MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory

With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric i...

Full description

Bibliographic Details
Main Authors: Yu Yang, Bichen Che, Yang Zeng, Yang Cheng, Chenyang Li
Format: Article
Language:English
Published: MDPI AG 2019-02-01
Series:Symmetry
Subjects:
Online Access:https://www.mdpi.com/2073-8994/11/2/215
id doaj-4af0f3d8fa894f2094c9f9f174b43047
record_format Article
spelling doaj-4af0f3d8fa894f2094c9f9f174b430472020-11-24T21:15:58ZengMDPI AGSymmetry2073-89942019-02-0111221510.3390/sym11020215sym11020215MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game TheoryYu Yang0Bichen Che1Yang Zeng2Yang Cheng3Chenyang Li4Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWith the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.https://www.mdpi.com/2073-8994/11/2/215Internet of Things systemasymmetric informationevolutionary gameoptimal strategy selection
collection DOAJ
language English
format Article
sources DOAJ
author Yu Yang
Bichen Che
Yang Zeng
Yang Cheng
Chenyang Li
spellingShingle Yu Yang
Bichen Che
Yang Zeng
Yang Cheng
Chenyang Li
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
Symmetry
Internet of Things system
asymmetric information
evolutionary game
optimal strategy selection
author_facet Yu Yang
Bichen Che
Yang Zeng
Yang Cheng
Chenyang Li
author_sort Yu Yang
title MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
title_short MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
title_full MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
title_fullStr MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
title_full_unstemmed MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
title_sort maiad: a multistage asymmetric information attack and defense model based on evolutionary game theory
publisher MDPI AG
series Symmetry
issn 2073-8994
publishDate 2019-02-01
description With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.
topic Internet of Things system
asymmetric information
evolutionary game
optimal strategy selection
url https://www.mdpi.com/2073-8994/11/2/215
work_keys_str_mv AT yuyang maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory
AT bichenche maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory
AT yangzeng maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory
AT yangcheng maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory
AT chenyangli maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory
_version_ 1716743911520600064