Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †
<p>The iterated processing in the game model.</p> "> Figure 2
<p>The feasible region for the equalizer strategy [<a href="#B26-sensors-18-00674" class="html-bibr">26</a>] (reproduced with permission from Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang, A Game-Theoretic Model on Coalitional Attacks in Smart Grid; published by IEEE, 2016). (<b>a</b>) Case 1: <math display="inline"> <semantics> <mrow> <mi>r</mi> <mo><</mo> <mfrac> <mi>N</mi> <mrow> <mi>N</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mrow> </semantics> </math>; (<b>b</b>) Case 2: <math display="inline"> <semantics> <mrow> <mfrac> <mi>N</mi> <mrow> <mi>N</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> <mo><</mo> <mi>r</mi> <mo><</mo> <mfrac> <mrow> <mi>N</mi> <mo>+</mo> <mi>β</mi> </mrow> <mrow> <mi>N</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mrow> </semantics> </math>; (<b>c</b>) Case 3: <math display="inline"> <semantics> <mrow> <mi>r</mi> <mo>></mo> <mfrac> <mrow> <mi>N</mi> <mo>+</mo> <mi>β</mi> </mrow> <mrow> <mi>N</mi> <mo>−</mo> <mn>1</mn> </mrow> </mfrac> </mrow> </semantics> </math>.</p> "> Figure 3
<p>The payoff of the some typical strategies [<a href="#B26-sensors-18-00674" class="html-bibr">26</a>] (reproduced with permission from Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang, A Game-Theoretic Model on Coalitional Attacks in Smart Grid; published by IEEE, 2016). (<b>a</b>) Win-Stay-Lose-Shift (WSLS) versus Random Strategy; (<b>b</b>) Equalizer versus Random Strategy; (<b>c</b>) all with Equalizer Strategy.</p> "> Figure 4
<p>The payoff of the Adaptive Equalizer (AE) strategy versus other strategies. (<b>a</b>) AE Strategy versus WSLS Strategy; (<b>b</b>) AE Strategy versus Random Strategy; (<b>c</b>) all with AE Strategy.</p> "> Figure 5
<p>The upper bound of <math display="inline"> <semantics> <mi>χ</mi> </semantics> </math> of the extortion strategy. (<b>a</b>) upper bound of <math display="inline"> <semantics> <mi>χ</mi> </semantics> </math> vs. <span class="html-italic">r</span> (<math display="inline"> <semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>0.15</mn> </mrow> </semantics> </math>); (<b>b</b>) upper bound of <math display="inline"> <semantics> <mi>χ</mi> </semantics> </math> vs. <span class="html-italic">r</span> (<math display="inline"> <semantics> <mrow> <mi>N</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics> </math>); (<b>c</b>) upper bound of <math display="inline"> <semantics> <mi>χ</mi> </semantics> </math> vs. <span class="html-italic">N</span> (<math display="inline"> <semantics> <mrow> <mi>r</mi> <mo>=</mo> <mn>1.6</mn> </mrow> </semantics> </math>).</p> "> Figure 6
<p>The payoff of the extortion strategy versus other strategies. (<b>a</b>) Extortion versus WSLS Strategy; (<b>b</b>) Extortion versus Random Strategy; (<b>c</b>) Extortion versus Equalizer Strategy.</p> ">
Abstract
:1. Introduction
- Game Theory-Based Model. We propose a game theory-based model to investigate the interaction among multiple adversaries who launch coalitional attacks against the system. We establish an extended Iterated Public Goods Game (IPGG) model to analyze the interactions among adversaries and each adversary is subjected by a penalty factor enforced by the defender via the defensive capability. In each round, each adversary must choose either to cooperate by participating in the coalitional attack, or to defect by standing aside. The participating adversaries contribute their own endowment and the gain obtained through the attack is distributed to all adversaries. Only participating adversaries will suffer the penalty from the defender when the coalitional attack is detected. Our proposed game model reveals the expected payoff of the participants through the equalizer strategy. The equalizer strategy can help a participant to choose cooperation or defection according to the last round outcomes, in order to control the payoff of his/her opponents to be a fixed value. In this paper, we present two typical cases: For an altruistic participant, he/she will set the payoff of his/her opponents to the maximum value. For an adaptive participant, he/she will set the payoff of his/her opponents to be the same as his/her own dynamically, meaning all participants obtain the same payoff. In addition, we further study the game model with multiple participants and a collusive strategy, which has the same objective as the equalizer strategy, but the strategy adopted by participants is totally different. The collusive strategy requires more than one participant to collude with each other to control the payoff of their opponents to be a fixed value, making it more difficult to be detected. With our proposed game model, we can quantify the capacity of the defender to reduce the expected payoff of adversaries.
