Abstract
Based on the bimatrix game theory, the network data transmission has been depicted in a game theory way: the actions of the attacker and defender (legitimate users) are depicted within a two-person, non-cooperative and bimatrix game model, this paper proves the existence of the Nash equilibrium theoretically, which is further illustrated by the experimental results.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Xia Zhengyou, Zhang Shiyong. A Kind of Network Security Behavior Model Based on Game Theory [J].Parallel and Distributed Computing, Applications and Technologies, 2003,20(4):950–954 (Ch).
Szczerba R J, Galkowski P, Glicktein I S,et al. Robust Algorithm for Real-Time Route Planning [J].Aerospace and Electronic Systems, IEEE Transactions, 2000,11(3):318–335.
Lee J, Kim Y, Lee H S. Fast Route Recovery Methods for Cellular IP Access Network [J].Vehicular Technology Conference, 2005,4(1):2580–2584.
Wang Z, Crowcroft J. Quality of Service Routing for Supporting Multimedia Applications [J].IEEE Journal on Selected Areas in Communications, 1996,14(7):1228–1234.
Saltzer J, Reed D, Clark D. End-to-End Arguments in System Design [J].AMC Trans on Computer Systems, 1984,2 (4):195–206.
Xiao Xipeng, Lionel M N. Internet QoS: A Big Picture [J].IEEE Network, 1999,13(2):8–18.
Dafermos S, Sparrow F T. The Traffic Assignment Problem for a General Network [J].J Res National Bureau Standards-B Math Sci, 1969,73B(2):91–118.
Korilis Y A, Lazar A. On the Existence of Equilibria in Noncooperative Optimal Flow Control [J].J ACM, 1995,42 (3):584–613.
Srikant R, Whitt W. Simulation Run Lengths to Estimate Blocking Probabilities [J].ACM Trans Modeling Comp Sim, 1996,6(1):7–52.
Bohacek S, Hespanha J, Obraczka K,et al. Enhancing Security via Stochastic Routing [J].Computer Communications and Networks, 2002,14(21):58–62.
La R J, Anantharam V. Optimal Routing Control: Repeated Game Approach [J].IEEE Transactions, 2002,27(3):437–450.
Zhang Weiying.Game Theory and Information Economics [M]. Shanghai: Shanghai People's Publishing House, 1996 (Ch).
Lye Kongwei, Wing J M. Game Strategies in Network Security [J].International Journal of Information Security, 2005,4(1–2):71–86.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Nature Science Foundation of China (90104029) and the Specialized Research Fund for the Doctoral Program of Higher Education (20050487046)
Biography: ZHENG Ying(1980-), male, Ph. D. candidate, research direction: network security.
Rights and permissions
About this article
Cite this article
Ying, Z., Hanping, H. & Wenxuan, G. Network security transmission based on bimatrix game theory. Wuhan Univ. J. Nat. Sci. 11, 617–620 (2006). https://doi.org/10.1007/BF02836676
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02836676