Information Security Problem Research Based on Game Theory

被引:0
|
作者
Sun, Wei [1 ]
Kong, Xiangwei [1 ]
He, Dequan [1 ]
You, Xingang [1 ]
机构
[1] Dalian Univ Technol, Sch Elect & Informat Engn, Dalian 116024, Peoples R China
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on Evolutionary Game Theory. In this paper, we set up the information security game model with penalty parameter, calculate Replicator Dynamics, and analyze the Evolutionary Stable Strategy of the game model. The result reveals that reducing the investment cost is the key factor to promote information security investment. If this condition can not be satisfied the regulation of penalty parameter will help to promote the investment. The research method in this paper provides a new thought for the solution of information security in the mobile electronic commerce chain.
引用
收藏
页码:554 / 557
页数:4
相关论文
共 50 条
  • [1] Research on Information Security Cost Based on Game-Theory
    Zuo, Zheng
    Fang, Yong
    Liu, Liang
    Fang, Fang
    Hu, Xingrong
    [J]. PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1433 - 1436
  • [2] Game Theory and Information Security
    Meng Xianghong
    Wang Xiaoli
    [J]. ADVANCED RESEARCH IN MATERIAL SCIENCE AND MECHANICAL ENGINEERING, PTS 1 AND 2, 2014, 446-447 : 1625 - +
  • [3] Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
    Sadkhan, Sattar B.
    Reda, Dhilal M.
    [J]. 2018 INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND THEIR APPLICATIONS (IICETA), 2018, : 118 - 123
  • [4] Security of Networked Control Systems with Incomplete Information Based on Game Theory
    Gao, Lei
    Sun, Jian
    Li, Jun
    [J]. PROCEEDINGS OF THE 39TH CHINESE CONTROL CONFERENCE, 2020, : 6701 - 6706
  • [5] Game Theory Meets Information Security Management
    Fielder, Andrew
    Panaousis, Emmanouil
    Malacaria, Pasquale
    Hankin, Chris
    Smeraldi, Fabrizio
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 15 - 29
  • [6] Research on Network Security Situation Prediction Based on Markov Game Theory
    Yong, Wang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 301 - 308
  • [7] Incentive Mechanism Design Based on Repeated Game Theory in Security Information Sharing
    Xiong Qiang
    Chen Xiaoyan
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON SCIENCE AND SOCIAL RESEARCH (ICSSR 2013), 2013, 64 : 399 - 401
  • [8] A Game Theory Approach in Information Security Risk Study
    Shing, Marn-Ling
    Shing, Chen-Chi
    Chen, Kuo Lane
    Lee, Huei
    [J]. E-BUSINESS, MANAGEMENT AND ECONOMICS, 2011, 3 : 201 - +
  • [9] Research on the Project Supervision Game Model Based on the Information Asymmetry Theory
    Zheng, Xiazhong
    Guo, Jie
    Chen, Shu
    [J]. 2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 486 - +
  • [10] Research on Application of Game Theory in the Information Fusion
    Xiao Xin-hua
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS: ICCEA 2010, PROCEEDINGS, VOL 2, 2010, : 48 - 51