{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:54:14Z","timestamp":1773179654728,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T00:00:00Z","timestamp":1595894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010663","name":"H2020 European Research Council","doi-asserted-by":"publisher","award":["787011"],"award-info":[{"award-number":["787011"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The smart grid provides advanced functionalities, including real-time monitoring, dynamic energy management, advanced pricing mechanisms, and self-healing, by enabling the two-way flow of power and data, as well as the use of Internet of Things (IoT) technologies and devices. However, converting the traditional power grids to smart grids poses severe security challenges and makes their components and services prone to cyber attacks. To this end, advanced techniques are required to mitigate the impact of the potential attacks. In this paper, we investigate the use of honeypots, which are considered to mimic the common services of the smart grid and are able to detect unauthorized accesses, collect evidence, and help hide the real devices. More specifically, the interaction of an attacker and a defender is considered, who both optimize the number of attacks and the defending system configuration, i.e., the number of real devices and honeypots, respectively, with the aim to maximize their individual payoffs. To solve this problem, game theoretic tools are used, considering an one-shot game and a repeated game with uncertainty about the payoff of the attacker, where the Nash Equilibrium (NE) and the Bayesian NE are derived, respectively. Finally, simulation results are provided, which illustrate the effectiveness of the proposed framework.<\/jats:p>","DOI":"10.3390\/s20154199","type":"journal-article","created":{"date-parts":[[2020,7,29]],"date-time":"2020-07-29T07:31:45Z","timestamp":1596007905000},"page":"4199","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Game Theoretic Honeypot Deployment in Smart Grid"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7795-8311","authenticated-orcid":false,"given":"Panagiotis","family":"Diamantoulakis","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0210-5290","authenticated-orcid":false,"given":"Christos","family":"Dalamagkas","sequence":"additional","affiliation":[{"name":"Testing, Research and Standards Centre, Public Power Corporation S.A., 15351 Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1605-9413","authenticated-orcid":false,"given":"Panagiotis","family":"Radoglou-Grammatikis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Western Macedonia, 50100 Kozani, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6042-0355","authenticated-orcid":false,"given":"Panagiotis","family":"Sarigiannidis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Western Macedonia, 50100 Kozani, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8810-0345","authenticated-orcid":false,"given":"George","family":"Karagiannidis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, 54124 Thessaloniki, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2020,7,28]]},"reference":[{"key":"ref_1","unstructured":"(2020, June 13). Cisco Annual Internet Report (2018\u20132023). White Paper. Available online: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html."},{"key":"ref_2","unstructured":"Littlefield, M. (2017). Putting Industrial Cyber Security at the Top of the CEO Agenda, LNS Research Library."},{"key":"ref_3","unstructured":"(2020, June 13). Available online: http:\/\/www3.weforum.org\/docs\/WEF_GRR18_Report.pdf."},{"key":"ref_4","unstructured":"(2020, June 13). The SPEAR Project. Available online: https:\/\/www.spear2020.eu\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MSECP.2003.1193207","article-title":"The Honeynet Project: Trapping the hackers","volume":"1","author":"Spitzner","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"ref_6","unstructured":"Spitzner, L. (2020, June 13). The Value of Honeypots, Part One: Definitions and Values of Honeypots. Available online: http:\/\/www.symantec.com\/connect\/articles\/value-honeypots-part-one-definitions-and-values-honeypots."},{"key":"ref_7","unstructured":"Scott, C., and Carbone, R. (2014). Designing and Implementing a Honeypot for a SCADA Network, SANS Institute Reading Room."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"684","DOI":"10.1109\/TSG.2016.2561266","article-title":"Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks","volume":"9","author":"Wei","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3337772","article-title":"A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy","volume":"52","author":"Pawlick","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"64075","DOI":"10.1109\/ACCESS.2020.2984795","article-title":"Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid","volume":"8","author":"Tian","year":"2020","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/s12046-019-1228-4","article-title":"Using game theory to model DoS attack and defence","volume":"44","author":"Kumar","year":"2019","journal-title":"S\u0101dhan\u0101"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"\u00c7eker, H., Zhuang, J., Upadhyaya, S., La, Q.D., and Soong, B.H. (2016). Deception-Based Game Theoretical Approach to Mitigate DoS Attacks. Lecture Notes in Computer Science, Springer International Publishing.","DOI":"10.1007\/978-3-319-47413-7_2"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2474","DOI":"10.1109\/TSG.2017.2670144","article-title":"Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid","volume":"8","author":"Wang","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1109\/TII.2019.2917912","article-title":"An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things","volume":"16","author":"Du","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Cho, J.H., Zhu, M., and Singh, M. (2019). Modeling and Analysis of Deception Games Based on Hypergame Theory. Auton. Cyber Decept., Springer International Publishing.","DOI":"10.1007\/978-3-030-02110-8_4"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"101579","DOI":"10.1016\/j.cose.2019.101579","article-title":"Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games","volume":"87","author":"Kiekintveld","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_17","first-page":"193","article-title":"Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model","volume":"60","author":"Tian","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"585","DOI":"10.4218\/etrij.2019-0152","article-title":"Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems","volume":"41","author":"Tian","year":"2019","journal-title":"ETRI J."