2.765

2022影响因子

(CJCR)

  • 中文核心
  • EI
  • 中国科技核心
  • Scopus
  • CSCD
  • 英国科学文摘

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于贝叶斯序贯博弈模型的智能电网信息物理安全分析

李军 李韬

李军, 李韬. 基于贝叶斯序贯博弈模型的智能电网信息物理安全分析. 自动化学报, 2019, 45(1): 98-109. doi: 10.16383/j.aas.2018.c180336
引用本文: 李军, 李韬. 基于贝叶斯序贯博弈模型的智能电网信息物理安全分析. 自动化学报, 2019, 45(1): 98-109. doi: 10.16383/j.aas.2018.c180336
LI Jun, LI Tao. Cyber-physical Security Analysis of Smart Grids With Bayesian Sequential Game Models. ACTA AUTOMATICA SINICA, 2019, 45(1): 98-109. doi: 10.16383/j.aas.2018.c180336
Citation: LI Jun, LI Tao. Cyber-physical Security Analysis of Smart Grids With Bayesian Sequential Game Models. ACTA AUTOMATICA SINICA, 2019, 45(1): 98-109. doi: 10.16383/j.aas.2018.c180336

基于贝叶斯序贯博弈模型的智能电网信息物理安全分析

doi: 10.16383/j.aas.2018.c180336
基金项目: 

国家自然科学基金 61522310

详细信息
    作者简介:

    李韬 华东师范大学数学科学学院教授.2009年获得中国科学院数学与系统科学院博士学位.主要研究方向为随机系统, 信息, 物理多主体系统, 博弈论.E-mail:tli@math.ecnu.edu.cn

    通讯作者:

    李军 上海大学机电工程与自动化学院博士研究生.主要研究方向为信息物理系统, 智能电网安全, 博弈论.本文通信作者.E-mail:leejun@shu.edu.cn

Cyber-physical Security Analysis of Smart Grids With Bayesian Sequential Game Models

Funds: 

National Natural Science Foundation of China 61522310

More Information
    Author Bio:

    Professor at the School of Mathematical Sciences,East China Normal University.He received his Ph.D.degree from the Academy of Mathematics and Systems Science,Chinese Academy of Sciences in 2009.His research interest covers stochastic systems,cyber-physical multi-agent systems,and game theory

    Corresponding author: LI Jun Ph.D.candidate at the School of Mechatronic Engineering and Automation,Shanghai University.His research interest covers cyber-physical system,smart grid security,and game theory.Corresponding author of this paper
  • 摘要: 智能电网是利用信息技术优化从供应者到消费者的电力传输和配电网络.作为一种信息物理系统(Cyber-physical system,CPS),智能电网由物理设备和负责数据计算与通信的网络组成.智能电网的诸多安全问题会出现在通信网络和物理设备这两个层面,例如注入坏数据和收集客户隐私信息的网络攻击,攻击电网物理设备的物理攻击等.本文主要研究了智能电网的系统管理员(防护者)如何确定攻击者类型,从而选择最优防护策略的问题.提出了一种贝叶斯序贯博弈模型以确定攻击者的类型,根据序贯博弈树得到博弈双方的均衡策略.首先,对类型不确定的攻击者和防护者构建静态贝叶斯博弈模型,通过海萨尼转换将不完全信息博弈转换成完全信息博弈,得到贝叶斯纳什均衡解,进而确定攻击者的类型.其次,考虑攻击者和防护者之间的序贯博弈模型,它能够有效地帮助防护者进行决策分析.通过逆向归纳法分别对两种类型的攻击者和防护者之间的博弈树进行分析,得到博弈树的均衡路径,进而得到攻击者的最优攻击策略和防护者的最优防护策略.分析表明,贝叶斯序贯博弈模型能够使防护者确定攻击者的类型,并且选择最优防护策略,从而为涉及智能电网信息安全的相关研究提供参考.
    1)  本文责任编委 孙秋野
  • 图  1  贝叶斯博弈的扩展式

