Research Article

Vulnerability Analysis of CSP Based on Stochastic Game Theory

Table 2

The description of states.

State Description (the information that the attacker obtains)

State 1 (1) None (initial healthy state)

State 2 (1) Configuration of both main clock node and slave node

State 3 (1) Real-time clock information of main clock node

State 4 (1) Real-time clock information of slave clock node

State 5 (1) Configuration of both main clock node and slave node
(2) Real-time clock information of main clock node

State 6 (1) Configuration of both main clock node and slave node
(2) Real-time clock information of slave clock node

State 7 (1) Real-time clock information of main clock node
(2) Real-time clock information of slave clock node

State 8 (1) Configuration of both main clock node and slave node
(2) Real-time clock information of main clock node
(3) Real-time clock information of slave clock node

State 9 (1) Real-time clock information of main clock node
(2) Real-time clock information of slave clock node
(3) Attacker could change time without being detected

State 10 (1) Configuration of both main clock node and slave node
(2) Real-time clock information of main clock node
(3) Real-time clock information of slave clock node
(4) Attack could change time without being detected