- Theoretical Analysis and Evaluation. Via a combination of comprehensive analysis and performance evaluation on our developed game model, we show the maximum payoff of adversaries in different cases. For example, with the increase of the rate of attack gain, the expected average payoff can reach the maximum value. With the aid of the penalty factor introduced by defensive mechanisms, the maximum value of the expected average payoff can be reduced to the minimum value. This means that the participating adversaries can obtain little gain from the coalitional attack, which reduces incentive to participate in the attack. Meanwhile, our proposed game model can help the defender set a proper defense level based on the affordable cost to reduce the attack consequence raised by the attack, improving the effectiveness of the defense.
- Extortion Strategy. We extend our developed game model to consider the extortion strategy as well. In this strategy, a selfish participant can extort his/her opponents, seeking to always obtain a greater payoff than his/her opponents, even if the total payoff decreases. Via the combined theoretical analysis and evaluation results, we find that the penalty of the defender can lead to more severe competition among the participants in the game. Therefore, it is difficult for adversaries to achieve global optimal outcomes, limiting the impacts caused by adversaries.
2. Related Work
3. Model
3.1. Iterated Game Model
3.2. Threat Model
4. Our Approach
4.1. Basic Idea
4.2. An Extended IPGG Model
4.3. Expected Payoff of Equalizer Strategy
4.4. Collusive Strategy
5. Theoretical Analysis
5.1. Negative
5.1.1. Case 1:
5.1.2. Case 2:
5.1.3. Case 3:
5.2. Positive
5.2.1. Case 1:
5.2.2. Case 2:
5.2.3. Case 3:
5.3. Penalty Factor of Defender
- When , this case is similar to the one described in Section 5.1.1, in which the range of expected average payoff is . Based on the proposed game model, the defender can set the range of penalty factor . If the penalty factor is set to , the maximum value of expected average payoff can approach 1.
- When , this case is similar to the case in Section 5.1.3, where the range of expected average payoff is . Based on the proposed game model, the defender can set the penalty factor , and this case will be similar to the case described in Section 5.1.2. If the penalty factor is set to r, the maximum value of expected average payoff can reach .
5.4. Strategy of Participants
6. Performance Evaluation
6.1. Evaluation Setup
6.2. Evaluation Results
7. Extortion Strategy
7.1. Allowed Range of Parameters
- (i)
- Case I. If , to ensure that , we can derive thatTherefore, inequation can not hold.
- (ii)
- Case II. If , it is easy to see that it is just the strategy with and .
- (iii)
- Case III. If , according to the constraints , we can derive the following inequations:Thus, we can see that the allowed range of depends on the positive or negative of . If , we haveIf , we have
7.2. Upper Bound of
7.3. Evaluation Results
8. Discussion
- Adaptation strategy: In the analysis of the equalizer strategy, we assume two kinds of participants. The first type will not be selfish and attempt to maximize the average payoff of their coalitional participants, while the second type will try to make everyone get the same payoff by dynamically adjusting their adaptive equalizer strategy after each round. Nonetheless, it is more likely that adversaries are intelligent and intend to adopt a dynamic strategy. In this scenario, they can give rewards or punishments according to the choices of their opponents, which is called adaptation strategy. Generally speaking, the adversaries will observe and analyze their opponent’s behaviors and develop an adaptation strategy, in which they can make different choices in different situations, in order to achieve a better payoff in the iterated game. With the adaptation strategy, the rational adversaries can avoid competition and try to cooperate with each other. Regarding the role of the defender, it is necessary to find a way to analyze and disrupt the cooperation among adversaries with an adaptation strategy. For example, a promising method is to forge some fake attackers to join in the iterated game and then disrupt the trust among the adversaries.