    Fig.  1  The Bayesian game in an extensive form

    图  2  网络攻击的序贯博弈树

    Fig.  2  The sequential game tree for cyber attacks

    图  3  物理攻击的序贯博弈树

    Fig.  3  The sequential game tree for physical attacks

    表  1  攻击者类型为网络攻击

    Table  1  The type of attacker is a cyber attack

    防护 不防护
    攻击 (1-2α)ω-cic, (2α-1)ω-cd ω-cic; -ω
    不攻击 0, -βω-cd 0, 0
    下载: 导出CSV

    表  2  攻击者类型为物理攻击

    Table  2  The type of attacker is a physical attack

    防护 不防护
    攻击 (1-2α)ω-cip, (2α-1)ω-cd ω-cip; -ω
    不攻击 0, -βω-cd 0, 0
    下载: 导出CSV

    表  3  行为函数收益

    Table  3  The payoff of the behavioral function

    $A(S, a, d)$ $a$为攻击者策略 $a$为防护者策略
    $S$为攻击者 d×Impact(a) 0
    $S$为防护者 $ - Impact(a)^{d}$ d×Impact(a)
    下载: 导出CSV

    表  4  行为策略$a$的影响函数(网络攻击)

    Table  4  The payoff of the behavioral function

    行为策略$(a)$ $C(a)$ $I(a)$ $A(a)$ $SF(a)$ $Impact(a)$
    $d_{\langle km, jd\rangle}$ $m$ $m$ $l$ $h$ $0.3l + 0.6m + 0.1h$
    $a_{ce}$ $h$ $l$ $l$ $m$ $0.7l + 0.1m + 0.2h$
    $a_{cj}$ $l$ $h$ $m$ $l$ $0.3l + 0.3m + 0.4h$
    $a_{cd}$ $l$ $h$ $m$ $h$ $0.2l + 0.3m + 0.5h$
    下载: 导出CSV

    表  5  行为策略$a$的影响函数(物理攻击)

    Table  5  The payoff of the behavioral function (physical attack)

    行为策略$(a)$ $C(a)$ $I(a)$ $A(a)$ $SF(a)$ $Impact(a)$
    $d_{\langle ca, mp\rangle}$ $l$ $m$ $m$ $m$ $0.1l + 0.9m$
    $a_{ps}$ $m$ $l$ $l$ $m$ $0.8l + 0.2m$
    $a_{pn}$ $l$ $m$ $m$ $m$ $0.1l + 0.9m$
    $a_{pt}$ $l$ $h$ $h$ $h$ $0.1l + 0.9h$
    下载: 导出CSV
  • [1] Derler P, Lee E A, Vincentelli A S.Modeling cyber-physical systems.Proceedings of the IEEE, 2012, 100(1):13-28 doi: 10.1109/JPROC.2011.2160929
    [2] Mitchell R, Chen I R.Effect of intrusion detection and response on reliability of cyber physical systems.IEEE Transactions on Reliability, 2013, 62(1):199-210 doi: 10.1109/TR.2013.2240891
    [3] Cao X H, Cheng P, Chen J M, Sam Ge S, Cheng Y, Sun Y X.Cognitive radio based state estimation in cyber-physical systems.IEEE Journal on Selected Areas in Communications, 2014, 32(3):489-502 doi: 10.1109/JSAC.2014.1403002
    [4] Baheti R, Gill H.Cyber-physical systems.The Impact of Control Technology.Washington D.C., USA:IEEE, 2011.161-166
    [5] Cintuglu M H, Mohammed O A, Akkaya K, Uluagac A S.A survey on smart grid cyber-physical system testbeds.IEEE Communications Surveys and Tutorials, 2017, 19(1):446464 doi: 10.1109/COMST.2016.2627399
    [6] Liu Y, Peng Y, Wang B L, Yao S R, Liu Z H.Review on cyber-physical systems.IEEE/CAA Journal of Automatica Sinica, 2017, 4(1):27-40 doi: 10.1109/JAS.2017.7510349
    [7] 温景容, 武穆清, 宿景芳.信息物理融合系统.自动化学报, 2012, 38(4):507-517 http://www.aas.net.cn/CN/abstract/abstract17704.shtml

