MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory
With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric i...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2019-02-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/11/2/215 |
id |
doaj-4af0f3d8fa894f2094c9f9f174b43047 |
---|---|
record_format |
Article |
spelling |
doaj-4af0f3d8fa894f2094c9f9f174b430472020-11-24T21:15:58ZengMDPI AGSymmetry2073-89942019-02-0111221510.3390/sym11020215sym11020215MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game TheoryYu Yang0Bichen Che1Yang Zeng2Yang Cheng3Chenyang Li4Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaInformation Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, ChinaWith the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems.https://www.mdpi.com/2073-8994/11/2/215Internet of Things systemasymmetric informationevolutionary gameoptimal strategy selection |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yu Yang Bichen Che Yang Zeng Yang Cheng Chenyang Li |
spellingShingle |
Yu Yang Bichen Che Yang Zeng Yang Cheng Chenyang Li MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory Symmetry Internet of Things system asymmetric information evolutionary game optimal strategy selection |
author_facet |
Yu Yang Bichen Che Yang Zeng Yang Cheng Chenyang Li |
author_sort |
Yu Yang |
title |
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory |
title_short |
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory |
title_full |
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory |
title_fullStr |
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory |
title_full_unstemmed |
MAIAD: A Multistage Asymmetric Information Attack and Defense Model Based on Evolutionary Game Theory |
title_sort |
maiad: a multistage asymmetric information attack and defense model based on evolutionary game theory |
publisher |
MDPI AG |
series |
Symmetry |
issn |
2073-8994 |
publishDate |
2019-02-01 |
description |
With the rapid development and widespread applications of Internet of Things (IoT) systems, the corresponding security issues are getting more and more serious. This paper proposes a multistage asymmetric information attack and defense model (MAIAD) for IoT systems. Under the premise of asymmetric information, MAIAD extends the single-stage game model with dynamic and evolutionary game theory. By quantifying the benefits for both the attack and defense, MAIAD can determine the optimal defense strategy for IoT systems. Simulation results show that the model can select the optimal security defense strategy for various IoT systems. |
topic |
Internet of Things system asymmetric information evolutionary game optimal strategy selection |
url |
https://www.mdpi.com/2073-8994/11/2/215 |
work_keys_str_mv |
AT yuyang maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory AT bichenche maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory AT yangzeng maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory AT yangcheng maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory AT chenyangli maiadamultistageasymmetricinformationattackanddefensemodelbasedonevolutionarygametheory |
_version_ |
1716743911520600064 |