IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v37y2022ics1874548221000755.html
   My bibliography  Save this article

Bayesian games for the cybersecurity of nuclear power plants

Author

Listed:
  • Maccarone, Lee T.
  • Cole, Daniel G.

Abstract

Many modern critical infrastructures are cyber–physical systems that rely on the integration of physical processes and computational resources. While this integration enables advanced system diagnostics, monitoring, and control, it also exposes the physical process to cyber-threats. Critical infrastructures such as nuclear power plants may be targeted by a variety of threat agents, each with unique motivations, resources, and capabilities. A Bayesian game-theoretic approach is presented to secure critical infrastructure when the adversary’s characteristics are uncertain. In a Bayesian game, some players have incomplete information about the other players. Within the context of critical infrastructure cybersecurity, plant defenders have incomplete information about threat agents, and threat agents have incomplete information about plant defenders. A Bayesian game provides a quantitative method for security teams to identify optimal defense strategies.

Suggested Citation

  • Maccarone, Lee T. & Cole, Daniel G., 2022. "Bayesian games for the cybersecurity of nuclear power plants," International Journal of Critical Infrastructure Protection, Elsevier, vol. 37(C).
  • Handle: RePEc:eee:ijocip:v:37:y:2022:i:c:s1874548221000755
    DOI: 10.1016/j.ijcip.2021.100493
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548221000755
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2021.100493?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Von Stengel, Bernhard, 2002. "Computing equilibria for two-person games," Handbook of Game Theory with Economic Applications, in: R.J. Aumann & S. Hart (ed.), Handbook of Game Theory with Economic Applications, edition 1, volume 3, chapter 45, pages 1723-1759, Elsevier.
    2. John C. Harsanyi, 1968. "Games with Incomplete Information Played by "Bayesian" Players Part II. Bayesian Equilibrium Points," Management Science, INFORMS, vol. 14(5), pages 320-334, January.
    3. Prajit K. Dutta, 1999. "Strategies and Games: Theory and Practice," MIT Press Books, The MIT Press, edition 1, volume 1, number 0262041693, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Caetano, Rafaela Vital & Marques, António Cardoso, 2023. "Could energy transition be a game changer for the transfer of polluting industries from developed to developing countries? An application of game theory," Structural Change and Economic Dynamics, Elsevier, vol. 65(C), pages 351-363.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Martin Meier & Burkhard Schipper, 2014. "Bayesian games with unawareness and unawareness perfection," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 56(2), pages 219-249, June.
    2. Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
    3. Giovanni Paolo Crespi & Davide Radi & Matteo Rocca, 2017. "Robust games: theory and application to a Cournot duopoly model," Decisions in Economics and Finance, Springer;Associazione per la Matematica, vol. 40(1), pages 177-198, November.
    4. van Damme, E.E.C., 1995. "Game theory : The next stage," Other publications TiSEM 7779b0f9-bef5-45c7-ae6b-7, Tilburg University, School of Economics and Management.
    5. Andrew M. Colman & Briony D. Pulford, 2015. "Psychology of Game Playing: Introduction to a Special Issue," Games, MDPI, vol. 6(4), pages 1-8, December.
    6. Qipeng Sun & Yuqi He & Yongjie Wang & Fei Ma, 2019. "Evolutionary Game between Government and Ride-Hailing Platform: Evidence from China," Discrete Dynamics in Nature and Society, Hindawi, vol. 2019, pages 1-14, January.
    7. William W. Wilson & Bruce L. Dahl, 2004. "Transparency and Bidding Competition in International Wheat Trade," Canadian Journal of Agricultural Economics/Revue canadienne d'agroeconomie, Canadian Agricultural Economics Society/Societe canadienne d'agroeconomie, vol. 52(1), pages 89-105, March.
    8. Bernhard von Stengel & Antoon van den Elzen & Dolf Talman, 2002. "Computing Normal Form Perfect Equilibria for Extensive Two-Person Games," Econometrica, Econometric Society, vol. 70(2), pages 693-715, March.
    9. Benjamin Patrick Evans & Mikhail Prokopenko, 2021. "Bounded rationality for relaxing best response and mutual consistency: The Quantal Hierarchy model of decision-making," Papers 2106.15844, arXiv.org, revised Mar 2023.
    10. Özalp Özer & Yanchong Zheng & Kay-Yut Chen, 2011. "Trust in Forecast Information Sharing," Management Science, INFORMS, vol. 57(6), pages 1111-1137, June.
    11. Lan Zhao & Jishan Zhu, 2010. "Internet Marketing Budget Allocation: From Practitioner'S Perspective," International Journal of Information Technology & Decision Making (IJITDM), World Scientific Publishing Co. Pte. Ltd., vol. 9(05), pages 779-797.
    12. Mark A. Satterthwaite, 1979. "On the Scope of Stockholder Unanimity Theorems," Discussion Papers 368, Northwestern University, Center for Mathematical Studies in Economics and Management Science.
    13. Fabrizio Germano, 2006. "On some geometry and equivalence classes of normal form games," International Journal of Game Theory, Springer;Game Theory Society, vol. 34(4), pages 561-581, November.
    14. Sundström, David, 2016. "On Specification and Inference in the Econometrics of Public Procurement," Umeå Economic Studies 931, Umeå University, Department of Economics.
    15. Scandizzo, Pasquale L. & Ventura, Marco, 2010. "Sharing risk through concession contracts," European Journal of Operational Research, Elsevier, vol. 207(1), pages 363-370, November.
    16. Wen Zhou & Nikita Koptyug & Shutao Ye & Yifan Jia & Xiaolong Lu, 2016. "An Extended N-Player Network Game and Simulation of Four Investment Strategies on a Complex Innovation Network," PLOS ONE, Public Library of Science, vol. 11(1), pages 1-18, January.
    17. Porter, Ryan & Nudelman, Eugene & Shoham, Yoav, 2008. "Simple search methods for finding a Nash equilibrium," Games and Economic Behavior, Elsevier, vol. 63(2), pages 642-662, July.
    18. Fernando Ordóñez & Nicolás E. Stier-Moses, 2010. "Wardrop Equilibria with Risk-Averse Users," Transportation Science, INFORMS, vol. 44(1), pages 63-86, February.
    19. Nil Kilicay‐Ergin & Cihan Dagli, 2015. "Incentive‐Based Negotiation Model for System of Systems Acquisition," Systems Engineering, John Wiley & Sons, vol. 18(3), pages 310-321, May.
    20. Waśniewski, Krzysztof, 2012. "Local governments’ fiscal policy as a factor of urban development – evidence from Poland," MPRA Paper 39176, University Library of Munich, Germany.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:37:y:2022:i:c:s1874548221000755. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.