    Wen Jing-Rong, Wu Mu-Qing, Su Jing-Fang.Cyber-physical system.Acta Automatica Sinica, 2012, 38(4):507-517 http://www.aas.net.cn/CN/abstract/abstract17704.shtml
    [8] Liu E D, Cheng P.Achieving privacy protection using distributed load scheduling:a randomized approach.IEEE Transactions on Smart Grid, 2017, 8(5):2460-2473 doi: 10.1109/TSG.2017.2703400
    [9] Dai W B, Dubinin V N, Christensen J H, Vyatkin V, Guan X P.Toward self-manageable and adaptive industrial cyber-physical systems with knowledge-driven autonomic service management.IEEE Transactions on Industrial Informatics, 2017, 13(2):725-736 doi: 10.1109/TII.2016.2595401
    [10] Deng R L, Zhuang P, Liang H.CCPA:coordinated cyber-physical attacks and countermeasures in smart grid.IEEE Transactions on Smart Grid, 2017, 8(5):2420-2430 doi: 10.1109/TSG.2017.2702125
    [11] Humayed A, Lin J Q, Li F J, Luo B.Cyber-physical systems security-a survey.IEEE Internet of Things Journal, 2017, 4(6):1802-1831 doi: 10.1109/JIOT.2017.2703172
    [12] Tian J, Tan R, Guan X H, Liu T.Enhanced hidden moving target defense in smart grids.IEEE Transactions on Smart Grid, DOI: 10.1109/TSG.2018.2791512, 2018.
    [13] Yang Q Y, Li D H, Yu W, Liu Y K, An D, Yang X Y, et al.Toward data integrity attacks against optimal power flow in smart grid.IEEE Internet of Things Journal, 2017, 4(5):1726-1738 doi: 10.1109/JIOT.2017.2709252
    [14] 孙秋野, 滕菲, 张化光.能源互联网及其关键控制问题.自动化学报, 2017, 43(2):176-194 http://www.aas.net.cn/CN/abstract/abstract18999.shtml

    Sun Qiu-Ye, Teng Fei, Zhang Hua-Guang.Energy internet and its key control issues.Acta Automatica Sinica, 2017, 43(2):176-194 http://www.aas.net.cn/CN/abstract/abstract18999.shtml
    [15] Luo X Y, Yao Q, Wang X Y, Guan X P.Observer-based cyber attack detection and isolation in smart grids.International Journal of Electrical Power and Energy Systems, 2018, 101:127-138 doi: 10.1016/j.ijepes.2018.02.039
    [16] Yan Y, Qian Y, Sharif H, Tipper D.A survey on cyber security for smart grid communications.IEEE Communications Surveys and Tutorials, 2012, 14(4):998-1010 doi: 10.1109/SURV.2012.010912.00035
    [17] Hasan M M, Mouftah H T.A study of resource-constrained cyber security planning for smart grid networks.In:Proceedings of the 2016 IEEE Electrical Power and Energy Conference.Ottawa, Canada:IEEE, 2016.1-6
    [18] Mo Y L, Kim T H J, Brancik K, Dickinson D, Lee H, Perrig A, et al.Cyber-physical security of a smart grid infrastructure.Proceedings of the IEEE, 2012, 100(1):195-209 doi: 10.1109/JPROC.2011.2161428
    [19] Osborne M J, Rubinstein A.A Course in Game Theory.Cambridge:MIT Press, 1994.
    [20] Hewett R, Rudrapattana S, Kijsanayothin P.Cyber-security analysis of smart grid SCADA systems with game models.In:Proceedings of the 9th Annual Cyber and Information Security Research Conference.Oak Ridge, Tennessee, USA:ACM, 2014.109-112
    [21] Maharjan S, Zhu Q Y, Zhang Y, Gjessing S, Basar T.Dependable demand response management in the smart grid:a Stackelberg game approach.IEEE Transactions on Smart Grid, 2013, 4(1):120-132 doi: 10.1109/TSG.2012.2223766
    [22] Ma J H, Liu Y T, Song L Y, Han Z.Multiact dynamic game strategy for jamming attack in electricity market.IEEE Transactions on Smart Grid, 2015, 6(5):2273-2282 doi: 10.1109/TSG.2015.2400215
    [23] Sanjab A, Saad W.Data injection attacks on smart grids with multiple adversaries:a game-theoretic perspective.IEEE Transactions on Smart Grid, 2016, 7(4):2038-2049 doi: 10.1109/TSG.2016.2550218
    [24] Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q S.A survey of game theory as applied to network security.In:Proceedings of the 43rd Hawaii International Conference on System Sciences.Honolulu, HI, USA:IEEE, 2010.1-10
    [25] 袁勇, 王飞跃.不完全信息议价博弈的序贯均衡分析与计算实验.自动化学报, 2016, 42(5):724-734 http://www.aas.net.cn/CN/abstract/abstract18862.shtml