- Additional cases with different objectives: Our proposed game model considers the scenario, in which adversaries launch coalitional attacks to disrupt the operation of the smart-world system based on the IPGG model. We would like to extend our developed model to other cases. For example, adversaries could obtain further gain by manipulating the electricity price [7], by disrupting the effectiveness of energy generation resources [25], by sending spam or mining bitcoins to reinstate the appliances usability [11]. In these cases, adversaries could either cooperate using the attack strategies that we have studied in this paper, or launch attacks against separate objectives. Generally speaking, there are usually two solutions to address this issue. The first is to abstract the new problems or new cases to the proposed game theory model. However, excessive assumptions and constraints will affect the applicability of the game model. The other solution is to use a more suitable game model for the new cases, such as the Stackelberg model, and then analyze the effectiveness of different strategies in the new game model. This can be one research direction of our future work.
- Relaxing constraints: As mentioned in our work, the capacity of the zero-determinant strategy is strictly limited within a range. In this case, if the number of participants or the rate of attack gain increases, the effect on the participants of the zero-determinant strategy can be suppressed. In this case, it is hard to establish a linear relationship among the payoffs of the participants, meaning that the equalizer strategy and its variants (e.g., collusive strategy) as well as the extortion strategy cannot be adopted to analyze the trends of their payoffs. Thus, it is necessary to develop new mechanisms to overcome this limitation. For example, by observing and analyzing the behavior of participants, some regular participants can be considered as a group in order to establish a new iterated game among different groups, so as to reduce the number of participants. The key issue is to find the optimal solution to divide the groups and extend the existing game model to new cases. Therefore, this can be another research direction of our future work.
9. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Locke, G.; Gallagher, P.D. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010; p. 33. [Google Scholar]
- Stankovic, J.A. Research Directions for the Internet of Things. IEEE Internet Things J. 2014, 1, 3–9. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Yang, X.; Yang, Q.; Fu, X.; Zhao, W. A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 2017, 66, 2551–2566. [Google Scholar] [CrossRef]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Zhang, H.; Zhao, W. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 2017, 4, 1125–1142. [Google Scholar] [CrossRef]
- Sivaraman, V.; Gharakheili, H.H.; Vishwanath, A.; Boreli, R.; Mehani, O. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, United Arab Emirates, 19–21 October 2015; pp. 163–167. [Google Scholar]
- Farooq, M.U.; Waseem, M.; Khairi, A.; Mazhar, S. A critical analysis on the security concerns of Internet of Things (IoT). Int. J. Comput. Appl. 2015, 111, 7. [Google Scholar]
- Lin, J.; Yu, W.; Yang, X. On False Data Injection Attack against Multistep Electricity Price in Electricity Market in Smart Grid. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 286–302. [Google Scholar] [CrossRef]
- Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2017, PP, 1. [Google Scholar] [CrossRef]
- Van der Meulen, R. 8.4 Billion Connected ‘Things’ Will Be in Use in 2017, Up 31 Percent From 2016; Gartner Inc.: Stamford, CT, USA, 2017. [Google Scholar]
