Game theory in network security for digital twins in industry

IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS
{"title":"Game theory in network security for digital twins in industry","authors":"","doi":"10.1016/j.dcan.2023.01.004","DOIUrl":null,"url":null,"abstract":"<div><p>To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (<em>X</em>) of white Hat 1 choosing the knowledge sharing policy is related to the probability (<em>x</em><sub>0</sub>) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (<em>y</em><sub>0</sub>) of white hat 2 choosing the knowledge sharing policy initially. When <em>y</em><sub>0</sub> ​= ​0.9, <em>X</em> converges rapidly in a relatively short time. When <em>y</em><sub>0</sub> is constant and <em>x</em><sub>0</sub> is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the \"cooperative development\" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the \"attack and defense game model\", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":null,"pages":null},"PeriodicalIF":7.5000,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864823000172/pdfft?md5=e4bd0604e0a430227120098d1040c077&pid=1-s2.0-S2352864823000172-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Communications and Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2352864823000172","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion, a series of discussions on network security issues are carried out based on game theory. From the perspective of the life cycle of network vulnerabilities, mining and repairing vulnerabilities are analyzed by applying evolutionary game theory. The evolution process of knowledge sharing among white hats under various conditions is simulated, and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed. On this basis, the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm (WCA) to produce better replacement individuals with greater probability from the perspective of both attack and defense. Through the simulation experiment, it is found that the convergence speed of the probability (X) of white Hat 1 choosing the knowledge sharing policy is related to the probability (x0) of white Hat 2 choosing the knowledge sharing policy initially, and the probability (y0) of white hat 2 choosing the knowledge sharing policy initially. When y0 ​= ​0.9, X converges rapidly in a relatively short time. When y0 is constant and x0 is small, the probability curve of the “cooperative development” strategy converges to 0. It is concluded that the higher the trust among the white hat members in the temporary team, the stronger their willingness to share knowledge, which is conducive to the mining of loopholes in the system. The greater the probability of a hacker attacking the vulnerability before it is fully disclosed, the lower the willingness of manufacturers to choose the "cooperative development" of vulnerability patches. Applying the improved wolf colony-co-evolution algorithm can obtain the equilibrium solution of the "attack and defense game model", and allocate the security protection resources according to the importance of nodes. This study can provide an effective solution to protect the network security for digital twins in the industry.

工业数字孪生网络安全的博弈论
为确保工业数字双胞胎网络的安全运行,避免黑客入侵对系统造成危害,基于博弈论对网络安全问题进行了一系列探讨。从网络漏洞的生命周期角度出发,运用演化博弈论对漏洞的挖掘和修复进行了分析。模拟了各种条件下白帽之间知识共享的演化过程,构建了厂商之间漏洞补丁合作开发策略的博弈模型。在此基础上,将差分进化引入狼群算法(WCA)的更新机制,从攻防两端的角度出发,以更大的概率产生更好的替换个体。通过仿真实验发现,白帽子 1 选择知识共享策略的概率(X)的收敛速度与白帽子 2 最初选择知识共享策略的概率(x0)和白帽子 2 最初选择知识共享策略的概率(y0)有关。当 y0 = 0.9 时,X 会在相对较短的时间内迅速收敛。当 y0 恒定且 x0 较小时,"合作开发 "策略的概率曲线收敛为 0。结论是临时团队中白帽成员之间的信任度越高,他们分享知识的意愿就越强,有利于挖掘系统漏洞。黑客在漏洞完全公开之前攻击漏洞的概率越大,制造商选择 "合作开发 "漏洞补丁的意愿就越低。应用改进的狼群协同进化算法可以得到 "攻防博弈模型 "的均衡解,并根据节点的重要性分配安全防护资源。本研究可为保护行业数字孪生网络安全提供有效的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Digital Communications and Networks
Digital Communications and Networks Computer Science-Hardware and Architecture
CiteScore
12.80
自引率
5.10%
发文量
915
审稿时长
30 weeks
期刊介绍: Digital Communications and Networks is a prestigious journal that emphasizes on communication systems and networks. We publish only top-notch original articles and authoritative reviews, which undergo rigorous peer-review. We are proud to announce that all our articles are fully Open Access and can be accessed on ScienceDirect. Our journal is recognized and indexed by eminent databases such as the Science Citation Index Expanded (SCIE) and Scopus. In addition to regular articles, we may also consider exceptional conference papers that have been significantly expanded. Furthermore, we periodically release special issues that focus on specific aspects of the field. In conclusion, Digital Communications and Networks is a leading journal that guarantees exceptional quality and accessibility for researchers and scholars in the field of communication systems and networks.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信