    Yuan Yong, Wang Fei-Yue.Sequential equilibrium analysis and computational experiments of a bargaining game with incomplete information.Acta Automatica Sinica, 2016, 42(5):724-734 http://www.aas.net.cn/CN/abstract/abstract18862.shtml
    [26] Wang K, Du M, Maharjan S, Sun Y F.Strategic honeypot game model for distributed denial of service attacks in the smart grid.IEEE Transactions on Smart Grid, 2017, 8(5):2474-2482 doi: 10.1109/TSG.2017.2670144
    [27] 张维迎.博弈论与信息经济学.上海:格致出版社, 上海三联书店, 上海人民出版社, 2012.

    Zhang Wei-Ying.Game Theory Information Economics.Shanghai:Truth and Wisdom Press, Shanghai Joint Publishing, Shanghai People's Publishing House, 2012.
    [28] Lakshmanan K, de Niz D, Rajkumar R, Moreno G.Resource allocation in distributed mixed-criticality cyber-physical systems.In:Proceedings of the 30th International Conference on Distributed Computing Systems.Genova, Italy:IEEE, 2010.169-178
    [29] 约翰·纳什[著], 张良桥, 王晓刚[译].纳什博弈论论文集.北京: 首都经济贸易大学出版社, 2015.

    Nash J[Author], Zhang Liang-Qiao, Wang Xiao-Gang[Translator].Essays on Game Theory.Beijing: Capital University of Economics and Business Press, 2015.
    [30] 罗斯[著], 龚光鲁[译].随机过程.第2版.北京:机械工业出版社, 2013.

    Ross S M[Author], Gong Guang-Lu[Translator].Stochastic Processes (2nd edition).Beijing:China Machine Press, 2013.
    [31] Li Y Z, Shi L, Cheng P, Chen J M, Quevedo D E.Jamming attacks on remote state estimation in cyber-physical systems:a game-theoretic approach.IEEE Transactions on Automatic Control, 2015, 60(10):2831-2836 doi: 10.1109/TAC.2015.2461851
    [32] Xie L, Mo Y L, Sinopoli B.False data injection attacks in electricity markets.In:Proceedings of the 1st IEEE International Conference on Smart Grid Communications.Gaithersburg, MD, USA:IEEE, 2010.226-231
    [33] Smith R.Assault on California power station raises alarm on potential for terrorism.Wall Street Journal, 2014, 1-7
    [34] Tsang R.Cyberthreats, vulnerabilities and attacks on SCADA networks.University of California, Berkeley, USA, 2010.
    [35] Lee A.Guidelines for Smart Grid Cyber Security, NIST Interagency/Internal Report (NISTIR)-7628, 2010.
  • 加载中
图(3) / 表(5)
计量
  • 文章访问数:  2692
  • HTML全文浏览量:  372
  • PDF下载量:  1071
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-05-29
  • 录用日期:  2018-09-14
  • 刊出日期:  2019-01-20

目录

    /

    返回文章
    返回