an SDN-Based WBAN Framework to Support Healthcare Applications
Next Article in Special Issue
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid
Previous Article in Journal
Pavement Crack Detection from Mobile Laser Scanning Point Clouds Using a Time Grid
 
 
Article
Peer-Review Record

Game Theoretic Honeypot Deployment in Smart Grid

Sensors 2020, 20(15), 4199; https://doi.org/10.3390/s20154199
by Panagiotis Diamantoulakis 1, Christos Dalamagkas 2, Panagiotis Radoglou-Grammatikis 3, Panagiotis Sarigiannidis 3,* and George Karagiannidis 1
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3: Anonymous
Sensors 2020, 20(15), 4199; https://doi.org/10.3390/s20154199
Submission received: 21 June 2020 / Revised: 21 July 2020 / Accepted: 24 July 2020 / Published: 28 July 2020
(This article belongs to the Special Issue Cybersecurity and Privacy-Preserving in Modern Smart Grid)

Round 1

Reviewer 1 Report

The authors have proposed a game theoretic honeypot deployment strategy to maximize both attackers' and defenders' payoff. The idea is very interesting and the analysis is quite rigorous. However, I have the following comments on this work:

 

  1. It will be good if the authors can demonstrate how the strategies are impacting smart grid applications. For example, how much financial loss will happen in energy trading or electricity billing. The connection to smart grid does not seem very strong, this can be further improved.
  2. Can these strategies be applied to false data injection attack scenarios, for example, as in "Impact of optimal false data injection attacks on local energy trading in a residential microgrid", ICT Express.
  3. Can the authors compare the security performance with other research papers on honeypot deployment?
  4. What is the physical significance of Nash Equilibrium in this scenario? The authors could have maximized payoffs for either attacker or defender, why both at the same time?

Author Response

Please see the attachement.

Author Response File: Author Response.pdf

Reviewer 2 Report

The paper studies attacks in smart grids using honeypots. The main contribution is the use of game theory for mitigating attacks in smart grids. The paper is well-written and well-organized. The contributions are significant and the discussion is lucid. Few minor points to improve the presentation of the paper:

1) The paper is heavily mathematical. Some background on the theory would be useful for practitioners like me.

2) A separate related work section to include some of the key works in the field. Perhaps include a table to show how your work compares to prior research.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 3 Report

The paper proposed a game-theoretic approach for honeypot deployment in the smart grid for addressing the cyber-physical issues. The paper is well written and the results are promising. 

To improve the manuscript the following issues are suggested:

  1. The attack model can be added in details in the system model.
  2. Future work can be added to the con conclusion.
  3. The references can be added: a) Wei, Longfei, Arif I. Sarwat, Walid Saad, and Saroj Biswas. "Stochastic games for power grid protection against coordinated cyber-physical attacks." IEEE Transactions on Smart Grid 9, no. 2 (2016): 684-694. b) Tian, Wen, Xiaopeng Ji, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, and Shuhua Huang. "Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid." IEEE Access 8 (2020): 64075-64085.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

The authors have addressed all my comments adequately. Please make sure to proof-read the paper and correct typos. For example, 'innovative' in line 17 and treats -->'threats' in line 33 of the introduction.

Back to TopTop