- Krebs, B. Hacked Cameras, DVRs Powered Today’s Massive Internet Outage; Krebs on Security: Arlington, VA, USA, 2017. [Google Scholar]
- Ronen, E.; Shamir, A. Extended functionality attacks on IoT devices: The case of smart lights. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany, 21–24 March 2016; pp. 3–12. [Google Scholar]
- Yu, W.; Griffith, D.; Ge, L.; Bhattarai, S.; Golmie, N. An integrated detection system against false data injection attacks in the Smart Grid. Int. J. Secur. Commun. Netw. 2015, 8, 91–109. [Google Scholar] [CrossRef]
- Yang, Q.; Yang, J.; Yu, W.; An, D.; Zhang, N.; Zhao, W. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 717–729. [Google Scholar] [CrossRef]
- Yang, X.; Zhang, X.; Lin, J.; Yu, W.; Fu, X.; Zhao, W. Data integrity attacks against the distributed real-time pricing in the smart grid. In Proceedings of the 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC), Las Vegas, NV, USA, 9–11 December 2016. [Google Scholar]
- Yang, Q.; Liu, Y.; Yu, W.; An, D.; Yang, X.; Lin, J. On Data Integrity Attacks against Optimal Power Flow in Power Grid Systems. In Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017. [Google Scholar]
- Lin, J.; Yu, W.; Zhang, N.; Yang, X.; Ge, L. On data integrity attacks against route guidance in transportation-based cyber-physical systems. In Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 313–318. [Google Scholar]
- Maharjan, S.; Zhu, Q.; Zhang, Y.; Gjessing, S.; Basar, T. Dependable demand response management in the smart grid: A Stackelberg game approach. IEEE Trans. Smart Grid 2013, 4, 120–132. [Google Scholar] [CrossRef]
- Abie, H.; Balasingham, I. Risk-based adaptive security for smart IoT in eHealth. In Proceedings of the 7th International Conference on Body Area Networks, Oslo, Norway, 24–26 February 2012; Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (ICST): Brussels, Belgium, 2012; pp. 269–275. [Google Scholar]
- Hernandez, G.; Arias, O.; Buentello, D.; Jin, Y. Smart Nest Thermostat: A Smart Spy in Your Home; Black Hat USA; UBM Tech: San Francisco, CA, USA, 2014. [Google Scholar]
- Lin, J.; Yu, W.; Yang, X.; Xu, G.; Zhao, W. On false data injection attacks against distributed energy routing in smart grid. In Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), Beijing, China, 17–19 April 2012; pp. 183–192. [Google Scholar]
- Ashok, A.; Govindarasu, M. Cyber-physical risk modeling and mitigation for the smart grid using a game-theoretic approach. In Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 18–20 February 2015; pp. 1–5. [Google Scholar]
- He, X.; Yang, X.; Lin, J.; Ge, L.; Yu, W.; Yang, Q. Defending against Energy Dispatching Data integrity attacks in smart grid. In Proceedings of the 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC), Nanjing, China, 14–16 December 2015; pp. 1–8. [Google Scholar]
- Hossain, M.M.; Fotouhi, M.; Hasan, R. Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things. In Proceedings of the 2015 IEEE World Congress on Services, New York, NY, USA, 27 June–2 July 2015; pp. 21–28. [Google Scholar]
- Zhang, C.; Green, R. Communication security in Internet of Thing: Preventive measure and avoid DDoS attack over IoT network. In Proceedings of the 18th Symposium on Communications & Networking, Alexandria, VA, USA, 12–15 April 2015; Society for Computer Simulation International: San Diego, CA, USA, 2015; pp. 8–15. [Google Scholar]
- Farraj, A.; Hammad, E.; Al Daoud, A.; Kundur, D. A game-theoretic analysis of cyber switching attacks and mitigation in smart grid systems. IEEE Trans. Smart Grid 2016, 7, 1846–1855. [Google Scholar] [CrossRef]