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1025","DOI":"10.1109\/JIOT.2016.2547994","article-title":"Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things","volume":"3","author":"La","year":"2016","journal-title":"IEEE Int. Things J."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"La, Q.D., Quek, T.Q.S., and Lee, J. (2016, January 22\u201327). A game theoretic model for enabling honeypots in IoT networks. Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7510833"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bilinski, M., Gabrys, R., and Mauger, J. (2018). Optimal Placement of Honeypots for Network Defense. Lecture Notes in Computer Science, Springer International Publishing.","DOI":"10.1007\/978-3-030-01554-1_7"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Fraunholz, D., and Schotten, H.D. (2018, January 10\u201312). Strategic defense and attack in deception based network security. Proceedings of the 2018 International Conference on Information Networking (ICOIN), Chiang Mai, Thailand.","DOI":"10.1109\/ICOIN.2018.8343103"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Jicha, A., Patton, M., and Chen, H. (2016, January 28\u201330). SCADA honeypots: An in-depth analysis of Conpot. Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, USA.","DOI":"10.1109\/ISI.2016.7745468"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Dalamagkas, C., Sarigiannidis, P., Ioannidis, D., Iturbe, E., Nikolis, O., Ramos, F., Rios, E., Sarigiannidis, A., and Tzovaras, D. (2019, January 24\u201328). A Survey On Honeypots, Honeynets and Their Applications On Smart Grid. Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France.","DOI":"10.1109\/NETSOFT.2019.8806693"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.icte.2018.01.015","article-title":"Impact of optimal false data injection attacks on local energy trading in a residential microgrid","volume":"4","author":"Islam","year":"2018","journal-title":"ICT Express"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.bdr.2015.03.003","article-title":"Big data analytics for dynamic energy management in smart grids","volume":"2","author":"Diamantoulakis","year":"2015","journal-title":"Big Data Res."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2873","DOI":"10.1109\/JSYST.2018.2868291","article-title":"Impact of Passive and Active Security Attacks on MIMO Smart Grid Communications","volume":"13","author":"Shafie","year":"2019","journal-title":"IEEE Syst. J."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"5678","DOI":"10.1109\/ACCESS.2017.2695520","article-title":"Impact of the Wireless Network\u2019s PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid","volume":"5","author":"Niyato","year":"2017","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2012.6231158","article-title":"Reliability analysis and redundancy design of smart grid wireless communications system for demand side management","volume":"19","author":"Niyato","year":"2012","journal-title":"IEEE Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/TSG.2010.2089069","article-title":"Autonomous Demand-Side Management Based on Game-Theoretic Energy Consumption Scheduling for the Future Smart Grid","volume":"1","author":"Wong","year":"2010","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"154167","DOI":"10.1109\/ACCESS.2019.2948356","article-title":"Game Theoretical Modelling of Network\/Cybersecurity","volume":"7","author":"Iqbal","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Garg, N., and Grosu, D. (2007, January 20\u201322). Deception in Honeynets: A Game-Theoretic Analysis. Proceedings of the 2007 IEEE SMC Information Assurance and Security Workshop, West Point, NY, USA.","DOI":"10.1109\/IAW.2007.381921"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/SURV.2012.062612.00056","article-title":"Game Theory for Network Security","volume":"15","author":"Liang","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1002\/jae.583","article-title":"Econometric applications of maxmin expected utility","volume":"15","author":"Chamberlain","year":"2000","journal-title":"J. Appl. Econom."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Liu, Y., Comaniciu, C., and Man, H. A Bayesian game approach for intrusion detection in wireless ad hoc networks. Proceedings of the 2006 Workshop on Game Theory for Communications and Networks.","DOI":"10.1145\/1190195.1190198"},{"key":"ref_36","first-page":"1","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"Diamond","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1080\/23307706.2017.1397554","article-title":"A rewriting system for convex optimization problems","volume":"5","author":"Agrawal","year":"2018","journal-title":"J. Control Decis."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/15\/4199\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:52:25Z","timestamp":1760176345000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/15\/4199"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,28]]},"references-count":37,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2020,8]]}},"alternative-id":["s20154199"],"URL":"https:\/\/doi.org\/10.3390\/s20154199","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,28]]}}}