Visible to the public A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures

TitleA Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Publication TypeConference Paper
Year of Publication2015
AuthorsIsmail, Z., Leneutre, J., Bateman, D., Chen, L.
Conference Name2015 IEEE 16th International Symposium on High Assurance Systems Engineering
PublisherIEEE
KeywordsCommunication equipment, communication infrastructure, cyber-physical system, electrical infrastructures, game theory, game-theoretical model, Games, interdependent ICT, Mathematical model, Nash equilibrium, Non-cooperative Game Theory, noncooperative game theory, off-the-shelf vulnerable operating systems, operating systems (computers), power engineering computing, power grids, power system control, power system management, pubcrawl170107, pubcrawl170108, risk management, SCADA Security, security, security risk management, Smart grid, smart power grids, Substations
Abstract

The communication infrastructure is a key element for management and control of the power system in the smart grid. The communication infrastructure, which can include equipment using off-the-shelf vulnerable operating systems, has the potential to increase the attack surface of the power system. The interdependency between the communication and the power system renders the management of the overall security risk a challenging task. In this paper, we address this issue by presenting a mathematical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we model interactions between an attacker and a defender. We derive the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. Finally, we evaluate the correctness and the efficiency of our model via a case study.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7027420&isnumber=7027398
DOI10.1109/HASE.2015.24
Citation Keyismail_game-theoretical_2015