- Yang, X.; He, X.; Lin, J.; Yu, W.; Yang, Q. A Game-Theoretic Model on Coalitional Attacks in Smart Grid. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 435–442. [Google Scholar]
- Liu, Y.; Ning, P.; Reiter, M.K. False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. 2011, 14, 13. [Google Scholar] [CrossRef]
- Xie, L.; Mo, Y.; Sinopoli, B. Integrity data attacks in power market operations. IEEE Trans. Smart Grid 2011, 2, 659–666. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Nguyen, N.T.; Zheng, R.; Han, Z. Detecting stealthy false data injection using machine learning in smart grid. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), Atlanta, GA, USA, 9–13 December 2013; pp. 808–813. [Google Scholar]
- Sedghi, H.; Jonckheere, E. Statistical structure learning of smart grid for detection of false data injection. In Proceedings of the IEEE Power and Energy Society General Meeting (PES), Vancouver, BC, Canada, 21–25 July 2013; pp. 1–5. [Google Scholar]
- Manandhar, K.; Cao, X.; Hu, F.; Liu, Y. Combating False Data Injection Attacks in Smart Grid Using Kalman Filter. In Proceedings of the 2014 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI, USA, 3–6 February 2014; pp. 16–20. [Google Scholar]
- Yang, Q.; Chang, L.; Yu, W. On False Data Injection Attacks against Kalman Filtering in Power System Dynamic State Estimation. Int. J. Secur. Commun. Netw. 2016, 9, 833–849. [Google Scholar] [CrossRef]
- Ericsson, G.N. Cyber security and power system communication—Essential parts of a smart grid infrastructure. IEEE Trans. Power Deliv. 2010, 25, 1501–1507. [Google Scholar] [CrossRef]
- Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–physical security of a smart grid infrastructure. Proc. IEEE 2012, 100, 195–209. [Google Scholar]
- Yang, Q.; An, D.; Min, R.; Yu, W.; Yang, X.; Zhao, W. Optimal PMU Placement Based Defense against Data Integrity Attacks in Smart Grid. IEEE Trans. Forensics Inf. Secur. 2017, 12, 1735–1750. [Google Scholar] [CrossRef]
- Yang, X.; Zhao, P.; Zhang, X.; Lin, J.; Yu, W. Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid. IEEE Internet Things J. 2017, 4, 147–161. [Google Scholar] [CrossRef]
- Li, Y. Design of a Key Establishment Protocol for Smart Home Energy Management System. In Proceedings of the 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, Madrid, Spain, 5–7 June 2013; pp. 88–93. [Google Scholar]
- Zhang, N.; Yu, W.; Fu, X.; Das, S.K. Establishing Defender’s Reputation against Insider Attacks. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2010, 40, 597–611. [Google Scholar] [CrossRef] [PubMed]
- Lu, W.; Xu, S.; Yi, X. Optimizing Active Cyber Defense. In Proceedings of the 4th Conference on Decision and Game Theory for Security (GameSec), Fort Worth, TX, USA, 11–12 November 2013. [Google Scholar]
- Xiao, L.; Xie, C.; Chen, T.; Dai, H.; Poor, H.V. A Mobile Offloading Game Against Smart Attacks. IEEE Access 2016, 4, 2281–2291. [Google Scholar] [CrossRef]
- Xiao, L.; Chen, Y.; Lin, W.S.; Liu, K.J.R. Indirect Reciprocity Security Game for Large-Scale Mobile Wireless Networks. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1368–1380. [Google Scholar] [CrossRef]
- Merrick, K.; Hardhienata, M.; Shafi, K.; Hu, J. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios. Future Internet 2016, 8, 34. [Google Scholar] [CrossRef]
- Yu, W.; Zhang, N.; Fu, X.; Zhao, W. Self-Disciplinary Worms: Modeling and Countermeasures. IEEE Trans. Parallel Distrib. Syst. 2010, 21, 1501–1514. [Google Scholar] [CrossRef]
- Zhang, N.; Yu, W.; Fu, X.; Das, S. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity. In Decision and Game Theory for Security, Proceedings of the First International Conference, GameSec 2010, Berlin, Germany, 22–23 November 2010; Alpcan, T., Buttyán, L., Baras, J.S., Eds.; Springer International Publishing AG: Cham, Switzerland, 2010; Volume 6442. [Google Scholar]
