File:Iotsec 0817.pdf

We demonstrate how evolutionary game theory can be used to model confidentiality in an advanced metering infrastructure. Theory is introduced and an example case study is presented.