- Amin, S.; Schwartz, G.A.; Hussain, A. In quest of benchmarking security risks to cyber-physical systems. IEEE Netw. 2013, 27, 19–24. [Google Scholar] [CrossRef]
- Gueye, A.; Marbukh, V. A game-theoretic framework for network security vulnerability assessment and mitigation. In Proceedings of the International Conference on Decision and Game Theory for Security, Budapest, Hungary, 5–6 November 2012; Springer International Publishing AG: Cham, Switzerland, 2012; pp. 186–200. [Google Scholar]
- Backhaus, S.; Bent, R.; Bono, J.; Lee, R.; Tracey, B.; Wolpert, D.; Xie, D.; Yildiz, Y. Cyber-physical security: A game theory model of humans interacting over control systems. IEEE Trans. Smart Grid 2013, 4, 2320–2327. [Google Scholar] [CrossRef]
- Esmalifalak, M.; Shi, G.; Han, Z.; Song, L. Bad data injection attack and defense in electricity market using game theory study. IEEE Trans. Smart Grid 2013, 4, 160–169. [Google Scholar] [CrossRef]
- Manshaei, M.H.; Zhu, Q.; Alpcan, T.; Bacşar, T.; Hubaux, J.P. Game theory meets network security and privacy. ACM Comput. Surv. 2013, 45, 25. [Google Scholar] [CrossRef]
- Laszka, A.; Felegyhazi, M.; Buttyan, L. A survey of interdependent information security games. ACM Comput. Surv. 2015, 47, 23. [Google Scholar] [CrossRef] [Green Version]
- Hilbe, C.; Wu, B.; Traulsen, A.; Nowak, M.A. Evolutionary performance of zero-determinant strategies in multiplayer games. J. Theor. Biol. 2015, 374, 115–124. [Google Scholar] [CrossRef] [PubMed]
- Zhang, H.; Niyato, D.; Song, L.; Jiang, T.; Han, Z. Zero-determinant strategy for resource sharing in wireless cooperations. IEEE Trans. Wirel. Commun. 2016, 15, 2179–2192. [Google Scholar] [CrossRef]
- Guo, J.L. Zero-determinant strategies in iterated multi-strategy games. arXiv, 2014; arXiv:preprint/1409.1786. [Google Scholar]
- Zhu, Q.; Başar, T. A dynamic game-theoretic approach to resilient control system design for cascading failures. In Proceedings of the 1st International Conference on High Confidence Networked Systems, Beijing, China, 17–18 April 2012; Association for Computing Machinery: New York, NY, USA, 2012; pp. 41–46. [Google Scholar]
- Saad, W.; Han, Z.; Poor, H.V.; Başar, T. Game-theoretic methods for the smart grid: An overview of microgrid systems, demand-side management, and smart grid communications. IEEE Signal Process. Mag. 2012, 29, 86–105. [Google Scholar] [CrossRef]
- Zhu, Q.; Basar, T. Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: Games-in-games principle for optimal cross-layer resilient control systems. IEEE Control Syst. 2015, 35, 46–65. [Google Scholar] [CrossRef]
- Ma, C.Y.; Rao, N.S.; Yau, D.K. A game theoretic study of attack and defense in cyber-physical systems. In Proceedings of the 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, 10–15 April 2011; pp. 708–713. [Google Scholar]
- Siever, W.M.; Miller, A.; Tauritz, D.R. Blueprint for iteratively hardening power grids employing unified power flow controllers. In Proceedings of the IEEE International Conference on System of Systems Engineering, San Antonio, TX, USA, 16–18 April 2007; pp. 1–7. [Google Scholar]
- Akiyama, E.; Kaneko, K. Evolution of cooperation, differentiation, complexity, and diversity in an iterated three-person game. Artif. Life 1995, 2, 293–304. [Google Scholar] [CrossRef] [PubMed]
- Press, W.H.; Dyson, F.J. Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proc. Natl. Acad. Sci. USA 2012, 109, 10409–10413. [Google Scholar] [CrossRef] [PubMed]
- Hilbe, C.; Traulsen, A.; Wu, B.; Nowak, M.A. Zero-determinant alliances in multiplayer social dilemmas. arXiv, 2014; arXiv:preprint/1404.2886. [Google Scholar]
- Dong, H.; Zhi-Hai, R.; Tao, Z. Zero-determinant strategy: An underway revolution in game theory. Chin. Phys. B 2014, 23, 078905. [Google Scholar]
- Pan, L.; Hao, D.; Rong, Z.; Zhou, T. Zero-Determinant Strategies in Iterated Public Goods Game. Sci. Rep. 2015, 5, 13096. [Google Scholar] [CrossRef] [PubMed]
- Al Daoud, A.; Kesidis, G.; Liebeherr, J. Zero-Determinant Strategies: A Game-Theoretic Approach for Sharing Licensed Spectrum Bands. IEEE J. Sel. Areas Commun. 2014, 32, 2297–2308. [Google Scholar] [CrossRef]
- He, X.; Dai, H.; Ning, P.; Dutta, R. Zero-determinant strategies for multi-player multi-action iterated games. IEEE Signal Process. Lett. 2016, 23, 311–315. [Google Scholar] [CrossRef]
- Hardin, G. The tragedy of the commons. Science 1968, 162, 1243–1248. [Google Scholar] [CrossRef] [PubMed]
- Rassenti, S.J.; Smith, V.L.; Wilson, B.J. Controlling market power and price spikes in electricity networks: Demand-side bidding. Proc. Natl. Acad. Sci. USA 2003, 100, 2998–3003. [Google Scholar] [CrossRef] [PubMed]
- Jacobsson, A.; Boldt, M.; Carlsson, B. A risk analysis of a smart home automation system. Future Gen. Comput. Syst. 2016, 56, 719–733. [Google Scholar] [CrossRef]
- Apicella, C.L.; Marlowe, F.W.; Fowler, J.H.; Christakis, N.A. Social networks and cooperation in hunter-gatherers. Nature 2012, 481, 497–501. [Google Scholar] [CrossRef] [PubMed]
- Milinski, M.; Sommerfeld, R.D.; Krambeck, H.J.; Reed, F.A.; Marotzke, J. The collective-risk social dilemma and the prevention of simulated dangerous climate change. Proc. Natl. Acad. Sci. USA 2008, 105, 2291–2294. [Google Scholar] [CrossRef] [PubMed]
- Nowak, M.; Sigmund, K. A strategy of win-stay, lose-shift that outperforms tit-for-tat in the Prisoner’s Dilemma game. Nature 1993, 364, 56–58. [Google Scholar] [CrossRef] [PubMed]
X | Participant X |
Strategy of participant X | |
Probability for participant X to cooperate under the outcome in the last round | |
N | Number of all the participants in the iterated game |
Payoff vector obtained by participant X | |
r | Rate of gain from the coalitional attack |
Probability for participant 1 to cooperate in the current round if he/she chooses cooperation (C) and his/her n opponents choose cooperation in the last round | |
Probability for participant 1 to cooperate in the current round if he/she chooses defection (D) and his/her n opponents choose cooperation in the last round | |
Probability that a single adversary attempts to launch an attack without being detected | |
Coefficients for linear combination in zero-determinant strategy | |
Penalty factor when the attack is detected | |
Parameter that controls the total payoff for the opponents | |
Coefficients satisfying the linear relationship in the equalizer strategy | |
Expected payoff obtained by the opponents of participant X | |
L | Number of the colluding participants in the collusive strategy |
Extortionate factor in the extortion strategy | |
Free parameter in the extortion strategy |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
He, X.; Yang, X.; Yu, W.; Lin, J.; Yang, Q. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. Sensors 2018, 18, 674. https://doi.org/10.3390/s18020674
He X, Yang X, Yu W, Lin J, Yang Q. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. Sensors. 2018; 18(2):674. https://doi.org/10.3390/s18020674
Chicago/Turabian StyleHe, Xiaofei, Xinyu Yang, Wei Yu, Jie Lin, and Qingyu Yang. 2018. "Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems" Sensors 18, no. 2: 674. https://doi.org/10.3390/s18020674
APA StyleHe, X., Yang, X., Yu, W., Lin, J., & Yang, Q. (2018). Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. Sensors, 18(2), 674. https://doi.org/10.3390/s18020674